Ivanti Pulse Connect9.1 - RADIUS with AM Configuration - SecurID Access Implementation Guide
This section describes how to integrate Ivanti Pulse Connect with SecurID Authentication Manager using RADIUS.
Architecture Diagram
Configure SecurID Authentication Manager
To configure your SecurID Authentication Manager for use with a RADIUS Agent, you must configure a RADIUS client and a corresponding agent host record in the Authentication Manager Security Console.
The relationship of agent host record to RADIUS client in the Authentication Manager can 1 to 1, 1 to many or 1 to all (global).
SecurID Authentication Manager listens on ports UDP 1645 and UDP 1812.
-
Sign into the SecurID Authentication Manager Security Console.
-
Browse to Authentication Clients > RADIUS > RADIUS Client > Add New and enter the Name, IP Address and Shared Secret.
-
Enter a Client Name.
-
Enter IPv4 Address . This is the IP of Pulse Connect user Login Server. See below.
-
Enter Make/Model. Choose - Standard Radius -.
-
Enter Shared Secret. This is the Shared Secret for the SecurID radius client. Note this will be used in the Pulse Connect RADIUS configuration below.
-
Save & Create Associated SecurID Agent.
-
-
Get the IP or Hostname for the RADIUS Server. This is used in the Pulse Connect configuration below. Browse to RADIUS > RADIUS Servers. Note the Server Name or IP Address this will be used in the Pulse Connect configuration below.
-
Click Publish. When all changes have been finalized.
Configure Ivanti Pulse Connect
Perform these steps to configure Ivanti Pulse Connect as a RADIUS client to SecurID Authentication Manager.
Procedure
-
Sign into the Pulse Connect Administration Console.
-
Create a Pulse Connect Authentication Server for Radius. Browse to Authentication > Auth. Servers
Select RADIUS Server from server type drop-down menu and click on New Server.
-
Enter the Name for the is Authentication Server.
-
Enter Radius Server. This is the IP or Hostname for the RADIUS Server found above.
-
Enter Shared Secret. This is the Shared Secret for the SecurID radius client created above.
-
Enter Timeout. The default value is 30 seconds, this may be insufficient for MFA. If necessary, this value may need to be increased.
-
Enter Backup Server Enter Backup Server information if you have more than one SecurID Authentication Manger RADIUS server.
-
Save Changes.
-
-
Create a User Realm.
-
Browse to Users -> User Realms.
-
Click on New.
-
Enter a Name for your User Realm.
-
Set Authentication. Choose the appropriate Authentication Server from the dropdown list. Created in step 2.
-
Save Changes.
-
Select Role Mapping Tab and Click on New Rule... to create your required Rule as needed to further restrict access based on your requirements. ie. user name is * to match all user ids. Make sure to Add a Role to the Rule . Users is the default system Role of all users . Click on Save Changes.
-
-
Create a Sign-in Policy.
-
Browse to Authentication -> Signing-In -> Sign-in Policies.
-
Click on New URL....
-
Select User type . Typically Users.
-
Set Sign-in URL. This is the URL for the given Secure Access Service.
-
Select the associated Realm and click Add. Realm created in Step 4.
-
Save Changes.
-
Next Step: Proceed to the Use Case Configuration Summary section for information on how to apply the RADIUS configuration to your use case.
Related Articles
Juniper JunOS vSRX - SecurID Access Implementation Guide 19Number of Views Ivanti Pulse Connect 9.1 - SecurID Access Implementation Guide 55Number of Views SailPoint IdentityNow - RSA Ready SecurID Access Implementation Guide 88Number of Views SailPoint IdentityIQ 8.1 - SecurID Access Implementation Guide 65Number of Views SailPoint IdentityIQ 8.1 - SecurID Admin SDK with AM Configuration - SecurID Access Implementation Guide 84Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.9 Release Notes (January 2026) An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide