CloudBees Feature Management - SAML Relying Party Configuration - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as Relying Party to CloudBees Feature Management.Procedure
- Sign in to RSA Cloud Administration Console.
- Click Authentication Clients > Relying Parties.
- On the Relying Party Catalog page, click Add a Relying Party and click Add for Service Provider SAML.
- On the Basic Information page, enter the name for the application in the Name field and click Next Step.
- On the Authentication page, choose SecurID manages all authentication.
- Select a Primary Authentication Method and Access Policy as required and click Next Step.
- Provide the Service Provider details in the following format:
- ACS URL: https://app.rollout.io/login/<organization-login-prefix> /callback
- Service Provider Entity ID: https://app.rollout.io/login/<organization-login-prefix>
Refer to the Configure CloudBees Feature Management section to obtain organization-login-prefix.
- In the SAML Response Protection section, choose IdP signs assertion within response.
- Download the certificate by clicking Download Certificate.
- Click Show Advanced Configuration.
- Under the User Identity section, configure Identifier Type and Property. For example, Identifier Type: Auto Detect and Property: Auto Detect.
- Click Save and Finish.
- On the My Relying Parties page, click the Edit drop-down icon and select the Metadata option to download the metadata.
- Click Publish Changes. Your application is now enabled for SSO.
Configure CloudBees Feature Management
Perform these steps to configure CloudBees Feature Management.Procedure
- Log on to CloudBees Feature Management with administrator credentials.
- Click the Profile icon and select Organization management.
- Enable SAML single sign-on.
- Provide the following details and click Update.
- Organization login prefix – Provide a unique name.
- Identity provider (IdP) metadata – Copy and paste the metadata downloaded from RSA.
Notes
After enabling SAML, you can check if all existing users are connected via SAML.To check if a user is connected via SAML:
- Click the Profile icon and select Account.
- If SAML Status does not show as Connected, click Connect SAML.
Return to CloudBees Feature Management - RSA Ready Implementation Guide.
Related Articles
Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 545Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 115Number of Views Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 252Number of Views Microsoft Entra ID - SAML Relying Party Configuration - RSA Ready Implementation Guide 87Number of Views F5 BIG-IP APM - SAML Relying Party Configuration - RSA Ready Implementation Guide 32Number of Views
Trending Articles
How to download and install the AFX Server Archive in RSA Identity Governance & Lifecycle RSA MFA Agent 2.5 for Microsoft Windows Installation and Administration Guide The Template ({Connector Template Name}) has missing file content error when creating AFX Connectors in RSA Identity Gover… Downloading RSA Authentication Manager license files or RSA Software token seed records Troubleshooting RSA MFA Agent for Microsoft Windows
Don't see what you're looking for?