WordPress - SAML Relying Party Configuration - RSA Ready Implementation Guide
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as Relying Party to WordPress.Procedure
- Sign in to RSA Cloud Administration Console.
- Navigate to the Authentication Clients menu and click Relying Parties.
- On the Relying Party Catalog page, click Add a Relying Party and click Add for Service Provider SAML.
- On the Basic Information page, enter the name for the application in the Name field and click Next Step.
- On the Authentication page, choose SecurID manages all authentication.
- Select a Primary Authentication Method and Access Policy as required and click Next Step.
- For providing Service Provider details:
- Click Import Metadata and click Choose File.
- Select the file that is downloaded from the Service Provider.
See the Configure WordPress section to download the metadata.
- Review the ACS URL and Service Provider Entity ID values that are auto-filled.
- In the SAML Response Protection section, choose IdP signs assertion within response.
- Download the certificate by clicking Download Certificate.
- Click Show Advanced Configuration.
- Under the User Identity section, configure Identifier Type and Property. For example, Identifier Type: AutoDetect and Property: Auto Detect.
- Click Save and Finish.
- On the My Relying Parties page, click the Edit drop-down icon and select the Metadata option to download the metadata.
- Click Publish Changes. Your application is now enabled for SSO.
Configure WordPress
Perform these steps to configure WordPress.As a prerequisite, obtain paid access to use miniOrange SAML 2.0 SSO plugin.
Procedure
- Log on to WordPress with admin credentials.
- Click miniOrange SAML 2.0 SSO plugin and select Service Provider Setup section.
- Click Add New IDP.
- Click RSA SecureID.
- Click Select this IDP as the Default Identity Provider toggle and click Upload IDP Metadata.
- Provide the following details:
- Identity Provider Name – Name of the Identity Provider Configured.
- Upload Metadata – Click Choose File and upload the metadata file downloaded from RSA.
- Click Upload.
- Click Redirection & SSO Links section.
- Under Auto-Redirection from site, choose Redirect to default IDP if user not logged in.
- Click Enable Backdoor Login toggle and click Update.
- Under the Login section, select your configured Identity Provider and click Select, click Add a Single Sign on the WordPress login page (Skip the last two steps if only IdP initiated flow configured).
- Scroll down and click Update.
- Under Service Provider Metadata section click Download XML Metadata (this file will be used to configure the RSA platform).
Return to WordPress - RSA Ready Implementation Guide
Related Articles
Microsoft Office 365 - SAML Relying Party Configuration - RSA Ready Implementation Guide 233Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views Microsoft Entra ID External Authentication Methods (EAM) - Relying Party Configuration Using OIDC - RSA Ready Implementati… 499Number of Views Microsoft Entra ID Custom Controls - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide 186Number of Views Workday - SAML Relying Party Configuration - RSA Ready Implementation Guide 4Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.9 Release Notes (January 2026) An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?