Skyhigh End User Remediation Flow - SAML My Page SSO Configuration - RSA Ready Implementation Guide
This article describes how to integrate Skyhigh End User Remediation Flow with RSA Cloud Authentication Service using My Page SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.
Procedure
- Navigate to the RSA Cloud Admin Console > Access > My Page > Single Sign-On (SSO), and enable SSO on the MyPage portal.
Note: Ensure that SSO on the MyPage portal is enabled and protected using two-factor authentication, like in the below example using a Password and Access Policy.
- Sign in to RSA Cloud Administration Console and browse to Applications > Application Catalog.
- Select Create from Template.
- On the Basic Information page, enter the name for the application in the Name field. Then click the Next Step button.
- In the Basic Information section, choose Cloud. And select Next Step.
- In the Connection Profile Section, select IDP-initiated.
- In the date input method section ,select Enter Manually and provide the following details:
- In the Service Provider section, for Assertion Consumer Service URL copy paste the value from Skyhigh (Refer Skyhigh section).
- In the Service Provider section, for Service Provider Entity ID copy paste the value from Skyhigh (Refer Skyhigh section).
- In the Message Protection section, select SP signs SAML requests and choose the file downloaded from Skyhigh (Refer Skyhigh section).
- Select IDP signs assertion within response .Click Download Certificate to download the signing certificate which will be used in Skyhigh configuration.
- In the User Identity section ,choose Identifier Type as emailAddress and Property as AutoDetect.
- Copy the identity Provider URL .This will be used in Skyhigh configuration.
- Leave default value as is, and click Next Step.
- Choose the proper Access Policy for this application and click Next Step.
- Make preferred changes in the Portal Display tab and Fulfillment tab, then click Next Step.
- Click Save and Finish.
- Click Publish Changes.
Configure Skyhigh
Prerequisites
Application should be integrated with Skyhigh.
Box was used for our testing purpose. To configure Box, perform the following steps.
Skyhigh Configuration
- Click the Gear icon.
- Go to Service Management > Add Service Instance > Select Box> Enable API.
- Copy the Security Cloud App ID ,which will be used in setting up Box.
Box Configuration
- Log in to Box account with administrator credentials.
- Go to Admin Console >Integrations >Platform Apps Manager and add a new Server Authentication App. Provide the client ID as the Security Cloud App ID copied earlier.
Changes to policy Settings
- Log in to Skyhigh with admin credentials, and go to Policy >Policy Settings >Policy Settings.
- Enable end user remediation.
Note: If the End -User Input option is not available contact Skyhigh support.
Data Storage
For end user remediation Your own data storage needs to be used.
- Log in to AWS with administrator credentials, and create a S3 bucket. Then copy the ARN of the bucket as well as AWS ID.
- In the Data Storage section of the Policy Settings ,Paste the ARN, AWS ID and select the appropriate region.
- Test the connection ,save it and contact Skyhigh support to enable the same.
DLP Policy and Classification
- Log in to Skyhigh as administrator.
- Go to Policy >DLP Policies >Classifications. Then create a custom classification.
- Go to Policy >DLP Policies >Classifications >Actions >Create New Policy.
- Create a new policy with deployment type as API, Services as the service instance you have created and rules and responses as per the business requirements.
Procedure
- Log in to Trellix account and click the Skyhigh Security Cloud icon.
- Go to the Gear Icon at the top right, and then click User Management >SAML Configuration.
- Go the End User tab and enable Single Sign On. Insert the the following values:
-
- Identity Provider Issuer URL: Copy paste this value from the RSA configuration (Refer RSA section).
- Identity Provider Certificate: Upload the certificate from the RSA configuration (Refer RSA section).
- Identity Provider Login URL: Will be same as Identity Provider Issuer.
- Signature Algorithm: SHA-256.
- SP-initiated Request Binding: HTTP-POST.
- Copy the Log in URL Endpoint which will be used as ACS URL on the RSA side.
- Copy the Entity ID which is the Service Provider Entity ID to be used on the RSA side.
Notes
- Pre-requisites are from the time of creating this guide .For the latest information please refer to Skyhigh documentation.
- Box is just one of the applications supported by Skyhigh and we used it to test the integration of end user remediation. For the latest list of applications supported by Skyhigh please refer to Skyhigh documentation.
- The configurations and the screenshots presented here for the service instance additions and policy creation are for reference purpose. For the latest information on configuring please refer to the documentation of Skyhigh.
Return to Skyhigh - RSA Ready Implementation Guide
Related Articles
Skyhigh End User Remediation Flow - SAML Relying Party Configuration - RSA Ready Implementation Guide 17Number of Views Skyhigh End User Remediation Flow - RSA Ready Implementation Guide 17Number of Views Delinea - SAML My Page SSO Configuration - RSA Ready Implementation Guide 13Number of Views Salesforce - SAML My Page SSO Configuration - RSA Ready Implementation Guide 66Number of Views RSA Cloud Authentication Service End User Videos 14Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.9 Release Notes (January 2026) An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide
Don't see what you're looking for?