F5 BIG-IP APM - SAML My Page Configuration - RSA Ready Implementation Guide
Originally Published: 2019-06-25
This article describes how to integrate F5 BIG-IP APM with RSA Cloud Authentication Service using My Page SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console and browse to Applications > Application Catalog.
- Click Create From Template and click Select for SAML Direct.
- On the Basic Information page, choose Cloud.
- Enter the name for the application and click Next Step.
- On the Connection Profile page, navigate to the Initiate SAML Workflow section and choose IdP-initiated.
- Scroll down to the Service Provider section and enter the following details:
- ACS URL: https://Virtual machine domain name/post/acs
- Service Provider Entity ID: Enter https://<VIRTUAL-SERVER>
- Scroll down to the Identity Provider section and make a note of the Identity Provider URL as it will be needed for the F5 BIG-IP APM configuration.
- Proceed with the Default option for Identity Provider Entity ID and Audience for SAML Response.
- Under the Message Protection section, for SAML Response Protection:
- Choose IdP signs assertion with response.
- Select the Override default signing key and certificate checkbox.
- Scroll down to the User Identity section and select the following:
- Identifier Type: emailAddress
- Property: mail
- Click Next Step.
- Under Access Policy, choose Allow All Authenticated Users and select the policy for this application.
- In the Portal Display section, select the Display in Portal checkbox.
- Verify the Fulfilment section and click Save and Finish to complete the configuration.
- Locate the created application on the My Applications page and click the drop-down arrow next to Edit > Export Metadata.
- Click Publish Changes and wait for the operation to be completed.
After publishing, your application is now enabled for SSO.
Configure F5 BIG-IP APM SSO
Perform these steps to integrate F5 BIGIP APM with RSA as My Page SSO.
Procedure
- Sign in to the BIG-IP Configuration Utility and click System > Certificate Management > Traffic Certificate Management > SSL Certificate List > Import.
- In the Import Type drop-down list, select Certificate.
- Enter the following details:
- Certificate Name: Choose New and enter a suitable name for the certificate.
- Certificate Source: Choose Upload File, click Choose File, and select the certificate downloaded in the Cloud Authentication Service configuration.
- Click import.
- Click Access > Federation > SAML Service Provider > External IdP Connectors.
- Click Create.
- On the Create New SAML IdP Connector window, under the General Settings tab, do the following:
- Name: Suitable name for this IdP Connector.
- IdP Entity ID: Enter the Issuer Entity ID obtained from the Cloud Authentication Service configuration.
- On the Create New SAML IdP Connector window, under Single Sign On Service Settings, do the following:
- Single Sign On Service URL: Enter the Identity Provider URL obtained from the Cloud Authentication Service configuration.
- Single Sign On Service Binding: Select POST in the the drop-down list.
- On the Create New SAML IdP Connector window, under Assertion Settings, select Identity Location as Subject in the drop-down list.
- On the Create New SAML IdP Connector window, under Security Settings, select the certificate imported from the IdP's Assertion Validation Certificate drop-down list.
- Click OK to complete the external IDP connectors.
- Click Access > Federation > SAML Service Provider > Local SP Services.
- Click Create.
- On the Create New SAML SP Service window, under General Settings, do the following:
- Name: Enter a suitable name for the SAML SP service.
- Entity ID: Enter https://<VIRTUAL-SERVER> replacing <VIRTUAL-SERVER> with the IP address or hostname of your Virtual Server as configured in F5. This should be the same as the Service Provider Entity ID as entered in the Cloud Authentication Service configuration.
- On the Local SP Services page, select the checkbox corresponding to the Service Provider.
- Click Bind/Unbind IdP Connectors at the bottom of the page.
- On the Edit SAML IdPs that use this SP window, click Add New Row.
- In the SAML IdP Connectors drop-down list, select the Connector created in the preceding section, and then click OK.
The configuration is complete.
Return to F5 BIG-IP APM - RSA Ready Implementation Guide.
Related Articles
F5 BIG-IP APM 14.1 - Step-up Authentication Configuration - RSA Ready SecurID Access Implementation Guide 58Number of Views F5 BIG-IP APM 14.1 - Access Profile Configuration - RSA Ready SecurID Access Implementation Guide 20Number of Views F5 BIG-IP APM - SAML Relying Party Configuration - RSA Ready Implementation Guide 30Number of Views F5 BIG-IP APM 14.1 - RADIUSwith AM Configuration - RSA Ready SecurID Access Implementation Guide 20Number of Views F5 BIG-IP APM - RSA Ready Implementation Guide 122Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?