Visit the Known Issues dashboard if you are experiencing issues on RSA Link
Complete the following tasks to implement risk-based authentication (RBA).
Before you begin
Choose a backup authentication method so that users can continue to access network resources if Authentication Manager is unavailable or user authentication is unsuccessful. See Backup Authentication Method for Risk-Based Authentication.
Update the Domain Name System (DNS) with entries for Authentication Manager. For instructions, see Planning for Domain Name System Updates.
Specify the RBA policy for your deployment integration. For instructions, see Add a Risk-Based Authentication Policy.
Ensure high availability for RBA. See Backup Authentication Method for Risk-Based Authentication.
Obtain the RSA Authentication Agent software or third party product. See RSA Authentication Agents.
Deploy the RSA Authentication Agent software or third party product. See Deploying an Authentication Agent that Uses the UDP Protocol.
Install the RBA Integration Script Template.
Generate an Integration Script for a Web-Based Application.
Use the implementation guide that you downloaded when you obtained the agent to configure your agent to pass authentication requests to and from Authentication Manager.
Test the RBA integration. See Testing Your Risk-Based Authentication Integration.