BeyondTrust Password Safe - SAML My Page SSO Configuration – RSA Ready Implementation Guide
This article describes how to integrate Cloud Access Service (CAS) with BeyondTrust Password Safe using SAML My Page SSO.
Configure CAS
Perform these steps to configure CAS using SAML My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console and browse to Applications > Application Catalog.
- Click Create from Template, and then click Select next to SAML Direct.
- On the Basic Information page, choose Cloud.
- Enter the name for the application and click Next Step.
- On the Connection Profile page, navigate to the Initiate SAML Workflow section and choose IdP-initiated.
- Scroll down to the Service Provider section, enter the following details (in the specified format) that will be provided during the BeyondTrust Password Safe configuration.
- Assertion Consumer Service (ACS) URL: https://<beyondinsight-domain-name>.com/eEye.RetinaCSSAML/SAML/AssertionConsumerService.aspx
- Service Provider Entity ID: https://< beyondinsight-domain-name>/eEye.RetinaCSSAML
- Make a note of the Identity Provider URL that is available under Identity Provider. This value is required later in the BeyondTrust configuration.
- Under the Message Protection section, choose IdP signs assertion within response.
- Click Download Certificate to download the certificate, which will be required for the BeyondTrust Password Safe configuration.
- Under the User Identity section, select the following values:
- Identifier Type: emailAddress
- Property: mail
- Under the Statement Attributes section, add the following attributes as shown in the screenshot, which the IdP must provide in the assertion:
- Group: This must match the group created in BeyondInsight or imported from Active Directory/LDAP.
- Name: UPN, username, or EmailAddress formats are acceptable.
- Surname
- GivenName
- Click Next Step.
- On the User Access page, choose the access policy you want to use to determine which users can access the application, and then click Next Step.
- On the Portal Display page, configure the portal display and other settings.
- Click Next Step.
- On the Fulfillment page, configure your preferred settings or leave the Fulfillment toggle button disabled as it is, and then click Save and Finish.
- Click Publish Changes and wait for the operation to be completed.
After publishing, the application is enabled for SSO.
Configure BeyondTrust Password Safe
Perform these steps to configure the BeyondTrust Password Safe.
Procedure
- Log in to BeyondInsight, the central management platform for most BeyondTrust solutions.
- In the left pane, click the Configuration icon.
- Under Authentication Management, click SAML Configuration.
- In the SAML Identity Providers pane, click Create New SAML Identity Provider +.
- Provide a name for the new SAML identity provider (IdP).
- Provide the following details in the Identity Provider Settings:
- Select the Default Identity Provider checkbox if you have more than one Identity Provider configured for the same Service Provider and you want this IdP to be used as the default.
- Identifier: Enter the Identity Provider URL copied from the CAS configuration.
- Single Sign-on Service URL: Enter the Identity Provider URL copied from the CAS configuration.
- SSO URL Protocol Binding: Select HTTP Post as the type.
- Encryption and Signing Configuration: Select the applicable checkboxes to enable options, as required by your service provider.
- Signature Method: Select the method, as is required by your IdP, in the drop-down list. The Want Assertion Signed checkbox was selected as shown in the screenshot.
- Current Identity Provider Certificate: Upload the identity provider certificate downloaded during CAS configuration.
- User Mapping: Select the type of user account as None.
- The following Service Provider Settings are auto-generated by BeyondInsight:
- Entity ID: This is the fully qualified domain name, followed by the file name: https://<beyondinsight-domain-name>/eEye.RetinaCSSAML/ this will be used as the Service Provider Entity ID in the CAS configuration.
- Assertion Consumer Service URL: The HTTPS endpoint on the service provider where the identity provider redirects to with its authentication response. This will be used as the Assertion Consumer Service (ACS) URL in the CAS configuration.
- Click Create SAML Identity Provider.
- Navigate to Configuration > User Management under Role Based Access.
- To enable Password Safe, select the required group from the list, click the three dots next to it, and choose View Group Details.
- Click Smart Groups, and then select All Smart Groups to choose the required Smart Group permissions.
- Select the checkbox next to the Smart Group where Password Safe should be enabled, and then click Assign Permissions.
- Choose either Assign Permissions Read Only or Assign Permissions Full Control.
- Once enabled, click the three dots next to it and select Edit Password Safe Roles.
- Choose the required Password Safe roles for the selected user group, and then click Save Roles.
The configuration is complete.
Related Articles
Cloud Administration FIDO Authenticator API 99Number of Views How to enable passwordless authentication over RDP for RSA MFA Agent For Microsoft Windows 2.3.6 and higher 88Number of Views Authentication failed error for users with a specific administrative role when logging in to RSA Authentication Manager Pr… 104Number of Views Enable SSH using the command line on RSA Authentication Manager 8.1 up to 8.3 1.12KNumber of Views Unable to login to RSA Authentication Manager via SSH after changing operating system password to contain a backslash (\) 299Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Release Notes for RSA Authentication Manager 8.8 Deploying RSA Authenticator 6.2.2 for Windows Using DISM Downloading RSA Authentication Manager license files or RSA Software token seed records
Don't see what you're looking for?