?
Solved

Can a single RSA keyfob be used in different server DBs? (M&A related)

Posted on 2010-11-29
3
Medium Priority
?
522 Views
Last Modified: 2012-05-10
Company1 was recently acquired by Company2.  Company1 uses RSA keyfobs, and so does Company2.  Until they are fully integrated, a need exists for Company1 users to access certain systems at Company2.  

Here is the question:  Can the keyfobs that are in use at Company1 be used /added to the RSA Server at Company2 so the users dont need to carry multiple keyfobs?

Thanks!  
0
Comment
Question by:ceaexperts
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 5

Accepted Solution

by:
tygrus2 earned 2000 total points
ID: 34247076
We've had tokens connect to two Authentication servers at work. The old 5.3 and then the new 7.1 because the Authentication agent was late at being migrated (change the RSA server, need to change the agent which changes the version of Apache which changes the version of RedHat Linux and the version of PHP). Someone turned off the old RSA server without telling anyone in our unit, we had to get them to turn the old server on again.

You have to migrate or duplicate information onto the other Authentication server.
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 34690236
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question