Setup Checklist for a New Deployment with a Relying Party

Document created by RSA Information Design and Development on Apr 14, 2017Last modified by RSA Information Design and Development on Sep 15, 2017
Version 3Show Document
  • View in full screen mode

Use this checklist if you are setting up a Cloud Authentication Service deployment for the first time and want to add a relying party for web applications or external SSO services.

In the Cloud Administration Console, the dashboard walks you through the required configuration after you select Relying Parties: Configure authentication for applications and third-party SSO solutions using the Cloud Authentication Service. The following table lists the required high-level steps.

If your Cloud Authentication Service deployment is already configured and you want to add a relying party, see Add a Service Provider.

High-Level TaskReference
1. Plan your product deployment.

RSA SecurID Access Cloud Authentication Service Planning Guide

2. Configure the Company ID.Configure Company Information and Certificates

3. Use the dashboard in the Cloud Administration Console to progress through the configuration steps.

  • Install and configure the identity router.

  • Add an identity source to connect your LDAP directory server to your deployment.

  • Set up access policies to control user access to authentication clients.

  • Add a relying party.


Deploying an Identity Router

Add an Identity Source for the Cloud Authentication Service

Access Policies

Add an Access Policy

Relying Parties

Add a Relying Party

4. Confirm the authentication methods within each assurance level.

Assurance Levels

Configure Assurance Levels

5. (Optional) To use SecurID Token as an authentication method, you must configure the Cloud Authentication Service to connect to RSA Authentication Manager.

Integrating the Cloud Authentication Service and RSA Authentication Manager

6. Roll out the product to end users, instructing users to download the app and test authentication.RSA SecurID Access Rollout to Users



You are here
Table of Contents > RSA SecurID Access Product Overview > Setup Checklist for a New Deployment with a Relying Party