This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Discussions

Browse the SecurID discussion board to get product help and collaborate with other SecurID users.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Discussions
  • :
  • Physical locations of primary and replica instances
  • Options
    • Subscribe to RSS Feed
    • Mark Topic as New
    • Mark Topic as Read
    • Float this Topic for Current User
    • Bookmark
    • Subscribe
    • Mute
    • Printer Friendly Page
BillHagen
BillHagen Beginner
Beginner
‎2016-04-22 07:22 PM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Physical locations of primary and replica instances

Jump to solution

Page 118 of the RSA Authentication Manager 8.1 Administrator's Guide shows the following graphic:

1.png

I would like to install the Authentication Manager Primary Instance and LDAP Directory Server 1 in the Headquarters building, and the Secondary Instance and LDAP Directory Server 2 in the DR building, physically and geographically separated...then make the above connections.

2.png

 

Does this work? Does it make sense? I'm scared senseless that all of IT will be using a passcode with key fobs, and then AD turns to mush...and we can't get logged in to fix it. I'm hoping the above scenario will fix that?

 

Thoughts?

  • Tags:
  • Community Thread
  • Discussion
  • failover
  • Forum Thread
  • ldaps
  • RSA SecurID
  • RSA SecurID Access
  • SecurID
0 Likes
Share
Reply
  • All forum topics
  • Previous Topic
  • Next Topic
1 Solution

Accepted Solutions
JayGuillette
Apprised Contributor JayGuillette Apprised Contributor
Apprised Contributor
‎2016-04-25 12:25 PM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Yes, we're on same page.  Normally you want to go local for information requests whenever possible in your network design, so it makes sense for a replica at a separate Replica site to be configured to ask the local replica site Domain Controller for User info, instead of have the same configuration of the Primary.  I've seen more than a few sites where copying the Primary configuration to the replica slows things down and causes problems, because the Replica at a different location is configured to first go to the Domain Controller next to the Primary, across a WAN.

View solution in original post

0 Likes
Share
Reply
5 Replies
JayGuillette
Apprised Contributor JayGuillette Apprised Contributor
Apprised Contributor
‎2016-04-22 11:28 PM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Both the Primary and the Replica need access to an LDAP external Identity Source like AD, so if they have local access, performance and reliability should be better.  Something like this, basic but local.

LDAPFailover.png

Preview file
4659 KB
2 Likes
Share
Reply
JayGuillette
Apprised Contributor JayGuillette Apprised Contributor
Apprised Contributor
‎2016-04-22 11:29 PM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Both the Primary and the Replica need access to an LDAP external Identity Source like AD, so if they have local access, performance and reliability should be better.  Something like this, basic but local.

LDAPFailover.png

Preview file
4659 KB
2 Likes
Share
Reply
BillHagen
BillHagen Beginner
Beginner
In response to JayGuillette
‎2016-04-25 12:19 PM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Thanks for the PPT, that actually answered some other questions I had.

As for this specific question, it seems we're on the same page:

3.png

 

Correct? Primary instance pointing to local AD/LDAPS with offisite AD/LDAPS as failover, and offsite Replica pointing to offsite AD/LDAPS (that's on the same LAN) with offiste AD/LDAPS as failover.

 

Primary: onsite. Replica: offsite. Acceptable?

0 Likes
Share
Reply
JayGuillette
Apprised Contributor JayGuillette Apprised Contributor
Apprised Contributor
‎2016-04-25 12:25 PM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Yes, we're on same page.  Normally you want to go local for information requests whenever possible in your network design, so it makes sense for a replica at a separate Replica site to be configured to ask the local replica site Domain Controller for User info, instead of have the same configuration of the Primary.  I've seen more than a few sites where copying the Primary configuration to the replica slows things down and causes problems, because the Replica at a different location is configured to first go to the Domain Controller next to the Primary, across a WAN.

0 Likes
Share
Reply
BillHagen
BillHagen Beginner
Beginner
In response to JayGuillette
‎2016-04-25 12:35 PM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Thanks Jay; this gives me confidence to go ahead with my install as planned.

0 Likes
Share
Reply
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.