CyberArk Password Vault Web Access - SAML Relying Party Configuration - RSA Ready Implementation Guide
Originally Published: 2021-10-07
This article describes how to configure RSA with CyberArk Password Vault Web Access (PVWA) using SAML Relying Party.
Configure RSA Cloud Authentication Service
Perform these steps to configure CyberArk PVWA as a Relying Party to RSA.
Procedure
- Sign in to RSA Cloud Administration Console.
- Click Authentication Clients > Relying Parties.
- On the My Relying Parties page, click Add a Relying Party.
- On the Relying Party Catalog page, click Add for Service Provider SAML.
- On the Basic Information page, enter a Name for the Service Provider in the Name field.
- Click the Next Step.
- On the Authentication page, choose SecurID Access manages all authentication.
- In the 2.0 Access Policy for Authentication drop-down list, select a policy which was previously configured.
- Click Next Step.
- On the Connection Profile page, choose Enter Manually for Data Input Method.
- Scroll down to the Service Provider section and enter the following details:
- ACS URL: Replace the <hostname> part in the URL to match actual hostname CyberArk uses for PVWA.
- Service Provider Entity ID: Entity ID for CyberArk PVWA.
- Under the Message Protection, in the SAML Response Protection section, choose IdP signs assertion within response.
- Download the certificate by clicking Download Certificate.
- Expand the Show Advanced Configuration section.
- Scroll down to the User Identity section and select the following:
- Identifier Type: Auto Detect
- Property: Auto Detect
- Scroll down to the Identity Provider section and take a note of the Entity ID. This will be used later in the Configure CyberArk PVWA section.
- Click Save and Finish.
- Click Publish Changes and wait for the operation to be completed.
Your application is now enabled for SSO.
Configure CyberArk PVWA
Perform these steps to configure CyberArk PVWA.
Procedure
- In the PasswordVault folder (default location is inetpub > wwwroot > PasswordVault) make a copy of the saml.config.template file and rename it to saml.config.
- Edit the saml.config file with the following parameters:
- ServiceProvider Name: Service Provider Entity ID set in step 11 of the RSA configuration section.
- PartnerIdentityProvider Name: Identity Provider URL obtained in step 16 of the RSA configuration section.
- SingleSignOnServiceUrl: Identity Provider URL obtained in step 16 of the RSA configuration section.
- Certificate: The base 64 text representation of the certificate that is downloaded from the RSA configuration section.
- In the command prompt, run iisreset.
- Log on to PVWA as an administrator.
- Navigate to Administration > Configuration Options > Options.
- Expand Authentication Methods and select saml.
- Set the Enabled option to Yes and update the DisplayName field to reflect what will be shown to the users.
- Click Apply.
- In the Options pane, right-click Access Restriction, and then select Add AllowedReferrer.
- In the Allowed Referrer property, in BaseUrl, specify base URL part of the Identity Provider URL from the RSA configuration.
- Click Apply.
- Sign out of PVWA.
The configuration is complete.
Return to CyberArk Password Vault Web Access - RSA Ready Implementation Guide.
Related Articles
CyberArk Vault - RSA Ready Implementation Guide 14Number of Views CyberArk Vault - RADIUS Configuration with Cloud Access Service - RSA Ready Implementation Guide 2Number of Views CyberArk Vault - RADIUS Configuration with Authentication Manager - RSA Ready Implementation Guide 3Number of Views CyberArk Password Vault Web Access - RADIUS Configuration with Cloud Access Service - RSA Ready Implementation Guide 69Number of Views CyberArk Password Vault Web Access - RSA Ready Implementation Guide 201Number of Views
Trending Articles
Downloading RSA Authentication Manager license files or RSA Software token seed records RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Release Notes for RSA Authentication Manager 8.8 Download RSA SecurID Access Cloud User Event audit logs using Cloud Administration REST API CLU RSA SecurID Software Token 5.0.2 for Windows Desktop displays message after reboot due to roaming profile: No token stor…
Don't see what you're looking for?