This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Discussions

Browse the SecurID discussion board to get product help and collaborate with other SecurID users.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Discussions
  • :
  • RSA Token Assigning Problem
  • Options
    • Subscribe to RSS Feed
    • Mark Topic as New
    • Mark Topic as Read
    • Float this Topic for Current User
    • Bookmark
    • Subscribe
    • Mute
    • Printer Friendly Page
TouseefAhmad
TouseefAhmad Beginner
Beginner
‎2019-02-15 05:09 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

RSA Token Assigning Problem

license violation active user limit exceeded message prompts while we have 7 unassigned tokens available to use. I removed about 4 users from active directory then assign token to new user by using RSA this time problem resolved. Kindly guide me regarding this problem and why token assigned after deleting users from AD?

Labels (1)
Labels
  • Labels:
  • Authenticators

  • Tags:
  • Authentication Manager
  • Authenticator
  • Authenticators
  • Community Thread
  • Discussion
  • Forum Thread
  • Licensing Issue
  • problem in assigning token
  • RSA SecurID
  • RSA SecurID Access
  • SecurID
  • Token
  • Token Auth
  • Token Authentication
  • Token Authenticator
  • Token Authenticators
1 Like
Share
Reply
  • All forum topics
  • Previous Topic
  • Next Topic
6 Replies
AhmedAbouelnaga
Occasional Contributor AhmedAbouelnaga Occasional Contributor
Occasional Contributor
‎2019-02-15 06:31 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Hello Touseef,

 

First, the users with tokens license does not expire however it has a "users with tokens" limit that can be reached and after that you will not be able to assign more token to users.

 

Hence, there is 2 different aspects, the first one is the "users with tokens" license limit which should be available in order to assign any available tokens and it can be viewed or imported through the "Security Console > Setup > Licenses".

The other aspect is the tokens' seeds which you import separately through the "Security Console > Authentication > SecurID Tokens > Import SecurID Token Jobs".

 

Therefore, I believe you have tokens' seeds available but there is not enough license limit.

 

Regarding the AD users deletion, kindly perform a clean up from the "Security Console > Setup > Clean Up Unresolvable Users" so as you can restore the tokens as unassigned.

 

Best Regards,
Ahmed Abouelnaga

0 Likes
Share
Reply
TouseefAhmad
TouseefAhmad Beginner
Beginner
In response to AhmedAbouelnaga
‎2019-02-15 06:38 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Thanks for your information. Can we perform "Clean Up Unresolvable Users" for specific users or for all users?

0 Likes
Share
Reply
AhmedAbouelnaga
Occasional Contributor AhmedAbouelnaga Occasional Contributor
Occasional Contributor
In response to TouseefAhmad
‎2019-02-15 06:58 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Hello Touseef,

 

The Clean up can be done for specific Identity source to clean up all the users that have been deleted recently from this identity source.

 

Best Regards,

Ahmed Abouelnaga

0 Likes
Share
Reply
TouseefAhmad
TouseefAhmad Beginner
Beginner
In response to AhmedAbouelnaga
‎2019-02-15 07:37 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

After this, then we have to rejoin AD ?

0 Likes
Share
Reply
EdwardDavis
Employee EdwardDavis
Employee
‎2019-02-15 08:27 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Any user, with any single way to authenticate or more, takes 1 off the licence.

 

One user with: token, two tokens, three, a fixed passcode, on-demand, or any combination, takes 1 off the licence.

 

Passwords alone, do not. An authenticator, or more, does.

 

----

 

When a user is deleted from the internal database,

authenticators go back to unassigned, and the licence will free up one slot. 

 

When you have an AD or LDAP user, and you remove them from AD,

the authenticators do not get unassigned, the userid and any authenticators remain assigned to <unknown> and the idea is, if the reason the user is missing is a simple network outage or other problem reaching LDAP, everything is normal once LDAP connectivity is restored. The system does not know if you deleted a users from LDAP intentionally, or there is an outage, so it keeps things assigned in the internal database, hoping to see the userid come back.

 

The identity source cleanup routine is what will go in the database and scrub all LDAP orphans and free up licence slots if you know you've made some changes and want tokens freed. The 'cleanup now' has a preview of objects it could clean, and you can review it and if you know why certain userids are on the list, then a cleanup can fix the licence count.

 

The scheduled cleanup can take care of this automatically, and also this cleanup job be set to not run if there are suddenly more objects to clean than expected (in case there is a network outage you may not want the cleanup to assume all ldap user info can be erased) so it has adjustable settings such as 'do not run if more than 50 objects' or 'do not run unless objects have been sitting for 7 days or more).

2 Likes
Share
Reply
StevenSpicer
Valued Contributor StevenSpicer Valued Contributor
Valued Contributor
In response to TouseefAhmad
‎2019-02-15 10:21 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

The connection to AD is not removed by the cleanup job, so unless I misunderstand you, you don't have to rejoin AD.

0 Likes
Share
Reply
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.