If you have completed What You Get With the Trial and optionally Step 2: Test with Your Users and Your SAML or RADIUS Applications, and still want to do more with the trial, do the following:
To do more with the trial, you need to deploy an identity router. The identity router is a virtual appliance that securely connects your on-premises resources, such as Active Directory, to the Cloud Authentication Service.When you deploy an identity router, you initially select a deployment type that is based on the type of applications that you want to protect.
Select the deployment type from the table below.
What You Want to Protect | Deployment Type |
---|---|
RADIUS clients such as VPNs in environments that do not support outbound RADIUS communication | RADIUS |
SAML applications and third-party SSO solutions | Relying Party |
SAML, HTTP Federation Proxy, or Trusted Headers applications and RSA SecurID Access single sign-on for all applications | SSO Agent |
There are a few things you need to plan to deploy an identity router in your environment.
Item | Description |
---|---|
Virtual appliance infrastructure | Hardware requirements:
Software requirements:
|
Microsoft Active Directory 2008 or 2012 or LDAPv3 directory server | Create a group of a limited number of users (for example, RSA SecurID Access Test Group) to synch and test with. |
SSO Agent only: Private key, public certificate, and certificate chain for SSL protection for the RSA SecurID Access Application Portal |
|
A mobile device or Windows PC |
|
RSA SecurID Access uses a hybrid architecture that consists of two components:
The identity router is a virtual appliance that securely connects your on-premises resources, such as Active Directory, to the Cloud Authentication Service. You can deploy the identity router in your on-premises VMware or Hyper-V environment, or in the Amazon Web Services (AWS) cloud.
In RADIUS and relying party deployments with VMware or Hyper-V, the identity router has one network interface. Place this interface in a private network where it can reach your LDAP directory. For more information about configuring your system to use these interfaces, see https://community.rsa.com/docs/DOC-54091.
In SSO Agent deployments with VMware or Hyper-V, the identity router has two network interfaces. Place one interface in a public-facing network and the other in a private network where it can reach your LDAP directory.
In all deployments with AWS, the identity router has one network interface to which you assign public and private IP addresses and connect other network resources from the internet or your private network.
Additional information is available in the Planning Guide.
Add your values to the following worksheet. You will use this information in the next section and during setup.
Item | Your Values |
---|---|
Cloud Administration Console and Cloud Authentication Service | Current values:
Your authentication service domain appears in the Cloud Administration Console on the Platform > Identity Router > Registration page when you add an identity router. |
SSO Agent only: Protected domain name This is a unique subdomain prepended to your registered domain name and is used by all traffic managed by the identity router, for example, sso.example.com. For more information, see https://community.rsa.com/docs/DOC-79572. |
|
LDAP directory server
| |
DNS servers IP addresses For DNS configuration requirements, see https://community.rsa.com/docs/DOC-54152. | |
NTP server IP address | |
Backups server IP address | |
Internal user subnet IP address | |
RADIUS only: RADIUS client IP address | |
Required only for VMware and Hyper-V identity router deployments: | |
Identity router management interface (private, required for all deployments)
| |
Identity router proxy interface (public, required for SSO Agent deployments with on-premises identity router)
|
|
Required only for Amazon Web Services identity router deployments: | |
Identity router
Note: For identity routers in AWS, netmask and gateway information is obtained automatically during instance launch, according to the VPC subnet settings. |
|
AWS environment configuration details
|
Replace the values in the table below with your values from the worksheet above. This table identifies the connectivity requirements that you might need to provide to your IT group to update firewall rules for your network. If you deploy the identity router in the Amazon cloud, the route tables, security groups, and network ACLs in your AWS environment must also allow these connections. Update your connectivity settings before continuing with the next step.
Source | Destination | Protocol and Port | Purpose |
---|---|---|---|
0.0.0.0/0
| Cloud Authentication Service | TCP 443 TCP 80, 443 | External user access to Cloud Authentication Service, application portal, and applications |
SSO Agent only: <Your internal (corp network) end users>
| Both Cloud Authentication Service environments | TCP 80, 443 | Internal user access to Cloud Authentication Service, application portal, and applications |
< Your administrators>
| For on-premises identity routers: For identity routers in the Amazon cloud: | On-premises (two network interfaces): TCP 443 One network interface or Amazon: TCP 9786 | Identity Router Setup Console |
For on-premises identity routers (one network interface): <Your identity router management interface IP address> For on-premises identity routers (two network interfaces): <Your identity router proxy interface IP address> For identity routers in the Amazon cloud: <Your identity router private IP address> | Cloud Administration Console and Cloud Authentication Service Cloud Administration Console and both Cloud Authentication Service environments Note: If your company uses URL filtering, be sure that *.access.securid.com, *.auth.securid.com, and the Cloud Authentication Service IP addresses for your region are whitelisted. | TCP 443 | Identity router registration |
For on-premises identity routers (one network interface): <Your identity router management interface IP address> For on-premises identity routers (two network interfaces): <Your identity router proxy interface IP address> For identity routers in the Amazon cloud: <Your identity router public IP address> | <Your protected resource> | TCP 443 or custom port | Application integration |
For on-premises identity routers: <Your identity router management interface IP address> For identity routers in the Amazon cloud: <Your identity router private IP address> | <Your LDAP directory server IP address> | TCP 389 TCP 636 | LDAP directory user authentication and authorization |
For on-premises identity routers: <Your identity router proxy interface IP address or identity router management interface IP address> For identity routers in the Amazon cloud: <Your identity router private IP address> | <Your DNS server IP address>
| UDP 53 | DNS |
RADIUS only: <Your RADIUS client IP address>
| For on-premises identity routers: <Your identity router management interface IP address> For identity routers in the Amazon cloud: <Your identity router private IP address> | UDP 1812 | RADIUS |
RADIUS only: <Your RADIUS client IP address>
| For on-premises identity routers: <Your identity router management interface IP address> For identity routers in the Amazon cloud: <Your identity router private IP address> | UDP 1812 | (Optional) RADIUS |
For on-premises identity routers: <Your identity router proxy interface IP address or identity router management interface IP address> For identity routers in the Amazon cloud: <Your identity router private IP address> | <Your NTP server IP address> | UDP 123 | Network time server synchronization |
<Your administrator computer>
| For on-premises identity routers: <Your identity router management interface IP address> For identity routers in the Amazon cloud: <Your identity router private IP address> | TCP 22 | (Optional) SSH for troubleshooting For more information, see https://community.rsa.com/docs/DOC-75833. |
We want your feedback! Tell us what you think of this page.