RSA SecurID Access: Configuration

Document created by Craig Hansen Employee on Apr 29, 2016Last modified by Elena Komarova on May 4, 2017
Version 13Show Document
  • View in full screen mode

Register Now

 

 

 

In order to register for a class, you need to first create an EMC account
If you need further assistance, contact us

Summary

This on-demand learning presents an overview of the steps and information required to configure RSA Via Access application integration.

 

Overview

This on-demand learning describes the configurations required post-installation to make RSA Via Access operational. The purpose of various system configurations are discussed and the process to accomplish each configuration is described.
Demonstrations of the key configurations are provided to augment the descriptions and to show the specific steps involved.

 

Audience
RSA SecurID Access customers interested in understanding more about how “RSA Via Access” can be configured for various applications, access policies, and authentication methods.


Delivery Type
On-Demand Learning


Duration
2 hours

 

Prerequisite Knowledge/Skills
Students should have familiarity with the concepts of: strong (multi-factor) user authentication, cloud applications, single sign-on, and networking communication. Students should view the following RSA University eLearning courses prior to this course to help provide the background information about this product:

 

Learning Objectives
Upon successful completion of this course, participants should be able to:

  • Identify information required for configuring single sign-on
  • Configure application access rules and policies
  • Add an Identity Source
  • Add identity providers such as Integrated Windows Authentication (IWA)
  • Deploy an IWA connector
  • Configure step-up authentication
  • Integrate RSA Authentication Manager as an authentication method

 

 

Course Outline

  • Digital Certificate Usage
    • SAML and SSL usage
    • Certificate formats and extensions
  • Configuring an LDAP Directory Server Connection
    • LDAP Directory Connections
    • Identity Sources
    • User Attributes and attribute mapping
    • LDAP Synchronization
  • Configuring the RSA Via Access Application Portal
    • The User Application Portal
    • Standard Portal Customization
    • Configuring Company Domain and Certificates
  • Adding Web Applications
    • Adding an Application to ‘My Applications’
    • Application Types to Create from Template: SAML, HFED, and Trusted Header
    • Application Availability and Visibility
  • Configuring SAML Applications
    • SAML Connections
    • SAML Authentication Workflow
    • IdP-Initiated and SP-Initiated SSO Profiles
    • Adding a SAML Application
  • Configuring User Access Policies and Step-up Authentication
    • Access Policies Overview
    • Rules and Rule Sets
    • Assurance Level
    • Rule Construction
    • Adding an Access Policy
  • Configuring Integrated Windows Authentication
    • Integrated Windows Authentication (IWA) Overview
    • Deploying IWA
    • Installing the IWA Connector
    • Adding IWA as an Identity Provider
    • Enabling IWA as an Automatic Authentication Source
    • Configuring Users’ Browsers to Support IWA
  • Adding Authentication Sources to Automate the Use of Configured Identity Provider
    • Automated Use of Identity Providers
    • Adding an Authentication Source
  • Connecting RSA Via Access to RSA Authentication Manager
    • Configuring a Static Route to RSA Authentication Manager
    • Connecting the RSA Via Access Hosted Service to RSA Authentication Manager

 

Demonstrations

  • Configuring an Identity Source
  • Configuring End User Portal Access
  • Configuring a Web Application through Discovery
  • Configuring an Application Catalog Application
  • Configuring a SAML Application and Using SAML Application Metadata
  • Configuring Access Policies
  • Registering Mobile Device
  • Configuring Step-up Authentication
  • Configuring Conditional Step-up Authentication
  • Configuring Integrated Windows Authentication (IWA)
  • Configuring Step-up Authentication with RSA SecurID

Register Now

 

 

 

In order to register for a class, you need to first create an EMC account
If you need further assistance, contact us

Attachments

    Outcomes