SecurID Admin SDK with AM
SailPoint IdentityIQ 8.1 - SecurID Admin SDK with AM Configuration - SecurID Access Implementation Guide
This section describes how to integrate SailPoint IdentityIQ with RSA Authentication Manager using SecurID Authentication API.
Configure RSA Authentication Manager
Prerequisites
You must complete the following prerequisites on your IdentityIQ host to configure RSA Authentication
Manager API security settings. Consult your RSA Authentication Manager Developer’s Guide for version specific instructions.
-
Set the required Java system properties.
-
Set the required system environment settings.
-
Export the root certificate from the RSA Authentication Manager server.
-
Import the server root certificate (Java) the local cacerts keystore.
Procedure
-
Set the command line Client User Name and Password. When you install RSA Authentication Manager, the system creates a user name and password for securing API connections to a command server. Follow the procedure below to obtain the command client user name and password from RSA Authentication Manager.
-
Open a command prompt on your RSA Authentication Manager host, change directories to RSA_AM_HOME/utils and enter the following command: rsautil manage-secrets --action list
-
When prompted, type your Operations Console username and password. (You created the Operations Console username and password when you configured RSA Authentication Manager.) The system will display the list of your internal system passwords.
-
Locate the values for your command client user name and password.
For example:Command Client User Name .................: CmdClient_ys0x7d41
Command Client User Password .............: e9SHbK0W4i
-
-
Create an RSA Authentication Manager Account for Connector Operations.
-
The connector requires an RSA Authentication Manager administrative user account with special permissions in order to perform aggregation and provisioning operations. Refer SailPoint IdentityIQ RSA Authentication Manager Connector guide for relevant permissions.
-
Configure SailPoint IdentityIQ
Perform these steps to configure SailPoint IdentityIQ as an authentication API client to RSA Authentication Manager. You must define each application in your enterprise. Specify the connection properties, relevant attributes, targets and aggregation rules for each application. Follow the steps 2-12 below to create a new application.
Procedure
-
-
For PIN Reset requirements perform the following steps to add a quick link on the dashboard and configure the workflow.
-
Ensure to import the open a command prompt on the IdentityIQ host machine.
-
Navigate to the identityiq web application’s WEB-INF\bin directory.
-
Execute following command to launch the IdentityIQ console iiq console.
-
Execute following command to import the workflow_RSA_PIN_Reset.xml configuration file import workflow_RSA_PIN_Reset.xml
-
-
Login to IdentityIQ as a superadmin user.
-
Select the Define tab and click the Add New Application button.
-
Choose a unique name to identify the application and enter it into the Name field.
-
Enter the name of the application’s owner in the Owner field.
-
Select RSA Authentication Manager – Direct from the Application Type dropdown list.
-
In the Configuration tab enter the information for the following:
-
| Parameter | Value |
|
Host | The RSA Authentication Manager host. |
| Port | The port to use to connect to RSA Authentication Manager. Default: 7002. |
| Administrator | The account that has permission to connect to the RSA Authentication Manager resource remotely. |
| Password | Password of the Administrator account. |
| Command Client User | The command client user name. |
| Command Client Password | Command Client Password corresponding to the Command Client User |
| Realm | Name of the Realm to manage. By default, if the Realm name is not modified you can specify the name as SystemDomain. |
| Identity Source |
Identity Source name linked to the Realm. By default, you can use Internal Database as the Identity Source name if that is the only RSA Authentication Manager you want to manage. Else, it can be any external database that you configured in the RSA. |
| Security Domain | Name of the security domain to manage. |
| Search Subdomain | Whether or not to manage the subdomain, when the parent security domain is specified for Security Domain field |
| Page Size | Limit to fetch number of accounts or groups per iteration through RSA Authentication Manager. Default: 500. |
-
-
Enter the server’s hostname and API connection port number in the Host and Port fields.
-
Enter your RSA Authentication Manager administrator’s username and password in the Administrator and Password fields.
-
Enter the RSA Command Client User’s username and password in the Command Client Username and Command Client Password fields.
-
Enter the name of the RSA Authentication Manager realm you will manage in the Realm field and the realm’s identity source name in the Identity Source field.
-
Enter the name of the security domain you will manage in the Security Domain field. If you would like to manage its sub domains as well, check the Search SubDomains checkbox.
-
-
Save Changes.
Next Step: Proceed to the Use Case Configuration Summary section for information on how to apply the SecurID Authentication API configuration to your use case.
Related Articles
SailPoint IdentityNow - RSA Ready SecurID Access Implementation Guide 88Number of Views Juniper JunOS vSRX - SecurID Access Implementation Guide 19Number of Views Ivanti Pulse Connect 9.1 - SecurID Access Implementation Guide 53Number of Views Ivanti Pulse Connect9.1 - RADIUS with AM Configuration - SecurID Access Implementation Guide 60Number of Views SailPoint IdentityIQ 8.1 - SecurID Access Implementation Guide 63Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Release Notes: Cloud Access Service and RSA Authenticators RSA Authentication Manager 8.9 Release Notes (January 2026) An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Release Notes for RSA Authentication Manager 8.8