Federated Directory - SAML Relying Party Configuration RSA Ready Implementation Guide
Originally Published: 2023-07-28
This section describes how to integrate RSA Cloud Authentication Service with Federated Directory using SAML Relying Party.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as Relying Party to Federated Directory.
Procedure
- Log on to RSA Cloud Administration Console.
- On the Authentication Clients menu, click Relying Parties.
- Click Add a Relying Party on the My Relying Parties page.
- In the Relying Party Catalog, select +Add for Service Provider SAML.
- On the Basic Information page, in the Name field, provide a name for the Service Provider.
- Click Next Step.
- On the Authentication page, click SecurID Access manages all authentication.
- In the Primary Authentication Method list, select your desired logon method as Password or SecurID.
- In the Access Policy list, select a policy that was previously configured.
- Click Next Step.
- Configure connection profile for Federated Directory via Enter Manually.
- Scroll down to the Service Provider Metadata section.
-
ACL URL - https://api.federated.directory/v2/Login/Saml2/<Directory ID> /Acs
-
Service Provider Entity ID – federated.directory/<Directory ID>
-
- Click Default Service Provide Entity ID.
- Click Download Certificate and save the content of the certificate to be used when configuring the service provider. Click IdP signs assertion within response.
- Configure User Identity for NAMEID mapping.
Identity Type – Email Address
Property - mail
- Click Save and Finish.
- On the top menu click Publish Changes.
Configure Federated Directory
Perform these steps to configure Federated Directory.
Procedure
- Log on to your Federated Directory account.
- Navigate to Directories, then click CREATE DIRECTORY.
- Provide your new directory a name and a short description, then click CREATE DIRECTORY.
- Go to the Settings tab and copy the Id value .This value will be used in the ACS URL which will be added in RSA.
- Select the options of Federated Directory Accounts and SAML.
- Provide the value of IdP entity id generated in RSA and paste it on the Login URL.
- Paste the certificate value copied from the certificate generated (Step 14 of the previous section).
- Remove the begin certificate and end certificate comment before pasting.
Notes
User creation for testing requires selecting the option of Federated Directory accounts. For creating the user, perform the following steps.
- Go to the Users tab and select CREATE USER.
- Set the same password as in RSA for testing purposes.
- To test the SP initiated flow, go to https://www.federated.directory/of/<your-company-name>
Configuration is complete.
Return to main page.
Related Articles
Federated Directory - SAML IDR SSO Configuration RSA Ready Implementation Guide 5Number of Views Federated Directory - SAML My Page SSO Configuration RSA Ready Implementation Guide 1Number of Views Federated Directory - RSA Ready Implementation Guide 2Number of Views How to back up the SAML configuration in RSA Federated Identity Manager (FIM) 2.0 24Number of Views Error: 'Relying Party servlet: java.lang.NullPointerException' in RSA Federated Identity Manager (FIM) 30Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Release Notes for RSA Authentication Manager 8.8 Deploying RSA Authenticator 6.2.2 for Windows Using DISM Downloading RSA Authentication Manager license files or RSA Software token seed records
Don't see what you're looking for?