CloudBees Feature Management - SAML My Page SSO Configuration - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.Procedure
- Enable My Page SSO by accessing the RSA Cloud Administration Console > Access > My Page > Single Sign-On (SSO). Ensure it is enabled and protected using two-factor authentication - Password and Access Policy.
- On the Applications > Application Catalog page, click Create From Template.
- Click Select for SAML Direct.
- On the Basic Information page, enter a name for the configuration in the Name field and click Next Step.
- On the Connection Profile page, click the IdP-initiated option.
- Provide the Service Provider details in the following format:
- ACS URL: https://app.rollout.io/login/<organization-login-prefix>/callback
- Service Provider Entity ID: https://app.rollout.io/login/<organization-login-prefix>
Refer to the Configure CloudBees Feature Management section to obtain organization-login-prefix.
- In the SAML Response Protection section, choose IdP signs assertion within response.
- Download the certificate by clicking Download Certificate.
- Click Show Advanced Configuration.
- Under the User Identity section, configure Identifier Type and Property. For example, Identifier Type: Auto Detect and Property: Auto Detect.
- Click Next Step.
- Choose your desired Access Policy for this application and click Next Step > Save and Finish.
- On the My Applications page, click the Edit drop-down icon and select Export Metadata to download the metadata.
- Click Publish Changes. Your application is now enabled for SSO.
Configure CloudBees Feature Management
Perform these steps to configure CloudBees Feature Management.Procedure
- Log on to CloudBees Feature Management with administrator credentials.
- Click the Profile icon and select Organization management.
- Enable SAML single sign-on.
- Provide the following details and click Update.
- Organization login prefix – Provide a unique name.
- Identity provider (IdP) metadata – Copy and paste the metadata downloaded from RSA.
Notes
After enabling SAML, you can check if all existing users are connected via SAML.To check if a user is connected via SAML:
- Click the Profile icon and select Account.
- If the SAML Status does not show as Connected, click Connect SAML.
Return to CloudBees Feature Management - RSA Ready Implementation Guide.
Related Articles
Palo Alto NGFW Global Protect - SAML My Page SSO Configuration - RSA Ready Implementation Guide 46Number of Views Microsoft Office 365 - SAML My Page SSO Configuration - RSA Ready Implementation Guide 123Number of Views Salesforce - SAML My Page SSO Configuration - RSA Ready Implementation Guide 66Number of Views Microsoft Entra ID - SAML My Page SSO Configuration - RSA Ready Implementation Guide 206Number of Views AWS IAM - SAML My Page SSO Configuration - RSA Ready Implementation Guide 34Number of Views
Trending Articles
RSA Authentication Manager Upgrade Process RSA SecurID software token .sdtid file fails to import into RSA SecurID Software Token 5.0 for Windows RSA Authentication Manager Administration Server with Operations Console service fails to start when restarted from the SS… RSA Governance & Lifecycle Generic RESTful Web Service Connector Application Guide RSA Release Notes: Cloud Access Service and RSA Authenticators
Don't see what you're looking for?