Edit the RADIUS Server Agent
Use the Security Console to edit the properties of a RADIUS server agent. You can also view the IP addresses of the server and the date and time of the last auto-registration, which updates the agent record with AM. The RSA Authentication Manager installer automatically installs the server agent when it registers the RADIUS server with AM during installation.
Procedure
In the Security Console, click RADIUS > RADIUS Servers.
Click the server that is associated with the agent that you want to edit.
From the context menu, click RSA Agent.
In the Notes field, enter any notes for this agent, for example, “For RADIUS server at San Jose site”.
If you want to assign a profile to this agent, from the RADIUS Profile drop-down menu, select a RADIUS profile.
Select whether to disable the agent. Do one of the following:
If you want the server to process RADIUS client authentication requests, make sure that Agent is disabled is cleared.
If you want to temporarily remove the server from RSA RADIUS, select Agent is disabled.
Determine who can use the agent for authentication. Do one of the following:
If you do not want to limit who can request access from the client, clear Allow access only to members of user groups who are granted access to this agent.
If you want to limit who can request access from the client, select Allow access only to members of user groups who are granted access to this agent.
Configure the AM contact list. Do one of the following:
If you want the agent to send authentication requests to the AM instance that responds first, select Automatically assign automatic contact list from instance that responds first.
If your organization has specific requirements for directing the agent's authentication requests to particular AM instances, select Manually assign contact list, and select the contact list from the drop-down list. For more information, see Contact Lists for Authentication Requests.
If your organization uses trusted realms and you want trusted users to authenticate through this agent, select Enable Trusted Realm Authentication, and determine which trusted users can access the authentication agent. Do one of the following:
If you do not want to limit which trusted users can access this agent, select Open to all Trusted Users. After trusted users authenticate to AM, AM automatically creates them in the security domain for the trusted realm.
If you want to limit which trusted users can access this agent, select Only Trusted Users in Trusted User Groups with access to the agent can authenticate.
Click Save.
Related Articles
Configure User Browsers for Integrated Windows Authentication 13Number of Views Upload Certificates for Trusted Certificate Authorities 46Number of Views Archive Logs Using Archive Now 48Number of Views Entering login credentials into Entitlement Manager (admingui) returns a 500 internal server error 19Number of Views "Error editing the Location update T_AV_CRSUBMISSION_FIELDS" when defining new Form Fields in RSA Identity Governance & Li… 38Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide