Single Sign-On

RSA SecurID® Access

Streamline user access and boost employee productivity with a secure, convenient single sign-on solution. RSA SecurID Access includes single sign-on capabilities that provide SaaS, mobile and web users with a single web-based portal for accessing their applications.

  • Apply business policies that match individual users’ risk profiles.
  • Request additional “step up” authentication—such as an RSA SecurID token or biometric—if an access attempt requires it.
Single Sign-On
Immature IAM Capabilities Prevail - Only 37% of organizations describe their IAM capabilities as mature

Solution Brief

RSA SecurID Access

RSA SecurID Access provides convenient, secure access and single sign-on to leading web and SaaS applications, native mobile apps, VPNs, firewalls, virtual desktops, and Windows and Linux servers.

Read the Solution Brief


Identity Assurance

Identity Assurance

RSA SecurID Access validates the legitimacy of access attempts by looking at certain characteristics of users—including (but not limited to) a user’s role, location, session and network information, and device type. It then considers the risk associated with the asset the user is trying to access, and based on those factors, RSA SecurID Access makes a real-time, risk-based authentication decision.

For Any User, from Anywhere

For Any User, from Anywhere

Deliver secure access to all your applications—not through a VPN but through a web-based portal users can access from anywhere in the world.

Security, Convenience and Speed

Security, Convenience and Speed

Applies the same highly secure access levels for SaaS and mobile apps that are already provided for traditional enterprise applications. Speeds user access to on-premises and SaaS applications with a frictionless user experience that adheres to enterprise security policies.

Administration Portal

Administration Portal

An easy-to-manage administration portal makes it easy to point to the web-based and SaaS connectors you need to quickly populate the portal with the applications that drive your business. Users can access the portal with their Active Directory passwords.

Apply Business-Driven Security to Access Decisions

Apply Business-Driven Security to Access Decisions

Govern access using context-based policies that look at the application a user is trying to reach, the location of the user and more. Riskier situations can require a user to provide additional “step up” authentication.


Reduce business risk using the trusted, reliable access controls provided by single sign-on to validate users’ identities and assure they are who they say they are.

Apply consistent and centrally enforced contextual access policies to efficiently configure access for users based on their business area, location, application sensitivity, session and network information, and device type.

Give business line managers and application owners the ability to easily enroll their applications and quickly provision access to users while maintaining compliance with enterprise security policies.

​Provide secure access to authorized users, from any device and any location to any system.

Take advantage of proven technology: RSA SecurID Access protects more than 25,000 organizations and 55 million users.

"For a highly regulated organization like ours, it made sense to choose the solution that gives us both the performance and scalability benefits of SaaS and the security of on premise."
Kyle Welsh
Chief Information Security Officer

Boeing Employee Credit Union


Solution Brief

RSA SecurID Suite

Find out how RSA SecurID Suite can help you address to fundamental IAM challenges: verifying that your users are who they say they are and ensuring they have the right level of access across cloud-based and on-premises resources.

Learn More


Accelerate Your Business and Minimize Risk with the RSA SecurID® Suite

The digital revolution is exposing organizations to new vulnerabilities and risks. Learn how RSA SecurID Suite can help you capture the benefits of digital transformation while mitigating related identity risks.

Learn More

Data Sheets


  • Identity Crisis: Authenticating Users in Today's Changing Environment The CISO for the Commonwealth of Pennsylvania, along with identity and access management experts from the FIDO Alliance and analyst firms, discuss what it takes to authenticate a range of users across and expanding array of devices and platforms.
  • User Authentication Trends Is single sign-on worth the risk? When will biometrics live up to its hype? Get definitive answers to these and other questions about user authentication trends.


Use Cases

  • RSA SecurID Access: Cloud Access Use Case Find out how our pure cloud multi-factor authentication solution helped a financial services company meet the needs of its highly mobile user base while improving audit performance.


  • 6 Keys to Successful Identity Assurance RSA Identity expert Jason Oeltjen leads a discussion about the six requirements for a successful identity assurance strategy. You'll learn what you need to end the tug of war between security and convenience.
  • A New Approach to Identity and Access Management Traditional identity and access management technologies leave IT security and operations teams ill-equipped to simultaneously ensure convenience and strong security. Join Jim Ducharme, VP of Identity Products at RSA, to learn how the right IAM technology can help you achieve both.
  • Integrating Identity and Authentication Events to Improve SIEM Threat Detection Most organizations have implemented SIEM as well as identity and access management technologies. But are these systems talking to each other? Join RSA and Ultimate Windows Security to learn about the event information generated by access management and authentication technologies and you can leverage it once it’s in your SIEM.

White Papers

Want a Demo?

Sign up for a free demo today and watch our products in action.

Ready to Buy?

It's easy. Speak with an RSA expert anytime to request a quote.