Set Restricted Access Times for User Groups
Restricted access times control when members of a user group can authenticate through associated authentication agents. By default, users are permitted to authenticate at any time.
Procedure
In the Security Console, click Identity > User Groups > Manage Existing.
Use the search fields to find the user group that you want to restrict.
Click the user group that you want to restrict, and click Restricted Access Times.
(Optional) From the Access Time Templates drop-down list, select a template. Templates are predefined access times that can be assigned to a user group.
(Optional) Use the View by GMT Offset drop-down list within the Access Times field to select the GMT offset corresponding to the time zone where the user group that you want to restrict is located. This allows you to set restrictions based on the local time for the members of the user group.
Use the Access Times boxes to select access time restrictions.
Click the time that you want the available access time to begin, press SHIFT, and click on the time that you want available access to end. This selects a range of hours. The available access time is the highlighted area. The times that are not highlighted are restricted.
To select multiple, non-consecutive hours, press CTRL, and click the appropriate hours.
To deselect a selected hour, press CTRL, and click the selected hour.
Click Save.
Related Concepts
Related Articles
Edit RADIUS Server Files 58Number of Views Managing Local Group Users with the Cloud Administration Local Groups Public API 26Number of Views How to resolve Orbix daemon starting failure in Thor Xellerate 1Number of Views Set Restricted Access Times for Trusted User Groups 6Number of Views Restricted Access Times for User Groups 4Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Announces Critical Security Updates for RSA ID Plus Components - RSA Authentication Manager and RSA Identity Router RSA MFA Agent 9.0 for PAM - Installation and Configuration Guide for Oracle Linux RHEL Ubuntu CentOS and Rocky Linux Explanation of successful authentication followed by passcode reuse and bad tokencode messages in RSA Authentication Manag… Quick Setup Guide - FIDO