How to configure an RSA Authentication Manager 8.1 server to accept a system-generated PIN when a token is in new PIN mode when a user authenticates from a RADIUS client
Originally Published: 2016-03-07
Article Number
Applies To
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.1, 7.1
Issue
- New PIN cancelled for user and request originated from agent messages when authenticating.
- "New PIN cancelled for user" and "request originated from agent"
- Real time authentication activity report has an entry in the Description column of "New PIN cancelled for user "<user name>". Request originated from agent "<agent_FQDN>" with IP address "<IP_address>" in security domain "<security_domain>"
- Real time authentication activity report has an entry in the Reason column as: N/A
2. The Authentication Manager token policy is configured to require a system-generated PIN (Authentication > Policies > Token Policies > Manage Existing).
3. If the Authentication Manager SecurID PIN format is configured for user-generated PINs in the RSA token policy, the issue is not seen.
4. The user successfully authenticates from the RADIUS client with the user-generated PIN.
Resolution
1. Login to the Operations Console on the RSA Authentication Manager instance hosting the RADIUS server.
2. Click Deployment Configuration > RADIUS Servers.
3. If prompted, enter the Super Admin user ID and password, and click OK.
4. Select the RADIUS server hosted on this instance, and select Manage Server Files from the context menu.
5. Select securid.ini and click Edit.
6. Navigate to the SecurID General options section in the file.
7. Change ;AllowSystemPins = 0 to AllowSystemPins = 1 (Remove the ";" to uncomment the line and change the value from 0 to 1)
8. When done, click Save and Restart RADIUS Server.
9. The user will now be able to successfully authenticates from the RADIUS client with the system-generated PIN.
Notes
- Changes made to the securid.ini file on one RADIUS server are not automatically replicated to other RADIUS servers in the deployment. You must manually edit the securid.ini files of each RADIUS replica server in the deployment.
- For more information on the securid.ini file, see page 30 of the RSA Authentication Manager 8.1 RADIUS Reference Guide.
Related Articles
New PIN cancelled for user and request originated from agent messages when authenticating with RSA Authentication Manager 264Number of Views Radius Client Authentication failed For PIN+Token profile (New PIN Mode) with Cisco Anyconnect VPN 567Number of Views Radius Client Authentication failed For PIN+Token profile (New PIN Mode) with Cisco Anyconnect VPN 114Number of Views Reset the token PIN in the RSA Authentication Manager 8.x Self-Service Console when the existing PIN is forgotten 403Number of Views RADIUS Clients 102Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?