Deploying RSA SecurID Tokens
Deploying RSA SecurID Tokens
The following steps outline the tasks required to deploy RSA SecurID tokens.
Procedure
- Import a Token Record File.
- (Optional) Move a Token Record to a New Security Domain.
- Assign Tokens to Users.
- For software tokens, Add a Software Token Profile. Otherwise, continue to the next step.
- Distribute the token. Choose one of the following:
- Distribute hardware tokens:
- If users are located within close proximity, instruct the users to physically collect the tokens.
- If your organization is large and geographically dispersed, distribute tokens by mail.
- Distribute One Software Token Using Dynamic Seed Provisioning
- Distribute One Software Token Using Dynamic Seed Provisioning
- Distribute Software Tokens Using File-Based Provisioning
- Distribute One Software Token Using File-Based Provisioning
- Distribute Software Tokens Using Compressed Token Format (CTF)
- Distribute One Software Token Using Compressed Token Format (CTF)
Related Articles
How to list all users without tokens in RSA ACE/Server 32Number of Views Export only 6.1 Token Data for RSA Authentication Manager 8.1 282Number of Views Export Tokens 95Number of Views Using the RSA Authentication Manager 8.3 Token Management Snap-In 46Number of Views SecurID Tokens 157Number of Views
Trending Articles
RSA Authentication Manager Upgrade Process RSA Release Notes for RSA Authentication Manager 8.8 RSA RADIUS Server service failed to start in the RSA Authentication Manager 8.1 Operations Console Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide RSA Release Notes: Cloud Access Service and RSA Authenticators
Don't see what you're looking for?