Now that you have explored the trial environment with the demo users and applications, you are ready for the next step. Follow the sections below to add your own users in the trial identity source and add your own SAML or RADIUS applications.
Note: If your environment does not support outbound RADIUS communication, skip step 2 and go to Step 3: Test with Your Identity Source and All Applications .
Before You Begin
Refer to the email that you received from RSA with your URLs and sign-in credentials for your demo environment. This email provides you with the application portal URL and administrative information you need to complete the sections below.
Test with Your Own Users in the Demo Environment
-
Add your users in the trial identity source:
-
Sign into the application portal with your credentials.
-
Open LDAP Admin.
Note: LDAP Admin is a basic identity source tool used only for this trial.
-
In the left frame, expand dc=cincounox,dc=net.
-
Click on the plus sign to expand ou=People, and click Create new entry here.
-
Click Generic: inetOrgPerson entry and enter the details of one of your users.
- Click Create Object.
-
To add a mobile number of the device that will be used for device registration, click Add new attribute, select mobile, and enter the value.
You can also add a title attribute and specify manager, if you want to do more title-based testing.
- Click Update Object > Update Object> Commit.
- Add additional users, as desired.
-
-
Synchronize the trial identity source and the Cloud Authentication Service with the latest changes:
- In the Cloud Administration Console, click Users > Identity Sources.
-
From the identity source Edit drop-down list, select Synchronization.
-
Click Synchronize Now.
The users are now in the Cloud Authentication Service.
- Instruct your users to complete Register Your Device on their own devices.
-
Ask your non-manager users to open App B.
They are prompted for authentication options in the Medium and High assurance levels.
Protect Your Own SAML or RADIUS Application
-
On RSA Ready in the RSA SecurID Access Integrations page, find a SAML or RADIUS application that you use.
RSA SecurID Access integrates with hundreds of third-party products, including the following:
-
Follow the instructions in the guide.
When you add the application in the Cloud Administration Console, you can either use an existing policy or create a new one.
-
In the application portal, click the new application and authenticate to it.
Next Steps
You've now done a few test authentications with your users and your RADIUS and SAML applications. Here is what to do next:
- If you want to use your own identity source or add a RADIUS application in an environment that does not support outbound RADIUS communication, go to Step 3: Test with Your Identity Source and All Applications .
-
If you have finished exploring the trial and are ready to learn more about RSA SecurID Access, contact your RSA Sales representative, or call 800-995-5095 and option 1 (Sales).
We want your feedback! Tell us what you think of this page.
Related Articles
Step 1: Test with Demo Users and Demo Applications 21Number of Views Step 3: Test with Your Identity Source and All Applications 15Number of Views Performing RADIUS authentication tests with NTRadPing to RSA Authentication Manager 8.32KNumber of Views Cloud Access Service Quick Setup Guide for RADIUS Clients - Step 8: Test 25Number of Views Cloud Access Service Quick Setup Guide for RADIUS Clients - Step 2: Deploy the Identity Router 39Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x