Configure Shipping Addresses for Hardware Authenticators
When you configure provisioning, you can configure a shipping address where hardware authenticators are sent for each user. Each user can have a separate shipping address. The shipping address appears on the user profile.
If you store shipping data in the internal database, the user must enter a shipping address for each request for anauthenticator that requires a distribution step.
If you use a directory server as the identity source, you can map the shipping address to existing identity attributes. The identity source automatically fills in the address information for the user. The user can view the shipping address, but cannot modify it.
Any changes made to the shipping address are only for the current authenticator request. Changes to the shipping address do not change the user’s record in the identity source.
Procedure
In the Security Console, click Setup > Self-Service Settings.
Under Provisioning, click Set Shipping Addresses.
(Optional) Under Shipping Address Mapping and Display Options, specify if you want the fields in the shipping address to be Required, Optional, Read-only, or Hidden.
(Optional) For each of the options, do one of the following:
If you store data in the internal database, under Map to, select Unmapped.
To use information from an identity source for the shipping address, under Map To, select one of the available identity attributes.
Click Save.
Related References
Related Articles
Cloud Administration Delete Hardware Token API 58Number of Views OATH HOTP Hardware Authenticators 228Number of Views Registering RSA SID 700 hardware tokens in Microsoft Entra ID 152Number of Views RSA Hardware Authenticators 613Number of Views Transfer SecurID 700 Hardware Token Ownership to Cloud Authentication Service 281Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle