This article describes how to integrate Cloud Access Service (CAS) with Microsoft Entra ID using My Page SSO.
Configure CAS
Perform these steps to configure CAS using My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console.
- Navigate to Applications > Application Catalog, and click Create From Template .
- Select SAML Direct from the list.
- On the Basic Information Page, choose Cloud.
- Enter the name for the application in the Name field.
- Click Next Step.
- In the Connection Profile section, select IdP-initiated.
- Enter the following values in the Service Provider section:
- Assertion Consumer Service (ACS) URL: Enter the Microsoft ACS URL “https://login.microsoftonline.com/login.srf”
- Service Provider Entity ID: Enter the Microsoft Issuer "urn:federation:MicrosoftOnline".
- In Identity Provider section, enter Identity Provider URL.
Note: The Identity Provider URL is required in the Microsoft configuration.
- In the Identity Provider Entity ID section, select Default and leave the other value as it is.
- In the Audience for SAML Response section, enter the same value as Service Provider Entity ID.
- In the Message Protection section, click Download Certificate.
- In the User Identity section, select persistent from the Identifier Type dropdown list.
- From the Property dropdown list, select objectGUID.
- In the Statement Attributes section, select the following Attributes.
- First Attributes
- Attribute Name > IDPEmail
- Attribute Source > Identity Source.
- Property > Enter the name used for the email attribute in your user directory (For example, "mail")
- Second Attributes
- Attribute Name > ImmutableID
- Attribute Source > Identity Source
- Property > Enter the name used for the object ID guid in your user directory (For example, "objectGUID")
- First Attributes
- When using SAML 2.0 federation with Microsoft Entra ID, MFA done at the IdP is only accepted if the SAML response includes an MFA
AuthnContextin theAuthnStatement. If this is missing or incorrectly configured, Microsoft Entra will assume MFA did not occur — and prompt users to register for Microsoft Authenticator or complete MFA again. Perform one of the following steps to configure this MFA claim in the token:
-
- In the Authentication Context section, make sure to include the following value: http://schemas.microsoft.com/claims/multipleauthn
-
- Included in the assertion as part of the Statement Attributes as
- Attribute Name > Enter http://schemas.microsoft.com/ws/2008/06/identity/claims/authenticationmethod
- Attribute Source > Constant
- Property > Enter http://schemas.microsoft.com/claims/multipleauthn
- Included in the assertion as part of the Statement Attributes as
Note: While including the AuthnContext/Statement Attribute is not a mandatory requirement in the configuration, it is strongly recommended to ensure Microsoft Entra recognizes the upstream MFA and avoids prompting users again.
- Click Next Step.
- On the User Access page, choose the Access Policy that will define which users are permitted to access the Microsoft O365 service provider.
- Click Next Step.
- On the Portal Display page, configure the portal display and other settings.
- Click Save and Finish.
- Click Publish Changes and wait for the operation to complete.
After publishing, your application is now enabled for SSO.
Configure Microsoft Entra
- Log in to Microsoft Entra admin center with admin credentials at https://entra.microsoft.com/
- From the left panel, go to Settings > Domains to verify your custom domain name.
- Run Windows PowerShell as an administrator and connect to your Microsoft Entra with the following command. You need to login with your Microsoft Entra Tenant administrator account.
Note: This admin account should be in a separate domain than the one that will be federated (e.g. The admin should be a member of the default domain that is provided by Microsoft).
Connect-MgGraph
- Retrieve all domains for the company (verified or unverified) to identify the domain which should be federated.
Get-MgDomain
- Run the following commands in a PowerShell environment, most of the values come from CAS configuration section:
domain: Enter the domain identified in the previous step for which you want to enable SSO.brandName: Provide a name to identify your Identity Provider (e.g., RSA – My Page).IssuerUri: Use the Identity Provider Entity ID configured in CAS.LogOnUri: Use the Identity Provider Entity ID configured in CAS.- Protocol: Enter “saml”.
certData: Configure the signing certificate by following these steps:
- Download the certificate and save it to a folder (e.g.,
C:\Users\my.name\Downloads). - Use the following PowerShell commands to process the certificate and assign it to the
certDatavariable. - If entering the command manually, ensure the character in "
r|n" is a backtick, not a single quote
$cert = "C:\Users\my.name\Downloads\IDPSigningCertificate.pem"
$certData = $(Get-Content -Path $cert -Raw) -replace"`r|`n|-----BEGIN CERTIFICATE-----|-----END CERTIFICATE-----",""
- Note: When using these variables, ensure you include the $ symbol before the variable name (e.g., $domain, $brandName, etc.).
- After defining the parameters, issue the following command. A successful run of command should not return any errors.
New-MgDomainFederationConfiguration -DomainId $domain -DisplayName $BrandName -SigningCertificate $certData -IssuerUri $IssuerUri -PassiveSignInUri $LogOnUri -PreferredAuthenticationProtocol $Protocol -FederatedIdpMfaBehavior "acceptIfMfaDoneByFederatedIdp"
- After applying the new domain federation configuration, you will be prompted to provide the internal domain federation ID. To retrieve this value, run the following command:
Get-MgDomainFederationConfiguration -DomainId "yourdomainname.com"
This will return the internal federation ID required for the configuration process.
- To verify if the domain is configured successfully, run the following command with your domain name and the result must show the same values as used in the script variables above.
Get-MgDomainFederationConfiguration -DomainId $domain| fl *
User Experience
Scenario A:
- Go to Entra ID applications portal: https://myapps.microsoft.com/
- User should enter his email address in the domain already federated with RSA. User then will be redirected to CAS to be authenticated.
- User enters the User ID and Password for authentication with RSA.
- After successful authentication, the user will be redirected to Microsoft Entra portal hosting the applications.
Scenario B:
- User can choose to directly access the application hosted on Microsoft Entra without accessing from the applications portal. For testing purposes of this integration, DocuSign has been configured with Microsoft Entra.
- The User enters the email address in the federated domain and then will be redirected to Microsoft which will redirect the user to CAS portal to be authenticated.
Note:
- Optionally the organization can give their users the direct application link that is hosted on their Microsoft Entra tenant which will have them skip entering the email address in DocuSign as a first step which enhances the login experience for users.
- Administrators can find the direct link for applications by accessing the Microsoft Entra Admin Center. From the left pane, navigate to Identity -> Applications -> Enterprise Applications -> User access URL.
- User enters the User ID and Password for authentication with RSA.
- After successful authentication, the user will be redirected to DocuSign home landing page.
Notes:
- Ensure that the Microsoft Graph PowerShell SDK is installed and that all necessary permissions have been granted before running these commands.
- Office 365 Single Sign-On (SSO) can only be enabled for domains that have been verified in Microsoft Entra ID.
- SSO is not supported for default “onmicrosoft.com” domains provided by Microsoft.
- If your organization doesn't yet have a custom domain for Office 365, one must be purchased to enable SSO.
- When configuring the signing certificate in PowerShell, use the backtick character (`), typically located just to the left of the “1” key on your keyboard.
- If you need to modify any configuration settings made in Windows PowerShell following the federation of the necessary domain, utilize the command "Update-MgDomainFederationConfiguration " rather than "New-MgDomainFederationConfiguration " as the domain has already been federated.
- All users who will authenticate via SAML must have an ImmutableID set. Users without an ImmutableID will not be able to sign in using SAML. You can list all users under the federated domain along with their ImmutableID using the following command:
Get-MgUser -All -Property UserPrincipalName,OnPremisesImmutableId | Select-Object UserPrincipalName,OnPremisesImmutableId
- You can revert-back to non-federated authentication by entering the following command:
Update-MgDomain -DomainId "yourdomainname.com" -BodyParameter @{AuthenticationType="Managed"}
The configuration is complete.
Related Articles
Microsoft Office 365 - SAML My Page SSO Configuration - RSA Ready Implementation Guide 116Number of Views Microsoft Entra ID - RSA Ready Implementation Guide 244Number of Views Microsoft Entra ID - SAML Relying Party Configuration - RSA Ready Implementation Guide 85Number of Views My Page Enrollment Policy 320Number of Views Microsoft Entra ID Custom Controls - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 186Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide How to recover the Application and AFX after an unexpected database failure in RSA Identity Governance & Lifecycle RSA MFA Agent 2.4 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager Upgrade Process