- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Do we require public IP with RSA SecurID Access (Identity Router)
Hello,
I am planning to evaluate RSA SecurID Access (SSO Features) for which I am looking for it's NFR Kit. Is this the part number which will fulfill my requirements "VIA-AC-S-NFR" or do I need to buy any other SKU as well.
My second question is that for the demo purposes my company cannot provide me public ip, and we need a url of identity router, to be communicated with the cloud (as this is what I have understood from the documentation). So do we have any alternative for this. Like if I use some Dynamic DNS and perform my evaluation. Will that work?
Please let me know on this.
Thanking You
Zia
- Tags:
- CAS
- Cloud
- Cloud Auth
- Cloud Authentication
- Cloud Authentication Service
- Community Thread
- Discussion
- evaluation
- Forum Thread
- Identity Router
- identity router url
- nfr kit
- RSA SecurID
- RSA SecurID Access
- SaaS
- SecurID
- SecurID Access
- SSO
- trial
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You need to be connected to the internet, which obviously means there must be a public IP address (and outbound NAT) somewhere in the path between your on-premises IDR (private network) and RSA Hosted Tenant (public internet). However you don't need a static public IP address or an inbound NAT/Firewall rule to register to the cloud or otherwise maintain communications to the cloud. As long as the IDR can reach the internet (outbound traffic) on TCP port 443 and UDP port 1194, the IDR will be able to register and maintain a connection to the cloud services even if the outbound NAT address changes. In the event the public IP address changes at the NAT boundary, communications between the IDR and the Hosted Tenant will experience a brief interruption while a new encrypted session is established on UDP 1194 using the certificates exchanged during registration.
All of this presumes you have a persistent on-premises environment where the IDR will be running and able to reach the internet continuously (minor service interruptions notwithstanding). It is not recommended or supported to deploy the IDR into a non-persistent environment as long lived service interruptions will likely prevent the IDR from receiving updates from the cloud and if the IDR fails to receive critical updates it will not longer be able to connect to the RSA hosted service.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello Zia,
VIA-AC-S-NFR is the correct SKU for a SecurID Enterprise Edition NFR.
As long as your test users/browsers are coming from an internal network a public IP address is not required. SAML assertions are passed through the browser between the IDR and the application; there is no direction communication between the application and the IDR. The only time a public IP address is necessary for the IDR is when a user/browser is coming from the internet to obtain a SAML assertion.
Thank you,
-alex
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello Alex,
Thanks for clarifying on the part number.
Regarding the public IP, won't I need it to connect to the RSA SecurID Access Hosted Service on the Cloud?
Regards
Zia
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You need to be connected to the internet, which obviously means there must be a public IP address (and outbound NAT) somewhere in the path between your on-premises IDR (private network) and RSA Hosted Tenant (public internet). However you don't need a static public IP address or an inbound NAT/Firewall rule to register to the cloud or otherwise maintain communications to the cloud. As long as the IDR can reach the internet (outbound traffic) on TCP port 443 and UDP port 1194, the IDR will be able to register and maintain a connection to the cloud services even if the outbound NAT address changes. In the event the public IP address changes at the NAT boundary, communications between the IDR and the Hosted Tenant will experience a brief interruption while a new encrypted session is established on UDP 1194 using the certificates exchanged during registration.
All of this presumes you have a persistent on-premises environment where the IDR will be running and able to reach the internet continuously (minor service interruptions notwithstanding). It is not recommended or supported to deploy the IDR into a non-persistent environment as long lived service interruptions will likely prevent the IDR from receiving updates from the cloud and if the IDR fails to receive critical updates it will not longer be able to connect to the RSA hosted service.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks Alex, I got the response, that I can proceed with the NFR kit.
