![]() There are no specific parameters required for the SecurID authentication method. For additional information on agent configuration, refer to ACE/server documentation. ![]() The gateway or the Security Management Server act as an ACE/Agent 5.0 and direct all access requests to the RSA ACE/server for authentication. ![]() ACE manages the database of RSA users and their assigned hard or soft tokens. ![]() For administrators, it is the Security Management Server that forwards the requests. Using SecurID, the Security Gateway forwards authentication requests by remote users to the ACE/server. When a user attempts to authenticate to a protected resource, the one-time use code must be validated by the ACE/server. All tokens generate a random, one-time use access code that changes approximately every minute. ![]() Hardware tokens are key-ring or credit card-sized devices, while software tokens reside on the PC or device from which the user wants to authenticate. Token authenticators generate one-time passwords that are synchronized to an RSA ACE/server and may come in the form of hardware or software. SecurID requires users to both possess a token authenticator and to supply a PIN or password. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |