Step 2: Test with Your Users and Your SAML or RADIUS Applications

Document created by RSA Information Design and Development Employee on Feb 17, 2020
Version 1Show Document
  • View in full screen mode

Now that you have explored the trial environment with the demo users and applications, you are ready for the next step. Follow the sections below to add your own users in the trial identity source and add your own SAML or RADIUS applications.

Note:  If your environment does not support outbound RADIUS communication, skip step 2 and go to Step 3: Test with Your Identity Source and All Applications .

Before You Begin

Refer to the email that you received from RSA with your URLs and sign-in credentials for your demo environment. This email provides you with the application portal URL and administrative information you need to complete the sections below.

Test with Your Own Users in the Demo Environment

  1. Add your users in the trial identity source:

    1. Sign into the application portal with your credentials.

    2. Open LDAP Admin.

      Note:  LDAP Admin is a basic identity source tool used only for this trial.

    3. In the left frame, expand dc=cincounox,dc=net.

    4. Click on the plus sign to expand ou=People, and click Create new entry here.

    5. Click Generic: inetOrgPerson entry and enter the details of one of your users.

    6. Click Create Object.
    7. To add a mobile number of the device that will be used for device registration, click Add new attribute, select mobile, and enter the value.

      You can also add a title attribute and specify manager, if you want to do more title-based testing.

    8. Click Update Object > Update Object> Commit.
    9. Add additional users, as desired.
  2. Synchronize the trial identity source and the Cloud Authentication Service with the latest changes:

    1. In the Cloud Administration Console, click Users > Identity Sources.
    2. From the identity source Edit drop-down list, select Synchronization.

    3. Click Synchronize Now.

      The users are now in the Cloud Authentication Service.

  3. Instruct your users to complete Register Your Device on their own devices.
  4. Ask your non-manager users to open App B.

    They are prompted for authentication options in the Medium and High assurance levels.

Protect Your Own SAML or RADIUS Application

  1. On RSA Ready in the RSA SecurID Access Integrations page, find a SAML or RADIUS application that you use.

    RSA SecurID Access integrates with hundreds of third-party products, including the following:

  2. Follow the instructions in the guide.

    When you add the application in the Cloud Administration Console, you can either use an existing policy or create a new one.

  3. In the application portal, click the new application and authenticate to it.

    The following videos show the user authentication experience in the listed applications.

    Cisco AnyConnect
    Citrix Systems Netscaler Gateway
    Palo Alto Networks NextGen Firewall 8
    Microsoft Office 365

Next Steps

You've now done a few test authentications with your users and your RADIUS and SAML applications. Here is what to do next:

  • If you want to use your own identity source or add a RADIUS application in an environment that does not support outbound RADIUS communication, go to Step 3: Test with Your Identity Source and All Applications .
  • If you have finished exploring the trial and are ready to learn more about RSA SecurID Access, contact your RSA Sales representative, or call 800-995-5095 or 1-781-515-7700 and option 1 (Sales).



We want your feedback! Tell us what you think of this page.

You are here
Table of Contents > Contents > Step 2: Test with Your Users and Your RADIUS or SAML Applications