Setting up Two-Factor Authentication with RSA SecurID9 minutes to read
You can set up Two-Factor Authentication (TFA) with RSA SecurID in Password Manager Pro if you have RSA Authentication Manager and RSA SecurID Appliance in your environment. This will help you leverage RSA SecurID's authentication factor as the second layer of security for your login. Following are the steps to set up Two-Factor Authentication with RSA SecurID in Password Manager Pro:
1. Configuring Two-Factor Authentication in Password Manager Pro
2. Integrating RSA SecurID with Password Manager ProYou can integrate RSA SecurID with Password Manager Pro by following the below steps:
Mapping Password Manager Pro users to RSA Authentication Manager:Before the second factor authentication can take place, use the RSA Security Console to enter all desired Password Manager Pro users into RSA Authentication Manager, assign tokens to them and activate them on the appropriate Agent Host. Ensure that the user name in RSA Authentication Manager and the corresponding user name in Password Manager Pro are the same. For an already existing RSA user, in case there is a user name mismatch between Password Manager Pro and RSA Authentication Manager, you can map the correct user name in Password Manager Pro by editing the user properties in Password Manager Pro. The following sequence describes the authentication process between Password Manager Pro and RSA SecurID:
3. Enforcing Two-Factor Authentication for Required Users
4. Connecting to Password Manager Pro Web Interface When TFA is EnabledThe users who have Two-Factor Authentication enabled for their accounts will have to authenticate twice successively during login. As mentioned above, the first level of authentication will be through Password Manager Pro's local authentication or AD/LDAP authentication. Depending on the type of TFA chosen by the administrator, the second level of authentication will differ as explained below:
4.1 Three different scenarios possible while logging into Password Manager Pro using RSA SecurIDCase 1: Entering user generated / system created PINAs mentioned above, the RSA passcode could be a combination of PIN and tokencode or just tokencode alone or a password depending on the configuration done in RSA Authentication Manager. If the settings in RSA Security Console demands the users to create a PIN on their own or use a system generated PIN, the following options would be shown to the users after step 2 (that is, after entering the first password and RSA tokencode to log in to Password Manager Pro). User Created PIN: In the case of user created PIN, users will get the option to enter the PIN on their own. The PIN should contain numeric characters - minimum of 4 and a maximum of 8 characters. After entering the PIN, the user will have to wait for a while until the RSA tokencode changes to a new value. Then, in the next screen, enter the new PIN and the RSA tokencode to authenticate. System Created PIN: In the case of system created PIN, Password Manager Pro itself will randomly generate a PIN and it will be shown on the screen. Users will have to note down the new PIN and wait for a while until the RSA tokencode changes to a new value. Then, in the next screen, the users will have to enter the new PIN as generated by the system and the RSA tokencode to authenticate. Case 2: New Tokencode ModeIf a user attempts to log in to Password Manager Pro using a random RSA passcode or by guesswork for a specified number of times, the RSA Authentication Manager will turn the screen to the New Tokencode mode to verify whether the user possesses the token. In that case, Password Manager Pro prompts for next tokencode during the login. That means, the user will have to wait until the RSA device shows a new tokencode and the new code to proceed with logging into Password Manager Pro. Note: If the new tokencode entered by the user is wrong, Password Manager Pro will revert to the initial login screen. Users will have to start again by entering the username. Case 3: Tokencode ModeWhen RSA On-Demand authenticator is configured, you need to supply the Tokencode to log in to Password Manager Pro. Tokencode will be sent to the registered email id or mobile number as configured in the RSA On-Demand authentication system. If you have configured High Availability Whenever you enable TFA or when you change the TFA service type, you need to restart the Password Manager Pro secondary server once for it to take effect. ©2025, ZOHO Corp. All Rights Reserved. | |