RSA Secure ID


RSA SecurID ( “SecurID”) is a two-factor authentication technology that is used to protect network resources. The authentication is based on two factors — something you know (a password or PIN) and something you have (an authenticator). The authenticator is typically a hardware token (such as a USB token, smart card or key fob) and the software token is the RSA Authentication Manager Software that provides the security engine used to verify authentication requests.
How RSA Secure ID Works

When a user attempts to access a protected resource, he is prompted for a unique passcode. The passcode is a combination of their user’s PIN and the code that is displayed on the authenticator token at the time of log in.

The user ID and pass code are intercepted by the RSA Authentication Agent and presented to the RSA Authentication Manager software which validates the pass code. The RSA SecurID system computes what number the token is supposed to be showing at that moment in time, checks it against what the user entered, and makes the decision to allow or deny access.

RSA Secure ID Vulnerabilities

RSA secureID, which is considered to be the strongest authentication system on the market, was the target of a network breach in March 2011. The hack led to attacks on RSA clients (the end-users), including military contractor Lockheed Martin. L-3 Communications was the second victim of an attempted hack attack.

Read Also:

  • Red Hat CloudForms

    Red Hat CloudForms is an Infrastructure-as-a-Service (IaaS) offering that builds upon a collection of more than 60 open source projects. CloudForms include application lifecycle management capabilities as well as the capability to create hybrid public and private clouds from the broadest range of computing resources with unique portability across physical, virtual and cloud computing resources. […]

  • gateway antivirus

    A feature of network security appliances that provides integrated antivirus security on the appliance to block potential threats before reaching the network. Gateway antivirus allows corporate and enterprise to check for viruses at the application layer using a web-based scanning service. A number of security vendors offer gateway antivirus solutions and the phrase is commonly […]

  • Extensible Threat Management (XTM)

    Extensible Threat Management (XTM) is the next generation of Unified Threat Management (UTM). Where UTM describes a category of network security appliances that integrates a range of security features such as firewall, gateway anti-virus, and intrusion detection (IDS) and prevention (IPS) capabilities; XTM expands on these security features to include better networking capabilities and management. […]

  • textual harassment

    Using a mobile phone to repeatedly send unsolicited text messages to another person. The text messages may be a form of sexual harassment, abuse or bullying via text. Victims of textual harassment can request their cellphone provider to block texts (and calls) coming from a specific number, but with the capability to text from computer, […]

  • OpenStack

    A project originally started by NASA and Rackspace for delivering a cloud computing and storage platform. Today, OpenStack is a global collaboration of developers and technologists producing an open source cloud computing platform for public and private clouds. The technology consists of a series of interrelated projects delivering various components for a cloud infrastructure solution. […]


Disclaimer: RSA Secure ID definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.