Absolute Secure Access - SAML My Page SSO Configuration - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.Procedure
- Sign in to the RSA Cloud Administration Console with administrator credentials.
- Enable SSO on the My Page portal by accessing the RSA Cloud Administration Console > Access > My Page > Single Sign-On (SSO). Ensure it is enabled and protected by two-factor authentication using a Password and Access Policy.
- Click Applications > My Applications.
- Click Add an Application.
- Click Create From Template.
- Click Select corresponding to SAML Direct.
- Configure the following options on the Basic Information page:
- Click the Cloud option under Choose where to enable your application.
- In the Name field, provide a name for the application; for example, Absolute Secure Access.
- In the Description field, provide a detailed description of the SAML application.
- Click Next Step.
- Configure the following options on the Connection Profile page:
- In the Initiate SAML Workflow section, click the SP-initiated option.
- Specify the FQDN or IP address of the Secure Access Server as the Connection URL. It is not used for the authentication for Absolute Secure Access.
- Select the Import Metadata option in the Data Input Method section.
- Click Choose File in the Data Input Method section.
- Locate and select the SP metadata from Secure Access. A summary of the imported SP metadata will be displayed.
- Verify the metadata information, and then click Save.
- Verify the details in the Service Provider and Identity Provider sections.
- Service Provider: The Assertion Consumer Service (ACS) URL should match the ACS Location setting from the SAML - SP Configuration option in the Secure Access Console with /saml/login appended to the end of the URL.
- Service Provider Entity ID: This setting should match the Entity ID setting from the SAML - SP Configuration option in the Secure Access Console.
- Identity Provider URL: Ensure a unique Identity Provider URL was generated by RSA.
- Select the SP signs SAML requests check box in the Message Protection > SAML Request Protection section, and then select the SP signing certificate PEM file created in the next section.
- Click Next Step.
- Configure the following options in the User Access section:
- Click the Select a Policy option.
- Select the access policy appropriate for Secure Access.
- Click Next Step.
- Configure the following options in the Portal Display section:
- Retain the Display in Portal check box cleared.
- Set an Application Icon and Application Tooltip if required.
- Click Save and Finish.
- Click Publish Changes.
- Click Applications > My Applications.
- Locate the SAML Application for Secure Access that was created in the previous step.
- Click the arrow icon beside Edit for the application, and then click Export Metadata.
Configure Absolute Secure Access
Perform these steps to configure Absolute Secure Access.
Procedure
Procedure
- Click Configure > Authentication Settings on the menu at the top of the page.
- Click New on the Authentication Settings page.
- Enter a descriptive name for the new Authentication Profile in the Profile name field, and then click OK.
- Select Authentication > User Authentication Protocol, change the Protocol option to SAML, and then click Apply.
- Select the SAML - SP Configuration option and provide the following details:
- Entity ID: The URL for the Secure Access Server or an identifier at the end of the URL if multiple SAML configurations are used. For example, https://secureaccess.absolute.com/ or https://secureaccess.absolute.com/rsa
- ACS Location: The URL for the Secure Access Server. For example, https://secureaccess.absolute.com/
- Click Apply.
- Click Generate New Certificate in the Signing certificate section.
- Click Download Metadata in the Metadata section.
- Create SP signing certificate from the SP metadata using the following steps.
- Open the downloaded SP metadata in a text editor.
- Open a new blank text editor document.
- Copy the entire SP signing certificate from the SP metadata. This is the value placed between the <ds:X509Certificate> and </ds:X509Certificate> section.
- Paste the value of the SP signing certificate in the blank text editor document.
- On a new line at the top of the text document containing only the SP signing certificate, add the following:
-----BEGIN CERTIFICATE----- - On a new line at the end of the text document containing the SP signing certificate, add the following:
-----END CERTIFICATE----- - Save the SP signing certificate as SPsigning.pem.
- Change the valid until value in SP metadata using the following steps.
- Open the downloaded SP metadata in a text editor.
- Locate the validUntil value.
- Modify the year to 5 years in the future. This will match the expiration of the SP signing certificate.
- Save the SP metadata.
- Click Configure > Authentication Settings on the menu at the top of the screen.
- Locate and select the Authentication Profile created in the previous steps.
- Select the SAML - IdP Configuration option and set the following options:
- Select the Setting Override check box.
- Click Choose File in the Identity provider metadata section.
- Locate and select the IdP metadata from the RSA console.
- Click Import.
- Change the Sign sign-on binding to HTTP POST.
- Click Apply.
Related Articles
Absolute Secure Access - SAML Relying Party Configuration - RSA Ready Implementation Guide 20Number of Views Citrix Secure Access Gateway Login Issue 14Number of Views Absolute Secure Access - RSA Ready Implementation Guide 44Number of Views SecurID users in Russian Federation cannot authenticate with software tokens 85Number of Views Access denied error when running sync-tokens command in Authentication Manager 8.x 289Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.9 Release Notes (January 2026) An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide
Don't see what you're looking for?