Configuring a Restricted Agent to Control User Access
A restricted agent allows only members of one or more specified groups to access protected resources. For example, if you create a restricted agent to provide access to personnel data and allow only members of the human resources group to authenticate on this agent, only members of the human resources group can access personnel data. You can further restrict access by limiting authentication to a specified a time span.
This procedure lists the high-level tasks required to configure a restricted agent.
Procedure
Add an authentication agent, and configure the agent to be a restricted agent.
For instructions, see Add an Authentication Agent.
Generate the AM configuration file.
For instructions, see Generate the Authentication Manager Configuration File.
Set up user groups.
For instructions, see Add a User Group and Add a User to a User Group.
Allow a user group access to the restricted agent.
For instructions, see Allow a User Group to Authenticate on an Agent.
(Optional) Set restricted access times for user groups.
For instructions, see Set Restricted Access Times for User Groups.
Related Articles
Configuring a restricted agent associated to a RADIUS client to control user access with RSA Authentication Manager 8.x. 87Number of Views How to configure restricted access times for authentication agents in RSA Authentication Manager 8.x 90Number of Views Creating agent shows as RADIUS client agent in authentication agents. 86Number of Views RADIUS Clients 102Number of Views Troubleshooting RSA MFA Agent for MacOS 27Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle