Manage Access Policies
Manage Access Policies
Use the Access Policies page to view the list of access policies in your deployment and to perform related tasks. Access policies are configured using the Cloud Administration Console You must be a Super Admin to manage access policies.
| Action | Instructions |
|---|---|
| View a list of access policies. | Click Access > Policies. |
| Add an access policy. | On the Access Policies list page, click Add a Policy. For further instructions, see Add an Access Policy. |
Edit an access policy. | On the Access Policies list page, click Edit for the policy. |
| Clone an access policy. | On the Access Policies list page, click the drop-down arrow and select Clone. |
| Delete an access policy. | First verify that no web applications are using the policy, then on the Access Policies list page, click Edit > Delete for the policy. |
| View a list of applications that use the policy. | On the Access Policies list page, click the drop-down arrow and select View Applications. |
| Enable, edit, or disable the RSA Authenticator Device Registration policy. | On the Access Policies list page, next to this policy click Enable, or click the drop-down arrow next to this policy and select Edit or Disable. For more information, see Device Registration Using Password Policy. |
Note: After you rename or delete an access policy, make sure you update the client configuration (if applicable) with the changes to ensure that the client is using the correct access policy.
Related Articles
Condition Attributes for Access Policies 188Number of Views Preconfigured Access Policies 17Number of Views Access Policy Examples 72Number of Views Virtual Attributes in Access Policies (Active Directory Only) 80Number of Views Access Policies 195Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?