Configure Company Information and Certificates

Document created by RSA Information Design and Development on Jul 14, 2016Last modified by RSA Information Design and Development on Sep 15, 2017
Version 18Show Document
  • View in full screen mode
  

Configure settings to identify your company and provide Secure Sockets Layer (SSL) private keys and certificates to protect the RSA SecurID Access Application Portal. Certificates and the Protected Domain Name are required only for SSO Agent deployments.

The first time you sign in to the Cloud Administration Console and access your account information, the Company Name and Company ID fields are preconfigured. Edit these settings to your company specifications.

Note:  The Company Information page used in this task also displays the Customer Support ID, which is required when you register with RSA Customer Support.

 

Before you begin

  • You must be a Super Admin for the Cloud Authentication Service.
  • Complete the RSA SecurID Access Solution Architecture Workbook. Plan the protected domain name carefully. Once added, it is difficult to change. See the RSA SecurID Access Cloud Authentication Service Planning Guide for details and examples. This name is not required for deployments that do not use the SSO Agent.
  • If you want to enable just-in-time synchronization for all identity sources, see Identity Sources for the Cloud Authentication Service.
  • Obtain the private key, public certificate, and certificate chain required to configure SSL protection for the RSA SecurID Access Application Portal. You generate the private key using your own infrastructure, and you must submit a certificate signing request (CSR) to a trusted Certificate Authority (CA) to obtain the public certificate and certificate chain. Certificates are not required for deployments that do not use the SSO Agent. The specific instructions to generate the private key and CSR vary by CA. Ensure that:
    • The private key, in RSA format, is 2048-bit or greater and is not password-protected.
    • The certificate and certificate chain files are in x509 PEM format. If you are prompted for a certificate format based on web server type, choose Apache.
    • The common name specified in the CSR uses the protected domain name, such as *.portal.example.com.

Procedure 

 
  1. In the Cloud Administration Console, click My Account > Company Settings and select the Company Information tab.
  2. In the Protected Domain Name field, enter the Protected Domain Name value from the RSA SecurID Access Solution Architecture Workbook. This is a unique domain name for your deployment, such as sso.example.com. Deployments that use the SSO Agent must have a protected domain name in order to publish changes to the identity router.
  3. Upload the following files:  
    • The Private Key that matches the public certificate. Ensure that the private key is not password protected.
    • The Public Certificate that was issued from the certificate authority (CA) for your domain. This certificate must be a wildcard certificate.
    • The Certificate Chain that was provided by the CA, which is valid for your public certificate.
  4. In the Company ID field, enter the Company ID that users provide when registering the RSA SecurID Authenticate on their devices.
    The Company ID must have fewer than 255 characters and may only contain alphanumeric characters with no spaces. This value must be unique across all RSA customers.

    Note:  After you change the Company ID, you must instruct users to provide the new value when registering the RSA SecurID Authenticate. Devices that are already registered are not affected.

  5. (Optional) In the Just-in-Time Synchronization field, click Enabled. This feature ensures that the cloud identity source is updated every time a user registers a device or authenticates. New users are added to the cloud identity source. Enablement affects all identity sources.
  6. Click Save Settings.

 

 

You are here
Table of Contents > Company Settings > Configure Company Information and Certificates

Attachments

    Outcomes