In DEBUG level, customers *can* roughly infer it from PassMark logs.
Start message for a request looks like: 2006-12-05 13:52:13,174 DEBUG [[ACTIVE] ExecuteThread: '1' for queue: 'weblogic.kernel.Default (self-tuning)'] [] [PM-23dfbb:-7fe2-72ebb2d7] [org.codehaus.xfire.transport.DefaultEndpoint] - <Received message to /pmws_server/services/AuthService
End message for a request looks like: 2006-12-05 13:52:13,378 DEBUG [[ACTIVE] ExecuteThread: '1' for queue: 'weblogic.kernel.Default (self-tuning)'] [] [PM-23dfbb:-7fe2-72ebb2d7] [org.codehaus.xfire.handler.HandlerPipeline] - <Invoking handler org.codehaus.xfire.handler.OutMessageSender in phase send
So, for example in the above pair, elapsed time is 13:52:13,378 minus 13:52:13,174 equals 204 msec.
This is duration from the time that XFire stack sees the request to the time it responds, it doesn?t include network latency between customers app server and our app server, nor does it include the time spent waiting for the request to be dispatched by the Adaptive Authentication app server prior to invocation of XFire. The time waiting for a request to be dispatched is neglible in a well-behaved system, but on an underpowered app server requests could spend a considerable amount of timed queued waiting for an available thread.
Running Adaptive Authentication with DEBUG level log messages imposes a noticable overhead on the application server, and given the possible difference between server processing time and total roundtrip time, RSA recomend that customers wishing to monitor response times do so in their own application measuring the total elapsed time between submitting a request and recieving a reply.
Related Articles
AFX is unresponsive and one or more AFX Connectors are in a Not Deployed state in RSA Identity Governance & Lifecycle 99Number of Views How to determine the size of a backup before creating one in RSA Identity Governance & Lifecycle 111Number of Views Error message on RSA Identity Management and Governance workflow: requires at least one valid outbound transition path but… 160Number of Views CyberArk Password Vault Web Access - RADIUS Configuration with Authentication Manager - RSA Ready Implementation Guide 122Number of Views How to stack a Unix authentication followed by SecurID prompt with the RSA Authentication Agent for PAM for SSH and Telnet… 674Number of Views
Trending Articles
How to recover the Application and AFX after an unexpected database failure in RSA Identity Governance & Lifecycle Troubleshooting AFX Connector issues in RSA Identity Governance & Lifecycle RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Release Notes for RSA Authentication Manager 8.8 RSA Authentication Manager 8.9 Release Notes (January 2026)