BigID - SAML My Page SSO Configuration - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.Procedure
- Enable My Page SSO by accessing the RSA Cloud Admin Console > Access > My Page > Single Sign-On (SSO). Ensure it is enabled and protected using two-factor authentication - Password and Access Policy.
- On the Applications > Application Catalog page, click on Create From Template.
- On the Choose Connector Template page, click Select for SAML Direct.
- On the Basic Information page, enter a name for the configuration in the Name field and click Next Step.
- In the Connection Profile section, select IdP-initiated option.
- Provide the Service Provider details in the following format:
- Assertion Consumer Service (ACS) URL: https://<Tenant ID>. Mybigid.com/api/v1/saml/login/callback.
- Service Provider Entity ID: <BigId Entity ID>
Note: A Unique Tenant ID will be provided for your instance from BigID.
Refer to the Notes section for instructions to obtain Entity ID.
- In the SAML Response Protection section, select IdP signs assertion within response.
- Download the certificate by clicking Download Certificate.
- Under the User Identity section, select Show Advanced Configuration, then configure Identifier Type and Property as follows:
- Identifier Type: Auto Detect
- Property: Auto Detect
- Under the Statement Attributes section. add the attributes from BigID as shown in the following figure.
Note: Refer to the BigID configuration section for mapping the attributes.
- Click Next Step.
- Choose your desired Access Policy for this application and click Next Step > Save and Finish.
- On the My Applications page click the Edit dropdown and select Export Metadata to download the metadata.
- Click Publish Changes to save your settings. After publishing, your application will be enabled for SSO.
Notes
- Entity ID can be found under SAML Settings in BigID platform.
- RSA Platform users must be part of a Group Membership that matches the SAML values specified in the BigID configuration (see the BigID configuration section).
Configure BigID
Perform these steps to configure BigID.Procedure
- Log in to BigID with admin credentials.
- Click Settings and select Access Management.
- Click the IdP tab and check the Enabled box under SAML Settings.
- Provide the following details:
- Entity ID – Enter unique Name or ID.
- Select Upload XML and click Select File or Drop and upload the metadata file downloaded from the RSA platform.
- Click on TEST CONNECTION to test the configuration.
Refer Configure RSA section for the instructions on how to obtain metadata.
- Under the Configure User Attributes section add the following attributes under the Token Attribute section.
- Under the Configure Role Groups section, configure the roles and groups as required:
- Token Attribute: Role (Custom value)
- SAML Values: Admin (Custom value)
- Click Save.
Return to BigID - RSA Ready Implementation Guide
Related Articles
Palo Alto NGFW Global Protect - SAML My Page SSO Configuration - RSA Ready Implementation Guide 43Number of Views SilverFort - SAML My Page SSO Configuration - RSA Ready Implementation Guide 3Number of Views Salesforce - SAML My Page SSO Configuration - RSA Ready Implementation Guide 66Number of Views Microsoft Entra ID - SAML My Page SSO Configuration - RSA Ready Implementation Guide 206Number of Views Delinea - SAML My Page SSO Configuration - RSA Ready Implementation Guide 14Number of Views
Trending Articles
Update an existing RSA Cloud Authentication Service Integrated Windows Authentication (IWA) Connector Identity Provider SA… RSA Authentication Manager 8.9 Release Notes (January 2026) Downloading RSA Authentication Manager license files or RSA Software token seed records RSA Authentication Manager 8.x import of replacement certificate fails with the error This certificate is already imported Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?