Solved

Can a single RSA keyfob be used in different server DBs? (M&A related)

Posted on 2010-11-29
3
504 Views
Last Modified: 2012-05-10
Company1 was recently acquired by Company2.  Company1 uses RSA keyfobs, and so does Company2.  Until they are fully integrated, a need exists for Company1 users to access certain systems at Company2.  

Here is the question:  Can the keyfobs that are in use at Company1 be used /added to the RSA Server at Company2 so the users dont need to carry multiple keyfobs?

Thanks!  
0
Comment
Question by:ceaexperts
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 5

Accepted Solution

by:
tygrus2 earned 500 total points
ID: 34247076
We've had tokens connect to two Authentication servers at work. The old 5.3 and then the new 7.1 because the Authentication agent was late at being migrated (change the RSA server, need to change the agent which changes the version of Apache which changes the version of RedHat Linux and the version of PHP). Someone turned off the old RSA server without telling anyone in our unit, we had to get them to turn the old server on again.

You have to migrate or duplicate information onto the other Authentication server.
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 34690236
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

Surfing Is Meant To Be Done Outdoors

Featuring its rugged IP67 compliant exterior and delivering broad, fast, and reliable Wi-Fi coverage, the AP322 is the ideal solution for the outdoors. Manage this AP with either a Firebox as a gateway controller, or with the Wi-Fi Cloud for an expanded set of management features

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question