Cloud Access Service POC Quick Setup Guide - Step 1: Plan
There are a few things you need to plan to deploy your system.
What You Need to Have
| Item | Description |
|---|---|
| Sign-in credentials to the Cloud Administration Console | Sign-in credentials are emailed to you after you request an environment from RSA Sales or your partner or complete the trial form. Be sure that the email address that you provide to RSA is for a real user in your Active Directory and not, for example, a group alias or general account. Be sure that the email address that you provide to RSA is for a real user in your LDAP directory and not, for example, a group alias or general account. For browser requirements, see Supported Browsers for the Cloud Administration Console. |
Virtual appliance infrastructure Required only for identity router deployment on-premises in a VMware or Hyper-V environment | Hardware requirements for image file:
For additional guidance, see Network Interface Requirements and Recommendations. VMware software requirements:
Software requirements:
|
Amazon Web Services (AWS) account Required only for identity router deployment in an Amazon Web Services cloud environment Note: To deploy an identity router in the Amazon cloud, you must be familiar with the following concepts as they relate to AWS: | Amazon Virtual Server Instance hardware requirements:
AWS cloud environment requirements:
|
Microsoft Active Directory 2008 or 2012 Microsoft Active Directory 2008 or 2012 or LDAPv3 directory server | Create a group of a limited number of users (for example, RSA Test Group) to synch and test with. |
| SSL/TLS certificate from your LDAP directory server | Used for an encrypted connection (LDAPS) to your directory server. Download the SSL/TLS certificate from your directory server. If your directory server does not have a certificate, install one. |
SSO Agent only: Private key, public certificate, and certificate chain for SSL protection for the RSA Application Portal |
|
SSO Agent only: Load balancer | Supported load balancers:
|
| A mobile device or Windows PC |
|
What You Need to Know
RSA uses a hybrid architecture that consists of two components:
Cloud Access Service (CAS) is a cloud service that provides an easy-to-use Cloud Administration Console and powerful identity assurance engine.
The identity router is an on-premises virtual appliance that securely connects your on-premises resources, such as Active Directory, to CAS. This VM has two network interfaces. Place one interface in a public-facing network and the other in a private network where it can reach your Active Directory.
The identity router is a virtual appliance that securely connects your on-premises resources, such as Active Directory, to CAS. You can deploy the identity router in your on-premises VMware or Hyper-V environment, or in the Amazon Web Services (AWS) cloud.
Note: After an identity router is registered in a deployment, it cannot be reused in another deployment. For example, suppose you registered an identity router with Company A for a trial deployment, and you want to use the same identity router with Company A in a production deployment. You must add a new identity router (virtual machine) to the production deployment.
Planning Network Interfaces for the Identity Router
Relying party deployments support both standalone and embedded identity routers. For details on planning network interfaces, see Identity Router Network Interfaces and Default Ports.
RADIUS services are available in standalone identity routers that are deployed with one or two network interfaces. If the identity router is deployed with two network interfaces, the RADIUS service listens on the management interface. For details on planning network interfaces, see Identity Router Network Interfaces and Default Ports.
SSO Agent deployments require a standalone identity router. The identity router can be deployed with with one or two network interfaces. If the identity router is deployed with two network interfaces, the SSO agent will be available from the portal interface. For details on planning network interfaces, see Identity Router Network Interfaces and Default Ports.
In all deployments with AWS, the identity router has one network interface to which you assign public and private IP addresses and connect other network resources from the internet or your private network.
Planning Worksheet
Add your values to the following worksheet. You will use this information in the next section and during setup.
Item | Your Values |
|---|---|
Cloud Administration Console and CAS |
The following are example URLs using the region-specific domain names: US deployment tenantName-idr-useast.auth.securid.com tenantName-idr-useast.access.securid.com ANZ deployment tenantName-idr-auc.auth-anz.securid.com tenantName-idr-auc.access-anz.securid.com EMEA deployment tenantName-idr-euwest.auth-eu.securid.com tenantName-idr-euwest.access-eu.securid.com Federal deployment tenantName-idr-govva.auth.securidgov.com tenantName-idr-govva.access.securidgov.com India deployment tenantName-idr-inc.auth-in.securid.com tenantName-idr-inc.access-in.securid.com Japan deployment tenantName-idr-jpe.auth-jp.securid.com tenantName-idr-jpe.access-jp.securid.com Canada deployment tenantName-idr-cac.auth-ca.securid.com tenantName-idr-cac.access-ca.securid.com tenantName-idr-cae.auth-ca.securid.com tenantName-idr-cae.access-ca.securid.com Singapore deployment tenantName-idr-sea.auth-sg.securid.com tenantName-idr-sea.access-sg.securid.com tenantName-idr-aue.auth-sg.securid.com tenantName-idr-aue.access-sg.securid.com Make sure to whitelist the wildcard base authentication and access domain names if you are using DNS firewall rules so that identity routers can connect to the Cloud using the region-specific domain names. Your authentication service domain appears in the Cloud Administration Console on the Platform > Identity Router > Registration page when you add an identity router. Note: A set of one or more DNS servers must be configured for each identity router (IDR). The set of DNS server(s) must be able to resolve internal and external domain names, including the securid.com names used by CAS. For instructions on checking the status of your Cloud connections, see View Identity Router Status in the Cloud Administration Console. To test access to the IP addresses, see Test Access to Cloud Access Service |
SSO Agent only: Protected domain name This is a unique subdomain prepended to your registered domain name and is used by all traffic managed by the identity router, for example, sso.example.com. For more information, see Protected Domain Name. |
|
SSO Agent only: Load balancer
| |
Active Directory server LDAP directory server
| |
DNS server IP address DNS servers IP addresses | |
| NTP server IP address | |
| Backups server IP address | |
| Internal user subnet IP address | |
RADIUS only: RADIUS client IP address | |
| Required only for VMware and Hyper-V identity router deployments: | |
Identity router management interface (private, required for all deployments)
| |
Identity router portal interface (public, required for IDR SSO Agent deployments with on-premises identity router)
|
|
| Required only for Amazon Web Services identity router deployments: | |
Identity router
Note: For identity routers in AWS, netmask and gateway information is obtained automatically during instance launch, according to the VPC subnet settings. |
|
AWS environment configuration details
| |
Connectivity Requirements
Replace the values in the table below with your values from the table above. This table identifies the connectivity requirements that you might need to provide to your IT group to update firewall rules. Update your firewall rules before continuing with the next step.
Replace the values in the table below with your values from the table above. This table identifies the connectivity requirements that you might need to provide to your IT group to update firewall rules for your network. If you deploy the identity router in the Amazon cloud, the route tables, security groups, and network ACLs in your AWS environment must also allow these connections. Update your connectivity settings before continuing with the next step.
Source | Destination | Protocol and Port | Purpose |
|---|---|---|---|
0.0.0.0/0
| CAS Both CAS environments Both CAS environments and <Your load balancer public IP address> | TCP 443 TCP 80, 443 | External user access to CAS External user access to CAS, application portal, and applications |
SSO Agent only: <Your internal (corp network) end users>
| Both CAS environments and <Your load balancer private IP address> | TCP 80, 443 | Internal user access to CAS, application portal, and applications |
< Your administrators>
| For on-premises identity routers:
For identity routers in the Amazon cloud: | On-premises (two network interfaces): TCP 443 One network interface or Amazon: TCP 9786 | Identity Router Setup Console |
For on-premises identity routers (one network interface): <Your identity router management interface IP address> For on-premises identity routers (two network interfaces): <Your identity router portal interface IP address> For identity routers in the Amazon cloud: <Your identity router private IP address> | Cloud Administration Console and CAS Cloud Administration Console and both CAS environments Note: If your company uses URL filtering, be sure that *.access.securid.com, *.auth.securid.com, and CAS IP addresses for your region are whitelisted. Note: If your company uses URL filtering, be sure that *.access.securid.com, *.auth.securid.com, and CAS IP addresses for your region are whitelisted. Also, confirm that you can access both environments. For instructions, see Test Access to Cloud Access Service. | TCP 443 | Identity router registration |
For on-premises identity routers (one network interface): <Your identity router management interface IP address> For on-premises identity routers (two network interfaces): <Your identity router portal interface IP address> For identity routers in the Amazon cloud: <Your identity router public IP address> | <Your protected resource> | TCP 443 or custom port | Application integration |
SSO Agent only: <Your load balancer private IP address>
| <Your identity router portal interface IP address> | TCP 80, 443 | Load balancer traffic to pool members |
SSO Agent only: <Your load balancer private IP address>
| <Your identity router management interface IP address> | TCP 443 | Load balancer health check of pool members |
For on-premises identity routers: <Your identity router management interface IP address> For identity routers in the Amazon cloud: <Your identity router private IP address> | <Your Active Directory server IP address> <Your LDAP directory server IP address> | TCP 389 TCP 636 | LDAP directory user authentication and authorization |
For on-premises identity routers: <Your identity router portal interface IP address or identity router management interface IP address> For identity routers in the Amazon cloud: <Your identity router private IP address> | <Your DNS server IP address>
| UDP 53 | DNS |
RADIUS only: <Your RADIUS client IP address>
| For on-premises identity routers: <Your identity router management interface IP address> For identity routers in the Amazon cloud: <Your identity router private IP address> | UDP 1812 | RADIUS |
RADIUS only: <Your RADIUS client IP address>
| For on-premises identity routers: <Your identity router management interface IP address> For identity routers in the Amazon cloud: <Your identity router private IP address> | UDP 1812 | (Optional) RADIUS |
For on-premises identity routers: <Your identity router portal interface IP address or identity router management interface IP address> For identity routers in the Amazon cloud: <Your identity router private IP address> | <Your NTP server IP address> | UDP 123 | Network time server synchronization |
| <Your administrator computer>
| For on-premises identity routers: <Your identity router management interface IP address> For identity routers in the Amazon cloud: <Your identity router private IP address> | TCP 22 | (Optional) SSH for troubleshooting |
Cloud Access Service POC Quick Setup Guide - Step 2: Deploy the Identity Router
Related Articles
Cloud Access Service Quick Setup Guide for RADIUS Clients - Step 1: Plan 80Number of Views Cloud Access Service Quick Setup Guide for My Page SSO - Step 1: Plan 47Number of Views IDR SSO - Step 1: Plan 204Number of Views Cloud Access Service POC Quick Setup Guide - Step 6: Test 37Number of Views Cloud Access Service POC Quick Setup Guide - Step 5: Protect the Cloud Administration Console 42Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Release Notes for RSA Authentication Manager 8.8 RSA announces End of Life EOL dates for RSA MyAccessLive Service RSA Authentication Manager 8.9 Administrator's Guide