Federated Directory - SAML Relying Party Configuration RSA Ready Implementation Guide
Originally Published: 2023-07-28
This section describes how to integrate RSA Cloud Authentication Service with Federated Directory using SAML Relying Party.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as Relying Party to Federated Directory.
Procedure
- Log on to RSA Cloud Administration Console.
- On the Authentication Clients menu, click Relying Parties.
- Click Add a Relying Party on the My Relying Parties page.
- In the Relying Party Catalog, select +Add for Service Provider SAML.
- On the Basic Information page, in the Name field, provide a name for the Service Provider.
- Click Next Step.
- On the Authentication page, click SecurID Access manages all authentication.
- In the Primary Authentication Method list, select your desired logon method as Password or SecurID.
- In the Access Policy list, select a policy that was previously configured.
- Click Next Step.
- Configure connection profile for Federated Directory via Enter Manually.
- Scroll down to the Service Provider Metadata section.
-
ACL URL - https://api.federated.directory/v2/Login/Saml2/<Directory ID> /Acs
-
Service Provider Entity ID – federated.directory/<Directory ID>
-
- Click Default Service Provide Entity ID.
- Click Download Certificate and save the content of the certificate to be used when configuring the service provider. Click IdP signs assertion within response.
- Configure User Identity for NAMEID mapping.
Identity Type – Email Address
Property - mail
- Click Save and Finish.
- On the top menu click Publish Changes.
Configure Federated Directory
Perform these steps to configure Federated Directory.
Procedure
- Log on to your Federated Directory account.
- Navigate to Directories, then click CREATE DIRECTORY.
- Provide your new directory a name and a short description, then click CREATE DIRECTORY.
- Go to the Settings tab and copy the Id value .This value will be used in the ACS URL which will be added in RSA.
- Select the options of Federated Directory Accounts and SAML.
- Provide the value of IdP entity id generated in RSA and paste it on the Login URL.
- Paste the certificate value copied from the certificate generated (Step 14 of the previous section).
- Remove the begin certificate and end certificate comment before pasting.
Notes
User creation for testing requires selecting the option of Federated Directory accounts. For creating the user, perform the following steps.
- Go to the Users tab and select CREATE USER.
- Set the same password as in RSA for testing purposes.
- To test the SP initiated flow, go to https://www.federated.directory/of/<your-company-name>
Configuration is complete.
Return to main page.
Related Articles
Federated Directory - SAML My Page SSO Configuration RSA Ready Implementation Guide 1Number of Views Federated Directory - SAML IDR SSO Configuration RSA Ready Implementation Guide 5Number of Views Federated Directory - RSA Ready Implementation Guide 2Number of Views Error: 'Relying Party servlet: java.lang.NullPointerException' in RSA Federated Identity Manager (FIM) 30Number of Views Federated Salesforce Account Collector fails with 'Invalid Credentials' in RSA Identity Governance & Lifecycle 118Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?