RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.x
When adding a user to the internal database, the following warning displays:
The indicated field(s) on this page require your attention.
It is required for users in the internal database to have an RSA password.
The Identity Management System used in RSA Authentication Manager has to support users in different data stores (for example, Microsoft Active Directory and SunOne). This means that even though Authentication Manager does not require a password, our optional data stores do.
The RSA password may be used to log in to the Security Console and Self-Service Console by administrators and users respectivel, also if the API is used then the RSA_Password method may be used for login if the RSA_Password has been set.
Since the existence of this value is dependent on whether the user is stored in the internal database or one of the optional data stores the setting to manage this option is configured in the identity store settings in the Operations Console.
Remove the password requirement from the internal database by doing the following:
- Log on to the Operations Console and navigate to Deployment Configuration > Identity Sources > Manage Existing.
- Click on Internal Database and choose Edit from the list of options.
- Select the The user password is optional radio button.
If you have any administrators logged into the Security Console they will need to log out and back in to see the changes.
After making the change when you create a new user in the internal database, the password prompts are replaced by a Manage Password checkbox. If you need the user to have a password just check Enable Password and enter the password as normal. This feature is present to allow you to be able to use the features listed above where the RSA Password may be used.
You will always need to have at least one super admin with an internal password, since at the point where the Operations Console prompts for a username/password of a user with superadmin privilege that this user must be in the internal database.
Related Articles
SecurID Internal Database Password Algorithm 70Number of Views How to set PINs and navigate Next Tokencode Mode for RSA SecurID Tokens using NTRadPing 707Number of Views How to manually set the date and time on an RSA Identity Governance & Lifecycle hardware appliance 306Number of Views RSA ACE/Agent for Web gives access to protected pages when correct passcode is used 52Number of Views How to check the size of the internal database in RSA Authentication Manager 8.x 275Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle