About the Operations Console
You use the Operations Console to configure and set up a deployment. For example, you use the Operations Console to manage the following items:
Identity sources. Add, view, edit, and delete existing identity sources.
Instances. View primary and replica instances; add, delete, and synchronize replica instances.
Disaster recovery. Restore a primary instance with a backup. Promote a replica instance to restore deployment administration.
Backups. Create a backup of deployment data.
SSL Certificates. Replace the console certificate with a certificate issued by a third-party certificate authority (CA).
Custom Logon Banners.Configure custom logon banners that display before users log on to the Operations Console, the Security Console, the Self-Service Console, or the appliance operating system with a Secure Shell (SSH) client.
Web Tiers. Add, view, edit, and delete web tiers.
Network Settings. Manage various network settings, for example., verifying an IP address or hostname.
Note: Initially, the Security Console and Operations Console both use the user name and password that you specified during Quick Setup. If you change the user name or password for either Console, the user name and password for the other Console remains unchanged.
Related Articles
View Operations Console Administrators 24Number of Views Delete an Operations Console Administrator 19Number of Views Log On to the Operations Console 33Number of Views RSA Announces the Release of RSA SecurID Token 2.4.1 for iOS 7Number of Views Add an Operations Console Administrator 61Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle