ManageEngine ADSelfService Plus - RSA MFA API (REST) - RSA Ready Implementation Guide
This article describes how to integrate ManageEngine ADSelfService Plus with RSA Authentication Manager using REST API.
Configure RSA Authentication Manager
Perform these steps to configure RSA Authentication Manager
Procedure
- Sign in to your RSA Security Console.
- Navigate to Access > Authentication Agents and click Add New.
- Enter the hostname of the ADSelfService Plus server in the Hostname field and click Resolve IP to establish a connection between the Security Console and the ADSelfService Plus server.
- Click Save to add the ADSelfService Plus server as an authentication agent.
Configure ManageEngine ADSelfService Plus
Perform these steps to configure ManageEngine ADSelfService Plus.
Procedure
- Sign in to the RSA Admin Console and navigate to Setup > System Settings.
- Under Authentication Settings, click RSA SecurID Authentication API.
- Copy the Access ID, Access Key, and Communication Port details.
- Log in to the ADSelfService Plus Admin Console and navigate to Configuration > Self-Service > Multi-factor Authentication > RSA SecurID.
- In the Choose the Policy drop-down list, select a policy.
Note: ADSelfService Plus allows you to create OU and group-based policies. To create a policy, navigate to Configuration > Self-Service > Policy Configuration and click Add New Policy. Click Select OUs/Groups, and make the selection based on your requirements. You need to select at least one self-service feature. Finally, click Save Policy. - Click RSA SecurID.
- Choose REST API as the Integration Type.
- On the RSA SecurID window, enter the hostname of RSA Authentication Manager in the API Host Name field.
- Paste the port number and Access Key obtained in Step 3 in the Port and Access Key fields respectively.
- Enter the authentication agent's name (that is, the hostname or access URL of the ADSelfService Plus server) in the Client Id field.
- Select the Secure API requests to RSA server with HMAC Authentication checkbox to verify the integrity of the authentication requests. Follow the steps mentioned under HMAC prerequisites before enabling HMAC authentication.
- Enter the Access ID copied in Step 3 in the Access Id field.
- Select a Username Pattern that matches the User Account Format in the RSA Admin Console.
Note: Users across different domains can have the same username, causing ambiguity during RSA mapping. To ensure a secure authentication, we strongly recommend using a username pattern that includes the domain. This username pattern needs to match the RSA User Account Format in the RSA admin console, to accurately map domain user accounts to RSA user accounts. - Click Test Connection and Save.
The configuration is complete.
Return to ManageEngine ADSelfService Plus - RSA Ready Implementation Guide.
Related Articles
CrowdStrike Falcon Identity Protection - Cloud Authentication Service - RSA MFA API (REST) Configuration - RSA Ready Imple… 16Number of Views SilverFort - RSA MFA API (REST) Configuration - RSA Ready Implementation Guide 25Number of Views CrowdStrike Falcon Identity Protection - Authentication Manager - RSA MFA API (REST) Configuration - RSA Ready Implementat… 26Number of Views Barracuda Networks CloudGen Firewall - RSA MFA API (REST) Configuration - RSA Ready Implementation Guide 71Number of Views Dell PowerStore - RSA MFA API (REST) Configuration - RSA Ready Implementation Guide 23Number of Views
Trending Articles
RSA Authentication Manager Upgrade Process RSA Release Notes for RSA Authentication Manager 8.8 RSA RADIUS Server service failed to start in the RSA Authentication Manager 8.1 Operations Console Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide RSA Release Notes: Cloud Access Service and RSA Authenticators
Don't see what you're looking for?