Solved

RSA security guide..

Posted on 2008-11-02
10
477 Views
Last Modified: 2013-11-08
Hi,
I am a new boy to RSA security system...
is there any guide or step by step information about this system and how to deal with it.

Br.
0
Comment
Question by:besmile4ever
  • 5
  • 4
10 Comments
 

Author Comment

by:besmile4ever
ID: 22865110
No commnets..
0
 
LVL 19

Expert Comment

by:CoccoBill
ID: 22866558
RSA the crypto algorithm or RSA the software vendor? Which "system" do you mean?
0
 
LVL 18

Expert Comment

by:Graphixer
ID: 22874509
RSA (the company) is well known as the maker of RSA SecurID two-factor authenticator tokens.  The tokens essentially act as a second password you can use to access web sites and VPNs.  You use one password that you know (like a PIN) and one from the token device.

Let me know what you're trying to do and I can try to point you to the right place.  I'm a former RSA employee, familiar with the tokens and the crypto algorihtm.
0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 

Author Comment

by:besmile4ever
ID: 22911729
Thnx to u all..
Now I want to implement it on one of our windows server..how to start and how to allow a test user to be implemented in a right way?
0
 
LVL 18

Expert Comment

by:Graphixer
ID: 22913131
Implement what?  An SSL certificate?  A SecurID token?  Please be specific about what you're trying to do.
0
 

Author Comment

by:besmile4ever
ID: 22915173
yep  A SecurID token?
0
 
LVL 18

Expert Comment

by:Graphixer
ID: 22915253
In addition to an RSA SecurID token, you would also need the RSA Authentication Manager installed on your system.  This is the software that authenticates the token code and PIN on the server side.

Details about RSA Authentication Manger are here:
http://www.rsa.com/node.aspx?id=1166

This page has a free trial offer where RSA will send you a physical token and the Authenticaiton Manager software.

If you're simply looking for a presentation on how the tokens work, try the RSA SecurID flash demo here:
http://www.rsa.com/node.aspx?id=1159

I'm not sure what their pricing is these days, and what the minimum purchase pack is.  They typically deal with hundreds or thousands of tokens per order rather than just one or a few, but Amazon sells SecurID tokens in packs of as few as 5, though I'm not sure if those come with the Authentication Manager.

Does this answer your question?
0
 

Author Comment

by:besmile4ever
ID: 22919312
Thnx Graphixer..
What i need is the steps to start implementing the tokens.
br.
0
 
LVL 18

Accepted Solution

by:
Graphixer earned 500 total points
ID: 22919596
Do you already have tokens?  Do you have the Authentication Manager software?  Have you purchased these items from RSA, through a reseller or other third party, or acquired them in some other manner?  Are you trying to activate one token, or are you shipping them to employees / customers / clients, etc.?  I need more information and not just one-line answers.

Any purchase arrangement would have included some basic instructions, and the Authentication Manager would certainly have a manual.  Do you not have those?  Tokens are generally set to expire after three or four years, so even if you have a functioning token, it may be worthless if it's older than that.

A quick Google search for 'rsa authentication manager installation' yielded this install guide:
http://theether.net/download/RSA/SecurID/6.1/authmgr_install_windows.pdf

Does this help?
0
 
LVL 18

Expert Comment

by:Graphixer
ID: 22919739
Maybe this will help?

Why and how to implement SecurID Authentication
http://www.windowsecurity.com/articles/Why-how-implement-SecurID-Authentication.html
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Adoption of Microsoft’s Enterprise Mobility and Security solution and Office 365 will re-order the File Sync and Share market Microsoft has stated that its Enterprise Mobility + Security (EMS) is the fastest growing product in the history of the …
Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
The Bounty Board allows you to request an article or video on any technical topic, or fulfill a bounty request to earn points. Watch this video to learn how to use the Bounty Board to get the content you want, earn points, and browse submitted bount…
Where to go on the main page to find the job listings. How to apply to a job that you are interested in from the list that is featured on our Careers page.

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now