This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • Epic Hyperdrive
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Authenticators
        • iOS and Android
        • macOS
        • Windows
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Authenticators
        • DS100 Authenticators
        • SID700 Authenticators
        • SID800 Authenticators
      • Integrations
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • Epic Hyperdrive
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Authenticators
        • macOS
        • Windows
      • Cloud Authentication Service
      • FIDO Management Service
      • Hardware Appliance
        Component Updates
      • Hardware Authenticators
        • SID800 Authenticators
      • Integrations
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
      • Tech Hub
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

RSA Customer Advisory: Authentication Manager 8.7 P3

View Details

Community Ideas & Suggestions

Drive innovation and crowdsource improvement by submitting enhancement requests for the community.
  • RSA Community
  • :
  • Support
  • :
  • Community Support
  • :
  • Ideas & Suggestions
  • :
  • Unassign token based on token “Last Used to Authenticate” date
  • Options
    • Subscribe to RSS Feed
    • Mark as New
    • Mark as Read
    • Bookmark
    • Subscribe
    • Printer Friendly Page
    • Report Inappropriate Content

Unassign token based on token “Last Used to Authenticate” date

2 Likes
Status: Proposed Submitted by DavidThomson1 Occasional Contributor on ‎2023-01-27 06:05 AM

Would it be possible to have some global setting in the Security Console where if the token “Last Used to Authenticate” date goes beyond a set period, the system would automatically unassign the token and put it back in the available pool.  So if for example, I set it to that if the tokens have not authenticated with 90 days, then from this post (27/01/2023), all tokens that had not authenticated since 29 October 2022 would be unassigned.  There would have to be some feature to exclude certain users (like users on long term leave) but if this could be an overnight maintenance task, it would help keep our licenced number of users in balance and add more tokens to the available pool.

Share

You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.

  • Comment
Completed Ideas
  • RSA Link "Your Content"

  • Logs delivery

View All ≫

Idea Statuses

Proposed 33
Information Requested 1
New 6
Duplicate 1
Approved 1
Already Offered 1
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
© 2023 RSA Security LLC or its affiliates. All rights reserved.