RSA SecurID Authentication9 minutes to read
RSA SecurID is considered the most secure authentication system available. Access Manager Plus allows you to setup Two-Factor Authentication if you have RSA Authentication Manager and RSA SecurID Appliance in your environment. RSA SecurID is based on a physical key such as a USB token, smart card, key fob, etc. When a user needs to login, he will provide the username and a unique password which is a combination of PIN and the code that is displayed on the authenticator. Summary of Steps
1. Configuring Two-Factor Authentication in Access Manager Plus
2. Integrating RSA SecurID with Access Manager PlusYou can integrate RSA SecurID with Access Manager Plus by following the below steps:
2.1 Mapping Access Manager Plus users to RSA Authentication Manager
The following sequence describes the authentication process between Access Manager Plus and RSA SecurID:
3. Enforcing Two-Factor Authentication for the Required Users
4. Connecting to Access Manager Plus Web Interface when TFA through RSA SecurID is EnabledThe users who have Two-Factor Authentication enabled for their accounts will have to authenticate twice successively during login. As mentioned above, the first level of authentication will be through Access Manager Plus's local authentication or AD/LDAP authentication. Depending on the type of TFA chosen by the administrator, the second level of authentication will differ as explained below:
4.1 Possible Scenarios while logging into Access Manager Plus using RSA SecurIDCase 1: Entering user generated / system created PINAs mentioned above, the RSA passcode could be a combination of PIN and tokencode or just tokencode alone or a password depending on the configuration done in RSA Authentication Manager. If the settings in RSA Security Console demands the users to create a PIN on their own or use a system generated PIN, the following options would be shown to the users after step 2 (that is, after entering the first password and RSA tokencode to log in to Access Manager Plus). User Created PIN:In the case of user created PIN, users will get the option to enter the PIN on their own. The PIN should contain numeric characters - minimum of 4 and a maximum of 8 characters. After entering the PIN, the user will have to wait for a while until the RSA tokencode changes to a new value. Then, in the next screen, enter the new PIN and the RSA tokencode to authenticate. System Created PIN:In the case of system created PIN, Access Manager Plus itself will randomly generate a PIN and it will be shown on the screen. Users will have to note down the new PIN and wait for a while until the RSA tokencode changes to a new value. Then, in the next screen, the users will have to enter the new PIN as generated by the system and the RSA tokencode to authenticate. Case 2: New Tokencode ModeIf a user attempts to log in to Access Manager Plus using a random RSA passcode or by guesswork for a specified number of times, the RSA Authentication Manager will turn the screen to the New Tokencode mode to verify whether the user possesses the token. In that case, Access Manager Plus prompts for next tokencode during the login. That means, the user will have to wait until the RSA device shows a new tokencode and the new code to proceed with logging into Access Manager Plus.
Case 3: Tokencode ModeWhen RSA On-Demand authenticator is configured, you need to supply the Tokencode to log into Access Manager Plus. Tokencode will be sent to the registered email id or mobile number as configured in the RSA On-Demand authentication system. See also:
©2025, Zoho Corporation Pvt. Ltd. All Rights Reserved. |