SilverFort - SAML My Page SSO Configuration - RSA Ready Implementation Guide
This article describes how to integrate SilverFort with RSA Cloud Access Service (CAS) using My Page SSO.
Configure CAS
Perform these steps to configure CAS using My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console and browse to Applications > Application Catalog.
- Click Create from Template and then click Select next to SAML Direct.
- On the Basic Information page, choose Cloud.
- Enter a name for the SilverFort application and click Next Step.
- On the Connection Profile page, navigate to the Initiate SAML Workflow section and choose SP-initiated.
- Connection URL: It is not required for SilverFort and can be set to any valid URL. For example, you can use the ACS URL as the Connection URL.
- Under Data Input Method, choose Enter Manually.
- Scroll down to the Service Provider section and provide the details in the following formats:
- Assertion Consumer Service (ACS) URL: Enter your Mobile Messaging Service URL with the addition of the following prefix: /apps/api/sso/response. For example:
- Global - https://raven.silverfort.io/apps/api/sso/response
- Singapore - https://sg.raven.silverfort.io/apps/api/sso/response
- Europe - https://eu.raven.silverfort.io/apps/api/sso/response
- Australia - https://au.raven.silverfort.io/apps/api/sso/response
- India - https://in.raven.silverfort.io/apps/api/sso/response
- Service Provider Entity ID: Enter the SAML Entity ID for your application. To ensure successful authentication, this must match the Audience value set in SilverFort.
- Assertion Consumer Service (ACS) URL: Enter your Mobile Messaging Service URL with the addition of the following prefix: /apps/api/sso/response. For example:
- Under the Message Protection section, choose IdP signs entire SAML response.
- Under the User Identity section, select emailAddress as Identifier Type and mail as Property.
- Under the Statement Attributes section, enter the following attributes:
Attribute Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Property: userName
Attribute Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Property: mail - Click Next Step.
- On the User Access page, select the access policy to determine which users can access the application, and then click Next Step.
- On the Portal Display page, configure the portal display and other settings.
- Click Next Step.
- On the Fulfillment page, configure your preferred settings, or leave the Fulfillment toggle disabled as is, and then click Save and Finish.
- Click Publish Changes and wait for the operation to be completed.
After publishing, your application is enabled for SSO. - Navigate to the newly created application from Application, and in the drop-down list, choose Export Metadata. This metadata will be used later in the SilverFort configuration.
Configure SilverFort
Perform these steps to configure SilverFort.
Procedure
- In the SilverFort Admin Console, navigate to the Settings page and select Integrations.
- Click the Identity Bridge tab.
- Click Add IdP and provide the following details.
- IdP Name: RSA ID Plus
- Application Name: Anything of your choice; for example, RSA_Silverfort_App
- Login URL: The Identity Provider URL copied from RSA (to find this, select Edit on your SAML application in RSA, and copy the Identity Provider URL).
- Issuer: The value of entityID copied from the metadata.
- Audience: The same value set for Service Provider Entity ID in RSA (for example, Silverfort_SP).
- Upload certificate: The certificate that was previously downloaded from RSA.
- Click Save.
Create Bridge Policy
Perform the following steps to create a SilverFort Bridge policy.
- On the Admin Console, navigate to the Policies page.
- Select Create policy and fill all required fields.
- Policy name: Create a name for the policy
- Action: Select Identity Bridge.
- IdP: Select RSA ID Plus.
- Enterprise app: Select the application name you entered in the Bridge Config.
- Click Save.
The configuration is complete.
Related Articles
MessageMedia SMS Gateway - On Demand Token Code Delivery Configuration - RSA Ready SecurID Access Implementation Guide 24Number of Views RSA Governance & Lifecycle - Upgrade and Migration Recommended Practices (v7.1x v7.2x) 94Number of Views Downloading the RSA SecurID Access Embedded Identity Router fails on Authentication Manager 8.5 353Number of Views RSA Governance & Lifecycle - Upgrade and Migration Recommended Practices 124Number of Views Planning Resource Protection with Multifactor Authentication 54Number of Views
Trending Articles
Downloading RSA Authentication Manager license files or RSA Software token seed records RSA Release Notes for RSA Authentication Manager 8.8 RSA Authentication Manager 8.9 Release Notes (January 2026) Download RSA SecurID Access Cloud User Event audit logs using Cloud Administration REST API CLU RSA SecurID Software Token 5.0.2 for Windows Desktop displays message after reboot due to roaming profile: No token stor…
Don't see what you're looking for?