ManageEngine ADSelfService Plus - RSA MFA API (REST) - RSA Ready Implementation Guide
This article describes how to integrate ManageEngine ADSelfService Plus with RSA Authentication Manager using REST API.
Configure RSA Authentication Manager
Perform these steps to configure RSA Authentication Manager
Procedure
- Sign in to your RSA Security Console.
- Navigate to Access > Authentication Agents and click Add New.
- Enter the hostname of the ADSelfService Plus server in the Hostname field and click Resolve IP to establish a connection between the Security Console and the ADSelfService Plus server.
- Click Save to add the ADSelfService Plus server as an authentication agent.
Configure ManageEngine ADSelfService Plus
Perform these steps to configure ManageEngine ADSelfService Plus.
Procedure
- Sign in to the RSA Admin Console and navigate to Setup > System Settings.
- Under Authentication Settings, click RSA SecurID Authentication API.
- Copy the Access ID, Access Key, and Communication Port details.
- Log in to the ADSelfService Plus Admin Console and navigate to Configuration > Self-Service > Multi-factor Authentication > RSA SecurID.
- In the Choose the Policy drop-down list, select a policy.
Note: ADSelfService Plus allows you to create OU and group-based policies. To create a policy, navigate to Configuration > Self-Service > Policy Configuration and click Add New Policy. Click Select OUs/Groups, and make the selection based on your requirements. You need to select at least one self-service feature. Finally, click Save Policy. - Click RSA SecurID.
- Choose REST API as the Integration Type.
- On the RSA SecurID window, enter the hostname of RSA Authentication Manager in the API Host Name field.
- Paste the port number and Access Key obtained in Step 3 in the Port and Access Key fields respectively.
- Enter the authentication agent's name (that is, the hostname or access URL of the ADSelfService Plus server) in the Client Id field.
- Select the Secure API requests to RSA server with HMAC Authentication checkbox to verify the integrity of the authentication requests. Follow the steps mentioned under HMAC prerequisites before enabling HMAC authentication.
- Enter the Access ID copied in Step 3 in the Access Id field.
- Select a Username Pattern that matches the User Account Format in the RSA Admin Console.
Note: Users across different domains can have the same username, causing ambiguity during RSA mapping. To ensure a secure authentication, we strongly recommend using a username pattern that includes the domain. This username pattern needs to match the RSA User Account Format in the RSA admin console, to accurately map domain user accounts to RSA user accounts. - Click Test Connection and Save.
The configuration is complete.
Return to ManageEngine ADSelfService Plus - RSA Ready Implementation Guide.
Related Articles
CrowdStrike Falcon Identity Protection - Authentication Manager - RSA MFA API (REST) Configuration - RSA Ready Implementat… 22Number of Views SilverFort - RSA MFA API (REST) Configuration - RSA Ready Implementation Guide 20Number of Views Barracuda Networks CloudGen Firewall - RSA MFA API (REST) Configuration - RSA Ready Implementation Guide 71Number of Views RSA October 2023 Release Announcements 37Number of Views CrowdStrike Falcon Identity Protection - Cloud Authentication Service - RSA MFA API (REST) Configuration - RSA Ready Imple… 12Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?