Follow the instruction steps in this section to apply your Authentication Agent or Risk Based Authentication configuration to IBM Security Access Manager Web Reverse Proxy.
Before you begin: Configure the integration type that your use case will employ. Refer to the Integration Configuration Summary section for more information.
Procedure
1. Log in to the local management interface of the appliance.
2. Browse to Secure Web Settings > Manage > Reverse Proxy.
3. Select the reverse proxy server instance that was added in prerequisites and click Edit.
4. On the Reverse Proxy Basic Configuration window,
- Click the Authentication tab.
- Under Forms Authentication section, select None from Transport drop-down list.
- Under Token Authentication section, select HTTPS from Transport drop-down list.
- Click Save.
5. Deploy changes.
Note: For testing, create a user in Security Access manager and try to access reverse proxy resource eg. https://vm2006.pe.rsa.net/index.html and authenticate using RSA SecurID credentials.
User Experience
| RSA SecurID Operation | RSA SecurID Authentication Prompts |
|---|---|
| Sign-in | |
| User-defined new PIN | |
| Next tokencode | |
Head back to the main page for more certification related information.
Related Articles
RSA Authentication Manager 8.7 Hardware Appliance Getting Started 32Number of Views Authentication Manager 8.x Deployment on Cloud Platform Fails When Configuring Network Settings 20Number of Views RSA Authentication Manager 8.7 SP2 Hardware Appliance Getting Started 101Number of Views RSA Authentication Manager 8.7 SP2 Security Configuration Guide 319Number of Views RSA Authentication Manager 8.7 SP2 RADIUS Reference Guide 329Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle