Any SAML IdP: Configuring Forcepoint ONE SSE as a SAML SP

Use the configuration information to register Forcepoint ONE SSE as a SAML SP on other external SAML IdP.

Note: Forcepoint ONE SSE UI supports UTF-8 characters. However, the SAML assertion only supports low-ASCII characters as attribute values. If an attribute value contains characters that are not low-ASCII, then SAML sign-in failures occur.

The following metadata URL will be used to register Forcepoint ONE SSE as a service provider.

  • SAML Metadata URL: https://portal.bitglass.com/sso/metadata/
  • SAML ACS Endpoint: https://portal.bitglass.com/sso/acs/

Otherwise, refer to the table below for manual configuration of the SAML settings:

SAML Response Setting Notes
SSO URL https://portal.bitglass.com/sso/acs/ Used also for Recipient URL and Destination URL.
Name ID Format EmailAddress  
Entity ID https://sso.bitglass.com This is the default URL used for the first IdP added to Forcepoint ONE SSE. If you add any subsequent URLs to Forcepoint ONE SSE, the Entity ID will be https://saml.bitglass.com/<character string> where <character string> is a random generated set of characters Forcepoint ONE SSE will use to identify the IdP. Make sure you are copying the Entity ID from the Forcepoint ONE SSE IdP setup page to get the right URL when setting up your configuration in your external IdP.
Assertion Signed, Not Encrypted  
Response Not Signed, Not Encrypted  
relay_state IdP initiate auth: bg_portal_login

SP initiated auth: bg_saml_login

For SP initiated auth, Forcepoint ONE SSE will set the relay_state parameter in the SAML request to bg_saml_login. The relay_state parameter should not be altered by the IdP. Refer to the Advanced IdP Settings to learn more about configuring the Default Relay State.
Signature Algorithm RSA_SHA256  
Digest Algorithm SHA256  
SAML Single Logout Disabled  
Authentication Context Class PasswordProtectedTransport  
Honor Force Authentication No