Deploying RSA Authenticator 6.2.4 for Windows Using DISM
Users can directly install the latest RSA Authenticator for Windows app from the Microsoft Store. However, if users cannot access the Microsoft Store, the administrator can use the Deployment Image Servicing and Management (DISM) command to deploy the app using the command-line tool. After the app is deployed, users can then add credentials to the RSA Authenticator app.
single computer or multiple computers:
Deploy the App on a Single Computer
Before you begin
Download RSA_Authenticator_6.2.4_Microsoft_Windows_Kit.zip from RSA Community.
Extract RSA_Authenticator_6.2.4_Microsoft_Windows_Kit.zip to a folder on the computer.
From the Windows Start menu, go to Command Prompt, right-click it and then select Run as administrator.
Navigate to the directory that contains the extracted files. Otherwise, you must provide the full path name to the directory on the command line.
Enter the following command on a single line. If you copy and paste the command, remove any line breaks that may appear.
DISM /Online /Add-ProvisionedAppxPackage /PackagePath:ea4d0189352d400ba62b3ed4ca040e4f.msixbundle /DependencyPackagePath:Microsoft.NET.Native.Framework.2.2_2.2.29512.0_x64__8wekyb3d8bbwe.appx /DependencyPackagePath:Microsoft.NET.Native.Runtime.2.2_2.2.28604.0_x64__8wekyb3d8bbwe.appx /DependencyPackagePath:Microsoft.VCLibs.140.00_14.0.33519.0_x64__8wekyb3d8bbwe.appx /LicensePath=ea4d0189352d400ba62b3ed4ca040e4f_License1.xml
Deploy the App on Multiple Computers
Before you begin
Download RSA_Authenticator_6.2.4_Microsoft_Windows_Kit.zip from RSA Community.
Procedure
Extract RSA_Authenticator_6.2.4_Microsoft_Windows_Kit.zip to a folder that is accessible to all computers where the app will be deployed, for example, a network share.
Using your preferred method to execute Windows commands on remote computers, enter the following command on a single line as an administrator. If you copy and paste the commands, remove any line breaks that appear.
DISM /Online /Add-ProvisionedAppxPackage /PackagePath:ea4d0189352d400ba62b3ed4ca040e4f.msixbundle /DependencyPackagePath:Microsoft.NET.Native.Framework.2.2_2.2.29512.0_x64__8wekyb3d8bbwe.appx /DependencyPackagePath:Microsoft.NET.Native.Runtime.2.2_2.2.28604.0_x64__8wekyb3d8bbwe.appx /DependencyPackagePath:Microsoft.VCLibs.140.00_14.0.33519.0_x64__8wekyb3d8bbwe.appx /LicensePath=ea4d0189352d400ba62b3ed4ca040e4f_License1.xml
Uninstall RSA Authenticator from the Machine
Run Powershell as an Administrator.
Run the Get-AppxProvisionedPackage –online command to get the list of apps installed.
From the apps list, search for RSASecurityLLC.RSASecurIDAuthenticate in the Display Name.
Copy the PackageName of RSASecurityLLC.RSASecurIDAuthenticate and use it in Step 5.
To remove RSA Authenticator for all users, run the following command:
Remove-AppxProvisionedPackage -PackageName <PackageName> -Online –AllUsers
Note: In the remove command above, replace <PackageName> with package name from Step 4.
Other Downloads:
Download the GPO Template Guide and Device Definition file from RSA Community.
Related Articles
View Administrative Roles 24Number of Views RSA SecurID 4.0 App Administrator Guide 35Number of Views Forescout 8.0 - RADIUSwith CAS Configuration - RSA Ready SecurID Access Implementation Guide 4Number of Views Multiple entitlements in RSA Identity Governance and Lifecycle cause supervisor approval to fail with ORA-22275: invalid L… 95Number of Views Is is possible to format and reuse nCipher Smart Cards? 5Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Release Notes: Cloud Access Service and RSA Authenticators RSA Authentication Manager 8.9 Release Notes (January 2026) An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Release Notes for RSA Authentication Manager 8.8