Follow the instruction steps in this section to apply your RADIUS configuration to WALLIX Bastion User Sign-In.
Before you begin: Configure the integration type that your use case will employ. Refer to the Integration Configuration Summary section for more information.
Procedure
1. Sign in to Wallix Bastion Administrative user interface and browse to Users > Accounts and click to add or edit the user that will authenticate using RSA SecurID Access.
2. In the Authentication and backup servers section, move the appropriate RSA SecurID Access server(s) to the Selected Authentications field and click to apply.
Configuration is complete.
User Experience - RSA Cloud Authentication Service
Method selection screen
User Experience - RSA Authentication Manager
Login Page
System generated new PIN
User defined new PIN
Head back to the main page for more certification related information.
Related Articles
Authentication Agent Configuration - Cisco ASA RSA Ready SecurID Access Implementation Guide 61Number of Views RADIUSwith AM Configuration - Cisco FTD RSA Ready SecurID Access Implementation Guide 87Number of Views F5 BIG-IP APM 14.1 - Authentication Agent Configuration - RSA Ready SecurID Access Implementation Guide 70Number of Views RADIUSwith CAS Configuration - WALLIX Bastion RSA Ready SecurID Access Implementation Guide 10Number of Views Vmware vSphere vCenter 6.7 - Authentication Agent Configuration - RSA Ready SecurID Access Implementation Guide 205Number of Views
Trending Articles
RSA Authentication Manager Upgrade Process RSA Release Notes for RSA Authentication Manager 8.8 RSA RADIUS Server service failed to start in the RSA Authentication Manager 8.1 Operations Console Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide RSA Release Notes: Cloud Access Service and RSA Authenticators