Ping Identity - IdP for Cloud Authentication Service - RSA Ready Implementation Guide
Originally Published: 2023-10-05
This section describes how to configure Ping Identity as an IdP for RSA Cloud Authentication Service.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as a service provider for Ping Identity.
Procedure
- Sign into the RSA Cloud Administration Console and browse to My Account > Company Settings > Sessions & Authentication.
- In the Cloud Administration Console Authentication > Primary Authentication section, click Third-Party Identity Provider (IdP) and perform the following steps.
- Sign-in URL: Displays the URL that the administrators will use when they sign in to the Cloud Administration Console through a third-party IdP.
- Assertion Consumer Service (ACS) URL: Displays the URL that Ping Identity will use to set up the service provider.
- Issuer ID: Enter the value provided by Ping Identity.
- Issuer URL: Enter the value of the Single Sign-on Service provided by Ping Identity.
- Audience ID: Enter a value that the identity provider will insert into SAML assertions to indicate for whom the assertions are intended. The value is set as the Entity ID in SAML requests sent to the identity provider.
- In the Cloud Administration Console Authentication > SAML Response Signature section, click Choose File to upload a certificate that the Cloud Authentication Service uses to validate the assertion signature provided by Ping Identity.
- Click Save Settings.
- Click Publish Changes.
Configure Ping Identity
Perform these steps to configure Ping Identity as the third-party IdP for RSA Cloud Authentication Service.
Procedure
- Sign into Ping Identity Admin Console, click Administrator to access the environment.
- In the left pane, click Connections > Applications.
- Click the plus icon.
- In the Add Application window, enter a name for the application and an optional description.
- Click SAML Application and click Configure.
- Choose Manually Enter.
- Enter the ACS URLs from RSA Cloud Administration Console and the Entity ID which should match the Audience ID in the configuration done in RSA.
- Click Save.
The application appears in the set of applications managed as SPs to Ping Identity. - Click the newly created application.
- Navigate to the Configure tab and click the edit icon.
- In the Subject NameID Format field, select the email address format and click Save.
- Click the Attribute Mappings tab and click the edit icon.
- Select Email address for the PingOne Mappings field and click Save.
- On the Configuration tab, under Connection Details, download the signing certificate and apply it in the RSA Cloud Authentication Console configuration under the SAML Response Signature section.
- Enable the application by toggling the switch button for the application.
Users can now log on to My Page and get authenticated by Ping Identity.
Configuration is complete.
Return to the main page.
Related Articles
RSA Governance & Lifecycle Integration: Microsoft Azure Active Directory AD Summary 199Number of Views Microsoft 365 with Azure AD - RSA Ready Implementation Guide 98Number of Views Microsoft Azure Active Directory - IdP for My Page - RSA Ready Implementation Guide 105Number of Views Microsoft Azure Active Directory - IdP for Cloud Authentication Service - RSA Ready Implementation Guide 136Number of Views Microsoft Azure Active Directory - Third-Party IdP Integration - RSA Ready Implementation Guide 186Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?