Test Access to Cloud Access Service
RSA maintains two Cloud Access Service (CAS) environments. When one environment becomes unavailable for any reason, your deployment automatically switches to the other environment. RSA recommends that you test access to both environments before it is needed to ensure a smooth transition during unexpected downtime.
After your deployment is switched to another environment, the following events occur:
Authentication services and the Cloud Administration Console are restored as quickly as possible.
Domain Name Services (DNS) redirects the Cloud Administration Console and your identity routers to the new URLs for your deployment (for example, US). Make sure to whitelist the base authentication and access domain names if you are using DNS firewall rules so that identity routers can connect to the Cloud using the region-specific domain names.
A message is posted to the RSA SecurID Access status page with details about the event.
Before you begin
Confirm that your firewall rules allow access to both IP addresses for your deployment.
If your company uses URL filtering, be sure that both IP addresses for your deployment are whitelisted.
Procedure
To test access for your identity routers, on an identity router, do the following:
Enable SSH on an identity router. For instructions, see Access SSH for Identity Router Troubleshooting.
To test the connectivity using the IP address, enter the following:
openssl s_client -connect 52.160.192.135:443
52.160.192.135 is an IP address for the uswest region of the US deployment. Enter an IP address for your deployment.
To test the connectivity with region-specific domain names, you can use the following example authentication domain name:
openssl s_client -connect tenantName-idr-useast.auth.securid.com:443
This domain name is for the useast region of the US deployment. Enter the domain name for your deployment.
Note: You can obtain the tenantName from the Cloud Administration Console.
You receive information back about the certificate chain and other details. If you are unable to reach the environment, the command eventually times out and you see SSL-related error messages.
- Repeat this for one identity router in each data center (or different firewall settings) in your deployment.
To test access for your internal users, on an internal machine, do the following:
Enter the following in a browser: https://52.160.192.135
52.160.192.135 is an IP address for the US deployment. Enter an IP address for your deployment.
You will see an error that the site is insecure. This is expected for the test.
View details about the connection and confirm that *auth.securid.com is included in the certification path.
For example, on Google Chrome, click the Not secure warning in the address bar. Then click the certificate and confirm that it is issued to *auth.securid.com.
- Repeat this for one internal machine in each data center (or different firewall settings) in your deployment.
If you are unable to access one of the environments, confirm that you have the correct firewall and whitelist settings. For more information, see the "Connectivity Requirements" section in your Quick Setup Guide. To download a Quick Setup Guide that is appropriate for your deployment, see Cloud Access Service Planning and Configuration.
Related Articles
Session Lifetime Limits 45Number of Views Edit an Authentication Agent 32Number of Views Update System Date and Time Settings 74Number of Views Configure Critical System Event Notification 142Number of Views Cloud Administration Delete User Now API 157Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x