SecurID Authenticate and SecurID Software Token App Permissions
SecurID App Permissions
This document describes the permissions needed to use the SecurID 4.x app.
| Permission | Purpose | Optional or Required? |
|---|---|---|
| Camera | Allows QR code scan during token import. | Optional. If permission is denied, the user must import software tokens using CT-KIP or an SDTID file. |
| Receive data from Internet | Allows internet access. | Required. |
| Have full network
access View network connections | Allows the app to determine if internet access is available. | Required. |
| Disable keyguard | Allows the app to approve or deny notification from the notification bar. | Enabled by default. Required. |
Use biometric | Allows user to use the biometric authentication method configured in the device. | Permission is always enabled, but if a biometric method is not configured, the user can enter the device PIN. |
Read database | Allows the app to read a database. | Enabled by default. Required. |
| Receive boot completed | Reinitializes internal components after the phone is restarted. | Enabled by default. Required. |
Related Articles
RSA SecurID software token .sdtid file fails to import into RSA SecurID Software Token 5.0 for Windows 1.86KNumber of Views Unable to load bean named CTKIPServerService when importing a token via CTKIP to RSA SecurID Software Token 654Number of Views How to install one RSA SecurID software token on multiple devices 605Number of Views RSA SecurID Software Token Distribution to Android from RSA Authentication Manager 8.1 938Number of Views Error Unable to resolve user by login ID and/or alias, or authenticator not assigned to user when attempting to authentica… 2.05KNumber of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?