Certified: August 30, 2025
Solution Summary
This article describes the configuration steps involved in utilizing the RSA Device Trust Connector for Microsoft Edge for Business.
Note: This feature is unavailable for FedRAMP customers.
The connector utilizes device signals from Microsoft Edge to ensure that only verified and managed endpoints are granted access to critical applications. By combining strong identity authentication with device posture checks, you enhance security beyond just verifying user identity, advancing Zero Trust maturity without the need for complex configurations.
Organizations want to ensure that only managed and compliant devices—in addition to authenticated users—can access sensitive applications.
Using the RSA Device Trust Connector, Microsoft Edge for Business can interact with RSA to validate device trust and user session context before permitting access to specified URLs or applications.
Configuration Summary
This section contains instruction steps that show how to configure RSA Device Trust Connector for Microsoft Edge for Business on RSA Cloud Access Service (CAS).
This document is not intended to suggest optimum installations or configurations. It is assumed that the reader has both working knowledge of all products involved, and the ability to perform the tasks outlined in this section. Administrators should have access to the product documentation for all products in order to install the required components.
All RSA and Microsoft components must be installed and working prior to the integration.
Configure Microsoft Entra
If RSA provides the App Registration, skip the next section and continue to Set Up RSA Connector in Microsoft Entra. If a custom app registration is required, proceed with the following section.
Create an App Registration in Microsoft Entra
This section describes how to create an app registration in Microsoft Entra. This will be used by CAS to authenticate to the Device Trust API provided by Microsoft Edge for Business.
Follow these steps to configure app registration on Microsoft Entra and assign it the necessary permissions.
Procedure
- Log in to the Microsoft Entra admin center https://entra.microsoft.com/.
- Click App registrations > New registration.
- Provide a name for the application.
- Under Supported Account Types, choose Accounts in this organizational directory only and click Register.
- Navigate to the newly created app registration. Create a new client secret for your application. Take a note of the Value field after the client secret is created, as this will be used later in the RSA configuration.
- In the left pane, under the Manage section, click API permissions > Add permission.
- On the Request API permissions screen, navigate to the APIs my organization uses tab.
- Search for Microsoft Edge management service and choose the resulting row.
- Choose Application permissions and add the DeviceTrust.Read.All permission.
- Once the permission is added, click Grant admin consent.
Set Up RSA Connector in Microsoft Entra
Procedure
- Navigate to Microsoft Admin Center: https://admin.microsoft.com/Adminportal/Home#/Edge/Connectors.
Note: Admins must set up a configuration policy first to assign to any Connector configuration. Follow this article to create a configuration policy. - At the end of the policy setup, apply the policy to a group.
- Once a configuration policy is created, navigate to the connectors page in the Edge Management Service: https://admin.microsoft.com/Adminportal/Home#/Edge/Connectors.
- Under Discover Connectors, locate the RSA Device Trust Connector and select Set up.
- In the Choose policy field, select a policy appropriate for your connector configuration.
- In the URL patterns to allow, one per line field, provide the URL for your configuration.
- In the Enable RSA managed application field, choose whether to Allow RSA to manage on your behalf or manage your own application based on your configuration. If the app registration is managed by RSA, choose Allow RSA to manage on your behalf and ensure that the Application (client ID) field is prefilled with the following ID. If not, add it manually.
Application (client) ID: d21ccd7c-c4fd-41ca-bcac-4960f20041a7 - Click Save configuration to apply your changes.
Configure CAS
Perform these steps to configure the Microsoft Edge for Business connector in RSA and use the managedBrowser attribute in access policies.
Procedure
- Navigate to Access > Managed Browser.
- Enable the configuration by switching the Enabled toggle button on.
- Enter your organization’s Microsoft Entra ID.
If the app registration was not done and provided by RSA:
-
- Choose Non-RSA Managed in the Application Type drop-down list.
- Enter Client ID (ID of the app registration done earlier).
- Enter Client Secret (the client secret of the registered app).
If the app registration was provided by RSA, select RSA Managed in the Application Type drop-down list.
- Click Save.
Create an Authentication Policy Using managedBrowser Attribute
- Navigate to Access > Policies.
- Create a policy with Conditional Access to include the managed browser attribute from RSA Microsoft Edge connector.
Test the User Flow
Launch the Edge browser, sign in with an account that belongs to the tenant and group associated with the configured Edge policy, go to edge://policy, and click Reload Policies. You should see the policy appear in the list of policies.
At this point, the device trust flow should initiate when the end user visits one of the URLs specified in the policy (that is, the RSA Cloud Authentication URL).
RSA Terminology Changes
The following table describes the differences in the terminologies used in the different versions of RSA products and components.
| Previous Version | New Version | Examples/Comments |
| Cloud Authentication Service | Cloud Access Service | |
| Token | OTP Credential | SecurID OTP Credential |
| Authenticator | Hardware Authenticator | |
| Tokencode | OTP | SecurID OTP, SMS OTP, Voice OTP |
| Access Code | Emergency Access Code | |
| SecurID Authenticate app | RSA Authenticator app | RSA Authenticator app for iOS and Android, RSA Authenticator app for Windows |
| Device | Authenticator | Register an authenticator |
| Company ID | Organization ID | |
| Account | Credential | |
| Device Serial Number | Binding ID |
Certification Details
CAS
Microsoft Edge for Business
Known Issues
No known issues.
Related Articles
How to Remove a Scheduled Task on a Log Collector / Virtual Log Collector 7Number of Views Configure Managed Browser 7Number of Views RSA Governance & Lifecycle Recipes: Overview - Business Descriptions 9Number of Views How business source filtering works in an account access and ownership review in RSA Identity Governance & Lifecycle 46Number of Views The Business Source column is missing from Table Options under the MultiApp Account Collector Accounts tab in RSA Identity… 32Number of Views
Trending Articles
How to recover the Application and AFX after an unexpected database failure in RSA Identity Governance & Lifecycle RSA SecurID Software Token 5.0.2 for Windows Desktop displays message after reboot due to roaming profile: No token stor… RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide Downloading RSA Authentication Manager license files or RSA Software token seed records RSA Release Notes for RSA Authentication Manager 8.8