Federated Directory - SAML IDR SSO Configuration RSA Ready Implementation Guide
Originally Published: 2023-07-28
This section describes how to integrate Federated Directory with RSA Cloud Authentication Service using IDR SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using IDR SSO.
Procedure
- Log on to RSA Cloud Administration Console and browse to Applications > Application Catalog.
- Click Create from Template, and select SAML Direct on the next window.
- Choose Identity Router in the Basic Information section.
- Provide the name and description and click Next Step.
- Navigate to Initiate SAML Workflow section.
In the Connection URL field, verify the default setting.
- Choose IDP-initiated or SP-Initiated. Choose the applicable.
- Scroll down to SAML Identity Provider (Issuer) section.
- Identity Provider URL is automatically generated.
- Issuer Entity ID is automatically generated.
- Select Choose File and upload the private key.
- Select Choose File to import the public signing certificate.
- Scroll down to the Service Provider section and enter below details:
- Assertion Consumer Service (ACS) - https://api.federated.directory/v2/Login/Saml2/<Directory ID>/Acs
- Audience (Service Provider Issuer ID) – federated.directory/<Directory ID>
- Scroll down to the user identity section and select the following:
- Identifier Type – Email Address
- Identity Source – select your user identity source.
- Property – mail
- Click Next Step.
- On the User Access page, select the access policy that the identity router will use to determine which users can access the application.
- Click Next Step.
- On the Portal Display page, configure the portal display and other settings.
- Click Save and Finish.
- Click Publish Changes.
Configure Federated Directory
Perform these steps to configure Federated Directory.
Procedure
- Log on to your Federated Directory account.
- Navigate to Directories, then click CREATE DIRECTORY.
- Provide your new directory a name and a short description, then click CREATE DIRECTORY.
- Go to the Settings tab and copy the Id value. This value will be used in the ACS URL which will be added in RSA.
- Select the options of Federated Directory Accounts and SAML.
- Provide the value of IdP entity id generated in RSA and paste it on the Login URL.
- Paste the certificate value copied from the certificate generated (Step 7 of the previous section).
- Remove the begin certificate and end certificate comment before pasting.
Notes
User creation for testing requires selecting the option of Federated Directory accounts. For creating the user, perform the following steps.
- Go to the Users tab and click CREATE USER.
- Set the same password as in RSA for testing purposes.
To test the SP initiated flow, go to https://www.federated.directory/of/<your-company-name>
Configuration is complete.
Return to main page .
Related Articles
Federated Directory - SAML Relying Party Configuration RSA Ready Implementation Guide 2Number of Views Federated Directory - SAML My Page SSO Configuration RSA Ready Implementation Guide 1Number of Views Federated Directory - RSA Ready Implementation Guide 2Number of Views Error: 'Relying Party servlet: java.lang.NullPointerException' in RSA Federated Identity Manager (FIM) 30Number of Views Federated Salesforce Account Collector fails with 'Invalid Credentials' in RSA Identity Governance & Lifecycle 118Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.9 Release Notes (January 2026) An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide
Don't see what you're looking for?