RSA is proud to announce that RSA Authentication Agent 2.0.1 for Microsoft AD FS is qualified to run on Microsoft Windows Server 2019 (Server Core or Desktop Experience) with AD FS 5.0.
After installing the AD FS Agent 2.0.1 on Windows Server 2019 with AD FS 5.0, you can select RSA SecurID Access as the primary authentication method and use Windows authentication as the secondary authentication method. When users access AD FS-protected resources, they are prompted to authenticate with any of the multifactor authentication methods supported by RSA Authentication Manager or the Cloud Authentication Service, such as Authenticate Tokencode, Approve, or RSA SecurID Tokens.
The AD FS Agent 2.0.1 continues to support Windows Server 2016 (Server Core or Desktop Experience) with AD FS 4.0 and Window Server 2012 R2 (Server Core or Desktop Experience) with AD FS 3.0. With these platforms, your users need to enter a username and password before using multifactor authentication to access protected resources..
If you are already using the AD FS Agent 2.0.1, no further updates are required.
You can install the AD FS Agent 2.0.1 or upgrade directly to AD FS Agent 2.0.1 from AD FS Agent 2.0. This update (available here) corrects a potential problem with biometrics authentication. See the Readme for information about the contents of the patch.
The AD FS Agent 2.0.1 does not update the Group Policy Object (GPO) template, root certificate, language pack, or documentation set. You can download or continue to use the AD FS Agent 2.0 versions of these files.
|For additional documentation, downloads and more, visit the RSA SecurID Access page on RSA Link.|
|EOPS Policy:||RSA has a defined End of Primary Support policy associated with all major versions. Please refer to the Product Version Life Cycle for additional details.|