Information Security

Defending the digital infrastructure


Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Authentication: RSA SecurID Appliance 2.0

RSA SecurID Appliance 2.0


RSA SecurID Appliance 2.0
RSA Security

Price: From $4,000 for 10-user to $34,000 for 250-user bundle


RSA Security's RSA SecurID Appliance 2.0

RSA SecurID Appliance 2.0 extends the box's robust two-factor authentication capabilities to large organizations.


Two-factor authentication has long been an attractive alternative to simple reliance on passwords. But, it has been difficult to implement and manage, and dogged by incompatibility with key networking components such as VPN gateways, Web portals, wireless access points and routers. After two decades of research and development, we are finally seeing products that come close to meeting enterprise expectations.

RSA Security's RSA SecurID Appliance, released last year, addressed most of these issues, but was geared towards small- and medium-sized organizations. Now, the highly scalable 2.0 version extends this functionality to large enterprises with capabilities of up to 50,000 users. The unit is shipped with support for up to 10 replicas, which can be used for load-balancing as well as high availability in situations when the primary is down for maintenance or other reasons.

The initial configuration was fairly smooth because of the product's well-designed Web interface. With good preparation and use of the planning worksheet included with the appliance, it is hard not to meet the 15-minute deployment (basic setup and configuration) claim made by RSA.

At the heart of SecurID is RSA's time-tested 4 GL-based Authentication Manager (the latest version includes wireless support and SecurID for Windows 2.0); we were able to carry out the majority of administrative tasks through the appliance's Web interface. However, you'll need to use the terminal service interface for advanced administrative tasks, such as importing users from an existing LDAP database instead of adding them manually and setting up synchronization jobs with LDAP databases.

In our lab, we used the SecurID Appliance to protect an IIS-based Web application, as well as for local Windows authentication. Both required installing an agent to relay authentication requests and a configuration file on the servers. The configuration file is created by the appliance after adding the servers. Similar agent software is required for Sun Microsystems' Java Web servers, Apache servers, UNIX/Linux hosts and the Novell eDirectory; in fact, more than 340 products, including remote access servers, IPSec- or SSL-based VPN gateways, Web portals, wireless APs and routers from various vendors are shipped with built-in support for RSA SecurID.

Like any other (Windows-based) device, the RSA SecurID Appliance did require extra reboots every time it experienced an unexpected power loss. Considering the criticality of the appliance and not-so-small price tag, provisioning an extra power supply doesn't seem unreasonable. We weren't impressed with the amount of time it took from opening a trouble ticket to receiving a call back from customer service.

The 1U rack-mountable appliance is built on a hardened Microsoft Windows 2003 Server. Patches and updates are provided through RSA's SecurCare Online portal. The unit comes with two 1 Gbps and two 10/100 Mbps network interfaces, and multiple USB and serial ports.

The 40x2 character-long LCD shows the basic status of the appliance, and a jog dial is provided for scrolling through the LCD options. Unfortunately, the LCD displays a "System Ready" message until the OS is completely up. (Be careful not to rotate the dial during boot-up--it can throw you into restore mode, which may result in losing configuration.) After that, it displays the name, IP address, connection status and whether the device is the primary unit or a replica.

Overall, we were pleased with the protection, ease of use and administration of the RSA SecurID Appliance, which gives both large and small organizations the robustness of RSA software in an easy-to-configure and -deploy box.



Article 10 of 18

Dig Deeper on Two-factor and multifactor authentication strategies

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

For Unix: We are trying to look for all of the logon activity for a user for the past 6 months, but when I run a report based on that user, I only get a record of the last 4 weeks, and I need the rest of the data. I see that our current archiving is purging and exporting our data offline and holding it there for 180 days. I do not know how to look at this archived data to get the rest of the user’s activity.

Get More Information Security

Access to all of our back issues View All