Deploying an Authentication Agent

Document created by RSA Information Design and Development on Jun 13, 2017Last modified by RSA Information Design and Development on Feb 12, 2018
Version 3Show Document
  • View in full screen mode

Authentication agents are software applications that securely pass user authentication requests to and from RSA Authentication Manager. Before an authentication agent can communicate with RSA Authentication Manager, you must deploy the agent.

Note:  For information on deploying authentication agents that uses the RSA SecurID Authentication API, see Deploying an Authentication Agent That Uses the REST Protocol.


  1. Use the Security Console to generate a configuration file for the agent. This allows the agent to locate Authentication Manager servers. For more information, see Generate the Authentication Manager Configuration File.

  2. Install an authentication agent on each machine that you want to protect. See your agent documentation for installation instructions.

  3. Use the Security Console to add a record for the new agent to the internal database. In this step, you can specify whether you are creating a restricted agent. The agent record identifies the agent to RSA Authentication Manager. This process is called registering the agent. For more information, see Add an Authentication Agent.



Related Concepts

RSA Authentication Agents

Related Tasks

Authentication Agent Types