Skyhigh Secure Web Gateway (Cloud using Agents) - SAML My Page SSO Configuration - RSA Ready Implementation Guide
This article describes how to integrate Skyhigh Secure Web Gateway ((Cloud using Agents) with RSA Cloud Authentication Service using My Page SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console.
- Enable My Page SSO by accessing the RSA Cloud Administration Console > Access > My Page > Single Sign-On (SSO). Ensure it is enabled and protected using two-factor authentication - Password and Access Policy.
- On the Applications > Application Catalog page, click Create From Template.
- Click Select for SAML Direct.
- On the Basic Information page, choose Cloud.
- Enter the name for the application in the Name field and select Next Step.
- On the Connection Profile page, choose SP-initiated.
- In the Connection URL field, enter https://saml.wgcs.skyhigh.cloud/saml.
- In the Data Input Method section, choose Enter Manually and provide the following values:
- Assertion Consumer Service(ACS) URL: https://saml.wgcs.skyhigh.cloud/saml
- Service Provider Entity ID: https://saml.wgcs.skyhigh.cloud
- Identity Provider Entity ID: Select the default value if not already selected.
- Audience for SAML Response: Select the default value if not already selected.
- Under the SAML Response Protection subsection of the Message Protection section, select IdP signs assertion within response.
- Under User Identity, select Identifier Type as Auto Detect and Property as mail.
- Under Statement Attributes, add email as an attribute.
- Click Next Step.
- Choose your desired Access Policy for this application and click Next Step.
- Make the desired changes to the portal display option and click Next Step.
- Make the desired changes to the Fulfillment form and click Next Step.
- Click Save and Finish.
- Click Publish Changes.
- On the My Applications page, click the Edit drop-down icon for the created application and select Export Metadata to download the metadata.
Notes:
-
- IdP-initiated flow is not supported for this integration.
- The email value is constant in our configuration. This is done for testing purposes. These attributes can be retrieved from your identity source.
Configure Skyhigh Secure Web Gateway (Cloud using Agents)
Perform these steps to configure Skyhigh Secure Web Gateway (Cloud using Agents).
Procedure
- Log in to your Trellix account and click Skyhigh security cloud.
- Click the settings icon and click Infrastructure > Web Gateway Setup.
- Click New SAML in the Setup SAML section.
- Click Actions > Import Idp Metadata.
- Import the metadata file downloaded from RSA.
- Fill in the following values and select the checkbox.
- Service Provider Entity ID: https://saml.wgcs.skyhigh.cloud
- User ID Attribute in SAML Response: email
- Group ID Attribute in SAML Response: memberOf
- Add the domain names of the user’s e-mail.
If the domains added are also present in the other tenants, then Skyhigh will throw an error as these domains identify the Identity provider to be used. - Download the Web Policy Certificate by visiting the following URL.
https://success.skyhighsecurity.com/Skyhigh_Secure_Web_Gateway_(Cloud)/Configuring_a_Web_Policy_%E2%80%94_OId_View/Web_Policy_Certificate/Download_the_Skyhigh_Security_Secure_Web_Gateway_Cloud_Certificate_Bundle
This URL is subject to change. Refer to the latest Skyhigh documentation for Skyhigh Security Secure Web Gateway Cloud Certificate bundle. - Perform the following steps for installing the certificate on your local machine:
- Double-click the unzipped .crt file and click Install Certificate.
- Choose Current User and click Next.
- Select the store as Trusted Root Certification Authorities and click OK.
- Click Next and click Finish.
- Click Policy > Web Policy > Policy.
- Select HTTPS Scanning and click the gear icon against HTTPS Connection Options.
- Click the three-dots icon against the certificate name and export it. Rename the file to .crt type and install the certificate on your machine by following the process mentioned in the preceding steps.
- (Optional) Navigate to Policy > Web Policy > Policy > Global Block > Global Block Lists and add the URLs that need to be blocked. These URLs will be blocked even after the user is authenticated by RSA.
- Click the gear icon, navigate to Infrastructure > Web Gateway Setup > Get SCP > Manage SCP, and select the policy created under Configuration Policies.
- Click Proxy Bypass.
- Click Bypass all proxies for traffic to these domains and add the following entries with your requirements.
myshn.net
webpolicy.cloud.mvision.skyhigh.cloud
dashboard-us.ui.skyhigh.cloud
securid.com
trellix.com - Click OK.
- (Optional) To add the processes to the list for Bypassing the proxy, find out the process names from the task manager and add those entries in Bypass all the proxies for traffic from these processes.
- Click Save.
- Select the Gateway List and create a Gateway if not already created with the following details.
- Gateway Hostname: c<CustomerID>.wgcs.skyhigh.cloud
- Listening Port: 8080
- Navigate to Policy > Web Policy > Policy > SAML Authentication.
- Click the gear icon and select the SAML configuration.
- Select custom SAML Authentication Preference if one is created.
- Navigate to SCP Configuration > Configuration Policies and select your policy.
- Click Actions > Export Bundle.
- Unzip the zip file and run the .msi file to install.
- Navigate to SCP Configuration > Configuration Policies and select your policy.
- Click Actions > Export Policy.
- Rename the downloaded file to scppolicy.opg and place it in C:\ProgramData\Skyhigh\SCP\Policy\Temp (Program Data is a hidden folder).
- Click the Windows Start menu > About Skyhigh client proxy. Connection status should be connected and the Policy Revision number should match the Revision number on the SCP configuration policy.
Notes
- Only SP-initiated flow is supported .
- Customer ID can be retrieved from SCP Configuration > Global Configuration > Tenant Authentication.
- By default, the timeout for the proxy using agents is 72000 seconds. To reduce this, select custom SAML Authentication Preference on Web Policy > SAML Authentication > gear icon.
To create the custom SAML Authentication Preference, navigate to Policy > Web Policy > Feature Configuration > SAML Authentication Preference (in the left pane).
The configuration is complete.
Return to Skyhigh Secure Web Gateway (Cloud using Agents) - RSA Ready Implementation Guide.
Related Articles
RSA SecurID 3.0 Software Token Quick Start Guide (Italian) 5Number of Views RSA Governance & Lifecycle - Active Directory (AD) Managed Applications 04 58Number of Views RSA Governance & Lifecycle Recipes: Dormant Account Process 46Number of Views RSA Identity G&L 7.1.0 installation intermittently fails on SLES 12 where 'Hardware Lock Elision' functionality of the CPU… 32Number of Views RSA Governance & Lifecycle 8.0 Patch 02 Release Notes 99Number of Views
Trending Articles
RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide Downloading RSA Authentication Manager license files or RSA Software token seed records RSA Release Notes for RSA Authentication Manager 8.8 Deploying RSA Authenticator 6.2.2 for Windows Using DISM
Don't see what you're looking for?