If you plan to enable SAML authentication in your policy rules, you must configure a SAML authentication private application that links the Forcepoint single sign-on Assertion Consumer Service (ACS) URL with the hosting site you are using for SAML authentication. The SAML
authentication private application is used to ensure the SAML assertion from your identity provider is redirected to the Private Access
service.
This task is required if you plan to enable SAML authentication for your private application policy rules.
Steps
-
Go to .
-
Click New.
-
Give the application a Name (for example, "SAML authentication") and an optional description.
-
In the Site field, select the private application hosting site for which you plan to enable SAML authentication.
Note: SAML authentication is supported for a single private application hosting site.
-
In the External FQDN field, enter the domain of the Forcepoint Assertion Consumer Service (ACS) URL.
This URL is shown on the page. Click the name of your configured identity provider to view and copy the
Service Provider Assertion Consumer Service URL. Enter the
domain only. For example:
saml.services.amer.forcepoint.io
-
Set the Protocol to HTTPS.
-
Leave the Port field blank.
-
In the Internal address field, enter the following IP address:
-
Click Save, then Deploy Changes.
Next steps
If you are using Cloud Security Gateway, you must also configure a proxy bypass setting for the SAML application, in the Cloud Security Gateway portal, on the Proxy Bypass tab of the page.