Manage Authentication Sources
Manage Authentication Sources
Use the Authentication Sources page to view the list of authentication sources in your deployment and to perform related tasks. Authentication sources are configured using the Cloud Administration Console. You must be a Super Admin to manage authentication sources.
| Action | Instructions |
|---|---|
| Add an authentication source. | Click Access > Authentication Sources. See Add an Authentication Source. |
| Add authentication source access rules. | See Add Authentication Source Access Rules. |
| Reorder authentication sources. | Click Access > Authentication Sources. Click and drag an authentication source up or down to change its position in the list, and click Save. |
| Delete an authentication source. | See Delete an Authentication Source. |
Related Articles
DSA-2019-018: RSA Authentication Manager Security Update for Multiple Hardware Appliance Firmware Vulnerabilities 7Number of Views Manage User Authentication Settings 22Number of Views Manage the RSA Authentication API Keys (Legacy Clients) 121Number of Views Manage PINs for Approve and Device Biometrics Authentication 130Number of Views Manage Legacy Clients (API Keys) 205Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?