
RSA SecurID Software Token 4.1 Administrator’s Guide
2: Installing the Application 35
Installing RSA SecurID Software Token for Mac OS X
You can deploy RSA SecurID Software Token for Mac OS X from the RSA web site
or stage the application on your own web site. Alternatively, you can use deployment
tools provided by Apple Computer or third-party vendors.
Note: RSA recommends that you set any customization policies before you install the
application. For more information, see “Customizing the Application” on page 83.
Mac OS X Installation Package
The RSA SecurID Software Token for Mac OS X installation package,
RSASecurIDToken410.dmg, contains the following:
• An installation file, RSASecurIDSoftwareToken410.mpkg.
• Documentation, including this Administrator’s Guide, Release Notes, and a user
Quick Start document. After the application is installed, users can access the
Quick Start from /Library/Documentation/Applications/SecurID/
SecurID_Token_quickstart.pdf.
• A device definition file, def/Desktop-Mac-4.x-swtd.xml. For more information,
see “Device Definition Files
” on page 49.
Customize the Token Database Location (Optional)
By default, software tokens used with the application are stored in ~/.RSA/RSA/RSA
SecurID Software Token Library. To change the storage location, you must modify
a configuration file before installing the software. The configuration file,
RSA_DB_Config.txt, is located within the installation package in the
RSASecurIDToken410.mkpg /Contents/Resource/ directory.
The configuration file contains the following placeholder for the path of the custom
database:
dbPath=~[CUSTOM_DB_PATH_PLACEHOLDER]
Configuration Requirements
Observe the following requirements when modifying the configuration file:
• Specify a database path that is relative to the user’s home directory. The specified
path must start with a tilde (~). Otherwise, the installer displays an error message
and quits.
• Do not include /../ in the custom database path.
Edit the Configuration File and Install the Application
Use the following procedure to customize the database location and install the custom
installation package.
Important: You must give nonadministrative users Read, Write, and Modify
privileges to the database file. Otherwise, they may not be able to use the application.
Comentarios a estos manuales