Deploying SecurID TokensDeploying SecurID Tokens
The following steps outline the tasks required to deploy SecurID tokens.
Procedure
- Import a Token Record File.
- (Optional) Move a Token Record to a New Security Domain.
- Assign Tokens to Users.
- For software tokens, Add a Software Token Profile. Otherwise, continue to the next step.
- Distribute the token. Choose one of the following:
- Distribute hardware tokens:
- If users are located within close proximity, instruct the users to physically collect the tokens.
- If your organization is large and geographically dispersed, distribute tokens by mail.
- Distribute One Software Token Using Dynamic Seed Provisioning
- Distribute One Software Token Using Dynamic Seed Provisioning
- Distribute Software Tokens Using File-Based Provisioning
- Distribute One Software Token Using File-Based Provisioning
- Distribute Software Tokens Using Compressed Token Format (CTF)
- Distribute One Software Token Using Compressed Token Format (CTF)