CyberArk Password Vault Web Access - SAML My Page SSO Configuration - RSA Ready Implementation Guide
Originally Published: 2021-10-07
This article describes how to integrate CyberArk Password Vault Web Access (PVWA) with RSA Cloud Authentication Service using My Page SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA using My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console and browse to Applications > Application Catalog.
- Click Create From Template and select SAML Direct.
- On the Basic Information page, choose Cloud.
- Enter the name for the application and click Next Step.
- On the Connection Profile page, navigate to the Initiate SAML Workflow section and choose IdP-initiated.
- Scroll down to the Service Provider section and enter the following details:
- ACS URL: Replace the <hostname> part in the URL to match actual hostname CyberArk uses for PVWA.
- Service Provider Entity ID: Entity ID for CyberArk PVWA.
- Scroll down to the Identity Provider section and make a note of the Identity Provider URL, which is required for the CyberArk PVWA configuration.
- Under Show IdP Advanced Configuration, proceed with the Default option for Identity Provider Entity ID and Audience for SAML Response.
- Under Message Protection, in the SAML Response Protection section, choose IdP signs assertion within response.
- Download the certificate by clicking Download Certificate.
- Scroll down to the User Identity section and select the following:
- Identifier Type: Auto Detect
- Property: Auto Detect
- Click Next Step.
- In the Access Policy section, choose the policy for the application in the drop-down list.
- Click Next Step and click Save and Finish.
- Click Publish Changes and wait for the operation to be completed.
Your application is now enabled for SSO.
Configure CyberArk PVWA
Perform these steps to configure CyberArk PVWA.
Procedure
- In the PasswordVault folder (default location is inetpub > wwwroot > PasswordVault) make a copy of the saml.config.template file and rename it to saml.config.
- Edit the saml.config file with the following parameters:
- ServiceProvider Name: Service Provider Entity ID set in step 6 of the RSA configuration section.
- PartnerIdentityProvider Name: Identity Provider URL obtained in step 7 of the RSA configuration section.
- SingleSignOnServiceUrl: Identity Provider URL obtained in step 7 of the RSA configuration section.
- Certificate: The base 64 text representation of the certificate that is downloaded from the RSA configuration section.
- In the command prompt, run iisreset.
- Log on to Password Vault Web Access as an administrator.
- Navigate to Administration > Configuration Options > Options.
- Expand Authentication Methods and select saml.
- Set the Enabled option to Yes and update the DisplayName field to reflect what will be shown to the users.
- Click Apply.
- In the Options pane, right-click Access Restriction, and then select Add AllowedReferrer.
- In the Allowed Referrer property, in BaseUrl, specify base URL part of the Identity Provider URL from the RSA configuration.
- Click Apply.
- Sign out of PVWA.
The configuration is complete.
Return to CyberArk Password Vault Web Access - RSA Ready Implementation Guide.
Related Articles
Microsoft Office 365 - SAML My Page SSO Configuration - RSA Ready Implementation Guide 116Number of Views Keeper Security - SAML My Page SSO Configuration - RSA Ready Implementation Guide 10Number of Views Symantec Privileged Access Manager - SAML My Page SSO Configuration - RSA Ready Implementation Guide 4Number of Views Microsoft Entra ID - SAML My Page SSO Configuration - RSA Ready Implementation Guide 202Number of Views Microsoft Entra ID - SAML Relying Party Configuration - RSA Ready Implementation Guide 84Number of Views
Trending Articles
Downloading RSA Authentication Manager license files or RSA Software token seed records RSA Release Notes for RSA Authentication Manager 8.8 RSA Authentication Manager 8.9 Release Notes (January 2026) Download RSA SecurID Access Cloud User Event audit logs using Cloud Administration REST API CLU RSA SecurID Software Token 5.0.2 for Windows Desktop displays message after reboot due to roaming profile: No token stor…
Don't see what you're looking for?