Configure RSA RADIUS to Use System-Generated PINs
RSA RADIUS does not allow system-generated PINs by default. If you choose to allow system-generated PINs, authentication will fail unless you change the RADIUS configuration file, securid.ini,on each RADIUS server to allow system-generated PINs, and then restart RADIUS.
Before you begin
You must be a Super Admin.
Procedure
Log on to the Operations Console on the RSA Authentication Manager instance hosting the RADIUS server.
Click Deployment Configuration > RADIUS Servers.
If prompted, enter your Super Admin User ID and password.
Select the server hosted on this instance, and click Manage Server Files from the context menu.
In the Configuration Files tab, select the securid.ini file, and click Edit from the context menu.
Find the following line:
AllowSytemPins = 0
The 0 indicates that system-generated PINs are not allowed. To allow system-generated PINS, change the setting to the following:
AllowSystemPins = 1
The 1 indicates that system-generated PINs are allowed.
Click Save and Restart RADIUS.
Restart the RADIUS server for the changes to take effect.
Related Articles
How to configure an RSA Authentication Manager 8.1 server to accept a system-generated PIN when a token is in new PIN mode… 286Number of Views Enable system-generated PINs for RADIUS in RSA Authentication Manager 8.x 49Number of Views How to set PINs and navigate Next Tokencode Mode for RSA SecurID Tokens using NTRadPing 708Number of Views How to configure RADIUS profiles to segment user permissions in Cisco devices for RSA Authentication Manager 8.x 432Number of Views Setting RADIUS attributes to use with the Telstra Next G wireless service 171Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Governance & Lifecycle 8.0.0 Administrators Guide Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory