Symantec Privileged Access Manager - SAML Relying Party Configuration - RSA Ready Implementation Guide
This article describes how to integrate Cloud Access Service (CAS) with Symantec Privileged Access Manager using SAML Relying Party.
Configure CAS
Perform these steps to configure CAS
Procedure
- Sign in to RSA Cloud Administration Console.
- Navigate to Authentication Clients > Relying Parties.
- On the Relying Party Catalog page, click Add a Relying Party and click Add for Service Provider SAML.
- On the Basic Information page, enter the name for the application in the Name field and click Next Step.
- On the Authentication tab, choose RSA manages all authentication, and select a Primary Authentication Method and Access Policy as required.
- Click Next Step.
- Specify the following details from Symantec Privileged Access Manager.
- Assertion Consumer Service (ACS URL): https://hostname.SymantecPAM/idp/profile/SAML2/POST/SSO
- Service Provider Entity ID: Unique in both CAS and Symantec Privileged Access Manager.
- Under the Message Protection section, for SAML Response Protection:
- Select the certificate downloaded from Symantec Privileged Access Manager.
- Choose IdP signs the assertion with response.
- Scroll down to the User Identity section and select the following:
- Identifier Type: emailAddress
- Property: mail
- Make a note of the Identity Provider Entity ID, as it is needed for the Symantec Privileged Access Manager configuration.
- Click Save and Finish.
- On the My Relying Parties page, for the created Relying Party, click the Edit drop-down icon and select the Metadata option to download the metadata.
- Click Publish Changes.
Your application is now enabled for SSO.
Configure Symantec Privileged Access Manager
Perform these steps to configure Symantec Privileged Access Manager.
Procedure
- Log in to Symantec Privileged Access Manager with the admin account.
- Browse to Configuration > Security > SAML and provide the following details under SP Configuration.
- Entity ID: It should be unique in both CAS and the Symantec portal.
- Fully Qualified HostName: Specify the CAS hostname here.
- Certificate Key Pair: gkcert.crt. This can be uploaded in the CAS SAML request.
- Navigate to Configured Remote SAML IDP to upload IDP Metadata File, which was downloaded from RSA.
- Click Save to complete the SAML configuration.
- Navigate to Configuration > Security > Certificates > Download from Filename and select the certificate to download it. This needs to be used in CAS configuration.
The configuration is complete.
Related Articles
Symantec Privileged Access Manager - SAML My Page SSO Configuration - RSA Ready Implementation Guide 4Number of Views Which RSA Cloud Authentication Service tenant am I using? 152Number of Views How to configure more than two IP addresses for an RSA Authentication Manager 8.2 Web Tier Virtual Host 649Number of Views Users cannot authenticiate to the RSA SecurID Access Portal or protected applications using Microsoft Integrated Windows A… 183Number of Views RSA SecurID Software Token 4.1.2 and 4.2.1 for Mac OS X displays: No token storage device was detected. Verify that the de… 371Number of Views
Trending Articles
RSA MFA Agent 2.5 for Microsoft Windows Installation and Administration Guide RSA Release Notes for RSA Authentication Manager 8.8 Troubleshooting RSA MFA Agent for Microsoft Windows How to download and install the AFX Server Archive in RSA Identity Governance & Lifecycle The Template ({Connector Template Name}) has missing file content error when creating AFX Connectors in RSA Identity Gover…
Don't see what you're looking for?