This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Discussions

Browse the SecurID discussion board to get product help and collaborate with other SecurID users.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Discussions
  • :
  • Replacing expiring tokens via Self Sevice
  • Options
    • Subscribe to RSS Feed
    • Mark Topic as New
    • Mark Topic as Read
    • Float this Topic for Current User
    • Bookmark
    • Subscribe
    • Mute
    • Printer Friendly Page
GeorgeNathaniel
GeorgeNathaniel Beginner
Beginner
‎2017-01-25 08:04 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Replacing expiring tokens via Self Sevice

Jump to solution

Hi All, 

 

We have a high number of tokens expiring soon and this is our first time using our new 8.1 self service portal for replacement.   One thing we are noticing in testing is that the users can definitely go on the site, hit replace and get a CTKIP activation email with the new token activation details... 

 

We are only deploying desktop PC and MAC tokens

 

After the user goes through the activation process, the token gets imported and the process completes. 

 

The issue is it appears that the old token is still retained as the current token and the new one shows as "Pending Replacement" 

Does anyone know if this is by design?  It would make sense that the new token will not become active until the current token actually expires in a few days. 

 

If this isn't the correct behavior... what else does the user need to do to activate the new token and begin using it?  

 

Thanks 

 

Version 8.1 r14

Labels (1)
Labels
  • Labels:
  • Authenticators

  • Tags:
  • 8.1
  • activation
  • aiuth manager
  • AM
  • Authentication Manager
  • Authenticator
  • Authenticators
  • Community Thread
  • ct-kip
  • Discussion
  • Forum Thread
  • pending replacement
  • RSA SecurID
  • RSA SecurID Access
  • SecurID
  • self-service console
  • software tokens
  • ssc
  • Token
  • Token Auth
  • Token Authentication
  • Token Authenticator
  • Token Authenticators
0 Likes
Share
Reply
  • All forum topics
  • Previous Topic
  • Next Topic
1 Solution

Accepted Solutions
EdwardDavis
Employee EdwardDavis
Employee
‎2017-01-25 08:23 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

By design:

 

when you get a replacement token, user now has two tokens assigned, an O and an R

 

the original one (O) keeps working until

 

a) it expires

or

b) you actually use the replacement token (R) with the original token pin to log in

 

Default policy unassigns the (O) token only when (R) is first used (even if (O) still has life left)

and (O) goes to the unassigned pile, and is disabled.

 

Also by default, (R) inherits the (O) token pin. But you can change policy to 

require a new pin with the (R) token, or delete the (O) token from the

system when (R) is first used successfully.

View solution in original post

2 Likes
Share
Reply
2 Replies
EdwardDavis
Employee EdwardDavis
Employee
‎2017-01-25 08:23 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

By design:

 

when you get a replacement token, user now has two tokens assigned, an O and an R

 

the original one (O) keeps working until

 

a) it expires

or

b) you actually use the replacement token (R) with the original token pin to log in

 

Default policy unassigns the (O) token only when (R) is first used (even if (O) still has life left)

and (O) goes to the unassigned pile, and is disabled.

 

Also by default, (R) inherits the (O) token pin. But you can change policy to 

require a new pin with the (R) token, or delete the (O) token from the

system when (R) is first used successfully.

2 Likes
Share
Reply
GeorgeNathaniel
GeorgeNathaniel Beginner
Beginner
‎2017-01-25 08:37 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Thanks for the response... it felt like it was by design.  We just went through the process of using the new Token to connect and sure enough it became the default and removed the expiring token, so we are good.

0 Likes
Share
Reply
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.