Cloudflare - SAML My Page SSO Configuration - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.Procedure
- Sign in to the RSA Cloud Administration Console with administrator credentials.
- Enable SSO on the My Page portal by accessing the RSA Cloud Administration Console > Access > My Page > Single Sign-On (SSO). Ensure it is enabled and protected by two-factor authentication using a Password and Access Policy.
- On the Applications > Application Catalog page, click on Create From Template.
- On the Choose Connector Template page, click Select for SAML Direct.
- On the Basic Information page, enter a name for the configuration in the Name field and click Next Step.
- In the Connection Profile section, select SP-initiated option.
- Provide the connection URL: https://<your-team-domain-name>
Note: You can find your team domain name in Zero Trust under Settings > Custom Pages (of Cloudflare).
- Provide the Service Provider details in the following format:
- Assertion Consumer Service (ACS) URL: https://<Domain-name>/cdn-cgi/access/callback.
- Service Provider Entity ID: This is the same as the ACS URL.
Note: The domain name can be extracted from your team domain name, which typically looks like <domain-name>.cloudflareaccess.com.
- In the SAML Response Protection section, select IdP signs entire SAML response.
- Under the User Identity section, select Show Connection Profile Advanced Configuration, then configure Identifier Type and Property as follows:
- Identifier Type: Auto Detect
- Property: Auto Detect
- Click Next Step.
- Choose your desired Access Policy for this application and click Next Step > Save and Finish.
- On the My Applications page, click the Edit dropdown for Cloudfalre SAML and select Export Metadata to download the metadata.
- Click Publish Changes to save your settings. After publishing, your application will be enabled for SSO.
Configure Cloudflare
Perform these steps to configure Cloudflare.Procedure
- Open the Cloudflare dashboard and on the left panel, select Zero Trust.
- In Zero Trust section. go to Settings > Authentication > Login methods.
- Select Add new and choose SAML.
- Choose a descriptive name.
- Upload the metadata file downloaded from RSA. The Single sign-on URL, IDP Entity ID, Signing Certificate, and Email attribute name will be auto-filled.
- Select Save.
- Select Test. This should be successful.
The configuration is complete.
Return to Cloudflare - RSA Ready Implementation Guide
Related Articles
Microsoft Entra ID - SAML My Page SSO Configuration - RSA Ready Implementation Guide 206Number of Views Palo Alto NGFW Global Protect - SAML My Page SSO Configuration - RSA Ready Implementation Guide 46Number of Views Delinea - SAML My Page SSO Configuration - RSA Ready Implementation Guide 14Number of Views Microsoft Office 365 - SAML My Page SSO Configuration - RSA Ready Implementation Guide 122Number of Views AWS IAM - SAML My Page SSO Configuration - RSA Ready Implementation Guide 34Number of Views
Trending Articles
Troubleshooting AFX Server issues in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.5 for Microsoft Windows Installation and Administration Guide Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory Troubleshooting RSA MFA Agent for Microsoft Windows
Don't see what you're looking for?