1Password - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as Relying Party to 1Password using OIDC.Procedure
- Sign in to RSA Cloud Administration Console.
- Click Authentication Clients > Relying Parties.
- On the My Relying Parties page, click Add a Relying Party.
- On the Relying Party Catalog page, click Add for Generic OIDC.
- On the Basic Information page, enter the name for the Service Provider in the Name field.
- Click Next Step.
- On the Authentication page, choose SecurID Access manages all authentication.
- In the Primary Authentication Method list, select your desired login method as either Password or SecurID.
- In the Access Policy list, select a policy that was previously configured.
- Click Next Step.
- Under Connection Profile, provide the following details:
- Authorization Server URL is auto-populated.
- Redirect URL is obtained from 1Password (see next section).
- Provide a Client ID.
- Select Client Authentication Method as Not Selected.
- Provide the following scopes: openid, profile, and email (scopes should be added in advance. See Notes.)
- Provide the following claims: sub, name, and email (claims should be added in advance. See Notes.)
- Click Save and Finish.
- Click Publish Changes.
Notes
- To add scopes, click Access > OIDC Settings.
- Click the Scopes tab and add the following scopes.
- Click Save Settings.
- To add claims, click the Claims tab and add the following claims.
- Click Save Settings.
- Click Publish Changes.
Configure 1Password
Perform these steps to configure 1Password.Procedure
- Sign in to 1Password admin console.
- In the right pane, click Policies, and then click Configure Identity Provider.
- Select Other in the Identity Provider drop-down list and provide a valid name.
- Provide the following details from the configuration done on RSA Cloud Administration Console.
- Client ID: Client ID name given in the connector configuration on the RSA side.
- Well-known URL: Use the following URL.
https:// <your RSA tenant> /sso/oidc/.well-known/openid-configuration
- Copy the Redirect URL and paste it into the connector created.
- Save and publish the connector before proceeding to the next step.
- Click Test Connection to verify the configuration. The user will be redirected to RSA where user details need to be provided. (This user should be configured on the RSA side). The connection should be successful.
- Save the configuration.
The configuration is complete.
Return to 1Password - RSA Ready Implementation Guide.
Related Articles
Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 499Number of Views Microsoft Entra ID Custom Controls - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 186Number of Views Salesforce - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 104Number of Views Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 233Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?