How to troubleshoot On-Demand Authentication (ODA) login failures in RSA Authentication Manager 8.x
Originally Published: 2015-03-30
Article Number
Applies To
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.x
Issue
Tasks
Resolution
The capture files will show if both the primary and any replicas are sending an email, if the replica is sending two emails, or if the primary and any replicas are not sending any emails.
- Launch two SSH sessions to the Authentication Manager primary with the operating system account rsaadmin.
- In Session 1,
- Sudo to the root user.
- Navigate to /usr/sbin.
- Start the tcpdump to capture the SMTP traffic.
login as: rsaadmin Using keyboard-interactive authentication. Password: <enter OS user password> Last login: Mon Sep 12 15:13:53 2016 from jumphost.vcloud.local RSA Authentication Manager Installation Directory: /opt/rsa/am rsaadmin@am81p:~> sudo su - rsaadmin's password: <enter OS user password> am81p:~ # cd /usr/sbin am81p:/usr/sbin # ./tcpdump -i eth0 -s 1514 -Z root port 25 -w /tmp/smtp_<server_name>.pcap tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 1514 bytes
- In Session 2,
- Sudo to the root user.
- Navigate to /usr/sbin.
- Start the tcpdump to capture the authentication traffic.
login as: rsaadmin Using keyboard-interactive authentication. Password: <enter OS user password> Last login: Tue Sep 13 14:40:59 2016 from jumphost.vcloud.local RSA Authentication Manager Installation Directory: /opt/rsa/am rsaadmin@am81p:~> sudo su - rsaadmin's password: <enter OS user password> am81p:~ # cd /usr/sbin am81p:/usr/sbin # ./tcpdump -i eth0 -s 1514 -Z root port 5500 -w /tmp/auth_<server_name>.pcap tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 1514 bytes
- Concurrently with steps 1 through 3 on the primary, repeat steps 1 through 3 on all replica servers.
- Let the captures run until the failures occur. When the logon failure occurs, stop the tcpdump in each session by typing Ctrl+C.
- On each server, navigate to /tmp to change permissions on the files.
am81p:/usr/sbin # cd /tmp am81p:/tmp # ls -al *.pcap -rw-r--r-- 1 root root 24 Sep 13 14:51 auth_<server_name>.pcap -rw-r--r-- 1 root root 24 Sep 13 14:51 smtp_<server_name>.pcap am81p:/tmp # chmod 777 *.pcap am81p:/tmp # ls -al *.pcap -rwxrwxrwx 1 root root 24 Sep 13 14:51 auth_<server_name>.pcap -rwxrwxrwx 1 root root 24 Sep 13 14:51 smtp_<server_name>.pcap am81p:/tmp #
- Copy the smtp._<server_name>pcap and the auth_<server_name>.pcap off the Authentication Manager primary and replicas using WinSCP or a similar program.
- In addition to providing the .pcap files to RSA Support, please login to the Operations Console for each server and download the troubleshooting logs (Administration > Download troubleshooting Files) and send those along as well. Note that a password is required when creating this file and that password needs to be provided to RSA support.
- Also send a copy of the authentication activity report covering the time frame of the ODA failures (Reporting > Reports > Add New > Authentication Activity).
Notes
Big Picture of an On-Demand Authentication
For an ODA/ODT login success,- The user enters their PIN.
- The PIN triggers an email or an SMS delivery of the On-Demand Tokencode.
- The use enters the ODT to complete the authentication request.
- The second login screen often says to enter the next tokencode, even for an ODA.
From the Authentication Agent
| 1 | Primary/replica | < | PIN received for user ID |
| 2 | > | Email sent to user with On-Demand Tokencode (ODT) | |
| 3 | Primary/replica | < | User enters ODA code |
| 4 | > | Successful authentication |
Note: If the authentication in Step 3 takes more than 60 seconds after the PIN is entered in Step 1 some agents timeout and do not send the Step 3 authentication request and nothing shows in the authentication activity logs because the authentication request never arrived. Moreover, the user has to enter their PIN again to trigger a second email/SMS ODT.
Related Articles
RCM installation fails with error 'Unable to load crypto provider : pkcs11v2 /usr/lunasa/lib/libCryptoki2_64.so' and '[Xrc… 43Number of Views Slow login to RSA Authentication Agent for Windows 7.x 404Number of Views How to temporarily enable HTTP login to RSA Identity Governance & Lifecycle 425Number of Views RSA Authentication Agent for Windows shows no login tiles on the login screen 258Number of Views Unable to login to RSA Authentication Manager via SSH after changing operating system password to contain a backslash (\) 304Number of Views
Trending Articles
An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager Upgrade Process Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide
Don't see what you're looking for?