RSA Product/Service Type: Cloud Authentication Service
You need a valid JWT to authenticate Administration API calls made to the RSA Cloud Authentication Service.
Generate an API key
1. Access the Cloud Administration Console
2. Navigate to Platform > API Key Management
3. Under the Administration API Key, click ADD to create a new key
4. Save & Download the key file
Using the Cloud Administration REST API client
1. Download the Cloud Administration REST API client
2. Store the key file obtained in step 4 under <client_home>/rsa-securidaccess-rest-client-sdk-2.7.2/bin
3. Open a Command Prompt window
4. Navigate to SDK bin directory:
cd <client_home>/rsa-securidaccess-rest-client-sdk-2.7.2/bin
5. Run generatetoken command:
rsa-securidaccess-rest-client-sdk -f <keyfile.key added in step 2> -o generatetoken
6. Add the token to your API requests in the Authorization header:
Authorization: Bearer <JWT>
2. All API keys can be created using the Help Desk Administrator role, except for 2 calls where the Super Administrator role should be used to generate the key
a. Add/Remove High-Risk User API
b. Retrieve High-Risk User List API
3. Refer to Using the Cloud Administration APIs for more information
Related Articles
ManageEngine ADSelfService Plus - RSA Ready Implementation Guide 18Number of Views Numeric Token Types in AMIS Calls 2Number of Views Troubleshooting SWIFT Alliance Access with RSA Authentication Manager using RADIUS protocol 48Number of Views AD Search filters 43Number of Views Overview of using the Linux curl command to interact with the Web Services API in RSA Identity Governance & Lifecycle 665Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x