Manage Access Policies

Document created by RSA Information Design and Development on Jul 14, 2016Last modified by RSA Information Design and Development on Jun 15, 2018
Version 25Show Document
  • View in full screen mode

Use the Access Policies page to view the list of access policies in your deployment and to perform related tasks. Access policies are configured using the Cloud Administration Console You must be a Super Admin to manage access policies.

                                     
Action Instructions
View a list of access policies. Click Access > Policies.
Add an access policy. On the Access Policies list page, click Add a Policy. For further instructions, see Add an Access Policy.

Edit an access policy.

On the Access Policies list page, click Edit for the policy.
Clone an access policy. On the Access Policies list page, click the drop-down arrow and select Clone.
Delete an access policy. First verify that no web applications are using the policy, then on the Access Policies list page, click Edit > Delete for the policy.
View a list of applications that use the policy. On the Access Policies list page, click the drop-down arrow and select View Applications.
Enable, edit, or disable the RSA SecurID Authenticate Device Registration policy.

On the Access Policies list page, next to this policy click Enable, or click the drop-down arrow next to this policy and select Edit or Disable. For more information, see RSA SecurID Authenticate Device Registration Policy.

 

 

Next Topic:Relying Parties
You are here
Table of Contents > Access Policies > Manage Access Policies

Attachments

    Outcomes