Obtaining the RSA Authentication Manager License Serial Number from the CLI
Originally Published: 2019-09-26
Article Number
Applies To
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.4.0
Platform: Linux
Issue
Resolution
A shell script called RSAAM_license_view.sh is available at URL https://sftp.rsa.com/human.aspx?Username=support&password=Password1&arg01=610325349&arg12=downloaddirect&transaction=signon&quiet=true which will obtain the XML output from /tmp/license.zip (where it is present), access the Authentication Manager database where it is in a [RUNNING] state and obtain the account_id from the ‘rsa_rep.ims_license’ table and generate a report.
Installation
- Download the shell script RSAAM_license_view.sh.
- {Optional} Where it is company policy run the shell script file through a virus scanner before usage.
- Copy the shell script into the /tmp folder on the primary instance using a secure FTP client. e.g. WinSCP (where secure shell has been enabled). Use the rsaadmin account to access the primary instance with the secure FTP client.
- Logon to the command line using the rsaadmin account (you will need to know the rsaadmin password).
- Navigate to the /tmp folder e.g. cd /tmp
- Change the file permissions to 755 for the file RSAAM_license_view.sh e.g. chmod 755 RSAAM_license_view.sh
- At the command line as rsaadmin, change the account privileges with the command: sudo su -
- Navigate to the /tmp folder e.g. cd /tmp
- In the /tmp folder enter the command: ./RSAAM_license_view.sh
NOTE: you will be prompted to enter the Operations Console username and password.
Example:
am84p:/tmp # ./RSAAM_license_view.sh Checking OC credentials....missing OC credentials! Please enter OC Administrator username: ocadmin Please enter OC Administrator password: password OC credentials validated (allowing for database access). License information being collected.. Done! Report file: /tmp/license_data_201909241110.log LICENSE INFORMATION <?xml version="1.0" encoding="UTF-8"?> <license:licenseRecord xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:license="http://www.rsasecurity.com/schemas/2004/05/licenserecord.xsd" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" creationDate="2013-09-23T14:32:45.374-05:00" deployment="floating" id="LIC821847529EB1640A0805183F91571F2E" licenseCategory="Development" version="1.0"> <!--Customer Information--> <license:customer>AM Developers Only</license:customer> <license:customerAccountId>AM_DEVELOPERS</license:customerAccountId> <!--Product Information--> <license:product>RSA Authentication Manager</license:product> <license:productId>AM</license:productId> <license:productVersion>8.1</license:productVersion> <license:strategy id="amcorelevel" name="License Type"> <license:className>com.rsa.authmgr.internal.admin.license.strategies.AMCoreStrategy</license:className> <license:classVersion>1.0</license:classVersion> <license:strategyData> <license:property name="Core">300</license:property> </license:strategyData> </license:strategy> <license:feature id="amtokenselfservice" name="Token Self-Service" version="1"> <license:strategy id="amtokenselfservice" name="Self-Service"> <license:className>com.rsa.authmgr.internal.admin.license.strategies.AMTokenSelfServiceStrategy</license:className> <license:classVersion>1.0</license:classVersion> <license:strategyData> <license:property name="data">true</license:property> </license:strategyData> </license:strategy> </license:feature> <license:feature id="amusercount" name="Users with Assigned Authenticators" version="1"> <license:strategy id="amusercount" name="Users with Assigned Authenticators"> <license:className>com.rsa.authmgr.internal.admin.license.strategies.AMUserCountStrategy</license:className> <license:classVersion>1.0</license:classVersion> <license:strategyData> <license:property name="Users">1000000</license:property> </license:strategyData> </license:strategy> </license:feature> <license:feature id="aminstance" name="Replication" version="1"> <license:strategy id="aminstance" name="Number of Instances"> <license:className>com.rsa.authmgr.internal.admin.license.strategies.AMInstanceStrategy</license:className> <license:classVersion>1.0</license:classVersion> <license:strategyData> <license:property name="Instances">15</license:property> </license:strategyData> </license:strategy> </license:feature> <license:feature id="bco" name="Business Continuity" version="1"> <license:strategy id="bco" name="Business Continuity"> <license:className>com.rsa.authmgr.internal.admin.license.strategies.AMBCOStrategy</license:className> <license:classVersion>1.0</license:classVersion> <license:strategyData> <license:property name="Enabled">true</license:property> <license:property name="AdditionalUsers">1000000</license:property> <license:property name="Expiration">2015.12.31</license:property> <license:property name="ActivationDuration">60</license:property> <license:property name="Activations">6</license:property> </license:strategyData> </license:strategy> </license:feature> <license:feature id="amofflineauth" name="Offline Authentication" version="1"> <license:strategy id="amofflineauth" name="Offline Authentication"> <license:className>com.rsa.authmgr.internal.admin.license.strategies.AMOfflineAuthStrategy</license:className> <license:classVersion>1.0</license:classVersion> <license:strategyData> <license:property name="data">true</license:property> </license:strategyData> </license:strategy> </license:feature> <license:feature id="tokens" name="Tokens" version="1"> <license:strategy id="tokens" name="Tokens"> <license:className>com.rsa.authmgr.internal.admin.license.strategies.AMTokenStrategy</license:className> <license:classVersion>1.0</license:classVersion> <license:strategyData> <license:property name="data">true</license:property> </license:strategyData> </license:strategy> </license:feature> <license:feature id="rbaoda" name="RBA/ODA" version="1"> <license:strategy id="rbaOdaEnabled" name="RBA/ODA"> <license:className>com.rsa.ims.license.strategies.RbaOdaStrategy</license:className> <license:classVersion>1.0</license:classVersion> <license:strategyData> <license:property name="data">true</license:property> </license:strategyData> </license:strategy> <license:strategy id="rbaOdaCount" name="Number of users with RBA/ODA enabled"> <license:className>com.rsa.authmgr.internal.admin.license.strategies.AMRbaOdaCounterStrategy</license:className> <license:classVersion>1.0</license:classVersion> <license:strategyData> <license:property name="RbaOdaAuthenticators">1000000</license:property> </license:strategyData> </license:strategy> </license:feature> <license:feature id="amradius" name="RADIUS" version="1"> <license:strategy id="amradius" name="RADIUS"> <license:className>com.rsa.authmgr.internal.admin.license.strategies.AMRadiusStrategy</license:className> <license:classVersion>1.0</license:classVersion> <license:strategyData> <license:property name="data">true</license:property> </license:strategyData> </license:strategy> </license:feature> <license:feature id="amtokenprovisioning" name="Token Provisioning" version="1"> <license:strategy id="amtokenprovisioning" name="Authenticator Provisioning"> <license:className>com.rsa.authmgr.internal.admin.license.strategies.AMTokenProvisioningStrategy</license:className> <license:classVersion>1.0</license:classVersion> <license:strategyData> <license:property name="data">true</license:property> </license:strategyData> </license:strategy> </license:feature> <!--End of license, signature here.--> <ds:Signature> <ds:SignedInfo> <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"></ds:CanonicalizationMethod> <ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"></ds:SignatureMethod> <ds:Reference URI="#LIC821847529EB1640A0805183F91571F2E"> <ds:Transforms> <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"></ds:Transform> <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"><ec:InclusiveNamespaces xmlns:ec="http://www.w3.org/2001/10/xml-exc-c14n#" PrefixList="ds license #default"></ec:InclusiveNamespaces></ds:Transform> </ds:Transforms> <ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"></ds:DigestMethod> <ds:DigestValue>qtazabV53aFzr2TAaPd+MS+3fL4=</ds:DigestValue> </ds:Reference> </ds:SignedInfo> <ds:SignatureValue> ZMQ8DRdYwxYm4z3AZqrEDSKuiwor02on5raBtCnREIiBlhkeoNVoY9/gz3n34jA67hgb2mWVsJGh nS/uu6WdVcuno1BKbjth/lcpiASiz1KyxpAnai+5PeVUbjm2Wropvem8mjaJAvZ/EhJZDk3Ycaam wFSOignJqu8bwMRAo0ZcS/XyAHitc1SkVQfa8lNl5Fewah1QoZGzcTZtizRzrRl6kp5lLJMNea7N RBWJXjwCsqPu7FU8OIE2DnmbIW7uteGxSKfaDfeMelkgE10g8pQL0vgYFKHVJH5nqm9XX8NsGy// qv9lq0xWLRLFs7GfalayiPf23WAGROq1ILt86w== </ds:SignatureValue> <ds:KeyInfo> <ds:X509Data> <ds:X509Certificate> MIIC+zCCAeOgAwIBAgIEjkIeOzANBgkqhkiG9w0BAQUFADAvMS0wKwYDVQQDEyRSU0EgTGljZW5z ZSBTaWduaW5nIFJvb3QgQ2VydGlmaWNhdGUwHhcNMDkxMjE0MTczNTE1WhcNMjAwMTE0MDUwMDAw WjA7MTkwNwYDVQQDEzBSU0EgRGV2ZWxvcG1lbnQgU2l0ZSBMaWNlbnNlIFNpZ25pbmcgQ2VydGlm aWNhdGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC5bQDItBxKWtRRlVUJbe52CtR/ 0u4Q3/yYs9bHb1jMydTeXqDxGlTMzuNayozBb0Oa+Ei4t9Tql6+jxsvS3i575RIR9h7tPyEIxy0Q 7ZH8fnU6evJBs6yB4F70rjnnSQSr9CPh10Cu2HR7xsdEjiIAKaWHxNtuf4uMRY8wrvnyO+PCmjBE KlEYVkMrVnNJJpS4abUH8bbaZBw41OXiQ+x+lIcLpi3yP9B0JUdb6pxLjpJgGY2pNmUjQ9TqNK82 o38tOOBDDYtxdLB+NJPaZej6JUN4V9ieeR30wYuomfCU1hRd57GCimWugmfNXYtEFOgnriGJ68vk 1eOmHDkDBskBAgMBAAGjEzARMA8GA1UdDwEB/wQFAwMHwAAwDQYJKoZIhvcNAQEFBQADggEBANUb xX2NGQiUWteazfAsQrmYo2mq14yOrjs6+dxXnyvd/It2EY3oCGdpmPqesYYIRzEiZRWdokLJQhLS ZetIyJbiTKsw9ZTByWfmSpLU/d+x9iG0JwmXWt5hKfsgU/e98Gr/TTA78lSzfQtv5RjmayT3OqVt BY0fA3iNv2/VDQsvhJ3EDca/mQoFXaaNEhd0C2fsgqUF+57xOOHLp+GZYNEQVWABm/3lbAh+q54s uM3/CgeetvuUQ2wTBJu9CV7fXq1YW5WVu3AlXOMVIs+3tp6jfTFYN2oBBhE695Sq9TBMFZYh+xK1 P83MbI42bmyMlf7MHuZRgWidrmvEcWE/qFs= </ds:X509Certificate> <ds:X509Certificate> MIID+jCCAeKgAwIBAgIEkqCP6jANBgkqhkiG9w0BAQUFADAmMSQwIgYDVQQDExtSU0EgUHVibGlj IFJvb3QgQ2VydGlmaWNhdGUwHhcNMDYwMjIyMTYzODQ5WhcNMTYwMzIyMDQwMDAwWjAvMS0wKwYD VQQDEyRSU0EgTGljZW5zZSBTaWduaW5nIFJvb3QgQ2VydGlmaWNhdGUwggEiMA0GCSqGSIb3DQEB AQUAA4IBDwAwggEKAoIBAQDr0MYTm1Wg6eU+nfL3SUMGkHoJ/VyU79cVkT1ji0x8sLf5eGAQHpbn Y8K4/6Uq146/TtRKqShREL3djpAPwc9g/cDiUpeochIOreZRkJ1KOxAQ+B4eTd8+hW8OUsUrBYOD 8XlFWdxEbFSvkdeaFYwKc7poZmyjl6yReUawOlQUDg8oaiIgC8dYXHu5N/q8aOyE9tehvPDIcszQ upFo7qdCblOCieMAATGUtmDDKb0xuBcS0ir+BzhkivVwuSF2g0Ze/5RiUgT3rlyF8zPR3pjHdu31 Lq9A/O9mGT2gNRDw+ehTThDoBjsEdySgxjnR1Jui+S0jQYMeSUxYwz9zt/31AgMBAAGjJzAlMBIG A1UdEwEB/wQIMAYBAf8CAQAwDwYDVR0PAQH/BAUDAweEADANBgkqhkiG9w0BAQUFAAOCAgEAWfJf TF6/PmWGIYUSW4OBzCp+r5EM1QYFI1/3rGEDUhqc8r5VQ4san7iNJzcXjQz2+wqxa6Oh/kiRdcSe NZ4wP3vQsWtlfynWNpVa9pwLHGwAirOjwSNfphi1PZEV41TzCZeXoIFUtdJbM+qYXSC5Xho3I5Lx 7Be+vORov5leEK2KVngO+w4CU/g53jN2bGmb40mLYpexMlD//20VWpEi8a7lnSSHDTbZf7kQ9qf7 ntin325Cjk8noVIIzg/+6TwB5WHZHzlMbDKgnJM8P4NydpSF2Hif3kSFeBjvUieDVfp4a1g3r+uR IeVqOLkqewbOjXz6XlPtiikl55xKWsWHtiSrKlHSOnHRM07CmiQGw6i2GHNI3XceimqCdhEYviXD mn0gHZd4ad41SKyUEJmnkWTBc6GOMGVDGmq1VB0yPPPaNuDLDFeSsXKwmgbatEyPyvtQUZErUNih dScyzs+rHC7nTS+1l95ruC4vWImQueOlNzIpS7lu/WG9bcz+VmzETl9/gBs6OI+gMwsp7b5HvzLf EPQeuybUljUfqtdobKzV5dpyI1kgoV8Gb7j/SX9oDsRhP7EM8Es6KNQJ9O4sf3j/wlYWWBPuBO6h Wiemo4YAUEwQXbOU8bFjxoB8FZohRwbcr3BD5QgXTfRtgn8X+T+04dwRaGf3fl8VgJyXrZs= </ds:X509Certificate> <ds:X509Certificate> MIIEwzCCAqsCBEP8kuswDQYJKoZIhvcNAQEEBQAwJjEkMCIGA1UEAxMbUlNBIFB1YmxpYyBSb290 IENlcnRpZmljYXRlMB4XDTA2MDIyMjE2MzU1NVoXDTI2MDIxNzE2MzU1NVowJjEkMCIGA1UEAxMb UlNBIFB1YmxpYyBSb290IENlcnRpZmljYXRlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKC AgEAlQNLsRbzrDSjnY5OT22TqFH+52u7gMODSsJigQOpLv4hQN/IFb+DHgJ3kuFMGiMzr6KguvWD LkFdIsfC08oQ66IrolzV26CCgTBuWYoY8qUUYKiwQh5xA6HAVAjm2/EcCVn8LMDvCeQW1UCaRf3v NMaQl9LdisjvfovRbeoN7S0idwcxlRsbGQuAjTiombNxYW/BoBDOeNSuFhB4szt6chXeLKt1/WfC EDYpGSIZaFL0Ox1Lzx6zN5Sio+W6XBFxVWtRlaW+6z4siQMJUsyRztQhb+3FFvyt1FwkOLdXfRP0 MD1DP1RaCsOv59V6MD/ekMQGweQ4T01UyT5Gg9yZPvupX0nwDGmV+L/VF62mmjqjMCqmPzYRSU+J IdLOb1a5eqodXoD6Uhmowznh+IyHmu69OqsGM9nEMyQWdLmCqjJAxDBn3/adtVTXH5ksmOeinFTL cFzlj/JPoFSnv6KbdxzVj3Ad/9DpFZH8LZZYYLdg1TnF0M1usG/s/1j1I2++X0lnpJVy3DNLjYTt UEM1NRvFgj7qgWiFicz3muV1b3++P7yeLkM+a1UaCTlq2RxvI7hNecDatP1uYe+khIcwTaUJRror ZiY680AIe0pgoi/omnZGglvgx6vxsoyNve14aFfehl9KxfJ6EVwHIaP0l2p7iw8gqAzAALezFzDA qHkCAwEAATANBgkqhkiG9w0BAQQFAAOCAgEAC9RlbZxefXc0SrIz6JZ2YtOu8uGilUmN2ALrQ8JF Pvi8RG8bdsJ4FSu/hc9Y/ehHadEsluOwbdUls82qL7k/znOqif+FoBC9mENEwnR3kWF1sK8K5AGV vs5P6dW3jjFu4F0BuzIuC1mGQFNbBwPU9NxCfRu5GbirTYHKM5d0Hm6k7Xig+rb5wDF69MPAY4UT nush29xKu+pX2hMivM3/oIIJvvefesSR0gh/Z39tw+pUQleZJGhpksDxISYpOvqpPeHKp7KmkzBS Umgbw1mck9EqIXnqMG9utaZ3BH4Zz+0ScD8lCd52vu7bhHPiWrdcKsFRbm83F1ID48z5oF8hqTjZ GC5IMBAZc820PGUWruGEjWazs52U4WiT3n6/yHixJ3Zel7gB+M30MqIR75IWtNYcoJO7IbbIg20e QJ7DkVX6V5RF3nHpMTqH7jsDK2HBYJFsk5h7H2mM5O717be1gTmxVWgCtDjPavzDhyf7fHrSbQnp xkPUEJIEAPw8mwUTvGmjnsJt2x4jai/u1Y7ZkXiFFlIzUzHbPk0vpAOOevO5sZniSXJJjvOa4xdz c5doiyB7mYF7mIE5w0iwEk3H6k+29hilg3SjXJ08MCQqiRHSsr+Rym2sZgaZ0dqiwL2DLlkfq8sP 0psnP+rLCRxbLMvBIt2cMvHSfQlGjI6ROXI= </ds:X509Certificate> </ds:X509Data> </ds:KeyInfo></ds:Signature> <!--End of signature.--> </license:licenseRecord> account_id --------------- AM_DEVELOPERS (1 row) END OF REPORT am84p:/tmp #In the report look for the <license:customerAccountId> in the <!--Customer Information--> section near the top of the report or account_id is provided direct from the Authentication Manager database using an SQL statement. The account id represents the Authentication Manager license serial number.
NOTE: where the license.zip does not exist or access to the Authentication Manager database is not possible then the following output is seen:
am84p:/tmp # ./RSAAM_license_view.sh Checking OC credentials....missing OC credentials! Please enter OC Administrator username: ocadmin Please enter OC Administrator password: password OC credentials validated (allowing for database access). License information being collected.. Done! Report file: /tmp/license_data_201909241116.log LICENSE INFORMATION - expecting to find license.zip in /tmp and could not find this file. - unable to access the Authentication Manager (AM) database.. check the status of AM services with '/opt/rsa/am/server/rsaserv status all' END OF REPORT am84p:/tmp #
Related Articles
Downloading RSA Authentication Manager license files or RSA Software token seed records 2.46KNumber of Views RSA Authentication Manager 8.8 upgrade fails with ERROR: auth_manager.rest_service.old_access_key is not found 1.89KNumber of Views The License/serial number being installed does not match the license/serial number stored on the server when installing an… 2.72KNumber of Views RSA MFA Agent for Windows will not run due to error "This module is blocked from loading into the Local Security Authority" 800Number of Views O365 WS-Fed authentication fails with RSA SecurID Access 109Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.9 Release Notes (January 2026) An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?