- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Connection without using RSA token
We are using RSA Solution for 2FA authentication. Now we want to configure 4 or 5 users to be authenticated with Active Directory without using RSA Token. Kindly guide if anyone knows about this ?
- Tags:
- Agent
- Agents
- Auth Agent
- Authentication Agent
- Community Thread
- Discussion
- Forum Thread
- RSA SecurID
- RSA SecurID Access
- SecurID
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Whatever device they are logging into will need to be able to authenticate to Active Directory by itself. RSA Authentication Manager server does not handle AD passwords...only userid+passcode. Any further authentication such as an AD password is up to the device they are logging into, not the Auth Manager server.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Whatever device they are logging into will need to be able to authenticate to Active Directory by itself. RSA Authentication Manager server does not handle AD passwords...only userid+passcode. Any further authentication such as an AD password is up to the device they are logging into, not the Auth Manager server.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
To add to what Ed said, if you are using an Authentication Manager agent, such as for PAM or Windows, the SecurID-speak term you want to understand is 'challenged'. A Challenged User must provide a Passcode, but an Un-Challenged user can authenticate with a Password.
Challenge has 4 settings;
1. Challenge Everyone, All Users
2. Challenge Everyone in a group
3. Challenge Everyone Not in a group
4. Challenge No One
Groups can be nested, and you can start with either a local group or an AD group, or even a local group that points to a Domain group, but there are some limits. There is also a cache setting for Windows laptops that may work offline, e.g. not on the Corp LAN with access to the AM servers like at home or Hotel room. With cached challenge settings there is also a programmatic default if the group lookup fails; default is to challenge the person trying to logon, but you could select not challenge if more worried about access than security or for whatever reason.
VPNs such as Cisco, Citrix, Sonic Wall, etc... should have their own way to configuring who to challenge, and allowing some users who are not challenged in SecurID terms to authenticate against AD, or LDAP, or whatever.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Basically they dont want to waste RSA token code on their employees that's why they are thinking that they can use it for their customers. Can it possible to configure such a scenario where employees authenticate with AD credentials without using RSA token and the customers can use their release token codes to authenticate itself?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Basically they dont want to waste RSA token code on their employees that's why they are thinking that they can use it for their customers. Can it possible to configure such a scenario where employees authenticate with AD credentials without using RSA token and the customers can use their release token codes to authenticate itself?
