Configuring a Restricted Agent to Control User Access
A restricted agent allows only members of one or more specified groups to access protected resources. For example, if you create a restricted agent to provide access to personnel data and allow only members of the human resources group to authenticate on this agent, only members of the human resources group can access personnel data. You can further restrict access by limiting authentication to a specified a time span.
This procedure lists the high-level tasks required to configure a restricted agent.
Procedure
Add an authentication agent, and configure the agent to be a restricted agent.
For instructions, see Add an Authentication Agent.
Generate the AM configuration file.
For instructions, see Generate the Authentication Manager Configuration File.
Set up user groups.
For instructions, see Add a User Group and Add a User to a User Group.
Allow a user group access to the restricted agent.
For instructions, see Allow a User Group to Authenticate on an Agent.
(Optional) Set restricted access times for user groups.
For instructions, see Set Restricted Access Times for User Groups.
Related Articles
Configuring a restricted agent associated to a RADIUS client to control user access with RSA Authentication Manager 8.x. 87Number of Views How to configure restricted access times for authentication agents in RSA Authentication Manager 8.x 90Number of Views What logs to collect to trouble shoot AM Prime 28Number of Views Differences to be aware of when configuring RSA SecurID Access Cloud IdP vs IDR IdP 82Number of Views Users cannot authenticate successfully when the RSA SecurID token is in either Next Tokencode Mode or New PIN Mode when au… 98Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) Artifacts to gather in RSA Identity Governance & Lifecycle RSA Governance & Lifecycle 8.0.0 Administrators Guide RSA Governance & Lifecycle 8.0.0 Installation Guide