11.07.2015 Views

RSA Authentication Manager 6.1 Administrator's Guide - The Ether ...

RSA Authentication Manager 6.1 Administrator's Guide - The Ether ...

RSA Authentication Manager 6.1 Administrator's Guide - The Ether ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>RSA</strong> <strong>Authentication</strong> <strong>Manager</strong> <strong>6.1</strong> Administrator’s <strong>Guide</strong>Important Administrative ToolsSystem Design Tools<strong>The</strong> following features will help you manage your <strong>RSA</strong> <strong>Authentication</strong> <strong>Manager</strong>Agent Hosts, tokens, and users more efficiently.Open Agent HostsOpen Agent Hosts are supported for all Agent types. If an Agent Host is “open,” usersare not required to be directly activated on the Agent Host or to be members of agroup activated on the Agent Host. Any user registered in your <strong>Authentication</strong><strong>Manager</strong> database can be authenticated on an open Agent Host. For more information,see “Agent Host/<strong>Authentication</strong> <strong>Manager</strong> Architecture” on page 23.Note: If you plan to use <strong>RSA</strong> <strong>Authentication</strong> Agent 6.0 or <strong>6.1</strong> to enable offlineauthentication, and you want only some users to have this capability, you can controlthis on an Agent Host basis. In this case, you would not want to use an open AgentHost. Offline authentication (and related) capabilities are discussed in more detail in“Setting Up Offline <strong>Authentication</strong> and Password Integration” on page 59.Automated Agent Host Registration and UpdatingAutomated Agent Host registration and updating reduces administrative overhead byenabling new Agent Hosts to register themselves with the <strong>Authentication</strong> <strong>Manager</strong>and by enabling existing Agent Hosts to automatically update their own IP addressesand sdconf.rec files. See “Automated Agent Host Registration and Updating” onpage 65.Consolidated LoggingAll log messages are consolidated to the Primary. When activity on a Replicagenerates a log message, the message is eventually sent to the Primary and logged inthe Primary log database. During heavy periods of authentication, consolidation ofthese delta records to the Primary database have a lower priority, but eventually areconsolidated.External AuthorizationYou can use External Authorization to apply additional criteria before users can accessnetwork resources. External Authorization criteria supplement <strong>RSA</strong> <strong>Authentication</strong><strong>Manager</strong> authentication—they do not replace it. See “Customizing YourAuthorization Procedures” on page 216.Report Creation UtilityYou can run standard reports (reports that cannot be modified or removed) and youcan create and run custom reports. Audit trail reports are run against the sdlogdatabase. Token statistic reports are run against the sdserv database. For moreinformation, see “<strong>RSA</strong> <strong>Authentication</strong> <strong>Manager</strong> Report Creation Utility (Windows)”on page 174 or “<strong>RSA</strong> <strong>Authentication</strong> <strong>Manager</strong> Report Creation Utility (UNIX)” onpage 183.34 2: Using <strong>RSA</strong> <strong>Authentication</strong> <strong>Manager</strong> Administration Applications

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!