This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Discussions

Browse the SecurID discussion board to get product help and collaborate with other SecurID users.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Discussions
  • :
  • User authentication during identity router update
  • Options
    • Subscribe to RSS Feed
    • Mark Topic as New
    • Mark Topic as Read
    • Float this Topic for Current User
    • Bookmark
    • Subscribe
    • Mute
    • Printer Friendly Page
JohnMcKellep
JohnMcKellep Contributor
Contributor
‎2020-05-28 09:25 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

User authentication during identity router update

If i have only 1 identity router in my cluster, when i do an update on it, will users still be able to authenticate using the app or will that function cease until the update is complete? We originally starting using the app to protect access to Office365 for users when they were off our corporate network. Now we use it more for 2 factor into our VPN which is protected by RSA Authentication Managers that now can use the RSA Authenticate App as a token. So does the authentication manager speak directly to the cloud for authentication or would it still go through the identity router?

Labels (1)
Labels
  • Labels:
  • Authenticators

  • Tags:
  • Authenticator
  • Authenticators
  • Community Thread
  • Discussion
  • Forum Thread
  • RSA SecurID
  • RSA SecurID Access
  • SecurID
  • Token
  • Token Auth
  • Token Authentication
  • Token Authenticator
  • Token Authenticators
0 Likes
Share
Reply
  • All forum topics
  • Previous Topic
  • Next Topic
4 Replies
TedBarbour
Employee TedBarbour
Employee
‎2020-05-28 10:28 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

John McKellep‌ - please see Identity Router Update Process. 

Users will not be able authenticate during the update. Your on-premise Identity Router brokers cloud service to LDAP and AM traffic.

Having more than one Identity Router is recommended for HA.

 

Hope that helps,

Ted

1 Like
Share
Reply
JohnMcKellep
JohnMcKellep Contributor
Contributor
In response to TedBarbour
‎2020-05-28 10:32 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Is it best to have multiple identity routers in one cluster or to have multiple clusters?

0 Likes
Share
Reply
TedBarbour
Employee TedBarbour
Employee
In response to JohnMcKellep
‎2020-05-28 12:25 PM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Without an analysis of your network topology and requirements it is difficult to say for sure but recommend you read about Clusters. If you are only using a single IDR now the next logical step would be a single cluster of three IDRs to provide better resiliency to any single IDR outage. 

Note that details about your network should not be discussed here in a public forum.

1 Like
Share
Reply
TedBarbour
Employee TedBarbour
Employee
In response to TedBarbour
‎2020-05-28 04:34 PM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

I should add if you are just using AM->Cloud with Authenticate App tokencodes or the PIN+Approve feature for your VPN then users would still be able to authenticate while the IDR is being updated. The IDR is not involved in either of those authentication use cases.

1 Like
Share
Reply
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.