Enable On-Demand Authentication for a User
On-demand authentication (ODA) delivers a one-time tokencode to a user’s mobile phone, e-mail account, or both. On-demand tokencodes expire after a specified time period, enhancing their security. ODA protects network resources that users access through SSL-VPNs, web portals, or browser-based thin clients.
Enable ODA for users so they can receive on-demand tokencodes.
Before you begin
Configure On-Demand Tokencode Delivery.
Procedure
In the Security Console, click Authentication > On-Demand Authentication > Enable Users.
Use the search fields to find the user for whom you want to enable ODA. Some fields are case sensitive.
Enable users for ODA.
To enable one user, do the following:
From the search results, click the user that you want to enable for ODA.
From the context menu, click Enable for ODA.
To enable multiple users, do the following:
From the list of available users, select the checkboxes next to the ones that you want to enable for ODA.
Click Enable for ODA.
Use the Send On-Demand Tokencodes to options to select a delivery method for on-demand tokencodes if applicable. Specify an e-mail address or phone number if necessary.
Note: If you elect to send an on-demand tokencode to a user's e-mail address, make sure that the user does not need the on-demand tokencode to access the e-mail account.
Use the Expiration Date options to specify the length of time the user can request on-demand tokencodes. You can specify an exact date or no expiration date.
Use the Associated PIN options to specify how the user's initial PIN is created. Create an initial PIN if necessary.
Click Save.
Related Articles
On-Demand Authentication 51Number of Views Disable On-Demand Authentication for a User 9Number of Views Enable On-demand Authentication by Both SMS and E-mail 20Number of Views Self-Service Troubleshooting 34Number of Views Delete a Password Dictionary 4Number of Views
Trending Articles
RSA Authentication Manager Upgrade Process RSA Release Notes for RSA Authentication Manager 8.8 RSA RADIUS Server service failed to start in the RSA Authentication Manager 8.1 Operations Console Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide RSA Release Notes: Cloud Access Service and RSA Authenticators