Cisco ISE 3.2 - SAML Relying Party Configuration - RSA Ready Implementation Guide
Originally Published: 2018-12-03
This section describes how to integrate Cisco ISE with RSA Cloud Authentication Service using Relying Party.
Procedure
- In Cloud Administration Console, go to Authentication Clients > Relying Parties > Add a Relying Party > Service Provider.
- In the Authentication section, choose SecurID manages all authentication.
- In the Connection Profile section, import the Metadata that was collected previously from Cisco ISE Admin GUI.
- In the SAML Response Protection section, choose to sign the whole SAML Response or the assertion only.
- In the User Identity section, select the NameID Identifier Type as emailAddress and Property as mail or UPN. You can optionally return the groups that the user is part of on Cisco ISE by mapping attribute value to the virtualGroups property in the Attributes Extension section.
- In the Identity Provider section, choose any discriminator name that you want, then click Save and Finish, then click Publish your changes.
- Go to Authentication Clients > Relying Parties, and choose your Cisco ISE created application.
- Click drop down menu and click Metadata > Download Metadata file.
- Go to Administration > Identity Management > SAML ID Providers > Choose your Relying party SAML Application > Identity Provider Config.
- Import the metadata file that was downloaded from Step 8 and click on Save.
- Go to the Groups section and set the Groups value as in Step 5. Assign the RBAC based on your you need.
- In the SAML Identity Provider section, you can add more attributes if needed but RSA must return them as in Step 5.
- In the Advanced Settings section, choose the Identity Attribute you need. For the Multi-value attributes, select “Each value in a separate XML element”.
Note: You can sign the whole SAML response or only the assertion. You can also accept only Encrypted Assertions. - Click Save.
Configuration is complete.
Return to the main page.
Related Articles
Cisco ISE 3.2 - Guest Portal Configuration - RSA Ready Implementation Guide 14Number of Views Cisco ISE 3.2 - Guest Access Portal Configuration - RSA Ready Implementation Guide 16Number of Views Cisco ISE 3.4 - Policy Sets Configuration - RSA Ready Implementation Guide 42Number of Views sirrus.runtime.TokenException: Token decryption failed 35Number of Views Cisco ISE 3.2 - SAML My Page SSO Configuration - RSA Ready Implementation Guide 17Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.9 Release Notes (January 2026) An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?