Okta - SAML My Page SSO Configuration - RSA Ready Implementation Guide
Originally Published: 2021-11-07
This section describes how to configure Okta with RSA Cloud Authentication Service using my page SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console and navigate to Applications > Application Catalog. Click Create From Template and select SAML Direct.
- Choose Cloud on the Basic Information page.
- Enter the name for the application and click the Next Step button.
- On the Connection Profile page, Navigate to Initiate SAML Workflow section and choose IdP-initiated.
- In Data Input Method, select Import Metadata file from Okta to populate the Assertion Consumer Service URL value and Service Provider Entity ID.
- Scroll down to the Identity Provider section. Make a note of the Identity Provider URL, as it will be needed for the OKTA configuration.
- Under the Message Protection section, for SAML Response Protection:
-
- Select IdP signs assertion with response.
- Scroll down to the User Identity section and select the following:
- Identifier Type – emailAddress
- Property – mail
- Click Next Step, select Allow All Authenticated Users, from the drop down select the policy for this application.
- On the Portal Display page, select Display in Portal. Click Next step.
- Enter Fulfilment details as shown below.
- Locate the application just created in My Applications page and click the dropdown arrow next to Edit > Export Metadata.
- Click Publish Changes. After publishing, your application is now enabled for SSO.
The configuration is complete.
OKTA Configuration
Perform these steps to configure OKTA.
Procedure
- Log in to Okta with the admin account, browse to the Security > Identity Providers > Add Identity provider.
- Select the Identity Provider as SAML 2.0 click Next.
- Provide the name details to configure General settings.
- Select IdP Usage as SSO only and select the checkbox for Account matching with Persistent Name ID.
- Provide details in the Account matching with IdP Username section.
-
- Select the idpuser.subjectNameID from drop down for IDP username.
- Match against field select the Email from drop down.
- If no match is found select the check box Redirec to Okta Sign-in page.
- Provide the following details in the SAML Protocol Setting section:
-
- IdP Issuer URI - Obtain from the metadata file downloaded from RSA.
- IdP Single Sign-On URL - Obtain from the metadata file downloaded from RSA.
- IdP Signature Certificate – Upload the downloaded certificate from RSA.
- Request Binding – Select HTTP POST.
- Provide the details as shown in the following figure and click Finish.
-
- Request Signature select the check box Sign SAML Authentication requests.
- Request Signature Algorithm select the SHA-256 from the drop down list.
- Destination Specify the destination RSA URL.
8. Navigate to the Identity Providers section and click Add Routing Rule under the Routing rules tab.
9. Provide the Rule name, select the IdP as Okta under IdPs, and click Create rule.
The configuration is complete.
Related Articles
RSA Identity Management & Governance AuthRequest asking for a transient ID in SAML SSO integration 190Number of Views RSA Identity Governance and Lifecycle SAML SSO failing with error "Did not find user with attribute" 209Number of Views Okta SSO - SAML Relying Party Configuration as a step-up for Okta applications - RSA Ready SecurID Access Implementation G… 87Number of Views An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x 1.15KNumber of Views How to SecurID-protect OWA using single sign-on (SSO) when OWA is in a cluster 199Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide Downloading RSA Authentication Manager license files or RSA Software token seed records RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Release Notes for RSA Authentication Manager 8.8 Download RSA SecurID Access Cloud User Event audit logs using Cloud Administration REST API CLU
Don't see what you're looking for?