Announcements

SecurID® Integrations

ParkMyCloud-integration-configuration-relying-party

 

ParkMyCloud - SAML Relying Party Configuration - SecurID Access Implementation Guide

This section describes how to integrate SecurID Access with ParkMyCloud using Relying Party. Relying party uses SAML 2.0 to integrate SecurID Access as a SAML Identity Provider (IdP) to ParkMyCloud SAML Service Provider (SP).

Architecture Diagram

gmoison_7-1638977842084.png

 

Configure SecurID Access Cloud Authentication Service

Perform these steps to configure SecurID Access Cloud Authentication Service(CAS) as a relying party SAML IdP to ParkMyCloud .

Procedure

  1. Sign into the Cloud Administration Console and browse to Authentication Clients > Relying Parties and click Add a Relying Party. Then select Add for a SAML service provider.

    gmoison_6-1638977832191.png

     

    gmoison_5-1638977825241.png

     

  2. On Basic Information page enter a Name for the application, ie. ParkMyCloud Then click on Next Step.

  3. On Authentication page.

    1. select the RSA SecurID Access manages all authentication.

    2. Select the desired Primary Authentication Method from the dropdown list.

    3. Select the desired policy from the Access Policy for Additional Authentication.

    4. Click Next Step.

      gmoison_4-1638977812182.png

       

  4. On Connection Profile page.

    1. Under the Service Provider Metadata section.

      gmoison_3-1638977793773.png

       

    2. For the Assertion Consumer Service (ACS) enter the SP ASC URL from ParkMyCloud SP information in the SSO setup below. This URL is based on your instance of ParkMyCloud. For example, https://console.parkmycloud.com/saml/sso/085a115594196aeb29c871efbetestsb.

    3. For the Service Provider Entity ID enter the SP Entity ID from ParkMyCloud SP information in the SSO setup below. This URL is based on your instance of ParkMyCloud. For example, https://console.parkmycloud.com/saml/sso/085a115594196aeb29c871efbetestsb.

    4. Uncheck SP signs SAML Requests.

    5. Check IdP signs assertion within response.

    6. Click on Download Certificate. This will be used below in the ParkMyCloud configuration.

    7. Open Advanced Configuration section.

      gmoison_2-1638977756833.png

       

    8. Note the Identity Provider Entity ID field . For Example :https://rsa-test-pe.auth-demo.securid.com/saml-fe/sso.

  5. Click on Save and Finish.

  6. Browse to Authentication Clients > Relying Parties .

  7. Scroll down to the your newly created Relying party and click down arrow to Edit and choose View or Download IdP MetatData and save off the metadata information if desired.

    gmoison_1-1638977738078.png

     

  8. Click on Publish Changes. Your application is now enabled for SSO. If you make any additional changes to the application configuration you will need to republish.

    gmoison_0-1638977716184.png

     

 

Configure ParkMyCloud

Perform these steps to integrate ParkMyCloud with SecurID Access as a Relying Party SAML SP.

Procedure

  1. Login into ParkMyCloud.

  2. Click on Single Sign-On.

  3. check Enabled.

  4. At the bottom note the SP ACS URL and SP Entitity ID. These will be used in the SecurID configuration above.

  5. In the Initial Team field select My First Team.

  6. In the IdP field select Custom.

  7. In the IdP Configuration field select Manual.

  8. For IdP sign-in URL provide the Identity Provider Entity ID from the above in the SecurID CAS configuration. For example, https://rsa-test-pe.auth-demo.securid.com/saml-fe/sso.

  9. For Idp entity ID provide the Identity Provider Entity ID from the above in the SecurID CAS configuration. For example, https://rsa-test-pe.auth-demo.securid.com/saml-fe/sso.

  10. For IdP Certificate copy and paste the certificate downloaded above in the SecurID CAS configuration.

    ParkmyCloudUI.png

  11. Click on Save Changes.

 

Configuration is complete.

Next Step: See main page for more certification information.

 

No ratings
Version history
Last update:
‎2021-12-08 10:37 AM
Updated by:
Contributors
Article Dashboard