RSA set-up

Posted on 2012-09-05
Last Modified: 2012-09-30
Hi All,

I just installed RSA Authentication Manager 7.1 SP4 on to my RSA server.  I have a data server that has a web application that I need to set-up to be able to use the RSA tokens to authenticate the user who logs on.  My support has run expired.  Could someone help me set this up?

Thank you in advance for your assistance
Question by:Reyesrj
    LVL 33

    Assisted Solution

    by:Dave Howe
    How do you plan to communicate to the RSA? does the webapp have a radius auth module (for example?)
    LVL 23

    Assisted Solution

    by:Ayman Bakr
    if it has RADIUS auth module then thus guide might be of help:

    Author Comment

    Thank you.  I will look at it tomorrow.
    Thanks for quick response.

    Assisted Solution

    Hi All,
    We have a Web server and an RSA server (two different servers).  I was told this will work, I just don’t know how.  I have never touched RSA before.  How will I get the user to authenticate through the RSA server and access the web server?  I’m really confused on how this works and what I need to do.
    Please help.
    LVL 33

    Accepted Solution

    Ok, you have two problems then :)

    The RSA solution allows you to accept a username and "password" which is the token code.
    In order to GET that to the RSA (and get a yes/no back) then most solutions support the authentication method "radius" which is an international standard method designed for this - however, the RSAs also support "SecureID" authentication which is their own, native protocol.

    webservers very very rarely "just authenticate" - normally, the website running on them does that, by prompting for the username and password then validating that before granting admission. This can be by a dozen or more methods, so you will need to see HOW your web app configures authentication and if it supports either of the RSA methods. You may also be able to install one of the RSA "agents" that proxy such requests, for further details look here:!offerings

    Author Closing Comment

    Sorry it took so long to respond.  I finally convinced my suprervisor to buy tech support.

    Thank you both for your efforts.

    Featured Post

    Threat Intelligence Starter Resources

    Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

    Join & Write a Comment

    Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
    Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
    This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
    To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…

    732 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    24 Experts available now in Live!

    Get 1:1 Help Now