I am doing self-testing for RSA SecurID Access via Radius. Everything works fine between VPN service and RSA SecurID Access on cloud. However, when i want on-premises Authentication Manager to authenticate VPN service with RSA SecurID Authenticate, I cannot input the Access Key retrieved from the Cloud Administration Console with the following error.
The Access Key retrieved from Cloud Administration Console - API key management is too long..
<removed screen shot>
Are my steps correct?
Thanks
Refer to this page and see where 'Access Keys' are generated for integration to Auth Manager
Enable RSA Authenticate App Users to Access Resources Protected by RSA Authentication Manager
RE:
In the Enable Identity Router API field, select the checkbox to enable access to the identity router API.
After you select the checkbox, RSA SecurID Access generates values in the Access ID and Access Key fields. Copy these values to a secure location. You will need to provide them to the RSA Authentication Manager administrator who is integrating the Cloud Authentication Service.
Note: The Access ID and Access Key are sensitive data. Store these values securely, and share them only with other Super Admins.
The access key will look similar this example: e3rz6f3964itiki6is751ypy7hpf55539nb6qw815n7oj3p52q6jo55uiycr3a55