Okta - IdP for Cloud Authentication Service - RSA Ready Implementation Guide
This section describes how to configure Okta as an IdP for RSA Cloud Authentication Service.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as a service provider for Okta.
Procedure
- Sign in to the RSA Cloud Administration Console and navigate to My Account > Company Settings > Sessions & Authentication.
- Under Cloud Administration Console Authentication, Password is displayed as the default primary authentication. To allow administrators to authenticate through a third-party identity provider, click Third-Party Identity Provider (IdP) and perform the following steps:
-
- The Sign-In URL field displays the URL the administrators will use when signing into Cloud Administration Console through a third-party identity provider. This field is read only.
- The Assertion Consumer Service URL field displays the URL that Okta will use to set up the service provider.
- In the Issuer ID field, enter the value of the Issuer ID provided by Okta: http://www.okta.com/AccountID.
- In the Issuer URL field, enter the value of the Single Sign-on Service provided by Okta: https://hostname.okta.com/app/rsasaml2testsp/AccountID/sso/saml.
- In the Audience ID field, the RSA hostname value will be auto populated. This value is included by the identity provider in SAML assertions to indicate the intended recipient. The value is set as the Entity ID in SAML requests sent to the identity provider.
-
- In the SAML Response Signature section, click Choose File to upload a certificate that the Cloud Authentication Service uses to validate the assertion signature provided by the Okta.
Refer to the Okta configuration section to obtain the certificate to validate the assertion signature.
- Click Publish Changes to save your settings. After publishing, your application will be enabled for SSO.
Note
- Ensure that all changes are correct and saved in Okta before making any changes in the RSA. Once changes are saved in the RSA, the feature will be enabled. If it doesn't work, all Super Admins and Admins will be locked out. This happens because enabling third-party IdP authentication disables regular password authentication by default, meaning the configuration must work through the IdP to access the Console.
Configure Okta
Perform these steps to configure Okta as an SSO Agent SAML service provider to RSA Cloud Authentication Service.
- Sign in to Okta with the admin account and browse to Applications > Create App Integration.
- Select SAML 2.0 checkbox under Sign-in method and click Next.
- In the General Settings section, provide the App name as RSA Cloud Administration and click Next.
- In the Configure SAML section, under SAML Settings, provide the following details:
- Single sign-on URL: Enter the value of SingleSignOnService, obtainable from the metadata file downloaded from the RSA platform.
- Audience URI (SP Entity ID): Enter the value of Service Provider Entity ID, obtainable from the metadata file downloaded from the RSA platform.
- Name ID format: Set this to Unspecified, the default value.
- Under Create SAML Integration section, follow these steps:
- Select the checkbox I’m an Okta customer adding an internal app and in App type, select the checkbox This is an internal app that we have created.
- Click Finish to complete the application integration with RSA Cloud Administration
- Once the application is configured, view the Issuer ID and Issuer URL on Sign On tab. The same values will be configured in RSA Cloud Authentication Service Company settings.
- Select the checkbox I’m an Okta customer adding an internal app and in App type, select the checkbox This is an internal app that we have created.
- Download the certificate to upload for RSA.
- To assign users to the application, click the Assing tab, select the People from the Assign dropdown. Search for the user and assign them.
- Click Assign to add the user to the application. The users assigned to the application appear will appear in the list.
Return to Okta - Third-Party IdP Integration - RSA Ready Implementation Guide .
Related Articles
Okta Agent - RSA Ready Implementation Guide 6Number of Views Okta - IdP for My Page - RSA Ready Implementation Guide 25Number of Views Okta - RSA Ready Implementation Guide 110Number of Views How to seperate MIB files for RSA Authentication Manager 8.x 69Number of Views Cloud Administration Enable Hardware Token API 23Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Release Notes: Cloud Access Service and RSA Authenticators RSA Release Notes for RSA Authentication Manager 8.8 RSA-2026-04: RSA Governance and Lifecycle Security Update for SUSE Linux Enterprise Server Vulnerabilities
Don't see what you're looking for?