BeyondTrust Password Safe - SAML Relying Party Configuration – RSA Ready Implementation Guide
This article describes how to integrate Cloud Access Service (CAS) with BeyondTrust Password Safe using SAML Relying Party.
Configure CAS
Perform these steps to configure CAS using SAML Relying Party.
Procedure
- Sign in to RSA Cloud Administration Console.
- Click Authentication Clients > Relying Parties.
- On the My Relying Parties page, click Add a Relying Party.
- On the Relying Party Catalog page, click Add for Service Provider SAML.
- On the Basic Information page, enter the name for the application in the Name field and click Next Step.
- On the Authentication page, choose RSA manages all authentication.
- In the 2.0 Access Policy for Authentication drop-down list, select a policy that was previously configured, and then click Next Step.
- Scroll down to the Service Provider section, enter the following details (in the specified format) that will be provided during the BeyondTrust Password Safe configuration.
- Assertion Consumer Service (ACS) URL: https://<beyondinsight-domain-name>.com/eEye.RetinaCSSAML/SAML/AssertionConsumerService.aspx
- Service Provider Entity ID: https://< beyondinsight-domain-name>/eEye.RetinaCSSAML
- Under the Message Protection section, choose IdP signs assertion within response.
- Click Download Certificate to download the certificate, which is required for the BeyondTrust Password Safe configuration.
- Under the User Identity section, select the following values:
- Identifier Type: Email Address
- Property: mail
- Under the Statement Attributes section, add the following attributes as shown in the screenshot, which the IdP must provide in the assertion:
- Group: This must match the group created in BeyondInsight or imported from Active Directory/LDAP.
- Name: UPN, username, or EmailAddress formats are acceptable.
- Surname
- GivenName
- Make note of the Entity ID under the Identity Provider section, as this value will be required later in the BeyondTrust configuration. You can enter any identifier in the Discriminator field—it will be appended to the Entity ID URL to ensure the Entity ID is unique to the Service Provider.
- Click Save and Finish.
- Click Publish Changes and wait for the operation to be completed.
After publishing, your application is enabled for SSO.
Configure BeyondTrust Password Safe
Perform these steps to configure the BeyondTrust Password Safe.
Procedure
- Log in to BeyondInsight, the central management platform for most BeyondTrust solutions.
- In the left pane, click the Configuration icon.
- Under Authentication Management, click SAML Configuration.
- In the SAML Identity Providers pane, click Create New SAML Identity Provider +.
- Provide a name for the new SAML identity provider (IdP).
- Provide the following details in the Identity Provider Settings:
- Select the Default Identity Provider checkbox if you have more than one Identity Provider configured for the same Service Provider and you want this IdP to be used as the default.
- Identifier: Enter the Identity Provider URL copied from the CAS configuration.
- Single Sign-on Service URL: Enter the Identity Provider URL copied from the CAS configuration.
- SSO URL Protocol Binding: Select HTTP Post as the type.
- Encryption and Signing Configuration: Select the applicable checkboxes to enable options, as required by your service provider.
- Signature Method: Select the method, as is required by your IdP, in the drop-down list. The Want Assertion Signed checkbox was selected as shown in the screenshot.
- Current Identity Provider Certificate: Upload the identity provider certificate downloaded during CAS configuration.
- User Mapping: Select the type of user account as None.
- The following Service Provider Settings are auto-generated by BeyondInsight:
- Entity ID: This is the fully qualified domain name, followed by the file name: https://<beyondinsight-domain-name>/eEye.RetinaCSSAML/ this will be used as the Service Provider Entity ID in the CAS configuration.
- Assertion Consumer Service URL: The HTTPS endpoint on the service provider where the identity provider redirects to with its authentication response. This will be used as the Assertion Consumer Service (ACS) URL in the CAS configuration.
- Click Create SAML Identity Provider.
- Navigate to Configuration > User Management under Role Based Access.
- To enable Password Safe, select the required group from the list, click the three dots next to it, and choose View Group Details.
- Click Smart Groups, and then select All Smart Groups to choose the required Smart Group permissions.
- Select the checkbox next to the Smart Group where Password Safe should be enabled, and then click Assign Permissions.
- Choose either Assign Permissions Read Only or Assign Permissions Full Control.
- Once enabled, click the three dots next to it and select Edit Password Safe Roles.
- Choose the required Password Safe roles for the selected user group, and then click Save Roles.
The configuration is complete.
Related Articles
BeyondTrust Password Safe – RSA Ready Implementation Guide 59Number of Views Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 230Number of Views Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 499Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views Microsoft Entra ID - SAML Relying Party Configuration - RSA Ready Implementation Guide 85Number of Views
Trending Articles
How to recover the Application and AFX after an unexpected database failure in RSA Identity Governance & Lifecycle Troubleshooting AFX Connector issues in RSA Identity Governance & Lifecycle RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Release Notes for RSA Authentication Manager 8.8 RSA Authentication Manager 8.9 Release Notes (January 2026)
Don't see what you're looking for?