1.0 Introduction
This article describes how to integrate Fortanix-Data-Security-Manager (DSM) with RSA SecurID Access using SAML Relying Party and SSO Agent configuration. It also contains the information that a user requires to:
Configure RSA Cloud Authentication Service
Configure Fortanix Data Security Manager
Relying party integrations use SAML 2.0 to integrate RSA SecurID Access as a SAML Identity Provider (IdP) to Fortanix DSM SAML Service Provider (SP).
SSO Agent integrations use SAML 2.0 technology to direct users’ web browsers to Cloud Authentication Service for authentication. SSO Agents also provide Single Sign-On to other applications using the RSA Application Portal.
When integrated, the Fortanix DSM end users must authenticate with RSA SecurID Access to sign in.
2.0 Architecture Diagram

Figure 1: Architecture diagram for Fortanix DSM with Relying Party Integration

Figure 1: Architecture diagram for Fortanix DSM with SSO Agent Integration
3.0 Configure RSA Cloud Authentication Service - Relying Party
Perform the following steps to configure RSA Cloud Authentication Service as a relying party SAML IdP to Fortanix DSM.
3.1 Procedure
Sign in to the RSA Cloud Administration Console and browse to Authentication Clients > Relying Parties and click Add a Relying Party.
Figure 3: Add Relying Party
From the Relying Party Catalog, click +Add for Service Provider SAML.
Figure 4: Add service provider SAML
In the Basic Information section, enter a name and click Next Step.
Figure 5: Enter basic information
In the Authentication section, do the following:
Under Authentication Details, select SecurID Access manages all authentication.
Select the appropriate primary and additional authentication methods.
Click Next Step.
Figure 6: Authentication details
On the next page, under Service Provider Metadata enter the following values:
Assertion Consumer Service (ACS) URL: Enter the URL: https://<fortanix_dsm_url>/saml.
Service Provider Entity ID - Enter the URL: https://<fortanix_dsm_url>/saml/metadata.xml.
Figure 7: Service provider metadata
Select Default Service Provider Entity ID in Audience for SAML Response section.
Figure 8: Audience for SAML response
In the Message Protection section, under SAML Response Protection, select IdP signs entire SAML response.
Figure 9: Message protection
Click Show Advanced Configuration.
Figure 10: Advanced configuration
Under the User Identity section, select the following:
Identifier Type: Select Auto Detect.
Property: Select Auto Detect.
Figure 11: User identity details
Click Save and Finish.
Click Publish Changes in the top left corner of the page and wait for the operation to complete.
Figure 12: Publish changes
On the My Relying Parties page, do the following:
Select Metadata from the Edit drop-down list to view and download an XML file containing your RSA SecurID Access IdP’s metadata.
Click Download Metadata File in the View or Download Identity Provider Metadata page to download the file. A file named
IdpMetadata.xml
should be downloaded.
Figure 13: My relying parties
4.0 Configure RSA Cloud Authentication Service - SSO Agent
Perform the following steps to configure RSA Cloud Authentication Service as an SSO Agent SAML IdP to Fortanix DSM.
4.1 Procedure
Sign in to the RSA Cloud Administration Console and browse to Applications > Application Catalog.
Click Create From Template and select SAML Direct.
Figure 14: Choose SAML direct connector template
On the Basic Information page, specify the application name and click Next Step.
Figure 15: Enter basic information
In the Initiate SAML Workflow section:
Connection URL: In the Connection URL field, enter the URL: https://<fortanix_dsm_url>.
Select the SP-initiated radio button.
Figure 16: Initiate XAML workflow
In the SAML Identity Provider (Issuer) section::
Identity Provider URL: This will be automatically generated.
Issuer Entity ID: This will be automatically generated.
Click Generate Cert Bundle to generate and download a zip file containing the private key and certificate. Unzip the downloaded file to extract the certificate and private key.
For the Private Key Loaded field, click Choose File and upload the RSA SecurID Access private key.
For the Certificate Loaded field, click Choose File and upload the RSA SecurID Access public certificate.
Figure 17: SAML IdP
Under the Service Provider section:
Assertion Consumer Service (ACS) URL: In the Assertion Consumer Service (ACS) URL field enter the URL: https://<fortanix_dsm_url>/saml.
Audience (Service Provider Entity ID): In the Audience field enter the URL: https://<fortanix_dsm_url>/saml/metadata.xml.
Figure 18: Service provider details
Under User Identity section, select Email Address from the Identifier Type drop down list, select the name of your user Identity Source and select the property value as mail.
Figure 19: User identity
Scroll to the bottom of the page and click Next Step.
On the User Access page, select the access policy the identity router will use to determine which users can access the Fortanixservice provider. Click Next Step.
Figure 20: Access policy
On the Portal Display page, configure the portal display and other settings. Click Save and Finish.
Click Publish Changes in the top left corner of the page and wait for the operation to complete.
Figure 21: Publish changes
Navigate to Applications > My Applications and locate Fortanix in the list and from the Edit option, select Export Metadata.
5.0 Configuration on Fortanix Data Security Manager
Perform the following steps to integrate Fortanix Data Security Manager with RSA SecurID Access as a Relying Party SAML Service Provider or as a SAML SSO Agent.
5.1 Procedure
Log in to the Fortanix DSM portal (https://<fortanix_dsm_url>/).
In the Fortanix DSM left panel, click the Settings tab, and then in the AUTHENTICATION tab, select SINGLE SIGN-ON.
Figure 22: Select Single Sign On
Add the SAML integration, and upload the SAML file downloaded from Step 12 of Configure RSA Cloud Authentication Service – Relying Party or Configure RSA Cloud Authentication Service – SSO Agent.
Figure 23: Add SAML Integration
Enter your custom SSO Title and Logo URL.
Figure 24: Customize SSO
Click ADD INTEGRATION to add the SSO SAML integration.
Once you have the Ping Identity SSO integrated successfully you will be able to see your configuration. The configuration is complete.
Figure 25: SAML IdP Integrated
Now, log out from Fortanix DSM and sign in using SSO.