RSA Product/Service Type: Cloud Authentication Service
You need a valid JWT to authenticate Administration API calls made to the RSA Cloud Authentication Service.
Generate an API key
1. Access the Cloud Administration Console
2. Navigate to Platform > API Key Management
3. Under the Administration API Key, click ADD to create a new key
4. Save & Download the key file
Using the Cloud Administration REST API client
1. Download the Cloud Administration REST API client
2. Store the key file obtained in step 4 under <client_home>/rsa-securidaccess-rest-client-sdk-2.7.2/bin
3. Open a Command Prompt window
4. Navigate to SDK bin directory:
cd <client_home>/rsa-securidaccess-rest-client-sdk-2.7.2/bin
5. Run generatetoken command:
rsa-securidaccess-rest-client-sdk -f <keyfile.key added in step 2> -o generatetoken
6. Add the token to your API requests in the Authorization header:
Authorization: Bearer <JWT>
2. All API keys can be created using the Help Desk Administrator role, except for 2 calls where the Super Administrator role should be used to generate the key
a. Add/Remove High-Risk User API
b. Retrieve High-Risk User List API
3. Refer to Using the Cloud Administration APIs for more information
Related Articles
Numeric Token Types in AMIS Calls 2Number of Views AD Search filters 44Number of Views ManageEngine ADSelfService Plus - RSA Ready Implementation Guide 22Number of Views Troubleshooting SWIFT Alliance Access with RSA Authentication Manager using RADIUS protocol 48Number of Views Overview of using the Linux curl command to interact with the Web Services API in RSA Identity Governance & Lifecycle 678Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide