Authentication error occurs when additional authentication is required for RSA SecurID Access application portal or a protected application
Originally Published: 2018-04-05
Article Number
Applies To
Issue
Authentication error
The /var/log/symplified/symplified.log includes a message like:
2018-04-05/18:50:20.627/UTC [ajp-bio-8009-exec-7] WARN com.symplified.service.appliance.cloudmfa.CloudMFAUtils[37] - Failed strong authentication: AUTHN_ATTEMPT_ID_NOT_FOUND
The User Event Monitor shows an authentication failure with Authentication Details AUTHN_ATTEMPT_ID_NOT_FOUND.Cause
- The user is in an associated LDAP identity source but has not been synchronized to the Cloud yet.
- The user has been synchronized to the Cloud but a step-up authentication is required and the user is not registered for any of the allowed step-up authentication options.
- Two users in different identity sources are synchronized to the Cloud with the same user ID. A step-up authentication is required and at least one of the two users is not registered for any of the allowed step-up authentication options.
Resolution
Next, take the appropriate step below, depending on the cause of the issue, to ensure the user is correctly sync'd to the Cloud.
- The user is in an associated LDAP identity source but has not been synced to the Cloud yet.
Follow the steps in Manually Synchronize an Identity Source for the Cloud Authentication Service to create a record of the user in the SecurID Access cloud service.
- The user has been synced to the Cloud but a step-up authentication is required and the user is not registered for any of the allowed step-up authentication options.
Ensure that the user has a device registered to perform the required additional authentication. For example, see RSA SecurID Authenticate Device Registration Overview if approve (push notification) or authenticate tokencodes are allowable authentication methods.
- Two users in different identity sources are sync'd to the Cloud with the same user id. A step-up authentication is required and at least one of the two users is not registered for any of the allowed step-up authentication options.
Delete the unwanted user from the Cloud Authentication Service, and from the identity source.
Lastly, ensure that the user has the ability to perform the required additional authentication. For example, see RSA SecurID Authenticate Device Registration Overview if approve (push notification) or authenticate tokencodes are allowable authentication methods, or ensure the user's correct telephone is registered for SMS or Voice Token Code authentication.
Related Articles
SBR RADIUS returning a string attribute with an additional character in the Access-Accept packet 169Number of Views How to configure additional authentication for the RSA SecurID Access Cloud Administration Console 120Number of Views Can the Microsoft Integrated Windows Authentication (IWA) icon be hidden in the RSA SecurID Access Application Portal? 80Number of Views Adding an additional Operations Console administrator fails with the error message Encrypted data could not be updated in … 100Number of Views Protect the Cloud Administration Console with Additional (Step-Up) Authentication 105Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.9 Release Notes (January 2026) An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide
Don't see what you're looking for?