Trusted Network policy attribute does not work correctly with applications configured after disabling Identity Confidence Collection with the RSA SecurID Access Application Portal
Originally Published: 2020-05-06
Article Number
Applies To
RSA Product/Service Type: Cloud Authentication Service, Identity Router
RSA Version/Condition: Identity Router 12.9.0.0.4
Issue
For example, the access policy is configured to allow access to users on a trusted network. Instead, users are denied access or prompted for multifactor authentication (MFA) when trying to access the application from a trusted network.
Cause
To confirm the setting,
- Launch the Cloud Administration Console.
- Go to My Account > Company Settings > Company Information > Identity Confidence Collection.
To verify the software version of an identity router,
- Launch the Cloud Administration Console.
- Go to Platform > Identity Routers.
- Click the dropdown arrow next to the identity router's name.
- Select Software Version.
Resolution
Workaround
Related Articles
RADIUS Accounting not working correctly with ACE/Server 5.0 30Number of Views Checkboxes do not work correctly on the Import/Export Metadata page in RSA Identity Governance & Lifecycle 38Number of Views LDAPS connection does not work with RSA Authentication Manager 8.4 94Number of Views Web Tier installation fails on Red Hat server - RSA Authentication Manager 8.1 182Number of Views RADIUS for Cloud Access Service Overview 99Number of Views
Trending Articles
An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process
Don't see what you're looking for?