Ping Identity - IdP for My Page - RSA Ready Implementation Guide
Originally Published: 2023-10-05
This section describes how to configure Ping Identity as an IdP for My Page.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA My Page as a service provider for Ping Identity.
Procedure
- Sign into RSA Cloud Administration Console and browse to Users > Identity Providers.
- Click Add for Cloud Identity Providers.
- In the Name and Description section, enter a name for the identity provider and add an optional description.
- In the Configuration section, provide the following details.
- Issuer ID: Enter the value provided by Ping Identity.
- Issuer URL: Enter the value of the Single Sign-on Service provided by Ping Identity.
- Audience ID: Enter a value that the identity provider will insert into SAML assertions to indicate for whom the assertions are intended.
The value is also used as the Entity ID in SAML requests sent to the identity provider. - Assertion Consumer Service (ACS) URL: Displays the URL that Ping Identity will use to set up the service provider.
- In the Certificate section, click Choose File to upload a certificate that the Cloud Authentication Service uses to validate the assertion signature provided by Ping Identity.
This is the certificate downloaded from the Ping Identity side. - Navigate to Access > My Page and enable Self-Service.
The users can use the URL displayed for accessing My Page. - In the Authentication section, change the Primary Authentication Method to Performed by Cloud Identity Provider and choose the created IdP from the Cloud Identity Providers list.
- Choose your preferred access policy for additional authentication if needed.
For testing purposes, you can select a policy that requires no additional step-up authentication. - Ensure that:
- An identity source is created in RSA Cloud Authentication Service under Users > Identity Sources or create a local identity source for testing purposes.
- Create new users in the local identity source.
These users can access My Page.
Configure Ping Identity
Perform these steps to configure Ping Identity as the third-party IdP for My Page.
Procedure
- Sign into Ping Identity Admin Console, click Administrator to access the environment.
- In the left pane, click Connections > Applications.
- Click the plus icon.
- In the Add Application window, enter a name for the application and an optional description.
- Click SAML Application and click Configure.
- Choose Manually Enter.
- Enter the ACS URLs from RSA Cloud Administration Console and the Entity ID which should match the Audience ID in the configuration done in RSA.
- Click Save.
The application appears in the set of applications managed as SPs to Ping Identity. - Click the newly created application.
- Navigate to the Configure tab and click the edit icon.
- In the Subject NameID Format field, select the email address format and click Save.
- Click the Attribute Mappings tab and click the edit icon.
- Select Email address for the PingOne Mappings field and click Save.
- On the Configuration tab, under Connection Details, download the signing certificate and apply it in RSA Cloud Authentication Console configuration under the Certificate section.
- Enable the application by toggling the switch button for the application.
Users can now log on to My Page and get authenticated by Ping Identity.
Configuration is complete.
Return to the main page.
Related Articles
Cloud Administration Live Verification APIs 32Number of Views SA server is not connecting SA Live cloud due to Local network Proxy 8Number of Views Live Verification Policy 53Number of Views Live Verification for Users 80Number of Views Authentication Manager 7.x stops authenticating and hanging - unable open any tab in Security and Operations Console after… 12Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?