Auth Agent Install Admin Guide
Auth Agent Install Admin Guide
2
for Microsoft Windows
Installation and Administration Guide
Contact Information
Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com
Trademarks
RSA, the RSA Logo, SecurID and EMC are either registered trademarks or trademarks of EMC Corporation in the United
States and/or other countries. All other trademarks used herein are the property of their respective owners. For a list of RSA
trademarks, go to www.rsa.com/legal/trademarks_list.pdf.
License agreement
This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and
may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice
below. This software and the documentation, and any copies thereof, may not be provided or otherwise made available to any
other person.
No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any
unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment by EMC.
Third-party licenses
This product may include software developed by parties other than RSA. The text of the license agreements applicable to
third-party software in this product may be viewed in the thirdpartylicenses.pdf file.
Distribution
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
Copyright 2012 EMC Corporation. All Rights Reserved. Published in the USA.
October 2012
Contents
Preface................................................................................................................................... 7
About This Guide................................................................................................................ 7
RSA Authentication Agent for Microsoft Windows Documentation ................................. 7
Related Documentation....................................................................................................... 7
Support and Service ............................................................................................................ 8
Before You Call Customer Support............................................................................. 8
Contents
Contents
Glossary ............................................................................................................................. 89
Index ..................................................................................................................................... 93
Contents
Preface
About This Guide
This guide describes how to install and configure RSA Authentication Agent 7.2 for
Microsoft Windows. It is intended for administrators and other trusted personnel. Do
not make this guide available to the general user population.
Related Documentation
For more information about products related to RSA Authentication Agent 7.2, see the
following:
RSA Authentication Manager documentation set. See the full documentation
set for RSA Authentication Manager (6.1 or 7.1). To access a documentation set,
go to http://knowledge.rsasecurity.com.
RSA Secured Partner Solutions directory. RSA has worked with a number of
manufacturers to qualify software that works with RSA products. Qualified
third-party products include virtual private network (VPN) and remote access
servers (RAS), routers, web servers, and many more. To access the directory,
including implementation guides and other information, go to
http://www.rsasecured.com.
Preface
https://knowledge.rsasecurity.com
www.emc.com/support/rsa/index.htm
https://gallery.emc.com/community/ma
rketplace/rsa?view=overview
RSA SecurCare Online offers a knowledge base that contains answers to common
questions and solutions to known problems. It also offers information on new releases,
important technical news, and software downloads.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The directory
includes Implementation Guides with step-by-step instructions and other information
on how RSA products work with third-party products.
Preface
Product Overview
Key Features
Supported Authenticators
1: Product Overview
Key Features
The following sections summarize the key features of RSA Authentication Agent for
Microsoft Windows. They include information about:
Offline authentication
10
1: Product Overview
authentication feature be enabled on both the Agent and the server. If you are using
Windows password integration, do not disable offline authentication.
1: Product Overview
11
If you decide not to exempt the users in the administrator group during installation or
when you first use the configuration wizard to create an installation package, you can
set that option later. For example, you can reconfigure your settings using the
Authentication Agent configuration wizard to create another installation package and
deploy it. Or, you could make changes by changing the policy in the Group Policy
Object template. For more information, see the Group Policy Object Template Guide.
For a list of other emergency access methods, see Choose Emergency Access
Methods on page 28.
of your domain or subject to Group Policy, you must install the templates on those
computers and specify the template settings with the Local Group Policy Editor. See
the Group Policy Object Template Guide for more information.
Before users start using Authentication Agent, you can define particular settings to
tailor the product to your needs. RSA Authentication Agent comes with the following
Group Policy Object (GPO) templates:
RSA_Authentication_Agent.adm
RSA_Authentication_Agent_Password_Synchronization.adm
RSA SecurID_Expiration_Warning.adm
RSACredProviderFilter_Microsoft.adm
RSACredProviderFilter_SecurID.adm
RSACredProviderFilter_SmartCard.adm
RSACredProviderFilter_ThirdParty.adm
RSADesktop_VerifyRSAComponents.adm
If you want to restrict logon options for Authentication Agent users on Windows Vista or
later Windows operating systems, you must install and configure one or more of the
Credential Provider Filter policy templates. A Credential Provider filter allows you to hide
the logon tile presented by a Credential Provider.
12
1: Product Overview
Description
RSACredProviderFilter_Microsoft
RSACredProviderFilter_SmartCard
RSACredProviderFilter_ThirdParty
RSACredProviderFilter_SecurID
When you use the RSA Control Center to clear the node secret on the
Authentication Agent client computer
Manager administrator must have enabled the offline authentication feature for them
and you must have left offline authentication running as a service on the Agent. If you
disable the offline authentication service through the Local Authentication Settings
template, users cannot use offline authentication or unlock their computers with just a
SecurID PIN. For more information on settings, see the RSA Authentication Agent 7.2
Group Policy Object Template Guide.
1: Product Overview
13
(RDP) sessions.
14
1: Product Overview
Authentication Agent. It is now configured exclusively with the Group Policy Object
Templates. For more information on setting this policy see the Local Authentication
Settings Template in the Group Policy Object Templates Guide.
Set the unlock option to allow access with an RSA SecurID PIN or a Windows
password. If a user needs to log on with a passcode (PIN and tokencode), you can
configure Authentication Agent to allow the user to unlock the computer by entering
the SecurID PIN without the tokencode or their Windows password. You can also set a
time when Authentication Agent no longer allows access without the full passcode.
For example, if the user locks the computer and wants to unlock it within an hour, the
user can enter a SecurID PIN or Windows password. Once that hour passes, the user
must enter the full passcode (PIN and tokencode) to unlock the computer.
Note: This ability to log on with just a SecurID PIN was available in the user interface
1: Product Overview
15
After you install Authentication Agent, users can see the RSA Authentication Agent
Credential Provider. This Credential Provider appears as an RSA SecurID tile with an
image and the appropriate user name under it.
If you want to switch the logon option available to users, you can filter the credential
providers by selecting different policy settings through the Group Policy Object
Template. For example, you can select an option to hide the Microsoft Password
Credential Provider or the Microsoft Picture Password Credential Provider, only show
the RSA Authentication Agent Credential Provider, or show all the available
Credential Providers.
Note: This setting was available in the user interface on previous versions of RSA
Authentication Agent. It is now configured exclusively with the Group Policy Object
Templates. For more information about policy templates, see the section RSA
Credential Provider Templates in the Group Policy Object Templates Guide.
Install the language pack to see the product in a language other than English.
When you install the standard Authentication Agent application, the following
components automatically appear in English:
Help
Documentation
If you use a Japanese operating system and you install the Japanese language pack for
Authentication Agent, you see these components in Japanese. (If you install the
Japanese language pack on a computer that uses an English operating system, you
continue to see the product in English.) If you want to use the product in a language
other than English or Japanese, contact your RSA representative. For more
information, see Install a Language Pack on page 46.
16
1: Product Overview
Supported Authenticators
RSA Authentication Agent for Microsoft Windows supports the following types of
authenticators:
Note: You cannot use software authenticators that reside on the computer to log on to
protected Windows desktops. However, once you log on to the desktop using a
different type of authenticator, you can use software authenticators to log on to the
network. You can use Authentication Agent with a software authenticator installed on
a portable device, for example, a Blackberry. For more information on software
authenticators, see the RSA documentation that comes with your software
authenticator.
The RSA SecurID 800 Authenticator (SecurID 800) can function as a SecurID
authenticator and smart card. To use it as a SecurID token, you can read the tokencode
off the front and manually enter it when prompted. Or, if you installed the Connected
Authentication feature with Authentication Agent, you can connect it to the USB port
for the Agent to automatically access the tokencode for you.
The SecurID 800 looks like this:
For smart card use, the SecurID 800 has a smart card with an embedded smart chip
and reader built into it. (The smart chip is a microprocessor that can store and process
data.) To use the SecurID 800 as a smart card, you need to install RSA Authentication
Client 3.5.4 and connect the authenticator to the USB port. For more information on
RSA Authentication Client, see the documentation that came with the product.
Note: If you have RSA Authentication Agent installed and you install RSA
Authentication Client, the user interface (also called the RSA Control Center) to
manage the SecurID or smart card portion of your authenticator changes. You see
more or fewer options, depending on what you have installed. For more information,
see RSA Control Center on page 18.
1: Product Overview
17
18
Test authentication.
Enable, test, or clear the reserve password. A reserve password allows users to log
on to a computer if offline authentication is not running or the computer cannot
connect to RSA Authentication Manager. You can also set the reserve password
using the GPO templates. For more information, see the Group Policy Object
Template Guide.
Clear the node secret if it is corrupt or does not match the node secret in the
Authentication Manager database.
Specify which users to challenge, and set how users are challenged when their
group membership cannot be determined on that specific computer. You can also
specify challenge settings with Group Policy. Note that Group Policy settings
override settings configured in the RSA Control Center, For more information, see
the Group Policy Object Template Guide.
Clear offline data if you disable offline authentication or you change the number
of offline days that RSA Authentication Manager generates and downloads or if
you want to reassign a protected computer to a different user.
1: Product Overview
Click Start > Programs (or All Programs) > RSA > RSA Control Center.
The following figure shows the Home page of the RSA Control Center.
Note: If you install RSA Authentication Client to use your SecurID 800 authenticator
as a smart card, the RSA Control Center that is installed with Authentication Agent
expands to show options to manage your smart card PIN. You continue to see the
Authentication Agent SecurID options as well. If you remove RSA Authentication
Client (or Authentication Agent), the options related to that product clear from the
Control Center. For more information, see the RSA Authentication Client (Smart
Card) Help or the RSA Authentication Agent (SecurID) Help that is installed with the
Control Center.
For a description of the notification area and the RSA Control Center icons, see
RSA Control Center Icons.
1: Product Overview
19
Description
Opens the RSA Control Center. You can double-click the icon or right-click
the icon and select an option to open the Control Center. To remove the icon
from the system tray, right-click the icon and select the option to close it.
Without the icon, you need to use the program group (for example, Start >
All Programs > RSA > RSA Control Center) to open the Control Center.
Warns that the number of offline days has dropped below a specified
number by displaying a yellow exclamation point in the lower-right corner.
Also displays the number of days left before an authenticator in the USB
port expires.
Use the Offline Days option from the Home page of the Control Center to
check or refresh your days. For more information on offline days, see
Chapter 4, Managing Authentication Agents or the RSA Authentication
Agent (SecurID) Help. For more information on setting the expiration of an
authenticator, see the Group Policy Object Guide.
Indicates that the application recognizes an authenticator connected to the
USB port by displaying a blue cross in the upper-right corner of the icon.
Note: Users can insert multiple authenticators into different USB ports and
select the one they want to use. For more information, see the
RSA Control Center (SecurID) Help.
Indicates that Authentication Agent is in the process of accessing data on
the authenticator.
Note: A user should not remove an authenticator until Authentication Agent
20
1: Product Overview
System Requirements
System Requirements
RSA Authentication Agent for Microsoft Windows has the following system
requirements:
Required Ports
The following table lists the ports that must be available for use by Authentication
Agent.
Port
Description
5500/udp
5580/tcp
5550/tcp
389/tcp
21
Windows Vista SP2, 32-bit and 64-bit, Business and Enterprise editions
Windows Server 2008 SP2, 32-bit and 64-bit, Standard, Enterprise, Data Center,
and Web Server editions
Windows Server 2012 SP2, Standard or Data Center editions (Server Core or
Server with Graphical User Interface [GUI] mode)
Product Name
Remote access
Desktop Connection
22
You must install SP3 hotfix 6 (or later) if you use RSA Authentication Manager 7.1 or
Patch 2 if you use RSA Authentication Manager 6.1. For installation instructions, go
to RSA SecurCare Online at https://knowledge.rsasecurity.com.
Before you enable RSA SecurID authentication, you must understand the
RSA Authentication Manager system and its features. For more information, see the
RSA Authentication Manager Administrators Guide (6.1 or 7.1) or contact your
Authentication Manager administrator.
23
Users can open one of these applications from their local computers to log on to
supported remote computers that have Authentication Agent installed on them. The
supported operating systems of the remote computers are: Windows Vista, Windows
7, Windows 8, Windows Server 2008 R2, or Windows Server 2012 running Terminal
Services.
Microsoft Remote Desktop Connection allows a user to gain full access to a remote
computer through a Local Area Network (LAN) or an Internet connection. If the local
Windows computer has Microsoft Remote Desktop Connection, users can connect to
remote computers using the RSA protected logon (if their Remote Desktop account
and permissions allow it). The computers must have Authentication Agent installed on
them.
Citrix Independent Computer Architecture (ICA) Client (Program Neighborhood,
Program Neighborhood Agent, or Web Client) allows a user to connect to a remote
Citrix XenApp computer to access published applications and desktops. Citrix users
can also access remote computers that have Authentication Agent installed, and they
can log on using RSA authenticators.
Remote Desktop Connection 6.1 or later includes Windows Network Level
Authentication (NLA). If this feature is enabled when a user attempts to connect to a
remote computer, the user is prompted to authenticate before establishing a
connection. If the computer uses NLA with an RSA Authentication Agent Credential
Provider configured on the remote computer, the user sees two prompts to authenticate
before the user can access the remote desktop.
One prompt opens from the local computer and the other opens from the remote
computer. This is not caused by the RSA Authentication Agent application. It is how
Microsoft implements Network Level Authentication when you use a third-party
credential provider. Once the user enters the account information and successfully
authenticates through each prompt, the user can access the remote computer. Network
Level Authentication is enabled by default for Windows Vista or later Windows
operating systems.
For more information on using Network Level Authentication, see the Microsoft web
site.
24
Reference
25
If you have not already done so, install either RSA Authentication Manager 7.1
with SP3 hotfix 6 (or later) or RSA Authentication Manager 6.1 with Patch 2 (or a
later hotfix rollup). For instructions, see the RSA Authentication Manager 7.1
Installation and Configuration Guide or RSA Authentication Manager 6.1
Installation Guide (for Windows or UNIX).
26
Register the RSA Authentication Agent for Microsoft Windows host as an agent
of RSA Authentication Manager. For more information, see the
RSA Authentication Manager Administrators Guide (6.1 or 7.1). You do not need
to manually register user computers if you install the Auto-Registration utility
when you install Authentication Agent. For more information, see Chapter 3,
Installing RSA Authentication Agent and Chapter 4, Managing Authentication
Agents.
Note: If you install Authentication Agent on a multihomed server and not an
No users
All users
A group of users
27
Description
Characteristics
Reference
Offline
emergency
tokencode
Offline
emergency
passcode
28
Description
Characteristics
Reference
See the
RSA Authentication Manager
Administrators Guide (6.1 or
7.1).
Description
Characteristics
Reference
See the
RSA Authentication Manager
Administrators Guide (6.1 or
7.1).
Fixed
passwords
On-demand
tokencode
Users with digital mobile Must be combined with the PIN See the
for the users authenticator.
RSA Authentication Manager
devices and home e-mail
7.1 Administrators Guide.
Users
mobile
devices
and
accounts can receive
e-mail accounts must be
one-time tokencodes as
enabled to receive on-demand
text messages.
tokencodes.
For Administrators
Emergency
Access
Method
Reserve
password
Description
Characteristics
Reference
29
For Administrators
Emergency
Access
Method
Exempt
administrator
account
Description
Characteristics
Reference
Register users who will be challenged for passcodes as RSA SecurID users in the
RSA Authentication Manager database and activate their authenticators. For more
information on registering users, see the RSA Authentication Manager
Administrators Guide (6.1 or 7.1).
Important: The Windows user names for RSA SecurID users must be registered in
the RSA Authentication Manager database. These user names cannot contain
spaces and must not exceed forty-eight characters.
30
Give assigned and enabled tokens to users who will be challenged for passcodes.
Installation Methods
Installation Considerations
Modify an Installation
Repair an Installation
RSA Authentication Agent must communicate with RSA Authentication Manager for
RSA SecurID authentication to occur. Before you install RSA Authentication Agent
7.2 for Microsoft Windows, make sure RSA Authentication Manager 7.1 SP3 hotfix 6
(or later) or Authentication Manager 6.1 with Patch 2 is installed on the appropriate
server.
For information on installing Authentication Manager, see the RSA Authentication
Manager 7.1 Installation and Configuration Guide or the RSA Authentication
Manager 6.1 Installation Guide (for Windows or UNIX). The following figure shows
the user datagram protocol (UDP) connection from the users computer to the
Authentication Manager server:
UDP
Connection
User's Computer
with
RSA Authentication Agent
IDC
Manager to extend the RSA SecurID logon process to users when their computers are
not connected to Authentication Manager through the network. For more information,
see Offline Authentication on page 55.
31
Installation Methods
Use one of the following methods to install Authentication Agent:
To install Authentication Agent on a single computer, run the MSI file (RSA
Authentication Agent.msi) on the local computer.
Important: If you installed Windows Server 2012 in Server Core mode (without a user
interface or GUI), you need to install Authentication Agent from the command line.
For example, you can run the configuration wizard (ConfigWizard.exe) to create an
Authentication Agent installation package and install it by entering: msiexec /qn /i
RSA Authentication Agent.msi at the command line. (Your installation package
may use another msi name.) Once you install the product, you can access the
Authentication Agent user interface (RSA Control Center) and use the options as
needed. You can also switch between Server Core and Server with GUI mode
after installing Authentication Agent and use it the same way. For more information
on creating a custom installation package and using the command line, see Install the
Product on Multiple Computers on page 38.
If you install Authentication Agent on the Windows Server where you plan to manage
your RSA Group Policy Object templates, you do not need to manually install the
templates. Authentication Agent automatically installs them in the Local Security
Policy. For more information, see the RSA Authentication Agent 7.2 Group Policy
Object Template Guide.
Single Installations
You may want to install the Authentication Agent on a single computer to run an
authentication test before deploying an installation package to a larger group. Or, you
may only need to install the product on one or two computers.
During the installation process, you choose a Typical or Custom installation. If you
choose a Typical installation, you import the system configuration file (sdconf.rec). If
you choose a Custom installation, you can select an option to install the
Auto-Registration utility and the RSA SecurID Connected Authenticator feature.
The Auto-Registration utility automatically registers users computers in the
Authentication Manager database the first time users start their computers with
Authentication Agent installed. If you select the Auto-Registration utility, you must
import the server certificate file (server.cer). If you want users to authenticate with a
SecurID 800 authenticator connected to the USB port, you must also select the
RSA SecurID Connected Authenticator feature.
32
Large-Scale Deployments
To customize the Authentication Agent logon settings and install the product on many
computers, use the ConfigWizard.exe file located in the Configuration Wizard folder
that came in the zipped folder of the product. During the process, you import the
system configuration file (sdconf.rec) and, if necessary, the server certificate file
(server.cer). You obtain the sdconf.rec and the server.cer files from your
RSA Authentication Manager administrator.
After you create an installation package using the configuration wizard, you can
deploy it using Microsoft Systems Management Server (SMS), the command line, or a
logon script.
Note: You can run the configuration wizard (ConfigWizard.exe) to create an
Authentication Agent installation package on any of the supported Windows operating
systems.
For more information on the Authentication Manager files, see the next section. For
more information on installing Authentication Agent on a single computer, see Install
the Product on a Single Computer on page 36. For more information on using the
configuration wizard, see Install the Product on Multiple Computers on page 38.
Important: If you want to use Authentication Agent in a language other than English,
install the language pack after you install the product. For more information on
installing a language, see Install a Language Pack on page 46.
33
Installation Considerations
Before you install RSA Authentication Agent, review the following information:
If you upgrade from RSA Authentication Agent 6.x or 7.0, you must map the old
settings to the new policies in the RSA Authentication Agent Group Policy Object
templates. For more information, see the Group Policy Object Template Guide.
Authentication Agent is available as a .zip file that you must download from
www.rsa.com.
Installing RSA Authentication Agent on a computer with RSA EAP Client 6.1.3
removes RSA EAP Client 6.1.3 from the computer.
If you install Authentication Agent on computers that are not joined to a domain,
you must manually define the Group Policy settings on each computer. For more
information, see the Group Policy Object Template Guide.
If you plan to install Authentication Agent on a single computer, copy the system
configuration file (sdconf.rec) and the server certificate file (server.cer) from
RSA Authentication Manager to the computer where you plan to install
Authentication Agent. (You only need the server.cer file if you plan to install the
Auto-Registration utility.) Browse to theses files when you run the
RSA Authentication Agent.msi. For more information, see Import
Authentication Manager Files on page 33.
34
fails. To ensure that SecurID authentication does not fail when the user attempts to
log on after running out of offline days, you must use a copy of the sdconf.rec file
from an Authentication Manager server that allows automatic registration and
performs authentication. (The authentication service must be running on that
server.) If you only use a primary server to perform database management, do not
use the sdconf.rec file from that primary server. Instead, use a sdconf.rec file
from a replica server. For more information on the Auto-Registration utility, see
Automatic Registration Process on page 64.
If you want to use a more secure way of establishing a node secret between
Authentication Manager and the Agent computer, you can use the Node Secret
Load utility that comes with Authentication Agent. This utility allows you copy
the node secret from Authentication Manager and load it to the appropriate
Authentication Agent computer before users start using SecurID authentication.
That way, you do not have to wait until after the first authentication to establish
the node secret. For more information, see Use the Node Secret Load Utility on
page 47.
35
user interface (GUI). You need to install Authentication Agent from the command
line. For more information, see Install the Product on Multiple Computers on page
38.
Before you Begin
Review the following items before you install the product:
Authentication Agent is available as a .zip file that you must download from
www.emc.com/domains/rsa/index.htm.
Authentication Agent requires the trusted root certificate thawte Primary Root
CA. This certificate is automatically provisioned on Windows Vista, Windows
7,Windows Server 2008. and Windows Server 2008 R2, provided the machine has
Internet access. On machines that do not have Internet access, you must use the
appropriate Microsoft root update mechanism to install the certificate in the
Trusted Root CA store of the machine account. For instructions, see Microsoft
Knowledge Base Article 931125.
36
6. Leave the default directory for the installation folder or click Change to browse to
another location. Click Next.
7. Click Browse to browse to and open the system configuration file (sdconf.rec).
Click Next. (You must obtain the file or the location of this file from your RSA
Authentication Manager administrator.)
8. Leave the default location for the offline data folder or click Change to browse to
another location. Click Next.
9. If you selected the Auto-Registration utility, click Browse to locate and open the
server certificate file (server.cer), and then click Next. You must obtain the file or
the location of this file from your RSA Authentication Manager administrator.
10. If you want all users that are not administrators to log on to the desktop with
SecurID Authentication, select Challenge all users except administrators. Local
administrators can log on using their Windows method (password or smart card).
Click Next.
11. Click Install. Authentication Agent installs on the local computer. For Windows
Vista or later operating systems, Windows prompts you to allow account control
privileges if you set up account control privileges. Click Allow.
12. Click Finish.
Next Steps
To test the installation on a local computer, see Test the Installation on page 43.
To view the product in another language instead of English, you can install a
language pack after you install the standard product. For more information, see
Install a Language Pack on page 46.
For computers you intend to protect with Authentication Agent that are not part of
your domain or subject to Group Policy, you must configure the template settings
with the Local Group Policy Editor. See the Group Policy Object Template Guide
for more information.
37
38
Decide if you need to create more than one installation package. For example, you
can set up a package for users of 32- or 64-bit operating systems, and you can set
up a package for users of 32- or 64-bit operating systems to use RSA SecurID 800
authenticators.
Authentication Agent is available as a .zip file that you must download from
www.rsa.com. Before installation, you must download the .zip file and extract
either the RSA Authentication Agent.zip or RSA Authentication Agent
x64.zip file depending on whether you are creating a 32-bit or 64-bit installation
package.
Authentication Agent requires the trusted root certificate thawte Primary Root
CA. This certificate is automatically provisioned on Windows 8, Windows 7,
Windows Vista, and Windows Server 2008 or later, provided the machine has
Internet access. On machines that do not have Internet access, you must use the
appropriate Microsoft root update mechanism to install the certificate in the
Trusted Root CA store of the machine account. For instructions, see Microsoft
Knowledge Base Article 931125.
1. To start the RSA Authentication Agent Installation Creation Wizard, open the
Configuration Wizard folder and double-click ConfigWizard.exe.
2. Click Browse to locate the RSA Authentication Agent.msi or
RSA Authentication Agent x64.msi file. Click Next.
3. Click Browse to import the system configuration (sdconf.rec) file that identifies
the Authentication Manager server you want to use. You must obtain the system
configuration file from your Authentication Manager administrator. Click Next.
4. Select Enable Auto-Registration to automatically register users computers in
the RSA Authentication Manager database the first time they start their computers
with Authentication Agent installed.
5. If you enable automatic registration, leave the default location to the server
certificate file (server.cer) or click Browse to locate it, and click Next. You must
obtain the server certificate file from your Authentication Manager administrator.
6. If you want to allow users to log on with an RSA SecurID 800 authenticator
connected to the USB port for the Agent to automatically access the tokencode,
select Enable RSA SecurID Connected Authenticator. Otherwise, leave the
default of not selected. Click Next.
7. If you want to challenge all users for an RSA SecurID passcode to log on to the
computer except users who belong to the administrator group on the computer,
select Enable challenge with the exclusion of the administrator group.
Otherwise, leave the default of not selected. Click Next.
Important: Only select this option if all the appropriate users have their
RSA SecurID authenticators and know how to log on with a passcode. If they do
not, they can still log on to their computers if they do not belong to a challenge
group or if they can access the Microsoft Password Provider Credential Provider
option. For more information on setting logon options, see the Group Policy
Object Template Guide.
39
8. Review your selections. For example, you can use the scroll bar to check the
following:
Auto-Registration utility state (enabled or disabled) and the path of the server
certificate file (server.cer)
9. To change any settings, click the back arrow (<-) and make any necessary
changes. Click Finish when done.
10. Enter a name for the installation package file.
Make sure you give the file a unique name to help you distinguish it from other
installation packages that you might create.
11. If necessary, browse to the location where you want to save the installation
package file. Click Save when done.
12. Click OK to save the settings and close the wizard.
Next Steps
40
To modify settings of the installation after you deploy it, you can repeat the steps
in this section to create another package and deploy it. New settings override the
previous settings. (For more information, see Modify an Installation on page
48.) Or, you can define settings using the Group Policy Object templates,
depending on the number of computers that need modifications. You can also set
some settings on a local computer through the Control Center. See the
RSA Authentication Agent (SecurID) Help for details.
The following settings that were in the previous versions of the Configuration
Wizard are now policies configured by the GPO Templates. For more information
about the following settings, see the Group Policy Object Template Guide:
Set the RSA SecurID PIN to allow users to unlock computers with a PIN
instead of a full passcode
RSA Authentication Agent for Microsoft Windows, and it does allow a user with
elevated privileges to remove it. Standard users can use the Repair option to repair the
installation, if necessary.
41
configuration wizard.
42
1. Right-click the command prompt icon from the Start menu and click Run as
administrator to open the command prompt.
2. Navigate to the directory that contains the RSA Authentication Agent.msi
package file (or a renamed Authentication Agent MSI file). Otherwise, you must
provide the full pathname to the package file on the command line.
3. Type a command similar to the following, depending on the name of your MSI
package:
msiexec /qn /i RSA Authentication Agent.msi
To log any errors, add the /lv (log verbose) option at the end of the command. The
product completes the installation and the system restarts automatically.
Reference
Test authentication.
If successful, you can deploy the product to multiple users as described in Deploy the
Installation Package to Multiple Computers on page 42.
43
Test Authentication
It is important to test authentication because, in addition to verifying the server
environment, it creates a node secret for Authentication Agent and stores it in the
RSA Authentication Manager database.
Important: If you want to use a more secure method of establishing a node secret
between the Authentication Agent computer and the Authentication Manager server,
use the Node Secret Load utility that comes with the RSA Authentication Agent 7.2
for Microsoft Windows kit. By creating the node secret before users authenticate, you
use encrypted authentication immediately instead of after the first use. For more
information, see Use the Node Secret Load Utility on page 47.
Node Secret
The node secret is a symmetric encryption key that RSA Authentication Manager and
RSA Authentication Agent use to encrypt and decrypt packets of data as they travel
across the network. The first time a user successfully authenticates or tests
authentication from an Agent host, RSA Authentication Manager creates a node secret
for that Agent host and stores it in the RSA Authentication Manager database. A copy
of the node secret is encrypted and sent to the Authentication Agent. The node secret
is stored on the agent.
If the node secret on the Authentication Agent host is corrupted or does not match the
node secret in the RSA Authentication Manager database, encrypted communications
between the Authentication Agent and Authentication Manager cannot work. If this
happens, Authentication Manager logs a node verification failure message in the RSA
Authentication Manager Activity monitor. For more information on testing
authentication or clearing the node secret, see the RSA Authentication Help. For more
information on how Authentication Manager manages logs node verification failures,
see the RSA Authentication Manager Administrators Guide (6.1 or 7.1).
To test authentication with a SecurID authenticator:
44
If you have a handheld authenticator (an authenticator not inserted into a USB
port), leave the default of Handheld token in the field.
If you have an RSA SecurID 800 authenticator inserted into the USB port,
leave the default serial number or name of the authenticator in the field.
If you have multiple RSA SecurID 800 authenticators inserted into USB
ports, leave the current authenticator serial number or name in the field or
select another one from the drop-down list.
6. In the User name field, leave the current user name or change it to another one.
7. In the Passcode or SecurID PIN field, do one of the following:
If you use a handheld authenticator without a set SecurID PIN, enter the
tokencode shown on the front of the authenticator. Click OK. The Set New
RSA SecurID PIN dialog box opens. Continue to step 8.
If you use an RSA SecurID 800 authenticator without a set SecurID PIN,
leave the field empty. Click OK. The Set New RSA SecurID PIN dialog box
opens. Continue to step 8.
If you use a handheld authenticator that has a set SecurID PIN, enter the
passcode (PIN followed by the tokencode shown on the front of the
authenticator). Click OK. Skip to step 10, if necessary.
If you use an RSA SecurID 800 authenticator that has a set SecurID PIN,
enter the PIN. Click OK. (Authentication Agent automatically accesses the
tokencode from the authenticator for you.) Skip to step 10, if necessary.
To create your PIN, select Create my own SecurID PIN. In the SecurID
PIN field, enter a PIN. Enter it again in the Confirm SecurID PIN field.
Click OK.
Note: The options available depend on your Authentication Manager settings.
If you use a handheld authenticator, wait until your token changes, then enter
your PIN and tokencode in the Passcode field. Click OK.
If you use a USB token, you see a message to wait while Authentication
Agent accesses the next tokencode. You do not need to enter a PIN.
10. If you see a prompt to enter the next tokencode to confirm your possession of the
token and synchronize it with Authentication Manager, do one of the following:
If you use a handheld authenticator, wait for your tokencode to change. Enter
the tokencode in the Next tokencode field and click OK.
Once you successfully authenticate, you see a success message. If you cannot
authenticate, you may need to check your Authentication Manager settings. See the
RSA Authentication Manager Administrators Guide (6.1 or 7.1).
45
English or the product remains in English. If you attempt to install the MSI language
pack before you install Authentication Agent, you see a message that the system
cannot install the language. You must install RSA Authentication Agent before you
install the language pack.
To install a language pack on a single computer:
1. Log on with elevated privileges (an administrator account) and double-click the
appropriate MSI file.
2. Double-click the RSA Authentication Agent <name of language>
Language.msi file.
3. Restart your computer when prompted to complete the installation.
To install a language pack on multiple computers:
1. Verify that all the appropriate computers have RSA Authentication Agent for
Microsoft Windows installed.
2. Deploy the RSA Authentication Agent <name of language> Language.msi file
using your preferred method. If you use the command line, enter the filename of
the language pack. To log any errors, use the /lv (log verbose) option. For
example, type the following to silently install a language pack:
msiexec /qn /i RSA Authentication Agent <name of language>
Language.msi
46
where <path> is the directory location and name of the node secret file. You will
be prompted to enter the password with which your node secret file was
encrypted. The Node Secret Load utility loads the new node secret file into the
Agent computer.
4. Repeat this procedure for each computer that needs the extra encryption
protection during the first SecurID authentication.
47
Modify an Installation
If you need to modify the settings of RSA Authentication Agent for Microsoft
Windows, the method you use depends on the number of computers that need
modification. For one computer, you can make modifications using the msiexec
command line or from the Control Panel. For multiple computers, you must use the
command line. See the next two sections according to your needs.
Note: You must have administrator privileges to modify the installation package, and
you must open the command prompt as an administrator to run the msiexec
commands.
You can run the msiexec commands on a single computer and multiple computers.
To modify the installation for a single computer with the MSI package:
1. For Windows Vista, Windows 7, or Windows 8, click Start > Control Panel.
Click Programs. Then click the Programs and Features icon. Click RSA
Authentication Agent. Click Change to open the wizard. Click Next to open the
Program Maintenance dialog box. Leave Modify selected, or select it, if needed.
Click Next.
2. Click the Agent Host Auto-Registration Utility drop-down box. Select Install
this feature on the local hard drive, Install this feature and all subfeatures on
the local hard drive, or Do not install this feature.
48
3. Click the Connected Authenticator drop-down box, and select Install this
feature on the local hard drive, Install this feature and all subfeatures on the
local hard drive, or Do not install this feature.
4. Click Next.
5. Clear or select the Challenge all users except administrators option. If you
select this option, users will need to log on using SecurID authentication. Local
administrators will not need to log on using SecurID authentication. Click Next.
6. Click Install.
7. Click Finish to restart the computer when prompted.
49
REMOVE=SID_C_x86 or 64
Repair an Installation
Repairing an installation replaces missing files in a damaged installation.
Note: To repair an installation, you must log on as an administrator to the computer
that has Authentication Agent installed, but you do not need to elevate your Microsoft
Windows user privileges.
To repair an installation on a single computer:
For Windows Vista, Windows 7, or Windows 8, click Start > Control Panel.
Click Programs. Then click the Programs and Features icon. Click RSA
Authentication Agent. A Repair button appears on the menu bar. Click
Repair.
Note: If you double-click the MSI file to repair the installation, select Repair and
click Next. Then click Install to repair the installation. Click Finish when done.
50
Authentication Agent from some computers. For example, you can install
Authentication Agent if the local security policy has the User Account Control: Only
elevate executables that are signed and validated setting enabled, but Windows
may not allow you to remove the application.
To remove the application if Windows does not allow you to remove it:
1. Click Start > Control Panel > Administrative Tools > Local Security Policy.
2. Open the Local Security Policy folder.
3. Then open the Security Options folder. Scroll down to the User Account
Control: Only elevate executables that are signed and validated setting.
4. If enabled, right-click the setting and click Properties.
5. From the Local Security Settings tab, select Disabled, and then click OK. You
can now remove the application from the computer.
51
5. Restart the computer if prompted. If you cancel the uninstall process at any time,
the application reverts back to its previous state.
Note: If you installed a language pack and want to remove it, see Uninstall the
52
However, if you remove the Agent and leave the language pack installed, users can no
longer log on through Authentication Agent. If you remove the language pack and
leave Authentication Agent, users see Authentication Agent in English.
To remove the language pack from a single computer:
53
Offline Authentication
Emergency Access
Offline Authentication
Offline authentication extends RSA SecurID authentication to users when the
connection to RSA Authentication Manager is not available, for example, when users
work away from the office. You can enable and disable offline authentication and set
the number of offline days users receive for individual Authentication Agents, groups
of users, or system-wide through the RSA Authentication Manager. For more
information, see the RSA Authentication Manager Administrators Guide (6.1 or 7.1).
If offline authentication is enabled, Authentication Manager generates offline data
(also called offline days) and downloads it to the Authentication Agent host when
Authentication Agent connects to the host. Authentication Agent hosts begin
receiving offline data during their second connected authentication to Authentication
Manager. For example, if you perform the authentication test as described in Test
Authentication on page 44, and then authenticate, Authentication Manager generates
and downloads the offline data. This allows the Agent user to authenticate offline.
By default, offline data is stored in the following location:
You can specify the location during installation. If you specify a location, offline data
is stored in specified_path\RSA\RSA Authentication Agent\Local\dayfiles.
When a user authenticates offline, Authentication Agent verifies the users
authentication information against the offline data stored on the users computer. If the
users authentication information is correct, the user gains access to the protected
computer.
55
The following graphic shows a scenario where a users computer, not connected to the
RSA Authentication Manager, can use offline data to access a protected computer.
Broken
UDP
Connection
IDC
56
Even if the users supply of offline days is full, offline days are automatically updated
when:
Offline days are not automatically refreshed if the authentication session has expired
(the user remains online for 24 hours or more). In this situation, the user has to refresh
offline days manually. Additionally, unlocking a computer with only an RSA SecurID
PIN does not initiate an automatic refresh.
You can also configure how many days of offline data a user is allowed to download.
This is the number of days worth of tokencodes that are downloaded to the users
machine. This is configured in the RSA Security Console on the RSA Authentication
Manager server as part of an offline authentication policy.
The following sections describe refresh scenarios.
Refresh When a Network Connection Exists
Authentication Agent recognizes that a network connection exists and attempts to
download offline days.
57
Windows taskbar (for Windows 7), click the arrow to Show hidden icons, click
Customize, find RSA Control Center Notification Icon in the Notification Area
Icons dialog box, and then select Show icon and notifications from the drop-down
list.
To refresh the offline days without a network connection, the user can:
1. Click the RSA Control Center icon. The RSA Control Center opens the Offline
Days dialog box.
2. Connect to the network, and then click Refresh to manually refresh offline days.
Authentication Agent does one of the following:
Description
Icon
3. Click OK.
58
1. Click the notification message from the RSA Control Center icon. The
RSA Control Center opens the Offline Days dialog box.
2. Click Refresh. Authentication Agent prompts the user for a passcode.
3. Enter the passcode. Authentication Agent does one of the following:
Description
Notification
Icon
Downloads offline days and sets the RSA Control Center icon to
normal.
Informs the user that a problem occurred and to try again later. The
RSA Control Center icon remains in the alert state.
Description
Indicates the supply of offline days has not dropped below a specified
number.
An caution icon appears on the keyhole to warn that the number of offline
days has dropped below a specified number. For more information, see the
RSA Authentication Agent (SecurID) Help.
59
You changed the offline settings on the RSA Authentication Manager (for
example, you disabled offline authentication for an Agent, or you changed the
number of offline days the Authentication Manager generates and downloads).
You change the authenticator properties for a user (for example, clear the users
PIN or synchronize the users authenticator).
After you remove offline data from an agent, the next time that computer successfully
authenticates to the RSA Authentication Manager, the Authentication Manager
generates new offline data and downloads it to the agent. For instructions on clearing
offline data, see the RSA Authentication Agent (SecurID) Help.
Emergency Access
Offline users can substitute offline emergency codes for passcodes by calling their
SecurID Authentication Manger Help Desk administrator. The Help Desk
administrator provides users with the offline emergency codes they need to use. For
example, if offline users:
Forget their PINs or run out of offline days, they can authenticate with an offline
emergency passcode. Users enter the offline emergency passcode instead of an
RSA SecurID passcode.
Lose their tokens or cannot log on or unlock the computer because of too many
failed authentication attempts, they can authenticate with an offline emergency
tokencode. Users combine the offline emergency tokencode with their RSA SecurID
PINs to authenticate.
The first time a user attempts to authenticate with a token after performing an offline
authentication with an offline emergency tokencode, Authentication Manager places
the users authenticator into lost authenticator temporary password mode (if
allowed).
The temporary password is the same as the offline emergency tokencode. It may have
an expiration date set by the Help Desk administrator. Before the password expires,
the user must contact the Authentication Manager Help Desk administrator to replace
the lost authenticator with a new one or return the lost authenticator to a not lost
status. For more information on how Authentication Manager manages emergency
codes, see the RSA Authentication Manager Administrators Guide (6.1 or 7.1).
60
Temporary fixed tokencode. For users whose computers are online with the
network. They can access their protected computers without a tokencode (for
example, when they have lost their tokens).
One-time tokencode. For users whose computers are online with the network.
They can access their protected computers with a tokencode that allows one
access.
On-demand tokencode. For users with digital mobile devices and home e-mail
accounts. If enabled, they can receive one-time tokencodes as text messages.
Offline emergency access tokencode. For users whose computers are not
connected to the network. They can access their protected computers without a
tokencode (for example, when they have lost their tokens).
Offline emergency access passcode. For users whose computers are not connected
to the network. They can access their protected computers without a PIN (for
example, when they have forgotten their PINs).
Reserve Passwords
The reserve password feature is an emergency access method that enables you, the
administrator, to authenticate to a users protected computer as that user without
entering an RSA SecurID passcode under the following circumstances:
To set up a reserve password, you use one of the following Authentication Agent
options:
If you select All Users as the challenge option, and the network connection fails, no
one, including an administrator, can access the desktop on the protected computer. For
this reason, RSA strongly recommends setting a reserve password or using another
emergency access method for administrators. (For information on other emergency
access methods, see Choose Emergency Access Methods on page 28.)
Only the Authentication Agent administrator knows the reserve password. If a user
needs to log on to the computer that requires a reserve password, the user needs to
contact the appropriate administrator for assistance.
61
Important: The reserve password is less secure than other emergency access methods.
For example, it does not require a SecurID PIN and it remains valid unless an
administrator changes it. With a one-time password, a user must include the SecurID
PIN and the user can only use it once.
If the reserve password feature is enabled, and the Windows system is unable to
communicate with the RSA Authentication Manager at the time of authentication,
instead of displaying a message that the Authentication Manager is unreachable, the
system prompts you to enter a reserve password. Users also need to enter a Windows
password.
For information on setting the reserve password option through the Local
Authentication Settings GPO template, see the Group Policy Object Guide. For
information on setting the reserve password through the RSA Control Center, see the
RSA Authentication Agent (SecurID) Help.
62
5. Verify that offline data has been downloaded to the users computer. To do this,
use Windows Explorer to verify that the offline data is stored in the users
computer. For information about where offline data is stored, see Offline
Authentication on page 55. The directories where offline data is stored are
hidden directories. To see the offline data files, you must configure Windows
Explorer to view hidden files.
1. Create a challenge group that includes the names of everyone who will share the
computer. If you need to create new Windows groups, see the appropriate
Microsoft documentation.
2. Set a reserve password for the computer.
For more information, see the RSA Control Center (SecurID) Help.
3. Specify the challenge for the group you created using the GPO template. For more
information, see the Group Policy Object Template Guide.
4. Instruct the remote user to contact the administrator for the reserve password and
then to log on to the computer. When a user attempts to access the computer while
it is offline, the user is prompted first for the reserve password, and then for the
Windows password.
5. Instruct the user to connect to the network remotely.
6. Instruct the user to lock the computer, and then unlock it by providing an
RSA SecurID passcode when prompted. This downloads offline data to the users
computer. From this point forward, the user must provide RSA SecurID passcodes
to authenticate locally.
7. Repeat steps 5 and 6 for each user account sharing the computer.
63
1. Instruct the user to install RSA Authentication Agent 7.2 using the MSI file. For
information, see Install the Product on a Single Computer on page 36.
2. Instruct the user to log on to the desktop using a Windows password, and then
connect remotely to the network.
3. Instruct the user to lock the computer, and then unlock it by providing an
RSA SecurID passcode when prompted. This downloads offline data to the users
computer.
Important: Remote users can refresh their offline data remotely, but must do so before
the last offline day expires. Otherwise, they must perform a connected authentication
to download more offline days. Users can continue to refresh their supplies of offline
days this way until their RSA SecurID authenticators expire.
64
When you use the RSA Control Center to clear the node secret on the
Authentication Agent client computer
65
66
67
Users in a Windows group are not challenged when the Windows group is in an
excluded challenge group.
The following table lists an example of a multidomain environment that has two
domains and different types of groups. All of the users and groups are in the same
forest. Authentication Agent cannot determine the membership of a user if the user or
group is in a different forest.
Example of Groups and Member in a Multidomain Environment
Type of Group
Description
Member
U1D1
U2D2
U3D1
U1D1
Universal Groups
U2D2
G1D1
G3D1
Global Groups
G1D1
G2D2
G3D1
G2D2
68
Description
Member
L2D1
U3D1
L3D1
G1D1
G3D1
The following table shows the users who are challenged to log on using RSA SecurID
authentication or excluded from it depending on what groups you selected in the
previous table.
Challenge or Exclude Group Settings
Group Setting
U1D1
User 1
U3D1
G1D1
User 3
G3D1
User 4
L1D1
User 5, User 6
L2D1
L3D1
User 3, User 4
69
70
Troubleshooting
Authentication Issues
The following sections contain details on connection and authentication issues you
may encounter while using Authentication Agent. This chapter also includes
troubleshooting information and details on error messages. For additional
troubleshooting information, log on to RSA SecurCare Online at
https://knowledge.rsasecurity.com.
Note: RSA SecurCare Online is only available to customers who have a valid
5: Troubleshooting
71
Authentication Issues
The following sections describe issues that you may encounter while running
Authentication Agent.
Authentication Fails After Changing the Send Domain and Username Option
Whenever you apply a new GPO Template to users, you may need to restart the
computer for the policy to take effect.
72
5: Troubleshooting
Auto-Registration utility when you installed Authentication Agent, try to resolve the
node secret issues listed in this section without user intervention.
The following events can cause node verification failure:
The Authentication Manager successfully authenticates a user and sends the node
secret to the RSA Authentication Agent 7.2, along with a successful
authentication message. Authentication Agent times out or fails (for example, due
to a power failure) before storing the node secret.
You are using Authentication Manager replica instances, and the replica instance
that sent the node secret to Authentication Agent has not yet notified other replica
instances. In this case, some users can successfully authenticate and others cannot.
You are using replica instances, and one or more replica instances are not running.
In this case, some users can successfully authenticate and others cannot.
You clear the node secret on Authentication Agent or Authentication Manager, but
not on both.
You clear the node secret on Authentication Agent and Authentication Manager,
but do not restart Authentication Agent if it does not have the Auto-Registration
utility installed.
You enter an invalid user name on the first authentication after clearing the node
secret.
5: Troubleshooting
73
For instructions on how to clear the node secret on Authentication Agent, see the
RSA Authentication Agent (SecurID) Help. For instructions on how to clear the node
secret on Authentication Manager, see the RSA Security Console Help.
Enable Tracing
You can enable tracing from the RSA Control Center to diagnose a range of
authentication issues. Typically, you would not enable tracing unless instructed to do
so by RSA Customer Support. Customer Support will also instruct you on which
components to trace and the levels to set for the tracing.
Note: Tracing is disabled by default. When enabled, the tracing output files are
written to C:\ProgramData\RSA\Logfiles for Vista, Windows 7, Windows Server
2008, and Windows Server 2008 R2.
To enable tracing:
1. From the computer with Authentication Agent installed, open the RSA Control
Center.
2. Click Advanced Tools.
3. Click Tracing.
4. As directed by Customer Support, configure the tracing settings.
5. Click OK.
74
5: Troubleshooting
3. If you receive an error message, Unable to retrieve server environment, the system
configuration (sdconf.rec) file is corrupt. You must replace the sdconf.rec.
For more information about replacing the file, see the Replace the System
Configuration (sdconf.rec) File.
5: Troubleshooting
75
76
5: Troubleshooting
5: Troubleshooting
77
78
5: Troubleshooting
5: Troubleshooting
79
sdopts.rec file.
81
balancing.
82
Meaning
210
You must assign a priority to each RSA Authentication Manager that you add
to the sdopts.rec file. Otherwise, the entry is invalid. The IP addresses in the
file are verified against the list of valid RSA Authentication Manager servers
that Authentication Agent receives as part of its initial authentication.
83
Only the actual IP address specified by the ALIAS keyword must be known
by the specified RSA Authentication Manager server. In addition, the actual
IP address must be included on any Authentication Manager server list
received by Authentication Agent. The Authentication Manager server list
provides actual and alias IP address information about all known
Authentication Manager servers in the realm. Authentication Agent receives
the list from the Authentication Manager server after Authentication Manager
validates an authentication request.
not use it with the USESERVER keyword for manual load balancing.
84
If you use the AVOID statement with the IP address of the default
RSA Authentication Manager server, the statement is ignored unless another
Authentication Manager server is available. The default Authentication Manager
server is the one where the sdconf.rec file was created. If an Authentication Manager
server is designated as the master, however, it becomes the default Authentication
Manager server regardless of where the sdconf.rec file was created.
The following example shows how to use the AVOID keywords in the sdopts.rec file:
AVOID=192.100.123.5
In this example, the RSA Authentication Manager server with the IP address
192.100.123.5 will not be used for authentication.
85
Note: You can use the USESERVER and ALIAS keywords together in the
sdopts.rec file. However, USESERVER keywords do not affect the alias addresses
used to connect to the Authentication Manager servers, and ALIAS keywords have no
effect on which Authentication Manager servers are specified for use.
through the Advanced Settings option in the RSA Control Center. For more
information on setting the IP address through the Control Center, see the
RSA Authentication Agent (SecurID) Help.
You can list the settings in the sdopts.rec file in any order, but you must list each
setting separately, one setting per line. The following example shows how to use the
ALIAS keywords in the sdopts.rec file.
;Any line of text preceded by a semicolon is ignored
;(is considered a comment).
;Do not put a blank space between a keyword and its
;equal sign. Blank spaces are permitted after the
;equal sign, after the IP address, and after the
;comma that separates an IP address from a priority
;value.
USESERVER=192.168.10.23, 10
USESERVER=192.168.10.22, 2
USESERVER=192.168.10.20, 1
USESERVER=192.168.10.21, 0
ALIAS=192.168.10.23, 192.168.4.1, 192.168.4.2, 192.168.4.3
ALIAS=192.168.10.22, 192.168.5.2, 192.168.5.3
ALIAS=192.168.10.20, 192.168.5.1
ALIAS=192.168.10.21, 0, 192.168.1.1
ALIAS_ONLY=192.168.10.23
IGNORE_ALIASES=192.168.10.22
In this example, the default is to use alias or actual IP addresses, with some
exceptions. The RSA Authentication Manager server with the actual IP address
192.168.10.23 has three alias addresses specified for it, while Authentication Manager
servers 192.168.10.20 and 192.168.10.21 each have only one alias.
RSA Authentication Manager server 192.168.10.22 has two alias addresses. The
aliases specified by the ALIAS keywords are additions to any aliases specified in the
sdconf.rec file and in the RSA Authentication Manager server.
This example shows how to use the USESERVER and ALIAS keywords together in
the sdopts.rec file. However, USESERVER keywords do not affect the alias
addresses used to connect to the Authentication Manager servers, and ALIAS
keywords have no effect on which Authentication Manager servers are specified for
use.
86
The ALIASES_ONLY exceptions specify that Authentication Agent should send its
requests to RSA Authentication Manager server 192.168.10.23 and 192.168.10.22 by
using only their alias IP addresses.
In the following example, the default is to use aliases, with two exceptions:
ALIASES_ONLY
IGNORE_ALIASES=192.168.10.23
IGNORE_ALIASES=192.168.10.22
87
This statement ensures that the Authentication Agent host always uses the specified IP
address to communicate with Authentication Manager.
Important: Authentication Agent ignores this setting if the computer has the IP
address override option set in the RSA Control Center. However, if you installed the
Auto-Registration utility (during or after the Authentication Agent installation
process), the address that the utility registers overrides the IP setting in the Control
Center. (The IP address override setting field also appears inactive once you install
the Auto-Registration utility.) For more information on setting the IP address through
the Control Center, see the RSA Authentication Agent (SecurID) Help.
88
Glossary
Term
Definition
agent
agent host
challenge group
connected
Credential Provider
disconnected
domain
emergency access
Glossary
89
Term
Definition
node secret
notification area
notification icon
offline authentication
offline data
offline days
passcode
90
Glossary
Term
Definition
reserve password
Server administrator
tokencode
two-factor authentication
USB authenticator
Windows account
Glossary
91
Term
Definition
92
Glossary
Index
A
account privileges, 41
agent
definition, 89
agent auto-registration utility
definition, 89
agent host
definition, 89
Agent Host Auto-Registration utility
affect on the node secret, 66
alias IP addresses, excluding from load
balancing, 86
ALIAS keyword, 83, 86
ALIASES_ONLY keyword, 84
Authentication Agent
description, 9
managing with GPO templates, 12
authentication problems, diagnosing, 74
authentication, offline, 10, 55
authenticator
supported, 17
using, 17
Automated Agent Host Registration and
Update utility
configuring for exemptions, 65
automatic
refresh of offline days, 57
update of IP addresses, 13
Auto-Registration utility
behavior during offline
authentication, 67
overview, 64
AVOID keyword, 84, 85
C
challenge
options, 10
challenge group
definition, 89
challenging users, 10
Citrix ICA Client, 24
CLIENT_IP keyword, 82, 87
command line, 43
configuration wizard, 38
connected
definition, 89
Control Center, 18
Index
creating
sdopts.rec file, 82
D
deploying installation package, 42
description
RSA Control Center, 18
description, Authentication Agent, 9
diagnosing authentication problems, 74
disconnected
definition, 89
documentation, 7
dynamic load balancing
excluding an Authentication
Manager, 85
overview, 81
E
elevated privileges, installing product
with, 41
emergency access, 60
for administrators, 11
offline, 60
encrypted communication, 47
error messages, 76
Event Viewer
log messages, 76
ExcludeAdaptor, 65
exempt administrator account, 11
G
Group Policy Object (GPO) templates, 12
I
icon, notification area, 59
IGNORE_ALIASES keyword, 84
installation
command line, 43
language, 16, 46
methods, 32
multiple computers, 38
repair, 50
silent, 38
single computer, 36
installation package
deploying, 42
IP addresses, automatic update, 13
93
K
keywords
ALIAS, 83, 86
ALIASES_ONLY, 84
AVOID, 84, 85
CLIENT_IP, 82, 87
IGNORE_ALIASES, 84
USESERVER, 81, 82, 85
L
language, 46
uninstall, 53
language, for installation, 16
load balancing, 81
dynamic, 81
excluding alias IP addresses, 86
maintaining primary IP addresses, 67
manual, 81
specifying an overriding IP address, 87
logs
Event Viewer, 76
M
managed applications, 41
managing Authentication Agent, 12
manual load balancing
configuring, 85
overview, 81
modifying options, 48
N
node secret, 47
node secret, clearing and replacing, 72
node verification failure, 72
notification icon, 59
O
offline authentication, 10, 55, 62
for remote users, 62
offline days
checking the supply, 59
managing, 57
refreshing
automatically, 57
when there is a network
connection, 57
without network connection, 58
offline days status, 59
options for challenging users, 10
94
P
password integration, 11
ports, required, 21
preparations
RSA SecurID users, 30
primary IP addresses, maintaining, 67
product
description, 9
R
refreshing offline days
when there is a network connection, 57
without network connection, 58
reinstall properties, 48
remote access products, 24
Remote Desktop Connection, 24
remote users, 62
removing Authentication Agent, 51
repairing an installation, 50
required operating systems, 22
required ports, 21
requirements, 21
RSA Control Center, 18
RSA SecurID users, preparing, 30
S
sdconf.rec file
copying from RSA Authentication
Manager, 26
viewing, 74
sdopts.rec file
creating, 82
sdopts.rec file, creating, 82
settings
node secret, 72
silent installation, 38
status, offline days, 59
T
tokencode, emergency, 60
U
uninstalling Authentication Agent, 51
uninstalling language, 53
updating IP addresses automatically, 13
Index
upgrade
RSA Authentication Agent 7.0 for
Microsoft Windows, 51
upgrade to Windows Vista, 51
users, challenging, 10
Index
W
Windows password integration, 11
95