The March 2019 release contains the following features and enhancements:
- RSA SecurID Access has significantly improved the replication of critical data across identity routers for SSO Agent deployments. To benefit from this improvement, you will need to update all of your identity routers within a cluster at the same time and update all clusters at the same time.
- If you deployed the Cloud Authentication Service before the March 2019 release, you now have the ability to enable just-in-time synchronization in the Cloud Administration Console without contacting RSA Customer Support. Just-in-time synchronization will be automatically enabled for all customers who deploy the Cloud Authentication Service after the March 2019 release.
- Improved threat-aware authentication allows you to control whether high risk users are allowed to access protected resources or if these users must authenticate at a higher assurance level than other users. Users might be identified as high risk because their accounts have been compromised, or because a third-party security information and event management (SIEM) solution, such as RSA NetWitness, has found suspicious activity.
- In the Cloud Administration Console, status indicators for the identity router have been improved and expanded to help you better troubleshoot NTP, DNS, and a variety of connection issues.
- You can assign an administration role to each Administrative API key. The role ensures that the API has appropriate permissions to access information in the Cloud Authentication Service. The API uses the key in the request.
- The FIDO Token authentication method is now available on more browsers (including mobile browsers) and supports the FIDO 2 authentication standard.
- You can create custom RADIUS profiles that specify an access policy rule set to identify which users can authenticate through the clients associated with the profile. You will be able to associate multiple profiles with a single client, or the same profiles with multiple clients.
- RSA SecurID Access facilitates troubleshooting for problems that may occur when the identity router is not connected to the Cloud Authentication Service (for example, before registration). Using the Identity Router Setup Console, you can enable Secure Shell (SSH) to access the command line, and enable emergency debug logging.
For additional documentation, downloads, and more, visit the RSA SecurID Access page on RSA Link.
RSA has a defined End of Primary Support policy associated with all major versions. Please refer to the Product Version Life Cycle for additional details.