This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Product Advisories

Read and subscribe to the latest announcements and advisories relating to the SecurID product.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Advisories
  • :
  • Product Advisories
  • :
  • What you need to do before you add new policies with Session Attributes - Spring Release Migration
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

What you need to do before you add new policies with Session Attributes - Spring Release Migration

The 2016 RSA Via Access Spring Release is changing the way context related attributes are used in application access policies. Rather than defining who has access based on user store attributes and session attributes (IP, User Agent String, Authentication Source, Authentication Type), administrators will define access based on user store attributes and authentication decisions will be based on session and context attributes.

 

In other words, session attributes will be moved into the authentication conditions section of a policy. All existing policies will be migrated to the new structure and existing session attributes will be moved into authentication conditions.  To ensure that migration will complete as smoothly as possible, we are providing a brief list of best practices.

 

If you follow the best practices, migration is likely to complete without issues and without changing the policy rule logic.   If you do not follow the best practices,  you might need to revisit the policy logic  after migration. All the information about the previous policy structure will be saved and will be available to RSA customer support. The policy description will clearly indicate if a policy that was migrated required a logic change.

 

Note: All existing policies created before April 27, 2016 should be migrated successfully even if they do not follow best practices. For new policies you create, please follow these best practices. This is a one-time migration. After the migration is complete there are no longer limitation on creation of new policies or modifications to old ones.

 

 

Best Practices

 

Note: All best practices relate to policies using session attributes only. If a policy is not using any session attributes, there are no limitations on those policies.

 

  1. 1. Avoid using more than one rule set in a policy when Match=All and the user criteria contains both access attributes (based on user store) and session attributes.

 

Example: The following two rule sets   both contain user store attributes and session attributes

  • Ruleset 1: Match all: ad group=sales , ip value=x Action: Allow
  • Ruleset 2: Match all sAMAccountName= “James”, authenticationSource=“z” Action: Authenticate

 

Will be migrated to:

  • Ruleset 1: ad group=sales

condition ip value=x, Action: Allow

default: Deny

 

  • Ruleset 2: sAMAccountName= “James:

condition: authenticationSource=“z” Action: Authenticate

Default: Deny

 

Explanation: After the rule sets are migrated, If the user attributes match for Ruleset 1, Ruleset 1 is going to be selected for evaluation.  Even if the conditions are not satisfied, Ruleset 2 is not going to be evaluated although it would have been evaluated before migration

 

 

2) Do not use more than two rule sets in a policy if any session attributes are used in the user criteria.  The problem is that attributes might lose priority.

If a policy containing session attributes has more than two rule sets, the migration will do best effort and flag this as requiring attention.

 

 

3) Do not create new policies with conditions until after the migration.

Note: This relates to policies using session attributes as well as conditions. If a policy is not using session attributes, there are no limitations on using conditions.

If policies created after April 27, 2016 contain session attributes and conditions, the migration will do best effort and flag this as requiring attention.

 

4) Do not create policies that just deny all access.

Example:

  • Ruleset1: Match all: ad group=sales , ip value=x Action: Deny
  • Ruleset2: Match all sAMAccountName= “James”, authenticationSource=“z” Action: Deny

Note: This policy does not  make sense as all access is deny. The identical semantic cannot be created using conditions.

 

 

FAQ:

Q: What happens if I see that my policy has changes by migration and a flag (MIG-1, MIG-2,..MING-4) appears in the policy description section?

A: Take a look at the release notes to find more information about the next steps and the migration codes. You can review the policy to ensure the logic is sound or change it to fit what you expect. If you cannot create the required logic, please contact RSA Customer Support for assistance.

Labels (1)
Labels:
  • Technical Advisories

Tags (20)
  • Advisory
  • conditions
  • context aware
  • context driven authentication
  • Migration
  • Product Communication
  • Product Notification
  • risk based authentication
  • risk_based_authentication
  • RSA SecurID
  • RSA SecurID Access
  • RSA Technical Advisory
  • RSA Via Access
  • SecurID
  • SecurID Access
  • session attributes
  • technical advisory
  • Technical Alert
  • Technical Communication
  • Technical Notification
0 Likes
Was this article helpful? Yes No
Share
No ratings
Version history
Last update:
‎2016-05-04 04:21 PM
Updated by:
Employee AyeletBiger
Contributors
  • AyeletBiger
    AyeletBiger

Related Content

Article Dashboard
  • Article History
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.