Edit the RADIUS Server Agent

Document created by RSA Information Design and Development on Jun 13, 2017Last modified by RSA Information Design and Development on Jun 13, 2017
Version 2Show Document
  • View in full screen mode

Use the Security Console to edit the properties of a RADIUS server agent. You can also view the IP addresses of the server and the date and time of the last auto-registration, which updates the agent record with Authentication Manager. The RSA Authentication Manager installer automatically installs the server agent when it registers the RADIUS server with Authentication Manager during installation.

Procedure 

  1. In the Security Console, click RADIUS > RADIUS Servers.

  2. Click the server that is associated with the agent that you want to edit.

  3. From the context menu, click RSA Agent.

  4. In the Notes field, enter any notes for this agent, for example, “For RADIUS primary server at San Jose site”.

  5. If you want to assign a profile to this agent, from the RADIUS Profile drop-down menu, select a RADIUS profile.

  6. Select whether to disable the agent. Do one of the following:

    • If you want the server to process RADIUS client authentication requests, make sure that Agent is disabled is cleared.

    • If you want to temporarily remove the server from RSA RADIUS, select Agent is disabled.

  7. Determine who can use the agent for authentication. Do one of the following:

    • If you do not want to limit who can request access from the client, clear Allow access only to members of user groups who are granted access to this agent.

    • If you want to limit who can request access from the client, select Allow access only to members of user groups who are granted access to this agent.

  8. Configure the Authentication Manager contact list. Do one of the following:

    • If you want the agent to send authentication requests to the Authentication Manager instance that responds first, select Automatically assign automatic contact list from instance that responds first.

    • If your organization has specific requirements for directing the agent's authentication requests to particular Authentication Manager instances, select Manually assign contact list, and select the contact list from the drop-down list. For more information, see Add a Manual Contact List.

  9. If your organization uses trusted realms and you want trusted users to authenticate through this agent, select Enable Trusted Realm Authentication, and determine which trusted users can access the authentication agent. Do one of the following:

    • If you do not want to limit which trusted users can access this agent, select Open to all Trusted Users. After trusted users authenticate to Authentication Manager, Authentication Manager automatically creates them in the security domain for the trusted realm.

    • If you want to limit which trusted users can access this agent, select Only Trusted Users in Trusted User Groups with access to the agent can authenticate.

  10. Click Save.

 

 

 

 


Attachments

    Outcomes