RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.x
An identity source is a repository that contains user and user group data. Each user and user group in a deployment is associated with an identity source.
RSA Authentication Manager supports the following as identity sources:
- Microsoft Active Directory 2008 R2
- Microsoft Active Directory 2012
- Microsoft Active Directory 2012 R2
- Microsoft Active Directory Lightweight Directory Services 2012 R2
- Microsoft Active Directory 2016
- Sun Java System Directory Server 7.0
- Oracle Directory Server Enterprise Edition 11g
- The default Oracle certificate keysize must be at least 2048
- OpenLDAP 2.4.40
- The Authentication Manager internal database
Note: The certificate used by the LDAPS protocol must be at least 2048-bits. For example, you must replace the default Oracle Directory Server certificate, which is 1024-bits.
In Active Directory, you can add a Global Catalog as an identity source, when some or all of the Active Directory servers in the Active Directory forest are used as identity sources. In such a case, you can use the Global Catalog for runtime activities, such as looking up and identifying users and resolving group membership within the Active Directory forest. You cannot use a Global Catalog identity source to perform administrative tasks.
Authentication Manager supports Active Directory Lightweight Directory Services (LDS) servers if the same server does not also have an Active Directory Domain Controller role. If a server has an Active Directory Domain Controller role, select that identity source type when connecting the identity source to Authentication Manager.
Data from an LDAP Directory
RSA Authentication Manager has read-only access to all LDAP directory identity sources. After a directory is integrated with Authentication Manager, you can use the Security Console to do the following:
-
View (but not add or modify) user and user group data that resides in the directory.
-
Perform Authentication Manager administrative tasks. For example, enable or disable the use of on-demand authentication (ODA) and risk-based authentication (RBA), or assign tokens or user aliases to individual users who reside in the directory.
You must use the LDAP directory native user interface to modify data in a directory.
Data from the Internal Database
Authentication Manager provides an internal database where you can create users and user groups. For users and user groups in the internal database, administrators can use the Security Console to do the following:
- Add, modify, and view user and user group data.
- Enable or disable Authentication Manager functions, such as ODA and RBA, for individual users, including users whose accounts are in an LDAP directory.
The following information is stored only in the internal database:
- Data that is specific to Authentication Manager, such as policies for administrative roles, and records for authentication agents and SecurID authenticators.
- Data that links Authentication Manager with LDAP directory user and user group records.
Creating an external identity source
The internal database is already linked.
Procedure
- Log on to the Operations Console on the primary instance.
- Click Deployment Configuration > Identity Sources > Add New.
- When prompted, enter your Super Admin User ID and password.
- In the Identity Source Basics section of the Connection(s) tab, specify:
- Identity Source Name. The name of the identity source that is displayed in the Security Console.
- Type. The type of the identity source that you are adding.
- Notes. Information about the identity source.
- In the Directory Connection - Primary section, do the following:
- Enter the requested information in the following fields. For detailed information, see Identity Source Properties.
- Directory URL
- Directory Failover URL
- Directory User ID
- Directory Password
- Click Test Connection to ensure that the primary instance can connect to the specified directory. If the test fails, make sure that you have correctly imported the certificate for this identity source.
- If you have a replica instance, complete the fields in the Directory Connection - Replica section, and click Validate Connection Information to verify that the primary instance can connect to the identity source.
- Verify that you entered the correct settings.
- If the settings are correct, make sure the primary instance is able to connect to the identity source.
- If the primary instance is able to connect to the identity source, make sure no other network issues are causing the connection failure.
- After you make any necessary changes, click Validate Connection Information again.
- Click Next.
- Provide the requested information for each of the following sections on the Add Identity Source - Map page. For detailed information, see Identity Source Properties.
- Directory Settings
- (Optional) Active Directory Options
- Directory Configuration - User Tracking Attributes
- Directory Configuration - Users
- Directory Configuration - Users Groups
- Click Save.
- After you finish, use the Security Console to link the new identity source to the system.
- Navigate to Setup > Identity Sources > Link Identity Source to System.
- Move the identity source from the Available to the Linked box
- Click Save.
- If you are logged on to the Security Console, you must log off and log back on to view the new identity source.
Identity Source Basics
Type. The type of identity source. For example, an LDAP identity source type can be Microsoft Active Directory, Microsoft Active Directory Lightweight Directory Services, Oracle Directory Server, Sun Java System Directory Server, or OpenLDAP. After an identity source is added to the deployment, you cannot change the identity source type. For the supported list of identity sources, see View the Identity Sources in Your Deployment.
Notes:
You can use up to 255 characters of text to add a note about the identity source.
Directory Connection - Primary and Replica
Notes:
- An SSL connection is required for password management.
- For Active Directory, the Global Catalog can have the same directory URL as another identity source that is not a Global Catalog.
If you want to permit users to change their passwords during authentication, the LDAP directory administrator account must have write privilege for user records in the identity source. If you do not permit password changes, the directory administrator account does not need write privileges.
Directory User ID. The LDAP directory administrator's User ID. For example, you might enter cn=Administrator,cn=Users,dc=domain,dc=com or Administrator@domain.com.
Directory Password. The LDAP directory administrator's password.
Make sure that this password is kept up-to-date. If this password expires, the connection to the identity source fails, meaning authentication for all users who use this identity source will fail.
Directory Settings
If you narrow the scope of an identity source, you must schedule a cleanup job to remove references to unresolvable users and user groups from the internal database. For more information, see Schedule a Cleanup Job.
User Base DN. The base DN for directory user definitions. For example, for Active Directory, you might enter cn=Users, dc=domainName, dc=com.
User Group Base DN. The base DN for directory user group definitions. For example, for Active Directory, you might enter ou=Groups, dc=domain, dc=com.
- Do not configure multiple identity sources with overlapping scope. If you have multiple identity sources that point to the same User Base DN or User Group Base DN, ensure that the User Search Filter and User Group Search Filter are configured so that each user and user group appears only in one identity source. Improper configuration may result in unresolvable users and authentication problems.
- If an attribute value contains a comma or an equal sign, you must escape these characters with a backslash. For example, if the attribute ou has the value of A=B, Inc, you must write this out as ou=A\=B\, Inc. If you do not escape these characters in an attribute value, the connection to the identity source fails. This only applies to commas or equal signs used in an attribute value. Do not escape commas separating elements of a distinguished name, for example, cn=Joe Smith, ou=Sales, or equal signs between a moniker and its attribute value, for example, ou=Sales.
- The default organizational unit “Groups” does not exist in the default Active Directory installation. Make sure you specify a valid container for the User Group Base DN.
- Select Directory to look in the external identity source only. If the user account is disabled in the external identity source, the user cannot authenticate. The ability of the user to authenticate is based solely on the User Account Enabled State in the external identity source.
- Select Directory and Internal Database to look in the internal database in addition to the external identity source. The user account must be enabled in both the internal database and the external identity source for the user to authenticate. If the user account is disabled in either the internal database or the external identity source, the user cannot authenticate.
Note: Do not turn on schema validation for an OpenLDAP directory identity source.
Active Directory Options
User Authentication. Select one of the following as the source for user authentication:
- Authenticate users to this identity source. Select this option if the identity source is not associated with a Global Catalog. If no Global Catalogs are configured as identity sources, this option is selected automatically.
- Authenticate users to a global catalog. Select this option if the identity source is associated with a Global Catalog, and select a Global Catalog from the drop-down menu.
Directory Configuration - User Tracking Attributes
Maps to. Select this option to map the User ID to a specified attribute.Uses the same mapping as E-mail. Select this option to map the User ID to the e-mail attribute. If you choose this option, the User ID and e-mail fields have the same value. The e-mail attribute must already be defined in the directory.
|
LDAP Directory Identity Source
|
Unique Identifier Default Value
|
|
Microsoft Active Directory
|
ObjectGUID
|
|
Sun Java System Directory Server
|
nsUniqueID
|
|
Oracle Directory Server
|
nsUniqueID
|
|
OpenLDAP
|
entryUUID
|
The attribute must contain unique data for each user. For example, an employee ID number or badge number that is unique for each user in the deployment.
The attribute must contain data for each user. The value cannot be empty.
The attribute value cannot change. If the value for a user changes, Authentication Manager cannot track the user. You cannot map any other fields to the attribute that you map to the Unique Identifier.
The attribute name can contain up to 64 characters.
The attribute value can contain up to 42 characters.
Directory Configuration - Users
Middle Name. The directory attribute that maps to the middle name attribute. By default, Middle Name maps to initials.
Last Name. The directory attribute that maps to the last name attribute. By default, Last Name maps to sn.
E-mail. The directory attribute that maps to the e-mail attribute. By default, E-mail maps to mail.
Certificate DN. Reserved for future use. By default, it is mapped to comment. Do not map certificate to critical fields, such as cn or sAMAccountName.
Password. The directory attribute that maps to the password attribute. By default, Password maps to unicodePwd.
Search Filter. The filter that specifies how user entries are distinguished in the LDAP directory, such as a filter on the user object class. Any valid LDAP filter for user entries is allowed, for example, (objectclass=inetOrgPerson).
Search Scope. The scope of user searches in the LDAP tree.
Object Classes. The object class of users in the identity source that are managed using the Security Console, for example, user,organizationalPerson,person.
Directory Configuration - User Groups
Search Filter. An LDAP filter that returns only group entries, such as a filter on the user group object class, for example, (objectclass=group).
Search Scope. The scope of user group searches in the LDAP tree.
Object Classes. The object class of user groups that are created or updated using the Security Console.
Membership Attribute. The attribute that contains the DNs of all the users and user groups that are members of a user group.
Use MemberOf Attribute. Enables the system to resolve membership queries by using the value specified for the MemberOf attribute.
Note: For an OpenLDAP directory identity source, do not select the User MemberOf Attribute.
MemberOf Attribute. The attribute of users and user groups that contains the DNs of the user groups to which they belong.
Linking the identity source to the realm
Before you begin
- You must be a Super Admin.
- If you link an Active Directory Global Catalog, you must also link each identity source that replicates user data to that Global Catalog. For example, if identity sources IS1 and IS2 replicate information to Global Catalog GC1, and you link GC1 as an identity source, you must also link IS1 and IS2 to the system.
Procedure
- In the Security Console, click Setup > Identity Sources > Link Identity Source to System.
- From the list of available identity sources, select the identity source that you want to link , and click the right arrow to move it to the Linked box
- Click Save.
If LDAP connections are not possible, users can be created in the internal database.
Related Articles
How to create an external LDAP identity source in RSA Authentication Manager 8.1 SP1 or later 1.57KNumber of Views How to troubleshoot RSA SecurID Access identity source errors 440Number of Views How to map an Active Directory external identity source to a universal group for Authentication Manager 8.x 601Number of Views Unlink the identity source if it is linked to the system error when deleting an unlinked external identity source in RSA A… 537Number of Views Cannot link the runtime identity source because no administrative identity sources reference this runtime source in RSA Au… 440Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x