This website uses cookies. By clicking OK, you consent to the use of cookies. Click Here to learn more about how we use cookies.
OK
  • RSA.com
  • Products
    • Archer®
      • Archer®
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Archer® Exchange
      • Training
      • Upcoming Events
      • Videos
    • RSA® Fraud & Risk Intelligence Suite
      • RSA® Fraud & Risk Intelligence Suite
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Web Threat Detection
      • Upcoming Events
      • Videos
    • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Cloud
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Upcoming Patch Content
      • Videos
    • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication Mobile SDK
      • Advisories
      • Events
      • Ideas
      • Knowledge Base
      • Request Access
      • Training
    • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 7.x
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® Adaptive Authentication for eCommerce
      • RSA® Adaptive Authentication for eCommerce
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® FraudAction Services
      • RSA® FraudAction Services
      • Advisories
      • Discussions
      • Documentation
      • Ideas
      • Videos
    • RSA® Web Threat Detection
      • RSA® Web Threat Detection
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Videos
    • RSA NetWitness® Platform
      • RSA NetWitness® Platform
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Integrations
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • RSA NetWitness® Detect AI
      • RSA NetWitness® Detect AI
      • Documentation
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA NetWitness® Investigator
      • RSA NetWitness® Investigator
      • Documentation
      • Download the Client
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA NetWitness® Orchestrator
      • RSA NetWitness® Orchestrator
      • Overview
      • Documentation
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA SecurID® Suite
      • RSA SecurID® Suite
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Knowledge Base
      • Ideas
      • Integrations
      • Training
      • Videos
    • RSA® Identity Governance & Lifecycle
      • RSA® Identity Governance & Lifecycle
      • Advisories
      • Blog
      • Community Exchange
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • RSA SecurID® Access
      • RSA SecurID® Access
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Integrations
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • Other RSA® Products
      • Other RSA® Products
      • RSA® Access Manager
      • RSA® Data Loss Prevention
      • RSA® Digital Certificate Solutions
      • RSA enVision®
      • RSA® Federated Identity Manager
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
  • Resources
    • Advisories
      • Product Advisories on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Hosted
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Product Advisories
    • Blogs
      • Blogs on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Blogs on RSA Link
    • Discussion Forums
      • Discussion Forums
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Discussion Forums on RSA Link
    • Documentation
      • Product Documentation
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Documentation on RSA Link
    • Downloads
      • Product Downloads
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Downloads on RSA Link
    • Ideas
      • Idea Exchange
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Documentation on RSA Link
    • Knowledge Base
      • Knowledge Base
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Knowledge Base Pages on RSA Link
    • Upcoming Events on RSA Link
      • Upcoming Events
    • Videos
      • Videos on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Videos on RSA Link
  • Support
    • RSA Link Support
      • RSA Link Support
      • News & Announcements
      • Getting Started
      • Support Forum
      • Support Knowledge Base
      • Ideas & Suggestions
    • RSA Product Support
      • RSA Product Support
      • General Security Advisories and Statements
      • Product Life Cycle
      • Support Information
      •  
      •  
      •  
      •  
      •  
  • RSA Ready
  • RSA University
    • Certification Program
      • Certification Program
    • Course Catalogs
      • Course Catalogs
      • Archer®
      • RSA NetWitness® Platform
      • RSA SecurID® Suite
    • On-Demand Subscriptions
      • On-Demand Subscriptions
      • Archer®
      • RSA NetWitness® Platform
      • RSA SecurID® Suite
    • Product Training
      • Product Training
      • Archer®
      • RSA® Fraud & Risk Intelligence Suite
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
    • Student Resources
      • Student Resources
      • Access On-Demand Learning
      • Access Virtual Labs
      • Contact RSA University
      • Enrollments & Transcripts
      • Frequently Asked Questions
      • Getting Started
      • Learning Modalities
      • Payments & Cancellations
      • Private Training
      • Training Center Locations
      • Training Credits
      • YouTube Channel
    • Upcoming Events
      • Upcoming Events
      • Full Calendar
      • Conferences
      • Live Classroom Training
      • Live Virtual Classroom Training
      • Webinars
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

RSA SecurID® Access Cloud Authentication Service Documentation

Browse the official RSA SecurID Access Cloud Authentication Service documentation for helpful resources for the product, step-by-step instructions, and other valuable resources.
  • RSA Link
  • :
  • Products
  • :
  • RSA SecurID Suite
  • :
  • RSA SecurID Access
  • :
  • Cloud Authentication Service
  • :
  • Documentation
  • :
  • Authentication Methods for Cloud Authentication Se...
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content
Versions
Collections
All Downloads

Table of Contents

  •   Release Notes
  •   Product Basics
    •   RSA SecurID Access Overview
    •   Cloud Authentication Service Overview
    •   RSA SecurID Access Editions
    •   High-Level Authentication Flows for the Cloud Authentication Service
  •   Quick Setup
    •   Getting Started with Quick Setup for the Cloud Authentication Service
  •   Deployment Management
    •   Cloud Administration Console Dashboard
    •   Publishing Changes to the Identity Router and Cloud Authentication Service
    •   Supported Browsers for the Cloud Administration Console
  •   Administrators
    •   Administrative Roles for the Cloud Administration Console
    •   Manage Administrators for the Cloud Administration Console
    •   Add, Edit, or Delete an Administrator for the Cloud Administration Console
    •   Change Your Account Name and Password in the Cloud Administration Console
    •   Reset Forgotten Password in the Cloud Administration Console
    •   Change the Identity Router Administrator Password Using the Identity Router Setup Console
  •   Company Settings
    •   Configure Company Information and Certificates
    •   Protected Domain Name
    •   Configure Session and Authentication Method Settings
    •   Password Lockout Examples
    •   Protect the Cloud Administration Console with Additional (Step-Up) Authentication
  •   Identity Routers
    •   Planning Your Identity Router Deployment
      •   Identity Routers
      •   Amazon Web Services Identity Router Deployment Models
      •   Amazon Web Services Identity Router Deployment Requirements
      •   Identity Router DNS Requirements
      •   Identity Router Virtual Appliance Hardware and Software Requirements for On-Premises Deployments
      •   Identity Router Network Interfaces and Default Ports
      •   Deployment Planning Checklist
  •   Installing and Configuring Identity Routers
    •   Deploying an Identity Router - Advanced Setup
    •   Add an Identity Router Using the Cloud Administration Console
    •   Add an Identity Router to the Cloud Authentication Service for RSA Authentication Manager
    •   Obtain the Identity Router Image
    •   Install the Identity Router Virtual Appliance for VMware
    •   Create the Identity Router Hyper-V Virtual Machine
    •   Launch the Identity Router for Amazon Web Services
    •   Configure Initial Network Settings for On-Premises Identity Routers Using the VM Console
    •   Configure Network Settings Using the Identity Router Setup Console
    •   Connect the Identity Router to the Cloud Administration Console
  •   Managing Identity Routers
    •   Configure Identity Router Security Levels
    •   Security Levels and Identity Router Connection Ciphers
    •   Set a Temporary Password for the Identity Router Setup Console
    •   View Identity Router Status in the Cloud Administration Console
    •   View Network Diagnostics on an Identity Router
    •   Identity Router Status Servlet Report
    •   Disconnect or Delete an Identity Router
    •   Enable Access to the Identity Router API
    •   Manage Identity Routers
    •   Update Identity Router Software
  •   Identity Sources
    •   Identity Sources for the Cloud Authentication Service
    •   LDAPv3 Server Requirements to Enable Expired Password Handling in the Application Portal
    •   LDAPv3 User Verification for the Cloud Authentication Service
    •   Add, Delete, and Test Connection for an Identity Source for the Cloud Authentication Service
    •   Directory Server Attributes Synchronized for Authentication
    •   Just-In-Time Synchronization
    •   Synchronize an Identity Source for the Cloud Authentication Service
    •   Manage Identity Sources for the Cloud Authentication Service
  •   User Application Portal
    •   User Application Portal
    •   Configure the Standard Web Application Portal
    •   Configure a Custom Portal Page for Web Applications
    •   Configure a Standard or Custom Application Portal Page
    •   Adding a Custom Logo to Your Cloud Authentication Service Deployment
    •   User Session and Single Sign-On
  •   Access Policies
    •   Planning Access Policies
      •   Planning Resource Protection with Multifactor Authentication
      •   Access Policies
      •   Condition Attributes for Access Policies
      •   Identity Confidence
      •   Assurance Levels
      •   Virtual Attributes in Access Policies (Active Directory Only)
      •   Preconfigured Access Policies
      •   Access Policy Examples
      •   Evaluating Assurance Levels and Primary Authentication Status for Returning Authentication Methods
  •   Configuring Access Policies
    •   Configure Assurance Levels
    •   Add, Clone, or Delete an Access Policy
    •   Add or Delete a Trusted Location
    •   Add or Delete a Trusted Network
    •   Portal Multifactor Authentication Policy
    •   Device Registration Using Password Policy
    •   Operators for Using LDAP Attributes in Access Policies
    •   View Access Policy Usage
    •   Manage Access Policies
  •   Clusters, High Availability, and Backups
    •   Clusters
    •   Cluster Relationships
    •   Load Balancer Requirements
    •   Manage Clusters
    •   Enable RADIUS on Identity Routers in a Cluster
    •   Configure High Availability for Cloud Authentication Service Deployments
    •   Backing Up User Profiles for HTTP Federation Applications
    •   Manage Cluster Backups
  •   Relying Parties
    •   Relying Parties
    •   SAML 2.0 Requirements for Service Providers
    •   Add a Relying Party
    •   Add a Service Provider
    •   Manage Relying Parties
    •   Example: SAML IdP for Cloud Authentication Service Assertion
  •   RADIUS
    •   RADIUS for the Cloud Authentication Service Overview
    •   Deploying RADIUS for the Cloud Authentication Service
    •   Add a RADIUS Client for the Cloud Authentication Service
    •   Configure a RADIUS Profile for the Cloud Authentication Service
    •   Attributes for RADIUS Clients and Profiles for the Cloud Authentication Service
    •   Customize the RSA SecurID Access Web Interface for a Cisco Adaptive Security Appliance
    •   Manage RADIUS for the Cloud Authentication Service
  •   Certificates
    •   Cloud Authentication Service Certificates
    •   Generate and Download a Certificate Bundle for Service Providers and Identity Providers for the SSO Agent
    •   List of Trusted Certificate Authorities for HFED and Trusted Headers Applications
    •   Upload Certificates for Trusted Certificate Authorities
    •   Delete a Trusted Certificate Authority Certificate
  •   Integrated Windows Authentication
    •   Integrated Windows Authentication
    •   Deploying Integrated Windows Authentication
    •   Configure User Browsers for Integrated Windows Authentication
  •   Identity Providers
    •   Adding Identity Providers
    •   Manage Identity Providers
    •   Restricting Access to Automated SSO Agent IdPs Using Authentication Source Access Rules
    •   Add Cloud Identity Provider
    •   Add a SAML Version 2 SSO Agent Identity Provider
    •   Authentication Sources
    •   Manage Authentication Sources
    •   Add an Authentication Source
    •   Add Authentication Source Access Rules
    •   Reorder Authentication Sources
    •   Delete an Authentication Source
  •   Web Applications
    •   Manage the Application Catalog
    •   Manage My Applications
    •   Add an Application to My Applications
    •   Delete an Application From My Applications
    •   Choosing a Connection Method to Add an SSO Agent Application
    •   SAML Applications
    •   Application Availability and Visibility
    •   Add a SAML Application
    •   Configure Advanced Settings for a SAML Connection
    •   Export SAML Metadata From an Application on the Identity Router
    •   HTTP Federation Proxy Applications
    •   Planning to Add an Application Using HTTP Federation Proxy
    •   HTTP Federation Proxy Planning Worksheet
    •   Add an Application Using HTTP Federation Proxy
    •   Trusted Headers
    •   Add an Application Using Trusted Headers
    •   Add a Bookmark Link in the Application Portal
    •   Deep Linking
  •   Authentication Methods and Emergency Access
    •   Authentication Methods for Cloud Authentication Service Users
    •   Authentication Method Lockout
    •   Emergency Access for Cloud Authentication Service Users
  •   Users and Authenticators
    •   Cloud Authentication Service User System Requirements
    •   Authenticator Registration
    •   RSA SecurID Authenticate App Security Features
    •   Configure Email Notifications
    •   Manage My Page
    •   Getting Started with FIDO-Certified Security Keys with RSA SecurID Access
    •   RSA and Yubico
    •   Using RSA Security Key Utility
    •   Registering Devices with RSA SecurID Authenticate App
    •   Manage Users for the Cloud Authentication Service
    •   Run User Reports
    •   Deploying the RSA SecurID Authenticate App in EMM Environment
    •   Deploying the RSA SecurID Authenticate for Windows App Using DISM
    •   RSA SecurID Authenticate and RSA SecurID Software Token App Permissions
  •   End User Rollout
    •   Cloud Authentication Service Rollout to Users
    •   Sample Rollout Email for RSA SecurID Access Users
    •   Configure Browsers to Trust the Cloud Authentication Service
  •   RSA Authentication Manager Integration
    •   Connect Your Cloud Authentication Service Deployment to RSA Authentication Manager
    •   Enable High Availability Tokencode in the Cloud Authentication Service
    •   Test the RSA Authentication Manager Connection
    •   Update the Connection between the Cloud Authentication Service and RSA Authentication Manager
    •   Delete the Connection Between the Cloud Authentication Service and RSA Authentication Manager
  •   Cloud Administration APIs
    •   Using the Cloud Administration APIs
    •   Manage the Cloud Administration API Keys
    •   Determining Access Requirements for High-Risk Users in the Cloud Authentication Service
    •   Authentication for the Cloud Administration APIs
    •   Cloud Administration Event Log API
    •   Cloud Administration User Search API
    •   Cloud Administration Synchronize User API
    •   Cloud Administration User Details API
    •   Cloud Administration Delete User Device API
    •   Cloud Administration Authenticator Details API
    •   Cloud Administration Mark User Deleted API
    •   Cloud Administration Delete User Now API
    •   Cloud Administration User Status API
    •   Cloud Administration Anomalous Users API
    •   Cloud Administration Unlock User Tokencodes API
    •   Cloud Administration Update SMS and Voice Phone API
    •   Cloud Administration Retrieve Authentication Audit Logs API
    •   Cloud Administration User Event Log API
    •   Cloud Administration Add/Remove High-Risk Users API
    •   Cloud Administration Retrieve High-Risk User List API
    •   Cloud Administration Health Check API
    •   Cloud Administration Retrieve Device Registration Code API
    •   Cloud Administration Enable Emergency Tokencode API
    •   Cloud Administration Disable Emergency Tokencode API
    •   Cloud Administration Retrieve License Usage API
    •   Cloud Administration FIDO Authenticator API
  •   RSA SecurID Authentication API
    •   Manage the RSA SecurID Authentication API Keys
    •   Allow FIDO Authentication to a Third-Party Domain
  •   Logging
    •   Logging for the Cloud Authentication Service
    •   Event Message Components for the Cloud Authentication Service
    •   Monitor User Events in the Cloud Administration Console
    •   Monitor System Events in the Cloud Authentication Console
    •   User Event Monitor Messages for the Cloud Authentication Service
    •   System Event Monitor Messages for the Cloud Authentication Service
    •   Administration Log Messages for the Cloud Authentication Service
    •   Identity Router Logging
    •   Configure Audit Logging in the Cloud Administration Console
    •   Set the Identity Router Logging Level
    •   Contents of Identity Router Log Bundle
    •   View the Identity Router System Log
    •   Identity Router Audit Log Messages
    •   RSA SecurID Authenticate App Logging
  •   Troubleshooting
    •   Troubleshooting Cloud Authentication Service User Issues
    •   Troubleshooting Cloud Administration Console Issues
    •   Troubleshooting Identity Router Issues
    •   Troubleshooting Cloud Authentication Service Identity Source Synchronization
    •   Monitor Uptime Status for the Cloud Authentication Service
    •   Access SSH for Identity Router Troubleshooting
    •   Grant RSA Customer Support Access to Your Account
    •   Test Access to Cloud Authentication Service
  •   Product Documentation and Support
    •   Product Documentation
    •   Support and Service for RSA SecurID Access
    •   RSA Ready Partner Program
    •   Placeholder 29
    •   Placeholder 30
    •   Placeholder 31
    •   Placeholder 32
    •   Placeholder 33
    •   Placeholder 34
    •   Placeholder 35
    •   Placeholder 36
    •   Placeholder 37
    •   Placeholder 38
    •   Placeholder 39
    •   Placeholder 40
  •   Copyright
    •   Copyright
    •   Yubico Copyright

Product Resources

  •   Advisories
    •   Product Advisories
    •   Security Advisories
    •   Service Notifications
    •   Technical Advisories
  •   Blog
  •   Discussions
  •   Documentation
    •   Authentication Agents
      •   API / SDK
      •   Apache Web Server
      •   Citrix StoreFront
      •   IIS Web Server
      •   Microsoft AD FS
      •   Microsoft Windows
      •   PAM
    •   Authentication Engine
    •   Authentication Manager
    •   Cloud Authentication Service
    •   Hardware Appliance Component Updates
    •   Hardware Tokens
    •   MFA Agents
      •   macOS
      •   Microsoft Windows
    •   Software Tokens
      •   Android
      •   Blackberry
      •   Blackberry 10
      •   iOS
      •   macOS
      •   Token Converter
      •   Windows
      •   Windows Phone
  •   Downloads
    •   Authentication Agents
      •   API / SDK
      •   Apache Web Server
      •   Citrix StoreFront
      •   IIS Web Server
      •   Microsoft AD FS
      •   Microsoft Windows
      •   PAM
    •   Authentication Engine
    •   Authentication Manager
    •   Cloud Authentication Service
    •   MFA Agents
      •   macOS
      •   Microsoft Windows
    •   Software Tokens
      •   Android
      •   Blackberry
      •   Blackberry 10
      •   iOS
      •   macOS
      •   Token Converter
      •   Windows
      •   Windows Phone
  •   Events
  •   Ideas
  •   Integrations
  •   Knowledge Base
  •   RSA SecurID Access Prime
  •   Training
  •   Videos

Authentication Methods for Cloud Authentication Service UsersAuthentication Methods for Cloud Authentication Service Users

An authentication method is a credential a user provides or an action a user performs to prove his or her identity. This topic describes the methods used for multifactor authentication (MFA) that you can make available to users who are in identity sources that are configured for the Cloud Authentication Service.

The following table lists the methods available to Cloud Authentication Service users and indicates whether the method can also be used to access resources protected by an RSA Authentication Manager agent.

Authentication Method Use to Access Resources Protected By
Cloud Authentication Service RSA Authentication Manager Agent
FIDO X
RSA SecurID Token X X
RSA SecurID Authenticate Tokencode X X
Emergency Tokencode X X
Approve (Push Notifications) X X
Device Biometrics X X
SMS Tokencode X X
Voice Tokencode X X
LDAP Directory Password X

You can expand the number of resources you protect and the authentication options you make available to users by integrating RSA Authentication Manager with the Cloud Authentication Service. For more information, see Connect RSA Authentication Manager to the Cloud Authentication Service (Authentication Manager 8.4 Patch 4 or later), Enable RSA Authenticate App Users to Access Resources Protected by RSA Authentication Manager (Authentication Manager 8.4 Patch 3 and earlier), and Enable RSA SecurID Token Users to Access Resources Protected by the Cloud Authentication Service.

FIDOFIDO

RSA SecurID Access supports the following FIDO-certified authenticators:

  • Security keys. Roaming (or hardware) USB, BLE, or NFC keys that are FIDO2 or U2F compliant.

  • Windows Hello

    See Windows Hello and FIDO2 Security Keys enable secure and easy authentication for shared devices.

  • Android 7.0 or higher phone

    See Now generally available: Android phone’s built-in security key.

RSA SecurID Access supports FIDO authenticators for both primary (for example, the user is prompted to sign in with a FIDO authenticator instead of entering a password after entering a user ID) and additional authentication (for example, after entering a user ID and password, the user is prompted to sign in with a FIDO authenticator).

FIDO2 security keys, Windows Hello, and Android phone can be used for primary authentication and additional authentication. U2F security keys can be used for additional authentication. For a list of system requirements for FIDO authenticators, see Cloud Authentication Service User System Requirements.

FIDO RegistrationFIDO Registration

Users must register their FIDO authenticators before they can use them for authentication. Registration happens in one of two ways for security keys:

  • The first-time user clicks an icon for a protected application, enters a username and identity source password, connects the FIDO authenticator, and, if required, taps the key. Subsequent authentications do not require a password. This is the default registration method.

  • The user goes to My Page to register the FIDO authenticator. Users authenticate to My Page according to the access policy protecting My Page. You can make My Page registration a requirement by enabling both My Page and FIDO authenticator registration in the Cloud Administration Console at Platform > My Page. After both functions are enabled, users can no longer register FIDO authenticators during first-time authentication. For more information, see Manage My Page.

Registration for Windows Hello and Android phone can only be done in My Page.

Requirements for Using FIDO for Primary AuthenticationRequirements for Using FIDO for Primary Authentication

Note the following requirements for using FIDO authenticators for primary authentication:

  • The FIDO authenticator must support user verification, such as a PIN or biometric. The user completes this verification as part of FIDO authentication.
  • Users must set up the FIDO user verification before accessing an application that requires FIDO authenticators.

  • Users must first register their FIDO authenticators with RSA SecurID Access when accessing an application where FIDO authenticators are used for additional authentication, for example, a service provider or My Page. Then users can use FIDO authenticators as a primary authentication method.

  • FIDO authenticators can be used for primary authentication only in relying party deployments.

FIDO2 CertificationFIDO2 Certification

The Cloud Authentication Service is a FIDO2 Certified Server. The certification demonstrates compliance with the FIDO specification and ensures compatibility with any FIDO-certified security key.

As part of this certification, the Cloud Authentication Service checks the integrity of the security key response message during registration. If the response message is modified on its way to the Cloud Authentication Service, the registration is unsuccessful.

Additionally, the Cloud Authentication Service verifies the integrity and authenticity of FIDO-certified security keys listed with the FIDO Alliance Metadata Service (MDS). The Cloud Authentication Service rejects MDS-listed keys if detected as counterfeit or compromised.

RSA SecurID TokenRSA SecurID Token

The RSA SecurID Token method employs a one-time, randomly generated number called a tokencode. The tokencode is generated on a hardware or software token and is verified by your on-premise RSA Authentication Manager server. A Personal Identification Number (PIN) is often required. The tokencode is time-based and must be used before it expires. RSA SecurID Tokens are issued and revoked only through Authentication Manager.

This method can be used to access resources protected by the Cloud Authentication Service or by authentication agents in RSA Authentication Manager deployments.

The Cloud Authentication Service supports RSA SecurID Token for primary authentication only in SSO Agent and relying party (service provider) deployments.

RSA SecurID Authenticate TokencodeRSA SecurID Authenticate Tokencode

Similar to RSA SecurID Tokens, RSA SecurID Authenticate Tokencode employs a one-time, randomly generated number called a tokencode. This tokencode is generated on a device where the RSA SecurID Authenticate app is installed. The tokencode, which is verified by the Cloud Authentication Service, is time-based and must be used before it expires. These tokencodes are valid for up to five minutes after they are generated and displayed on a user's device. The user is enrolled for this method automatically after device registration.

Protect Access to Authenticate TokencodeProtect Access to Authenticate Tokencode

You can require users to provide additional authentication to view the RSA SecurID Authenticate Tokencode. This setting takes effect 24 hours after it is enabled or after the user restarts the app. The user must tap or click View Tokencode on the app home screen and authenticate before viewing the tokencode.

The first time the user taps or clicks View Tokencode, the app prompts the user to create a PIN that is only used for viewing the Authenticate Tokencode. The PIN must be numeric, contain 4-10 digits, and cannot contain repeating or consecutive numbers, for example, 1111 or 1234. You can configure the minimum PIN length. For instructions, see Configure Session and Authentication Method Settings.

The PIN applies to the RSA SecurID Authenticate Tokencodes for all companies in the app. If users have multiple companies in the app, their minimum PIN length is the longest minimum PIN length of their companies.

On iOS and Android, if the user has set up biometrics, the app prompts the user to authenticate with a biometric (for example, fingerprint or Face ID) instead of using a PIN. The user can also choose to skip or cancel biometrics and enter the PIN. If the user fails biometrics or has not set up biometrics, then the app prompts the user to enter the PIN.

On Windows, the app prompts the user to authenticate with the PIN.

If the user enters an incorrect PIN five times, the PIN is locked and the user must reset the PIN. To reset the PIN, users must do the following:

  • On iOS or Android, the app prompts the user for device unlock credentials, such as a passcode. The user must set up device unlock credentials to reset the PIN.

  • On Windows, the app prompts the user to delete all companies that require authentication to view the tokencode and then re-register those companies.

The user can authenticate to view the tokencode with an online or offline device. However, if the user needs to reset the PIN on a Windows device, the user must be online. The user can reset the PIN online or offline on iOS or Android devices.

Integrated DeploymentsIntegrated Deployments

If your company has deployed both RSA SecurID Access and RSA Authentication Manager 8.2 or later, you can integrate the two products so that users can authenticate with RSA SecurID Tokens and RSA SecurID Authenticate Tokencodes on the same RSA Authentication Agent.

Emergency TokencodeEmergency Tokencode

Emergency Tokencode is for users who forget or misplace their registered authenticators. The same tokencode is generated for both online and offline use.

Super Admins - See how to configure Emergency Tokencode:

Help Desk Administrators - See how to provide users with an Emergency Tokencode:

For detailed information, see:

  • Emergency Tokencode for Online Access

  • Emergency Tokencode for Offline Access

Emergency Tokencode for Online AccessEmergency Tokencode for Online Access

Description
When to Use Emergency Tokencode for Online Access If the user is able to sign in to the company network without the registered authenticator, you can give the user an Emergency Tokencode to access resources protected by the Cloud Authentication Service.
Configuration Prerequisites

For primary authentication, Emergency Tokencode can be used as a replacement for the FIDO authentication method in relying parties. You select a box to allow this replacement when configuring primary authentication for the relying party. See Add a Service Provider.

Similar to other RSA SecurID Access additional authentication methods, Emergency Tokencode must be configured and published in your assurance levels and access policies before it can be used for online additional authentication.

Note: RSA recommends that you avoid adding Emergency Tokencode to the High assurance level. Doing so will make Emergency Tokencode available to your most sensitive applications.

User Experience for Online Access
  1. The user calls the Help Desk.

  2. The Help Desk Administrator finds the user on the Users > Management page in Cloud Administration Console and generates an Emergency Tokencode.

    If offline Emergency Tokencode is enabled for your company, the same tokencode is generated for online and offline access.

  3. The Help Desk Administrator securely delivers the tokencode to the user immediately and instructs the user to select Emergency Tokencode from the list of available options during the next authentication.

  4. The next time the user is online and attempts to access the protected resource, the user selects Emergency Tokencode and then enters the tokencode.

    If a user types the tokencode incorrectly, the number of allowed retries is configured in the Cloud Administration Console on the My Account > Company Settings > Session & Authentication page.

Lifetime for Online Access

After a user selects Emergency Tokencode one time during authentication, Emergency Tokencode becomes the user's default method until one of the following events occurs:

  • The tokencode expires. Expiration is configured (1-7 days) on the Users > Management page. For instructions, see Enable Emergency Tokencode for a User.

  • An administrator disables the tokencode on the Users > Management page.

  • The user selects a different option during authentication, and that option becomes the new default.

Generate or disable Emergency Tokencode for a user

See Manage Users for the Cloud Authentication Service .

Emergency Tokencode for Offline AccessEmergency Tokencode for Offline Access

Description
When to Use Emergency Tokencode for Offline Access A user can use Emergency Tokencode to sign into a computer that is protected by the RSA MFA Agent for Microsoft Windows, even if the computer has no internet connection. If the computer has an internet connection, the same tokencode can be used to access resources protected by the Cloud Authentication Service.
Configuration Prerequisites

Your deployment must meet these configuration requirements:

  • The RSA MFA Agent 2.x or later for Microsoft Windows must be installed on users’ Windows devices. See the RSA MFA Agent 1.2 for Microsoft Windows Installation and Administration Guide.

  • Emergency Tokencode must be configured and published in your assurance levels and access policies.

  • Offline Emergency Tokencode must be enabled on the Company Settings > Sessions & Authentication page in theCloud Administration Console. See Configure Session and Authentication Method Settings.

User Experience for Offline Access
  1. The user calls the Help Desk.

  2. The Help Desk Administrator finds the user on the Users > Management page in Cloud Administration Console and generates an Emergency Tokencode.

    The same tokencode is generated for online and offline access.

  3. The Help Desk Administrator securely delivers the tokencode to the user immediately.

  4. The next time the user attempts to sign in to his or her Windows computer, the MFA Agent prompts the user to sign in and enter the Emergency Tokencode.

Lifetime for Offline Access

The Emergency Tokencode is created and downloaded to the user’s computer the first time the user successfully authenticates online through the MFA Agent to the Cloud Authentication Service. The tokencode becomes invalid after one of the following events occur:

  • The configured lifetime (1-30 days) has elapsed. You configure this setting on the My Account > Company Settings > Session & Authentication page. For instructions, see Configure Session and Authentication Method Settings.

  • The user has successfully authenticated, through the MFA Agent, using a method other than Emergency Tokencode, to the Cloud Authentication Service. A new tokencode is downloaded to replace the old one, beginning a new lifetime cycle.

The online expiration date may elapse before the offline expiration date. If this occurs and the user still needs online emergency access, you can regenerate the tokencode and give it a new online expiration date. The offline expiration date remains valid and unchanged from the first time it is generated until it expires or until the user successfully authenticates with a different method. Also, the Emergency Tokencode itself remains exactly the same if you click Generate Code, even multiple times, before the offline expiration date is reached.

Generate or disable Emergency Tokencode for a user

See Manage Users for the Cloud Authentication Service .

Approve (Push Notifications)Approve (Push Notifications)

When using Approve to access a cloud-protected resource, the user attempts to access the application and then receives a push notification prompting to tap a button on a registered device. When using Approve to access an agent-protected resource, the user enters a PIN before tapping a button on an Authenticate device. In both cases, the user can also tap an interactive notification on the device or on an Apple Watch or Android Wear watch paired to the device. The user must respond within one minute, otherwise the method times out and is considered a failed authentication. The user is enrolled for this method automatically after Authenticate device registration.

This method can be used to access resources protected by the Cloud Authentication Service or by authentication agents in RSA Authentication Manager deployments.

Device BiometricsDevice Biometrics

Device Biometrics allows users to authenticate to applications using biometrics available on devices, such as, Apple Touch ID or Face ID, Android fingerprint, or Windows Hello. Before using Device Biometrics, users must first set up biometrics on their devices. RSA SecurID Access does not force users to do this.

To use Device Biometrics on Windows 10 PCs, Windows Hello must be enabled. Also, keep in mind that users can sign in using a Hello PIN.

When using Device Biometrics to access an agent-protected resource, the user must first enter a PIN before entering the biometric credential.

SMS TokencodeSMS Tokencode

SMS Tokencode is a six-digit code that RSA SecurID Access sends to the user's phone in an SMS message when the user attempts to access an application. The tokencode, which is verified by the Cloud Authentication Service, is time-based and must be used before it expires three minutes after it is sent to the user. If it expires or the user does not receive it, the user can click Resend Tokencode. This method does not require device registration using the RSA SecurID Authenticate app.

When planning your available authentication methods, consider making SMS Tokencode available for emergency access when the user cannot use other methods, for example, when the user loses the RSA SecurID Token or cannot locate the device used to register the RSA SecurID Authenticate app.

Users can use SMS Tokencode if these criteria are met:

  • RSA has enabled this feature for your company.

  • Users' required identity source information is synchronized with the Cloud Authentication Service (similar to other authentication methods).

  • A valid mobile phone number is stored for the user in the Cloud Authentication Service. The phone number can be synchronized from the LDAP directory server or entered manually by the administrator.

For details on how SMS phone numbers are handled during identity source synchronization, see Identity Sources for the Cloud Authentication Service.

Voice TokencodeVoice Tokencode

Voice Tokencode is a six-digit code that RSA SecurID Access provides by calling the user's phone when the user attempts to access an application. The tokencode, which is verified by the Cloud Authentication Service, is time-based and must be used before it expires three minutes after it is sent to the user. If it expires or the user does not receive it, the user can click Resend Tokencode. This method does not require a mobile device.

When planning your available authentication methods, consider making Voice Tokencode available for emergency access when the user cannot use other methods, for example, for users who do not have mobile phones or when the user loses the RSA SecurID Token.

Users can use Voice Tokencode if these criteria are met:

  • RSA has enabled this feature for your company.

  • Users' required identity source information is synchronized with the Cloud Authentication Service (similar to other authentication methods).

  • A valid phone number (landline or mobile) is stored for the user in the Cloud Authentication Service. The phone number can be synchronized from the LDAP directory server or entered manually by the administrator.

For details on how Voice Tokencode phone numbers are handled during identity source synchronization, see Identity Sources for the Cloud Authentication Service.

LDAP Directory PasswordLDAP Directory Password

The LDAP directory password is used for primary authentication and to register devices. LDAP directory passwords are managed within the LDAP directory server. User records are synchronized from the LDAP directory server to identity sources in RSA SecurID Access. The Cloud Authentication Service must be able to reach your on-premise identity source for authentication to succeed.

 

Previous Page Next Page
0 Likes
Was this article helpful? Yes No
Share
No ratings

On this page

Powered by Khoros
  • Products
  • Resources
  • Solutions
  • RSA University
  • Support
  • RSA Labs
  • RSA Ready
  • About RSA Link
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
© 2021 RSA Security LLC or its affiliates.
All rights reserved.