RSA Product/Service Type: Cloud Authentication Service
You need a valid JWT to authenticate Administration API calls made to the RSA Cloud Authentication Service.
Generate an API key
1. Access the Cloud Administration Console
2. Navigate to Platform > API Key Management
3. Under the Administration API Key, click ADD to create a new key
4. Save & Download the key file
Using the Cloud Administration REST API client
1. Download the Cloud Administration REST API client
2. Store the key file obtained in step 4 under <client_home>/rsa-securidaccess-rest-client-sdk-2.7.2/bin
3. Open a Command Prompt window
4. Navigate to SDK bin directory:
cd <client_home>/rsa-securidaccess-rest-client-sdk-2.7.2/bin
5. Run generatetoken command:
rsa-securidaccess-rest-client-sdk -f <keyfile.key added in step 2> -o generatetoken
6. Add the token to your API requests in the Authorization header:
Authorization: Bearer <JWT>
2. All API keys can be created using the Help Desk Administrator role, except for 2 calls where the Super Administrator role should be used to generate the key
a. Add/Remove High-Risk User API
b. Retrieve High-Risk User List API
3. Refer to Using the Cloud Administration APIs for more information
Related Articles
Troubleshooting SWIFT Alliance Access with RSA Authentication Manager using RADIUS protocol 48Number of Views ManageEngine ADSelfService Plus - RSA Ready Implementation Guide 22Number of Views Numeric Token Types in AMIS Calls 2Number of Views AD Search filters 44Number of Views Overview of using the Linux curl command to interact with the Web Services API in RSA Identity Governance & Lifecycle 683Number of Views
Trending Articles
RSA Authentication Manager Upgrade Process RSA Release Notes for RSA Authentication Manager 8.8 RSA RADIUS Server service failed to start in the RSA Authentication Manager 8.1 Operations Console Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide RSA Release Notes: Cloud Access Service and RSA Authenticators