• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Company · Blog · Newsletter · Events · Partner Program

Downloads      Support      Security     Admin Login
Rublon

Rublon

Secure Remote Access

  • Product
    • Regulatory Compliance
    • Use Cases
    • Rublon Reviews
    • Authentication Basics
    • What is MFA?
    • Importance of MFA
    • User Experience
    • Authentication Methods
    • Rublon Authenticator
    • Remembered Devices
    • Logs
    • Single Sign-On
    • Access Policies
    • Directory Sync
  • Solutions
    • MFA for Remote Desktop
    • MFA for Remote Access Software
    • MFA for Windows Logon
    • MFA for Linux
    • MFA for Active Directory
    • MFA for LDAP
    • MFA for RADIUS
    • MFA for SAML
    • MFA for RemoteApp
    • MFA for Workgroup Accounts
    • MFA for Entra ID
  • Customers
  • Industries
    • Financial Services
    • Investment Funds
    • Retail
    • Technology
    • Healthcare
    • Legal
    • Education
    • Government
  • Pricing
  • Docs
Contact Sales Free Trial

Multi-Factor Authentication (2FA/MFA) for Pulse Connect Secure SSL VPN – SAML

Multi-Factor (MFA) and Two-Factor Authentication (2FA) for Pulse Connect Secure SSL VPN using SAML

February 10, 2021 By Rublon Authors

Last updated on October 16, 2024

Overview

The purpose of this document is to enable Rublon Multi-Factor Authentication (MFA) for users logging in to Pulse Connect Secure SSL VPN. In order to achieve that using SAML, you have to use Rublon Access Gateway. All required steps will be described in this document.

Supported Authentication Methods

Authentication Method Supported Comments
Mobile Push ✔ N/A
WebAuthn/U2F Security Key ✔ N/A
Passcode ✔ N/A
SMS Passcode ✔ N/A
SMS Link ✔ N/A
Phone Call ✔ N/A
QR Code ✔ N/A
Email Link ✔ N/A
YubiKey OTP Security Key ✔ N/A

Before you start

You need to install and configure Rublon Access Gateway itself before configuring Pulse to work with it. Please read the Rublon Access Gateway documentation and follow the steps in Installation and Configuration sections. Afterwards, continue with this document.

Configuration

1. Log in to Pulse admin panel.

2. Go to Authentication → Auth. Servers.

3. Select SAML Server in the New dropdown, and click New Server….

4. Fill in the fields in the Settings tab. Refer to the following image and table.

Server NameEnter a name for your authentication server, e.g. Rublon Access Gateway.
SAML VersionSelect 2.0.
Identity Provider Entity IdEnter the value of Entity ID from Rublon Access Gateway (Applications → Information for configuring applications with Rublon Access Gateway).
Identity Provider Single Sign On Service URLEnter the value of SSO URL from Rublon Access Gateway (Applications → Information for configuring applications with Rublon Access Gateway).
User Name TemplateEnter cn.
Support Single LogoutCheck.
Single Logout Service URLEnter the value of Logout URL from Rublon Access Gateway (Applications → Information for configuring applications with Rublon Access Gateway).
Single Logout Response URLEnter the value of Logout URL from Rublon Access Gateway (Applications → Information for configuring applications with Rublon Access Gateway).
Upload CertificateUpload the certificate you have downloaded from Rublon Access Gateway (Applications → Information for configuring applications with Rublon Access Gateway → DOWNLOAD CERTIFICATE).
Enable Signing Certificate status checkingUncheck.
Metadata ValiditySet to a value of your choice, e.g. 365 days.

5. Click Save Changes.

6. Scroll down to the bottom of the page and click Download Metadata. You are going to need that XML file later.

7. Do not close Pulse admin panel. Log in to Rublon Access Gateway in another tab.

8. Go to Applications → Import application metadata.

9. Enter a name for your application, e.g. Pulse. Select the XML file you have downloaded before, and click UPLOAD.

10. Your application will appear on the applications list in the All applications subtab.

11. Get back to Pulse admin panel. Go to Users → User Realms → New User Realm….

12. Set a Name for your new realm, e.g. Rublon Access Gateway.

13. Select the previously created Rublon Access Gateway authentication server in the Authentication dropdown.

14. Click Save Changes.

15. Select the Role Mapping tab and click New Rule….

16. Set a name of your choice for your new rule.

17. Set Rule:If username… to is *.

18. Assign a Users role. Select Users on the Available Roles list and click Add ->.

19. Click Save Changes.

20. Go to Authentication → Signing In → Sign-in Policies.

21. Click New URL… to create a new URL.

22. Set Sign-in URL to */saml/.

23. Set Sign-in page to Default Sign-in page.

24. Select User picks from a list of authentication realms and select the Rublon Access Gateway realm you have created before. To do this, just select Rublon Access Gateway on the Available realms list and click Add ->.

25. Click Save Changes.

26. Your configuration is now complete. Your users can now log in to Pulse Connect Secure SSL VPN with Rublon 2FA enabled.

Log in to Pulse Connect Secure with Rublon 2FA

This example portrays logging in to Pulse Connect Secure SSL VPN via a web browser.

1. Open the Pulse VPN login page in your browser.

2. You will be redirected to Rublon Access Gateway login page.

3. Provide your username and password. Click SIGN IN.  A window should appear with a selection of various 2FA options from Rublon. Let’s choose Mobile Push.

4. You will be sent a push notification. Tap APPROVE.

5. You will be successfully logged in to Pulse SSL VPN.

Troubleshooting

If you encounter any issues with your Rublon integration, please contact Rublon Support.

Related Posts

Rublon Access Gateway

Rublon Access Gateway – Integrations

Filed Under: Documentation

Primary Sidebar

Contents

  • Overview
  • Supported Authentication Methods
  • Before you start
  • Configuration
  • Log in to Pulse Connect Secure with Rublon 2FA
  • Troubleshooting
  • Related Posts
Try Rublon for Free
Start your 30-day Rublon Trial to secure your employees using multi-factor authentication.
No Credit Card Required


Footer

Product

  • Regulatory Compliance
  • Use Cases
  • Rublon Reviews
  • Authentication Basics
  • What is MFA?
  • Importance of MFA
  • User Experience
  • Authentication Methods
  • Rublon Authenticator
  • Remembered Devices
  • Logs
  • Single Sign-On
  • Access Policies
  • Directory Sync

Solutions

  • MFA for Remote Desktop
  • MFA for Windows Logon
  • MFA for Remote Access Software
  • MFA for Linux
  • MFA for Active Directory
  • MFA for LDAP
  • MFA for RADIUS
  • MFA for SAML
  • MFA for RemoteApp
  • MFA for Workgroup Accounts
  • MFA for Entra ID

Industries

  • Financial Services
  • Investment Funds
  • Retail
  • Technology
  • Healthcare
  • Legal
  • Education
  • Government

Documentation

  • 2FA for Windows & RDP
  • 2FA for RDS
  • 2FA for RD Gateway
  • 2FA for RD Web Access
  • 2FA for SSH
  • 2FA for OpenVPN
  • 2FA for SonicWall VPN
  • 2FA for Cisco VPN
  • 2FA for Office 365

Support

  • Knowledge Base
  • FAQ
  • System Status

About

  • About Us
  • Blog
  • Events
  • Co-funded by the European Union
  • Contact Us

  • Facebook
  • GitHub
  • LinkedIn
  • Twitter
  • YouTube

© 2025 Rublon · Imprint · Legal & Privacy · Security

  • English