Symantec Privileged Access Manager - SAML My Page SSO Configuration - RSA Ready Implementation Guide
This article describes how to configure Symantec Privileged Access Manager with Cloud Access Service (CAS) using My Page SSO.
Configure CAS
Perform these steps to configure CAS using My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console and browse to Applications > Application Catalog.
- Click Create from Template and click Select for SAML Direct.
- On the Basic Information page, choose Cloud.
- Enter the name for the application and click Next Step.
- On the Connection Profile page, navigate to the Initiate SAML Workflow section and choose IdP-initiated.
- Specify the following details from Symantec Privileged Access Manager.
- Assertion Consumer Service (ACS) URL: https://hostname.SymantecPAM/idp/profile/SAML2/POST/SSO
- Service Provider Entity ID: Unique in both CAS and Symantec Privileged Access Manager.
- Scroll down to the Identity Provider section.
- Make a note of the Identity Provider URL, as it is needed for the Symantec Privileged Access Manager configuration.
- Under the Message Protection section, for SAML Response Protection:
- Select the certificate downloaded from Symantec Privileged Access Manager.
- Choose IdP signs assertion within response.
- Scroll down to the User Identity section and select the following:
- Identifier Type: emailAddress
- Property: mail
- Click Next Step and select the configured policy.
- On the Portal Display page, select Display in Portal and click Next Step.
- Configure the Fulfillment details as per your organization's policy.
- Locate the application you created on the My Applications page and click the drop-down arrow next to Edit, and click Edit > Export Metadata.
- Click Publish Changes. After publishing, your application is now enabled for SSO.
Configure Symantec Privileged Access Manager
Perform these steps to configure Symantec Privileged Access Manager.
Procedure
- Log in to Symantec Privileged Access Manager with the admin account.
- Browse to Configuration > Security > SAML and provide the following details under SP Configuration.
- Entity ID: It should be unique in both CAS and the Symantec portal.
- Fully Qualified HostName: Specify the CAS hostname here.
- Certificate Key Pair: gkcert.crt. This can be uploaded in the CAS SAML request.
- Navigate to Configured Remote SAML IDP to upload IDP Metadata File, which was downloaded from RSA.
- Click Save to complete the SAML configuration.
- Navigate to Configuration > Security > Certificates > Download from Filename and select the certificate to download it. This needs to be used in CAS configuration.
The configuration is complete.
Related Articles
Keeper Security - SAML My Page SSO Configuration - RSA Ready Implementation Guide 10Number of Views Oracle Cloud Infrastructure - SAML My Page SSO Configuration - RSA Ready Implementation Guide 20Number of Views Keeper Security - SAML Relying Party Configuration - RSA Ready Implementation Guide 5Number of Views Keeper Security - RSA Ready Implementation Guide 24Number of Views CyberArk Password Vault Web Access - SAML My Page SSO Configuration - RSA Ready Implementation Guide 60Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Release Notes: Cloud Access Service and RSA Authenticators An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Release Notes for RSA Authentication Manager 8.8
Don't see what you're looking for?