Users can access traditional on-premises resources protected by Authentication Manager, such as VPNs and wireless access points, by authenticating with tokencodes generated by the RSA SecurID Authenticate app.
Users can access traditional on-premises resources protected by RSA Authentication Manager, such as VPNs and wireless access points, by authenticating with tokencodes generated by the RSA SecurID Authenticate app. You need to connect Authentication Manager to the Cloud Authentication Service so Authentication Manager can forward the tokencodes to the Cloud Authentication Service for validation.
Note: These instructions apply only to Authentication Manager 8.4 Patch 3 and earlier. If you have Authentication Manager 8.4 Patch 4 or later, see Connect RSA Authentication Manager to the Cloud Authentication Service to learn the quickest way to connect to the Cloud.
To configure the integration, perform these steps:
After you configure and test a minimal deployment with one identity router that receives authentication requests from agents, see Configure High Availability to learn how you can improve performance.
At least one identity router and a Cloud Authentication Service deployment. If you need to start from scratch, see the Quick Start guides available on RSA Link at Cloud Authentication Service Planning and Configuration.
RSA Authentication Manager 8.2 Service Pack 1 or later with at least one primary instance. Version 8.2 is also supported. For details, see Authentication Manager Version Support.
Understand how the authentication process works in an integrated deployment. See Authentication Process Flow for a graphic description.
Confirm that users who will use the RSA SecurID Authenticate app are in an identity source connected to the Cloud Authentication Service. For details on Authentication Manager identity source requirements, see Authentication Manager Version Support.
The Super Admin for the Cloud Authentication Service performs these steps:
Upload your own identity router SSL certificate to the Cloud Authentication Service. For instructions, see Configure Company Information and Certificates.
Collect Deployment Information and Provide it to the RSA Authentication Manager Administrator.
The identity router API is a REST-based web services interface. RSA Authentication Manager 8.4 Patch 3 and earlier uses this API to send the Authenticate Tokencode to the identity router and to receive the authentication results from the Cloud Authentication Service. You use the Cloud Administration Console to do the following:
Enable API access for Authentication Manager.
Generate an Access ID and Access Key, which RSA Authentication Manager uses to access the identity router.
Before you begin
Obtain the IP address (or address range) and network mask for the part of your network where Authentication Manager is deployed.
Add a Super Admin account to the Cloud Administration Console using credentials that do not belong to a specific individual. This account is used exclusively to manage identity router API access. For example, you can create a new email address specifically for this account, or use an address that is jointly monitored by all Super Admins in your deployment. Super Admins can modify the identity router API access configuration through this account.
Procedure
In the Cloud Administration Console, click My Account > Administrators.
Click Edit next to the Super Admin account that you want to grant API access.
Select the Enable Identity Router API checkbox to enable access to the identity router API.
This step generates an Access ID and Access Key. Copy these values to a secure location. The RSA Authentication Manager administrator needs this information to configure Authentication Manager to accept Authenticate Tokencodes.
Note: The Access ID and Access Key are sensitive data. Store these values securely, and share them only with other Super Admins.
In the IP Address and Netmask fields, specify the Authentication Manager server IP address or subnet that needs to access the API. A subnet can represent multiple Authentication Manager IP addresses.
The embedded identity router in Authentication Manager requires the Gateway IP address for the identity router with the network mask 255.255.255.255. You can view the Gateway IP address on the Network Diagnostics page. For instructions, see View Network Diagnostics on an Identity Router.
If more than one Authentication Manager instance can access the embedded identity router REST API, add each Authentication Manager IP address. You view this information by logging on to the Operations Console for each Authentication Manager instance and clicking Administration > Network > Appliance Network Settings.
If you want to add another network, click Add, then repeat step 4.
Click Save.
Click Publish Changes.
The Super Admin for the Cloud Authentication Service must collect the following information and provide it to the Super Admin or Trust Administrator for Authentication Manager:
Identity router API Access ID and Access Key.
IPv4 address for each identity router to which Authentication Manager will connect. For identity routers in the Amazon cloud, use the private IP address. For on-premises identity routers, use the management interface IP address.
Identity router API port: 443 for on-premises identity routers or 9786 for identity routers in the Amazon cloud
URL prefix for the identity router API service: https://<identityrouterIP>:<port>/api/v1
where <identityrouterIP> is the IP address of the identity router and <port> is the port number. For identity routers in the Amazon cloud, use the private IP address and port 9786. For on-premises identity routers, use the management interface IP address and port 443.
Identity router root certificate from the certificate chain. This certificate was configured on the My Account > Company Settings page in the Cloud Administration Console. Confirm if you have a local copy of the certificate, or open the Identity Router Setup Console and export it from the browser. If you need to export it, see 000036639 - How to export RSA SecurID Access Authentication Manager, Identity Router, or Cloud Authentication Service Root Certificate and follow instructions for the identity router root certificate.
The Super Admin for RSA Authentication Manager performs the appropriate task, depending on your deployment.
If you have... | Perform this task |
---|---|
RSA Authentication Manager 8.2 SP1 or 8.3 and your Authentication Manager users and Cloud users are in the same identity sources or RSA Authentication Manager 8.4 |
Configure RSA Authentication Manager to Accept Authenticate Tokencodes |
RSA Authentication Manager 8.2 SP1 or 8.3 and your Authentication Manager users and Cloud users are in different identity sources or RSA Authentication Manager 8.2 |
Add an RSA SecurID Access Deployment to RSA Authentication Manager as a Trusted Realm |
Note: Users with both RSA SecurID tokens and Authenticate Tokencodes can access all protected resources with the same username or e-mail address.
This task connects Authentication Manager to identity routers in your deployment, allowing the Cloud Authentication Service to verify Authenticate Tokencodes when users access agent-protected resources.
After a user successfully authenticates to access an agent-protected resource using the Authenticate app, the user's Authentication Manager record counts the Authenticate app as an active token. The Authenticate app counts against the default limit of three active tokens per user, and it counts as an active token for licensing purposes.
Before you begin
Procedure
If your deployment has more than one identity router, add the identity router management IP addresses and hostname to the hosts file on each RSA Authentication Manager appliance in your Authentication Manager deployment.
Note: Do not edit the hosts file outside of the Operations Console, or the file may become unreadable.
Enter the IPv4 addresses and the hostname of the identity routers. Click Add New, and enter:
IPv4 address for an identity router. For example, 192.168.255.255.
Hostname for the identity routers. You can use the same hostname that is used for the identity router management interfaces, or you can define a logical hostname that only Authentication Manager uses.For example, you can map multiple identity router IP addresses to the logical hostname identityrouter.rsa-securid.com. Authentication Manager uses round robin load balancing to send authentication requests to each consecutive IP address in the list. Failover is provided, because Authentication Manager can use the next IP address if an identity router does not respond. The logical hostname is used as the Access URL in the Operations Console and the hostname to the identity router IP mappings is configured in the Operations Console at Administration > Network > Hosts File.
Each hostname and FQDN cannot exceed 255 characters. The hostname and FQDN combined cannot exceed 1024 characters. Example hostname: identityrouter.rsa-securid.com.
To associate different IP addresses with the same hostname, you must add a row for each IP address. For example, you can create multiple rows with different identity router IP addresses for the same RSA SecurID Access hostname.
Comments, if any.
Note: Do not repeat an IP address or hostname that is in the Read-only Content section of the hosts file.
After you finish
Perform this task in any of the following cases:
An RSA Authentication Manager deployment can support only one RSA SecurID Access deployment as a trusted realm. However, you can use the Operations Console to add IP addresses for multiple identity routers in this trusted realm. Doing this allows Authentication Manager to use round robin load balancing, high availability, and failover for authentication requests. The trusted realm relationship exists if at least one identity router is available.
Before you begin
Obtain the required identity router information from the Cloud Authentication Service Super Admin. You can use the same hostname that is used for the identity router management interfaces, or you can define a logical hostname that only Authentication Manager uses.
For example, you can map multiple identity router IP addresses to the logical hostname identityrouter.rsa-securid.com. Authentication Manager uses round robin load balancing to send authentication requests to each consecutive IP address in the list. Failover is provided, because Authentication Manager can use the next IP address if an identity router does not respond.
Note: If you map multiple identity router IP addresses, you must maintain the .hosts file when identity routers are added or removed from the deployment.
Procedure
Add the identity router IP addresses and hostname to the hosts file on each RSA Authentication Manager appliance in your Authentication Manager deployment.
Note: Do not edit the hosts file outside of the Operations Console, or the file may become unreadable.
Click Add New, and enter:
Identity router hostnames. Each hostname and FQDN cannot exceed 255 characters. The hostname and FQDN combined cannot exceed 1024 characters. For example, identityrouter.rsa-securid.com.
To associate different IP addresses with the same hostname, you must add a row for each IP address. For example, you can create multiple rows with different identity router IP addresses for the same hostname.
Comments, if any. Do not use double quotation marks, hash characters, or non-printing characters.
In the Operations Console, click Administration > Operating System Access.
Select each NIC on which you want to enable SSH.
Click Save.
Note: (Optional) While logged on to the appliance operating system, you can manually save a copy of the hosts file for each appliance. The hosts file is not included in an Authentication Manager backup file.
cd /opt/rsa/am/utils/
and press ENTER.
Type:
./rsautil manage-securid-access-trusts -a create
and press ENTER.
Note: You can enter the options directly on the command line. For additional options, see Options for manage-securid-access-trusts.
When prompted, enter each value and press ENTER:
Note: It is critical that Authentication Manager only sends authentication requests to a legitimate identity router running the SSO Agent.
RSA Authentication Manager tests the connection to the trusted realm. After 30 seconds, a message indicates whether the test succeeded. If the test fails, view the imsTrace.log file in the /opt/rsa/am/server/logs directory.
Note: Replica instances require additional time to accept the root certificate obtained from the identity router. Wait at least ten minutes before testing the trusted realm or authenticating with Authenticate Tokencodes on a replica instance.
After you finish
After you finish setting up your RSA SecurID Access deployment, the Super Admin for the Cloud Authentication Service needs to roll out RSA SecurID Access to your users. The rollout involves communicating information about the user experience, for example, the application portal for an SSO Agent deployment, the RSA SecurID Authenticate app, and optionally RSA SecurID Access My Page, emergency access, and system requirements. for instructions, see RSA SecurID Access Rollout to Users on RSA Link at https://community.rsa.com/docs/DOC-54129.
The following illustration shows the process flow for an RSA SecurID Authenticate app user accessing a resource protected by an RSA Authentication Agent. The Cloud Authentication Service validates the Authenticate Tokencode and returns information to Authentication Manager before the user gains access.
In RSA Authentication Manager 8.4, new users are automatically assigned the RSA SecurID Authenticate app as an active token in Authentication Manager after they register their mobile devices for the Cloud Authentication Service and successfully use an Authenticate Tokencode to access an RSA-SecurID protected resource. You do not need to perform any manual steps to add these users to Authentication Manager. This process applies to all users, even if they did not previously have an active token in Authentication Manager. The Authenticate app counts against the default limit of three active tokens per user.
Users with active Authenticate app tokens in Authentication Manager can also obtain emergency access tokencodes to access resources protected by Authentication Manager agents. For example, users who want to access an agent-protected resource using the Authenticate app and lose their mobile devices can request emergency access tokencodes by logging on to the Self-Service Console or by contacting an Authentication Manager Help Desk administrator.
Note: Emergency access tokencodes cannot be used to access applications that are protected only by the Cloud Authentication Service, without Authentication Manager agents.
RSA Authentication Manager 8.2 SP1 or later supports the following:
Users can use the Authenticate app to access agents and use the same identity source sign-in credentials for Authentication Manager and the Cloud Authentication Service.
Users can use single sign-on (SSO) to access web applications protected by the Cloud Authentication Service
RSA Authentication Manager 8.2 supports the following:
Authentication Manager 8.2 users who are in an RSA SecurID Access trusted realm can authenticate to the Cloud Authentication Service. Offline authentication is not supported because offline authentication data cannot be generated.
Users who are using both SecurID and Authenticate Tokencode must be configured with different database attributes for each form of authentication. For example, you can use the SAMAccountName attribute for SecurID authentication and an e-mail attribute for the Authenticate Tokencode. In this case, users can use both SecurID and Authenticate Tokencode if they remember to use the correct username or e-mail address required to access each protected resource.
After you configure and test a minimal deployment with one identity router that receives authentication requests from agents, consider how you want to configure high availability. High availability increases the likelihood that an identity router will be available to process authentication requests when one or more identity routers in the same cluster are down. It also improves performance by ensuring that requests are distributed evenly among identity routers. Choose one of the following configuration methods:
High availability with host lookup is configured after you follow the steps provided in Step 3: Configure RSA Authentication Manager. You register all identity router addresses in a cluster to a single hostname in the network host file and add this hostname to the Access URL field of the RSA SecurID Authenticate app configuration in Authentication Manager. When Authentication Manager attempts to connect to this URL, it looks up the hostname, resolves all IP addresses bound to this host, and uses round-robin to select an address to connect to an identity router.
This method is less expensive to implement than load balancing, but is also less efficient and may result in the identity router trying to contact an identity router that is offline.
To test availability, stop an identity router while allowing users to authenticate to the cluster. View the audit logs to see which identity routers are handling authentication.
You can configure a load balancer to accept authentication requests and redirect them to the IP address of an active identity router based on the selected load balance logic. The network interface for the load balancer must be on the same network as the identity router interface. For on-premises identity routers, configure the load balancer to connect to the management interface.
Load balancers provide you with more control than host lookup. Local and global load balancers can take into account the geographic location and activity status of the identity routers when they redirect requests.
For more information about load balancing in Cloud Authentication Service deployments, see Load Balancer Requirements.
Before you begin
This procedure involves Super Admins for the Cloud Administration Console and the Authentication Manager Operations Console.
Procedure
See Step 3: Configure RSA Authentication Manager and perform the appropriate steps for your deployment.
Note: When you Configure RSA Authentication Manager to Accept Authenticate Tokencodes, specify the hostname and load balancer port instead of the logical hostname in the Access URL field. Also, if the load balancer hostname is not registered in the DNS server, add only the load balancer hostname and IP address to the Authentication Manager network hosts file. Do not associate the identity router IP addresses to this hostname.
Open the load balancer configuration file. Add the management IP addresses of the identity routers to which Authentication Manager will connect. Choose the logic you want the load balancer to use for selecting identity routers.
After you finish
To test the availability of your identity routers, stop an identity router while allowing users to authenticate to the cluster. View the audit logs to see which identity routers are handling authentication.
Table of Contents > Enable RSA SecurID Authenticate App Users to Access Resources Protected by RSA Authentication Manager