When Jira is accessed via the RSA portal, certain functionalities do not work as expected. Users are able to log in, but widgets fail to load, and multiple features are non-functional.
However, when Jira is accessed directly within the local network, it operates normally.
The issue is related to handling long URIs when accessing Jira through the RSA portal or a reverse proxy.
A review of the IDR logs showed no suspicious activity. However, analysis of Apache HTTP Server version 2.4.58 revealed that the mod_substitute module enforces a maximum substitution limit of 5 MB.
Requests containing long URIs are likely exceeding this limit, which results in broken widgets and non-functional features in Jira when accessed via the portal.
As a temporary solution, the customers can increase the maximum line length for substitutions in the Cloud Administration Console.
- Sign in to Cloud Administration Console.
- Navigate to Applications > My Applications.
- Click Edit for the Jira application.
- Go to Proxy Settings.
- Click Advanced Configuration.
- Under Rewrite Rules, add the following rule:
SubstituteMaxLineLength 10M - Save the configuration.
- Publish the changes.
This change raises the maximum substitution line length to 10 MB, preventing long URI requests from exceeding the default 5 MB limit in mod_substitute.
Related Articles
RSA SecurID WebExpress and ACE/Server QuickAdmin: Protecting JRun functionality from IIS Lockdown Tool 6Number of Views RSA ACE/Server Remote Administration functionality on Windows 2000 7Number of Views How to test EFN Functionality 121Number of Views Troubleshooting RSA SecurID Access Application Portal unsuccessful logon message due to a bad identity source bind 313Number of Views macOS Ventura Impacting the Functionality of MFA Agent and Authenticator for macOS 43Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Release Notes for RSA Authentication Manager 8.8 RSA Authentication Manager 8.9 Release Notes (January 2026) Supported On-Demand Authentication (ODA) SMS providers for use with RSA Authentication Manager 8.x Deploying RSA Authenticator 6.2.2 for Windows Using DISM