• Add an Application Using HTTP Federation Proxy

      The HTTP Federation (HFED) Proxy method enables you to configure a connection to a web application that does not support Security Assertion Markup Language (SAML) and that uses a sign-in form to authenticate u...
  • Update Identity Router Software for a Cluster

       RSA releases identity router software updates periodically. You must apply these updates to ensure compatibility with new RSA SecurID Access features and improvements. RSA SecurID Access suppor...
  • Manage Authentication Sources

    Use the Authentication Sources page to view the list of authentication sources in your deployment and to perform related tasks. Authentication sources are configured using the Cloud Administration Console. You must be...
  • Configure a Standard or Custom Application Portal Page

       Select the topic you need to configure the application portal.     Configure the Standard Web Application Portal Configure a Custom Portal Page for Web Applications   &#...
  • Identity Router Logging

    RSA SecurID Access generates audit logs and system logs for each identity router in your deployment. You can use these logs to track user and system events, and to troubleshoot identity router problems. Audit L...
  • Administration Log Messages for the Cloud Authentication Service

    The Cloud Administration Console generates audit log messages that describe Super Admin activities. Note:  Use the Log Events API to write a client program that retrieves and delivers these messages. For more i...
  • Add an Identity Router Using the Cloud Administration Console

       Before setting up an identity router virtual appliance or cloud-based instance, you must add an identity router record to the Cloud Authentication Service using the Cloud Administration Console. When ...
  • Clone an Access Policy

       When you clone an access policy, RSA SecurID Access copies settings from the original policy to a new policy and names the new policy Clone oforiginal_policy. You can edit the policy to give it a di...
  • Using RSA Security Key Utility

    If your organization uses FIDO2-certified security keys, you can use RSA Security Key Utility to manage user verification for the security keys. RSA Security Key Utility is a Windows utility that you deploy on users' ...
  • Portal Multifactor Authentication Policy

    Deployments that use the SSO Agent can use the Portal Multifactor Authentication Policy to require users to complete additional authentication in addition to the default requirements of user ID and password to si...
  • Configure Company Information and Certificates

       Configure settings that affect your entire deployment. These settings include: Configure secure Sockets Layer (SSL) private keys and certificates to protect the RSA SecurID Access Application Portal...
  • Authenticator Registration

       Users complete authenticator registration so that they can use the RSA SecurID Authenticate app (registered on a phone, tablet, or desktop or PC) or FIDO authenticator to authenticate to protected a...
  • Add Administrators for the Cloud Administration Console

        Perform this task to add Super Admins and Help Desk Admins to manage the Cloud Administration Console. Help Desk Admins for the Cloud Administration Console assist users who authenticate with the Clo...
  • Manage Clusters

       Use the Clusters page to view the clusters in your deployment and to perform related tasks. Clusters are configured using the Cloud Administration Console. You must be a Super Admin to manage clusters. ...
  • Cloud Administration Disable Emergency Tokencode API

    Use the Cloud Administration Emergency Tokencode API to disable the Emergency Tokencode authentication method for a user. An administrator can disable a user's emergency tokencode before it expires. After the tokencod...
  • Assurance Levels

    Assurance levels define the authentication methods required to access applications or authentication clients (relying party or RADIUS client) during authentication. RSA SecurID Access provides three assurance lev...
  • Condition Attributes for Access Policies

    An access policy can specify conditions to restrict user access based on whether users match the conditions you define. You can also require different authentication methods for users who match certain conditions. F...
  • Configure Identity Router Security Levels

    Security levels determine the cipher requirements that the identity router enforces when connecting to users and components in your RSA SecurID Access deployment. On the Platform > Certificates and Encryption > ...
  • Deploying an Identity Router

       Choose a path for deploying your identity router: Quick Setup Advanced Setup You must be a Super Admin in the Cloud Administration Console. Make sure you change your password at the fi...
  • Test Integrated Windows Authentication

      After you configure the RSA SecurID Access SSO Agent to use Integrated Windows Authentication (IWA), RSA recommends that you perform a test authentication to verify that it works properly.   Befor...