Manage Authentication Sources

Document created by RSA Information Design and Development on Jul 14, 2016Last modified by RSA Information Design and Development on Oct 20, 2017
Version 20Show Document
  • View in full screen mode

Use the Authentication Sources page to view the list of authentication sources in your deployment and to perform related tasks. Authentication sources are configured using the Cloud Administration Console. You must be a Super Admin to manage authentication sources.

                           
ActionInstructions
Add an authentication source. Click Access > Authentication Sources. See Add an Authentication Source.
Add authentication source access rules.See Add Authentication Source Access Rules.
Reorder authentication sources.Click Access > Authentication Sources. Click and drag an authentication source up or down to change its position in the list, and click Save.
Delete an authentication source.See Delete an Authentication Source.

 

 

Previous Topic:Authentication Sources
You are here
Table of Contents > Identity Providers > Manage Authentication Sources

Attachments

    Outcomes