Recommended order of operations for RSA Passwordless
a month ago
Originally Published: 2025-10-01
Article Number
000073634
Applies To
  •  Authentication Manager 8.x
  • MFA Agent 2.3.x for Windows
Tasks

Below is the recommended sequence of steps that RSA Professional Services advises and applies in the field. I recommend we incorporate this some flavor of this guidance into documentation so customers understand there is a best-practice order of operations for a successful deployment of RSA’s “true Passwordless” experience (beyond just Windows Password Integration - WPI):

 

  1. PKI Configuration
    • Microsoft Entra: Create and configure PKI per RSA documentation.
    • On-Prem/Active Directory: Configure Active Directory Certificate Authority per RSA documentation.
    • Note: These paths differ significantly, so be mindful of the steps and details here.
  2. Test Configuration (Optional but Ideal)
    • On a handful of dev/test machines, install the RSA MFA agent and configure agent and Passwordless settings.
    • Follow the correct configuration paths for Entra (see Chapter 5: “Enabling RSA MFA Agent on Microsoft Entra ID Joined Machines”) vs. Active Directory (see “Passwordless Prerequisites”).
    • Iterate until the agent functions as expected before moving forward.
  3. Finalize & Push Configurations
    • Collect final global configuration settings from step 2.
    • Configure a complex Reserve Password for the RSA agent as a break-glass measure, hash it via the RSA utility, and vault it with limited/auditable access. Rotate periodically if checked out.
    • Commit into Entra/GPO policies depending on environment.
    • Push via Intune (Entra) or GPO (Active Directory).
    • Push policies 2–3 weeks ahead of RSA agent software rollout to account for user availability (vacation time, sick time, etc.) and endpoint coverage (must be online and able to receive respective updates).
    • Reporting/Intune checks should confirm coverage where possible.
  4. Software Deployment
    • Use Intune or a preferred software management solution to deploy RSA MFA binaries.
    • Follow a phased rollout: start with technical staff, expand as confidence builds, then release broadly across the organization.

This approach has consistently proven to minimize disruptions, ensure proper sequencing, and proactively avoid “toes being stubbed.”