How to enable logging in to the Cloud Admin Console with the IDR acting as the Third-Party Identity Provider (IdP)
Originally Published: 2021-04-09
Article Number
Applies To
RSA Product/Service Type: Cloud
Issue
Some customers would like to configure the IDR or the Load Balancer as a Third-party Identity Provider to the Cloud Admin Console, such that the IDR SSO Portal is used to login into Admin Console.
Tasks
Resolution
Other than the session that we will keep as a backup if we are locked out of the Admin Console, we will open two other sessions to the Cloud to be able to map the SAML Attributes:
- In the First Session on the Cloud Admin Console, go Applications --> My Applications.
- Click on Add an Application --> Create from Template --> SAML Direct.
- Ensure that under Basic Information, the Disabled checkmark is not checked, then go to Connection Profile.
- In the Second Session, go to My Account --> Company Settings --> Sessions & Authentication and under the Cloud Administration Console Authentication change the Primary Authentication From Password to Third-Party Identity Provider (IdP).
- Copy the link under Sign-In URL. NOTE: Take a note of that link because this is the SAML link you will use to sign in to your Admin Console.
- Back in the First Session where we create the SAML Application, no need to upload any metadata under Connection Profile, and under Initiate SAML Workflow paste the value copied in Step 5 under Connection URL.
- Ensure the method is SP-initiated, Binding Method is POST and do not check Signed.
- Copy the Identity Provider URL from the First Session to the Second Session under Issuer URL.
- In the First Session, keep Issuer Entity ID as it is the Default value.. and copy that value and paste it in the Second Session under Issuer ID
- In the first session Generate Cert Bundle, and give the CN to be your portal hostname then download and extract that .zip folder.
- In the first session choose the Private Key to be private.key, and upload file cert.pem to be the certificate.
- In the second session under SAML Response Signature ensure you upload the same cert.pem file from the Certificate Bundle.
- In the second session copy, the value under Assertion Consumer Service (ACS) URL and paste it in the first session under.
Assertion Consumer Service (ACS) URL - In the second session, copy the value under Audience ID and paste it in the first session under Audience (Service Provider Entity ID).
- In the first Session under User Identity, make sure the Identifier Type is Email Address and the Property is mail.
- Under Show Advanced Configuration leave everything unchecked.
- Configure the user access as needed, then Save the Application.
- In the second session, configure your Sign-Out URL to be https://<PortalHostname>/LogoutServlet
- Under Error URL, put the value to be https://<PortalHostname>?Signing-error-cas
- Also, Save Settings on the same Page and publish changes.
Related Articles
Name or service not known error when connecting Identity Router (IDR) to RSA Authentication Manager 251Number of Views Is RSA AA compliant with Federal Act 508 54Number of Views RSA Authentication Manager stuck at startup after configuring Embedded IDR 362Number of Views RSA SecurID Authenticator 6.0 and 6.1 for Windows fails to import aCT-KIP URL 65Number of Views How to upgrade an RSA SecurID Access IDR 330Number of Views
Trending Articles
How to recover the Application and AFX after an unexpected database failure in RSA Identity Governance & Lifecycle Troubleshooting AFX Connector issues in RSA Identity Governance & Lifecycle RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Release Notes for RSA Authentication Manager 8.8 RSA Authentication Manager 8.9 Release Notes (January 2026)
Don't see what you're looking for?