View Identity Sources Linked to the System
When you link an identity source to the system, all users and groups in the identity source are available to AM and can be viewed and managed through the Security Console.
In the Security Console, user management includes such tasks as enabling or disabling users for authentication methods, associating groups with restricted agents, and assigning tokens to users. If you want to modify user data that is stored in an LDAP directory, use your LDAP directory tools.
Users in an identity source are visible in the top-level security domain by default, but can be moved to other security domains as necessary. Additionally, you can configure security domain mappings to move users from an identity source to a specific lower-level security domain.
You can link multiple identity sources to the system.
In the Operations Console, you can view a list of all of the identity sources in a deployment and details of a specific identity source. For instructions, see View the Identity Sources in Your Deployment.
Procedure
In the Security Console, click Setup > Identity Sources > Link Identity Source to System.
Related Concepts
Related Articles
Enable or Disable RADIUS User Attributes 27Number of Views View the Identity Sources in Your Deployment 6Number of Views Manage User Profile and Notifications 3Number of Views Manage User Groups 4Number of Views Directory Server Attributes Synchronized for Authentication 75Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Governance & Lifecycle 8.0.0 Administrators Guide Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory