This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Knowledge Base

Find answers to your questions and identify resolutions for known issues with knowledge base articles written by SecurID experts.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Knowledge Base
  • :
  • How to enable or disable strict TLS 1.2 mode in RSA Authentication Manager 8.2
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content

How to enable or disable strict TLS 1.2 mode in RSA Authentication Manager 8.2

Article Number

000033354

Applies To

RSA Product Set: SecurID
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.2

 

Issue

The most recent Payment Card Information Data Security Standard (PCI DSS) recommends using the Transport Layer Security (TLS) 1.2 cryptographic protocol for secure network communications. RSA Authentication Manager supports a strict TLS mode that only uses TLS 1.2 for communication within your Authentication Manager deployment.

By default, new RSA Authentication Manager 8.2 deployments use TLS 1.2. RSA Authentication Manager 8.1 Service Pack 1 (SP1) Patch 13 or later includes a TLS 1.2 Mode Update. If you applied the TLS 1.2 Mode Update to your SP1 deployment, then your upgraded version 8.2 deployment uses TLS 1.2. If you did not apply the TLS 1.2 Mode Update, then your upgraded version 8.2 deployment uses SSL 3.0, TLS 1.0, and TLS 1.1.

When Authentication Manager 8.2 uses strict TLS 1.2 mode, trusted realm authentication is only available with RSA Authentication Manager 8.1 Service Pack 1 (SP1) Patch 13 or later realms, in which you have applied the TLS 1.2 Mode Update. Disabling TLS 1.2 mode allows trusted realm authentication between Authentication Manager 8.2 and earlier versions of Authentication Manager that do not use TLS 1.2.

You can enable and disable the strict TLS 1.2 mode in Authentication Manager 8.2. To do so, perform the following procedure on the primary instance and each replica instance. Updating the primary instance automatically updates the web tier, but restarting the web tier is required for the changes to take effect.

 

Task

This article addresses how to enable TLS 1.2 mode in RSA Authentication Manager 8.2 so that SSLv3, TLS 1.0 and TLS 1.1 are not allowed to be negotiated down.

Resolution

To enable or disable strict TLS 1.2, follow the steps below: 
  1. Log on to the appliance with the rsaadmin user ID and the current operating system password:
    1. On a hardware appliance, log on to the appliance using an SSH client.
    2. On a virtual appliance, log on to the appliance using an SSH client, the VMware vSphere client, the Hyper-V Virtual Machine Manager Console, or the Hyper-V Manager.
  2. Change directories to /opt/rsa/am/utils.
  3. Run the commands listed below.  Note:  To restart all of your RSA Authentication Manager services later, you must remove restart from the following commands:
    1. To enable strict TLS 1.2 mode, type:

./rsautil store -a enable_min_protocol_tlsv1_2 true restart
  1. To disable strict TLS 1.2 mode so that your deployment can support SSL 3.0, TLS 1.0, and TLS 1.1, type:

./rsautil store -a enable_min_protocol_tlsv1_2 false restart​
  1. (Optional) If you decided to manually restart all RSA Authentication Manager services, do the following:
    1. Change directories to /opt/rsa/am/server.
    2. Type:

./rsaserv restart all
  1. Repeat steps 1 - 4 for each Authentication Manager instance in your deployment.
  2. Restart the web tier.
    1. On the web tier server, go to the RSA_WT_HOME/webtierBootstrapper/server directory, where RSA_WT_HOME is the web-tier installation directory.
    2. On a Windows server, launch Windows services then restart the web tier services.
    3. On a Linux server, type the following command:

./rsaserv restart all

Notes

Refer to the article entitled What are the limitations of strict TLS 1.2 mode in RSA Authentication Manager 8.2? for more information.
Tags (44)
  • 8
  • 8.2
  • 8.2.x
  • 8.x
  • Admin
  • Administration
  • Administrative
  • AM
  • Appliance
  • Auth Manager
  • Authentication Manager
  • Best Practice
  • Best Practices
  • Customer Support Article
  • Helpful Hints
  • How To
  • Informational
  • Instructions
  • KB Article
  • Knowledge Article
  • Knowledge Base
  • Process Steps
  • Recommendations
  • Recommended
  • Recommended Practice
  • RSA AM
  • RSA Auth Manager
  • RSA Authentication Manager
  • RSA SecurID
  • RSA SecurID Access
  • RSA SecurID Suite
  • SecurID
  • SecurID Access
  • SecurID Appliance
  • SecurID Suite
  • Tip &amp Tricks
  • Tips and Tricks
  • Tutorial
  • Version 8
  • Version 8.2
  • Version 8.2.x
  • Version 8.x
  • Walk Through
  • Walkthrough
0 Likes
Was this article helpful? Yes No
Share
No ratings

In this article

Version history
Last update:
‎2021-04-23 10:38 AM
Updated by:
Administrator RSA-KB-Sync Administrator

Related Content

Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.