Announcements

SecurID® Discussions

Browse the SecurID discussion board to get product help and collaborate with other SecurID users.
NathanielHall
Beginner
Beginner

Do I need to use a hardware token as a seed for the other tokens in my deployment?

Submitting a support ticket on behalf of a team member:

"Basically I want to ask RSA if I need to use a hardware token as a seed for the other tokens in my deployment or if the seed that comes with the software for the hardware tokens is all that is needed. If I need to use a hardware token as a seed, then I need to know what the procedure is to do that."

Any direction you can provide would be greatly appreciated.

0 Likes
2 Replies
_EricaChalfin
Employee (Retired) Employee (Retired)
Employee (Retired)

Nathaniel Hall‌,

 

Users who you want to challenge for authentication need tokens. These can be hardware tokens. software tokens or on-demand tokens delivered via SMS or email.  Such tokens can be purchased directly from RSA or from your reseller.

 

  1. Once you have received the token seed records you Import a Token Record File into the Authentication Manager primary.  
  2. Next, if you re using software tokens, create one or more Software Token Profiles, for the different devices and/or delivery methods.
  3. Once the tokens are installed in the database, you would Assign Tokens to Users.
  4. If you assigned a hardware token, follow the steps on how to Distribute a Hardware Token.
  5. If you assigned a software token, follow the recommended steps on Software Token Distribution.
  6. Before importing their software token seeds on their devices, users with software tokens would download the RSA SecurID Software Token application for their device from the respective application store, such as Apple's iTunes, Google Play or BlackBerry World.  
  7. Once the user receives the software token file or download string, she imports it onto her device
  8. Now, with either a hardware token or software token, our user tries to login to the corporate VPN or to a web site and provides her user name and tokencode displayed on the token or in the app.  This starts the New PIN process where the user created her PIN and then authenticates with it.
  9. A successful authentication is shown below.

 

cisco 1.png

 

 

cisco 2.png

Please let me know if this answers your questions or if you need more information.

 

Regards,

Erica

0 Likes
_EricaChalfin
Employee (Retired) Employee (Retired)
Employee (Retired)

tfjwryrjbogosc9uogxrg1si4hkw9po4bp3wc3odzlm=‌,

 

Please let me know if you have any further questions on this.

 

Regards,

Erica

0 Likes