Troubleshooting guide
Contents 3
RSA Authentication Manager 6.1 to 8.1 Migration Guide
Contents
Revision History.............................................................................................................. 7
Preface................................................................................................................................... 9
About This Guide................................................................................................................9
RSA
Authentication Manager 8.1 Documentation ............................................................. 9
Related Documentation..................................................................................................... 10
Support and Service ...........................................................................................................11
Before You Call Customer Support............................................................................11
Chapter 1: Important RSA Authentication Manager 8.1
Changes.............................................................................................................................. 13
Introduction to RSA Authentication Manager 8.1 ............................................................ 13
Important Changes to Terms and Concepts ...................................................................... 13
Authentication Manager 8.1 Enhancements ..................................................................... 16
Authentication Manager 8.1 License Types ..................................................................... 18
Risk-Based Authentication ............................................................................................... 20
Web Tier ........................................................................................................................... 20
Architectural Changes in Authentication Manager 8.1..................................................... 21
Changes to Sites......................................................................................................... 23
Changes to User Groups ............................................................................................ 24
The Replication Model...................................................................................................... 28
Runtime Updates on a Replica Instance ........................................................................... 28
Administrative Capabilities............................................................................................... 29
Changes to Browser-Based Administration............................................................... 29
Increased Administrative Scoping ............................................................................. 30
Group Administrators ................................................................................................ 33
Custom Administration Applications................................................................................ 33
Authentication Manager Real-Time Activity Monitors.................................................... 33
Report Templates .............................................................................................................. 34
RSA RADIUS ................................................................................................................... 34
Comparison of Cross-Realm Relationships and Trusted Realms ..................................... 35
Chapter 2: Planning For Migration..................................................................... 39
Migration Planning Checklist ........................................................................................... 39
Complete an Authentication Manager 6.1 to 8.1 Migration Assessment ......................... 40
Choosing a Migration Path ............................................................................................... 41
Migration with the Same Hostname and IP Address ................................................. 41
Migration with a New Hostname and IP Address ..................................................... 41
Authentication Agent Support .......................................................................................... 42
Auto-Registration and Legacy Mode......................................................................... 42
Installed RSA Authentication Agents........................................................................ 42
Embedded Agents in Third-Party Hardware and Products........................................ 42