1Password - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as Relying Party to 1Password using OIDC.Procedure
- Sign in to RSA Cloud Administration Console.
- Click Authentication Clients > Relying Parties.
- On the My Relying Parties page, click Add a Relying Party.
- On the Relying Party Catalog page, click Add for Generic OIDC.
- On the Basic Information page, enter the name for the Service Provider in the Name field.
- Click Next Step.
- On the Authentication page, choose SecurID Access manages all authentication.
- In the Primary Authentication Method list, select your desired login method as either Password or SecurID.
- In the Access Policy list, select a policy that was previously configured.
- Click Next Step.
- Under Connection Profile, provide the following details:
- Authorization Server URL is auto-populated.
- Redirect URL is obtained from 1Password (see next section).
- Provide a Client ID.
- Select Client Authentication Method as Not Selected.
- Provide the following scopes: openid, profile, and email (scopes should be added in advance. See Notes.)
- Provide the following claims: sub, name, and email (claims should be added in advance. See Notes.)
- Click Save and Finish.
- Click Publish Changes.
Notes
- To add scopes, click Access > OIDC Settings.
- Click the Scopes tab and add the following scopes.
- Click Save Settings.
- To add claims, click the Claims tab and add the following claims.
- Click Save Settings.
- Click Publish Changes.
Configure 1Password
Perform these steps to configure 1Password.Procedure
- Sign in to 1Password admin console.
- In the right pane, click Policies, and then click Configure Identity Provider.
- Select Other in the Identity Provider drop-down list and provide a valid name.
- Provide the following details from the configuration done on RSA Cloud Administration Console.
- Client ID: Client ID name given in the connector configuration on the RSA side.
- Well-known URL: Use the following URL.
https:// <your RSA tenant> /sso/oidc/.well-known/openid-configuration
- Copy the Redirect URL and paste it into the connector created.
- Save and publish the connector before proceeding to the next step.
- Click Test Connection to verify the configuration. The user will be redirected to RSA where user details need to be provided. (This user should be configured on the RSA side). The connection should be successful.
- Save the configuration.
The configuration is complete.
Return to 1Password - RSA Ready Implementation Guide.
Related Articles
Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 545Number of Views Microsoft Entra ID Custom Controls - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 200Number of Views Salesforce - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 107Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 115Number of Views Microsoft Entra ID - SAML Relying Party Configuration - RSA Ready Implementation Guide 87Number of Views
Trending Articles
Downloading RSA Authentication Manager license files or RSA Software token seed records RSA MFA Agent 2.5 for Microsoft Windows Installation and Administration Guide Troubleshooting RSA MFA Agent for Microsoft Windows RSA Release Notes for RSA Authentication Manager 8.8 RSA Release Notes: Cloud Access Service and RSA Authenticators
Don't see what you're looking for?