Follow the instruction steps in this section to apply your SSO Agent or Relying Party to Cisco ISE My Device Portal. To configure SAML, refer to the My Device Portal SAML Configuration.
Before you begin
Configure the integration type that your use case will employ. Refer to the Integration Configuration Summary section for more information.
To configure RADIUS with Authentication Manager, use this link, to configure RADIUS with RSA Cloud Authentication Service, use this link, and to configure the Authentication Agent, use this link.
Procedure
Note: My Devices Portal does not support multi-step authentications required by RSA SecurID and RADIUS external identity sources. If a user authenticates in new PIN or next OTP mode, they will fail authentication. Cisco is tracking this as an enhancement with bug id: CSCvd90254. For Integration with SAML, kindly refer My Device SAML Configuration section.
- Sign into Cisco ISE Admin GUI, browse to Work Centers > BYOD > Portals & Components > My Devices Portals and click to configure your My Devices Portal.
- Click to expand the Portal Settings menu.
- In the Authentication method choose your method (RADIUS or Authentication Agent) and click Save.
Configuration is complete.
Return to main page.
Related Articles
Cisco ISE 3.2 - Admin Access Configuration - RSA Ready Implementation Guide 30Number of Views Cisco ISE 3.2 - Guest Access Portal Configuration - RSA Ready Implementation Guide 16Number of Views Cisco ISE 3.2 - Login Screenshots - RSA Ready Implementation Guide 53Number of Views Cisco ISE 3.4 - Policy Sets Configuration - RSA Ready Implementation Guide 42Number of Views Cisco ISE 3.2 - Guest Portal Configuration - RSA Ready Implementation Guide 14Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x