Expiring Today—Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

RSA two factor authentication with sid700

Posted on 2011-02-15
1
Medium Priority
?
957 Views
Last Modified: 2012-05-11
Hi Experts,

My company is using the AD 2003 and Citrix remote access infrastructure(CAG, AAC etc)
We currently use Safeword authentication for Citrix remote access.

Now, we are planning to move away from Safeword in favour of RSA two factor authentication using sid700 key fob.

My question is what changes will I need to make in the AD and Citrix (CAG and AAC) to accomplish this.

Do I need to install a software on Domain Controllers? which one?
Do I need to install some software on Citrix CAG/AAC? which one?

I really appreciate any input as I am so new to Citrix.

Thanks Experts
0
Comment
Question by:sherrysidhu
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 21

Accepted Solution

by:
snusgubben earned 2000 total points
ID: 34906422
I can't give you a complete solution, but maybe some hints.

You don't have to install anything on the DCs.

You need to reconfigure CAG to use RSA SecureID instead of Safeword. RSA SecurID is pre-supported so there is no need to install anything on the CAG.

cag

If you have a Web Interface server you also need to change from Safeword to RSA.

 wi
0

Featured Post

Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question