Skyhigh Secure Web Gateway (Cloud using Browser Setting) - SAML Relying Party Configuration - RSA Ready Implementation Guide
This article describes how to integrate RSA with Skyhigh Secure Web Gateway (Cloud using Browser Setting) using SAML Relying Party.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as a Relying Party to Skyhigh Secure Web Gateway (Cloud using Browser Setting).
Procedure
- Sign in to RSA Cloud Administration Console.
- Click Authentication Clients > Relying Parties.
- On the My Relying Parties page, click the Add a Relying Party.
- On the Relying Party Catalog page, click Add for Service Provider SAML.
- On the Basic Information page, enter a name for the Service Provider in the Name field and click Next Step.
- On the Authentication page, choose SecurID Access manages all authentication.
- In the Primary Authentication Method drop-down list, select your desired login method as either Password or SecurID.
- In the Access Policy drop-down list, select a policy that was previously configured.
- Click Next Step.
- On the Connection Profile page, choose Enter Manually and provide the following values:
- ACS URL: https://saml.wgcs.skyhigh.cloud/saml
- Service Provider Entity ID: https://saml.wgcs.skyhigh.cloud
- Under the Audience for SAML Response section, select Default Service Provider Entity ID.
- Under the Message Protection section, for SAML Response Protection, select Idp signs assertion within response.
- Under the User Identity section, select Identifier Type and Property as Auto Detect.
- Under the Statements Attributes section, add email and group as the attributes.
- Click Save and Finish.
- On the My Relying Parties page, in the Edit drop-down list, select Metadata to download it.
- Click Publish Changes.
Note: The group and email values are constant in our configuration. This is done for testing purposes. These attributes can be retrieved from your identity source.
Configure Skyhigh Secure Web Gateway (Cloud using Browser Setting)
Perform these steps to configure Skyhigh Secure Web Gateway (Cloud using Browser Setting).
Procedure
- Log in to your Trellix account and click Skyhigh security cloud.
- Click the settings icon and click Infrastructure > Web Gateway Setup.
- Click New SAML in the Setup SAML section.
- Click Actions > Import Idp Metadata.
- Import the metadata file downloaded from RSA.
- Fill in the values and select the checkbox as shown in the following figure. Copy the Identity Provider Entity ID from the RSA configuration if not auto-populated. This will be the value for SAML Identity Provider URL also.
- Add the domain names of the user’s e-mail.
If the domains added are also present in the other tenants, then Skyhigh will throw an error as these domains identify the Identity provider to be used. - Download the Web Policy Certificate by visiting the following URL.
https://success.skyhighsecurity.com/Skyhigh_Secure_Web_Gateway_(Cloud)/Configuring_a_Web_Policy_%E2%80%94_OId_View/Web_Policy_Certificate/Download_the_Skyhigh_Security_Secure_Web_Gateway_Cloud_Certificate_Bundle
This URL is subject to change. Refer to the latest Skyhigh documentation for Skyhigh Security Secure Web Gateway Cloud Certificate bundle. - Perform the following steps for installing the certificate on your local machine:
- Double-click the unzipped .crt file and click Install Certificate.
- Choose Current User and click Next.
- Select the store as Trusted Root Certification Authorities and click OK.
- Click Next and click Finish.
- Click Policy > Web Policy > Policy.
- Select HTTPS Scanning and click the gear icon against HTTPS Connection Options.
- Click the three-dots icon against the certificate name and export it. Rename the file to .crt type and install the certificate on your machine by following the process mentioned in the preceding steps.
- (Optional) Navigate to Policy > Web Policy > Policy > Global Block > Global Block Lists and add the URLs that need to be blocked. These URLs will be blocked even after the user is authenticated by RSA.
- Click the settings icon and navigate to Infrastructure > Client Proxy Management > Global Configuration > Tenant Authentication and copy the Customer ID.
- Navigate to the proxy settings of your machine and enable the proxy server.
- Add the following values:
- Address: http://c+<Customer ID copied from the previous step>.wgcs.skyhigh.cloud
- Port: 8084
- Add the following exceptions along with your requirements:
*.trellix.com; *.securid.com;dashboard-us.ui.skyhigh.cloud;webpolicy.cloud.mvision.skyhigh.cloud;*.myshn.net - Click Save.
The configuration is complete.
Return to Skyhigh Secure Web Gateway (Cloud using Browser Setting) - RSA Ready Implementation Guide.
Related Articles
Cloud Authentication Service Integration 8Number of Views Configure RSA Authentication Manager as a Secure Proxy Server for Cloud Authentication Service 83Number of Views How to require users to use SecurID to authenticate on some clients and ACE/Server passwords on other clients. 9Number of Views RSA Authentication Manager Secure Proxy Server for Cloud Authentication Service 161Number of Views Skyhigh Secure Web Gateway (Cloud using Agents) - RSA Ready Implementation Guide 10Number of Views
Trending Articles
How to recover the Application and AFX after an unexpected database failure in RSA Identity Governance & Lifecycle Troubleshooting AFX Connector issues in RSA Identity Governance & Lifecycle RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Release Notes for RSA Authentication Manager 8.8 RSA Authentication Manager 8.9 Release Notes (January 2026)
Don't see what you're looking for?