Test Web Services Description Language (WSDL) connectivity for RSA Authentication Manager 8.x
Originally Published: 2015-05-13
Article Number
Applies To
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.x
Issue
Resolution
- Enter the URL https://<fully_qualified_domain_name>:7002/ims-ws/services/CommandServer?wsdl into a supported web browser, where the <fully_qualified_domain_name> is replaced with the fully qualified domain name of your primary RSA Authentication Manager instance.
- The popup below displays:
- The required username and password can be found via the command line of the RSA Authentication Manager primary instance.
- Logon to the RSA Authentication Manager operating system with the rsaadmin account where you are connecting to WSDL
- Navigate to the /opt/rsa/am/utils folder as rsaadmin.
- Use the following commands to get the username and password required
login as: rsaadmin Using keyboard-interactive authentication. Password: <enter operating system password> Last login: Wed Jan 8 16:14:09 2020 from jumphost.vcloud.local RSA Authentication Manager Installation Directory: /opt/rsa/am rsaadmin@am82p:~> cd /opt/rsa/am/utils rsaadmin@am82p:/opt/rsa/am/utils> ./rsautil manage-secrets -a list Please enter OC Administrator username: <enter Operations Console administrator name> Please enter OC Administrator password: <enter Operations Console administrator password> Secrets stored in ./etc/systemfields.properties. Command API Client User ID ............................: CmdClient_r06oo8sc Command API Client User Password ......................: idQl1P2AaphUEFrTe87Wbmz6KyOe8R SSL Server Identity Certificate Private Key Password ..: lBSeudmCmvYIlkeMHM4bkwstOdav8s SSL Server Identity Certificate Keystore File Password : xHZc6S9k1ZGLCLFWJLn9PyA7Uy3i6i Root Certificate Private Key Password .................: FoxETeO49g4fh6Cixbji7RGcPJrCqF Root Certificate Keystore File Password ...............: BB3aNkbU4uaEoNbURcTflnqd7Kcuna The "listkeys" action displays the key names to use when setting the values.
- At the prompt, enter the username and password captured above and press OK.
- If the WSDL interface is working, the Authentication Manager instance will return an XML file, as in the example below:
Notes
- The Command Client User Name and Password cannot be changed, as it would cause serious issues if changed.
- When the correct Command API Client User ID but a bad password is provided to WSDL an Error 401—Unauthorized is returned.
- Authentication looping is due to incorrect logon credentials being provided.
- For more info, check the RSA Authentication Manager Developer's Guide.
- The RSA Authentication Manager SDK and RSA Authentication Manager Developer’s Guide are found in the rsa-am-extras-<version>.zip available via RSA SecurID Access Downloads on RSA Link.
Related Articles
RSA Governance & Lifecycle Generic REST Collector Guide 386Number of Views RSA Authenticator 4.5 for iOS and Android Quick Start Guide (Dutch) 6Number of Views Mobile Lock: Technical FAQs 294Number of Views AFX test connector settings button times out and the test connector capabilities work or the test connector capabilities f… 383Number of Views RSA Authentication Manager 8.3 Dell Hardware Appliance Getting Started 9Number of Views
Trending Articles
How to recover the Application and AFX after an unexpected database failure in RSA Identity Governance & Lifecycle Troubleshooting AFX Connector issues in RSA Identity Governance & Lifecycle RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Release Notes for RSA Authentication Manager 8.8 RSA Authentication Manager 8.9 Release Notes (January 2026)
Don't see what you're looking for?