View Identity Sources Linked to the System
When you link an identity source to the system, all users and groups in the identity source are available to AM and can be viewed and managed through the Security Console.
In the Security Console, user management includes such tasks as enabling or disabling users for authentication methods, associating groups with restricted agents, and assigning tokens to users. If you want to modify user data that is stored in an LDAP directory, use your LDAP directory tools.
Users in an identity source are visible in the top-level security domain by default, but can be moved to other security domains as necessary. Additionally, you can configure security domain mappings to move users from an identity source to a specific lower-level security domain.
You can link multiple identity sources to the system.
In the Operations Console, you can view a list of all of the identity sources in a deployment and details of a specific identity source. For instructions, see View the Identity Sources in Your Deployment.
Procedure
In the Security Console, click Setup > Identity Sources > Link Identity Source to System.
Related Concepts
Related Articles
View the Identity Sources in Your Deployment 6Number of Views Manage User Profile and Notifications 3Number of Views Enable or Disable RADIUS User Attributes 27Number of Views Manage User Groups 4Number of Views Directory Server Attributes Synchronized for Authentication 79Number of Views
Trending Articles
RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.5 for Microsoft Windows Installation and Administration Guide Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory Troubleshooting AFX Server issues in RSA Identity Governance & Lifecycle Downloading RSA Authentication Manager license files or RSA Software token seed records