1.0 Introduction
This article describes how to integrate Fortanix-Data-Security-Manager (DSM) with RSA SecurID Access using SAML Relying Party and Single Sign-On (SSO) Agent configuration.
Relying party integrations use SAML 2.0 to integrate RSA SecurID Access as a SAML Identity Provider (IdP) to Fortanix DSM SAML Service Provider (SP).
SSO Agent integrations use SAML 2.0 technology to direct users’ web browsers to Cloud Authentication Service for authentication. SSO Agents also provide Single Sign-On to other applications using the RSA Application Portal.
When integrated, the Fortanix DSM end users must authenticate with RSA SecurID Access to sign in.
It also contains the information that a user requires to:
Configure RSA Cloud Authentication Service
Configure Fortanix DSM
2.0 Architecture Diagram

Figure 1: Architecture diagram for Fortanix DSM with relying party integration

Figure 2: Architecture diagram for Fortanix DSM with SSO agent integration
3.0 Configure RSA Cloud Authentication Service
3.1 Add Relying Party
Perform the following steps to configure RSA Cloud Authentication Service as a relying party SAML IdP to Fortanix DSM.
Sign in to the RSA Cloud Administration Console and browse to Authentication Clients → Relying Parties and click Add a Relying Party.
Figure 3: Add Relying Party
In the Relying Party Catalog, click Add for Service Provider SAML.
Figure 4: Add service provider SAML
In the Basic Information section, enter a name and click Next Step.
Figure 5: Enter basic information
In the Authentication section, do the following:
Under Authentication Details, select SecurID Access manages all authentication.
Select the appropriate primary and additional authentication methods.
Click Next Step.
Figure 6: Authentication details
On the Service Provider page, enter the following values:
Assertion Consumer Service (ACS) URL: Enter the URL: https://<fortanix_dsm_url>/saml.
Service Provider Entity ID - Enter the URL: https://<fortanix_dsm_url>/saml/metadata.xml.
Figure 7: Service provider metadata
In Audience for SAML Response section, select Default Service Provider Entity ID.
Figure 8: Audience for SAML response
In the Message Protection section, under SAML Response Protection section, select IdP signs entire SAML response.
Figure 9: Message protection
Click Show Advanced Configuration.
Figure 10: Advanced configuration
Under the User Identity section, select the following:
Identifier Type: Select Auto Detect.
Property: Select Auto Detect.
Figure 11: User identity details
Click Save and Finish.
Click Publish Changes in the top left corner of the page and wait for the operation to complete.
Figure 12: Publish changes
On the My Relying Parties page, do the following:
Select Metadata from the Edit drop down list to view and download an XML file containing your RSA SecurID Access IdP’s metadata.
Click Download Metadata File in the View or Download Identity Provider Metadata page to download the file. A file named
IdpMetadata.xml
should be downloaded.
Figure 13: My relying parties
3.2 Add Single Sign-On Agent
Perform the following steps to configure RSA Cloud Authentication Service as an SSO Agent SAML IdP to Fortanix DSM:
Sign in to the RSA Cloud Administration Console and browse to Applications → Application Catalog.
Click Create From Template and select SAML Direct.
Figure 14: Choose SAML direct connector template
On the Basic Information section, enter the application name and click Next Step.
Figure 15: Enter basic information
In the Initiate SAML Workflow section, do the following:
Connection URL: In the Connection URL field, enter the URL: https://<fortanix_dsm_url>.
Select the SP-initiated radio button.
Figure 16: Initiate XAML workflow
In the SAML Identity Provider (Issuer) section, do the following:
Identity Provider URL: This will be automatically generated.
Issuer Entity ID: This will be automatically generated.
Click Generate Cert Bundle to generate and download a zip file containing the private key and certificate. Unzip the downloaded file to extract the certificate and private key.
For the Private Key Loaded field, click Choose File and upload the RSA SecurID Access private key.
For the Certificate Loaded field, click Choose File and upload the RSA SecurID Access public certificate.
Figure 17: SAML IdP
Under the Service Provider section, do the following:
Assertion Consumer Service (ACS) URL: Enter the URL: https://<fortanix_dsm_url>/saml.
Audience (Service Provider Entity ID): Enter the URL: https://<fortanix_dsm_url>/saml/metadata.xml.
Figure 18: Service provider details
Under User Identity section, select Email Address from the Identifier Type drop down list, select the name of your user Identity Source and select the property value as mail.
Figure 19: User identity
Scroll to the bottom of the page and click Next Step.
On the User Access page, select the access policy the identity router will use to determine which users can access the Fortanix service provider. Click Next Step.
Figure 20: Access policy
On the Portal Display page, configure the portal display and other settings. Click Save and Finish.
Click Publish Changes in the top left corner of the page and wait for the operation to complete.
Figure 21: Publish changes
Navigate to Applications → My Applications and locate Fortanix in the list and from the Edit option, select Export Metadata.
4.0 Configure RSA SecurID Access in Fortanix DSM
Perform the following steps to integrate Fortanix DSM with RSA SecurID Access as a Relying Party SAML service provider or as a SAML SSO agent:
Log in to the Fortanix DSM using URL: https://<FORTANIX_DSM_URL>/.
In the Fortanix DSM user interface (UI), navigate to Settings → AUTHENTICATION tab, and select SINGLE SIGN-ON as the authentication method.
Click ADD SAML INTEGRATION to add a new SAML integration.
Figure 22: Select SSO
On the Add SAML Integration page, do the following:
Click UPLOAD A FILE to browse and upload the SAML file downloaded in the Step 12 of Section 3.1: Add Relying Party or Section 3.2: Add Single Sign-On Agent.
Figure 23: Upload SAML metadata
In the SSO Title field, customize the SSO by adding a name in the SSO Title field and a URL for the logo image in the Logo URL field.
Click ADD INTEGRATION.
Figure 24: Customize SSO
After successfully integrating RSA Cloud Authentication Service as a relying party or an SSO agent, Fortanix DSM displays the configured SSO below:
Figure 25: SAML IdP integrated
5.0 Test the Integration
Perform the following steps to verify the SSO integration:
Log out of Fortanix DSM to sign in using SSO.
On the Fortanix DSM Login screen, click the LOG IN WITH RSA SECURID ACCESS to log in using the newly added SSO configuration.
Figure 26: Sign in using SSO
You will now be automatically logged in to Fortanix DSM and reach the Fortanix DSM accounts page.