This section describes how to integrate RSA SecurID Access with MyWorkDrive using relying party. Relying party uses SAML 2.0 to integrate RSA SecurID Access as a SAML Identity Provider (IdP) to MyWorkDrive SAML Service Provider (SP).
Architecture Diagram
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as a relying party SAML IdP to MyWorkDrive .
Procedure
-
Sign into the RSA Cloud Administration Console and browse to Authentication Clients > Relying Parties and click Add a Relying Party.
-
Click the Add a Relying Party button on the My Relying Parties page.
-
From the Relying Party Catalog select the +Add button for Service Provider SAML.
-
Enter a Name for the Service Provider in the Name field on the Basic Information page.
-
Click the Next Step button.
-
On the Authentication page, select RSA SecurID Access manages all authentication.
-
Select your access policy from the Access Policy for Additional Authentication drop-down menu.
-
Select Next Step.
-
For Connection Profile page's Service Provider Metadata section, enter the following information:
-
Assertion Consumer Service (ACS) URL Enter the Assertion Consumer Service (ACS) URL like https://YourMWDserver.yourdomain.com/SAML/AssertionConsumerService.aspx.
-
Service Provider Entity ID - MyWorkDrive.
- Select Default Service Provider Entity ID in Audience for SAML Response section.
-
Copy the MyWorkDrive certificate from MyWorkDrive Server location C:\Wanpath\WanPath.Data\Settings\Certificates and click Choose File and attach it.
-
Click Download Certificate. This certificate is required for Step 2 of Configure SAML in MyWorkDrive.
-
-
Click Show Advanced Configuration and configure User Identity with the following values:
-
Identity Type – Email Address
-
Property - mail
-
Click Save and Finish.
-
Click Publish Changes.
- Navigate to Authentication Clients > Relying Parties and locate MyWorkDrive in the list and from the Edit option, select View or Download IdP Metadata. Locate the entityID from the metadata and copy it as it will be needed in Step 3 Configure SAML in MyWorkDrive.
Configure SAML in MyWorkDrive
Perform these steps to configure MyWorkDrive as a Relying Party SAML SP to RSA Cloud Authentication Service.
Please Note: Before proceeding, please ensure that the users are available in Active Directory with matching username UPN with users logging into RSA Cloud Authentication Service.
Procedure
-
Log into MyWorkDrive Server as administrator.
-
Navigate to C:\Wanpath\WanPath.Data\Settings\Certificates and place the RSA Cloud Authentication Service certificate downloaded in Step 11-a of Configure RSA Cloud Authentication Service section.
-
Update the SAML config located at C:\Wanpath\WanPath.Data\Settings to add <PartnerIdentityProvider> entry. In this case we used below:
<PartnerIdentityProvider Name="https://rsa-sid-pe-01.auth-dev.securid.com/saml-fe/sso"
Description="RSA Identity Provider"
SignAuthnRequest="true"
SingleSignOnServiceUrl="https://rsa-sid-pe-01.auth-dev.securid.com/saml-fe/sso"
PartnerCertificateFile="C:\Wanpath\WanPath.Data\Settings\Certificates\IDPSigningCertificate.pem"/>
- Name: Enter the entityID URL from Step 15 of Configure RSA Cloud Authentication Service section.
- Description: Description for this config.
- SignAuthnRequest: true.
- SingleSignOnServiceUrl: Enter the entityID URL from Step 15 of Configure RSA Cloud Authentication Service section.
- PartnerCertificateFile: Full file path of the certificate placed in Step 2 of this section.
Configuration is complete.
Return to the main page for more certification related information.
Related Articles
Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 499Number of Views Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 230Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views Microsoft Entra ID Custom Controls - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 186Number of Views Microsoft Entra ID - SAML Relying Party Configuration - RSA Ready Implementation Guide 85Number of Views
Trending Articles
How to recover the Application and AFX after an unexpected database failure in RSA Identity Governance & Lifecycle Troubleshooting AFX Connector issues in RSA Identity Governance & Lifecycle RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Release Notes for RSA Authentication Manager 8.8 RSA Authentication Manager Upgrade Process