This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Knowledge Base

Find answers to your questions and identify resolutions for known issues with knowledge base articles written by SecurID experts.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Knowledge Base
  • :
  • How to verify that RSA Authentication Agent for Windows can perform challenge user lookups across di...
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content

How to verify that RSA Authentication Agent for Windows can perform challenge user lookups across different Active Directory, AD Domains or Forests

Article Number

000039454

Applies To

RSA Product Set: RSA SecurID
RSA Product/Service Type: Authentication Agent for Windows
RSA Version/Condition: 7.4.x, 7.4, 7.3.x
Platform: Windows
Platform (Other): Challenge group for users across 2 Domains
O/S Version: 10
 

Issue

The RSA Authentication Agent 7.4 for Microsoft Windows Installation and Administration Guide (auth_agent_install_admin_guide.pdf), p. 23 under Create Groups of Users to Challenge with RSA SecurID, states "Confirm that groups that you create are recognized by Active Directory, [AD] as a group and can be queried. For detailed instructions on creating groups, see your Microsoft Windows documentation."

This means that when user challenge is based on group membership (as opposed to challenge everyone), the user lookup involves a Get-ADPrincipalGroupMembership command, which might:
  1.  Simply look in all sub-domains under a single AD Domain, or
  2.  Need to lookup from one AD forest to another, different AD forest - in which case there would need to be a 'trust' relationship between forests, or this lookup will fail.

This Knowledge Base, KB article will demonstrate how to use Windows PowerShell Get-ADUser -Identity to verify that Windows agents can find an AD user in order to successfully challenge that user.

Symptoms that AD challenge User lookup failed
Windows Agent log file
===SIDAuthenticator(LogonUI).log===
ADsOpenObject failed.
[sidChallenge::checkCachedSettings] Cannot open challenge cache data key for user <UserID>
[ADSIHelper::getUserADsLDAPPath] Failed to set NT4 Name = <Domain_NT4_name>\<UserID>

===SIDCredentialProvider(LogonUI).log===
[sidChallenge::checkCachedSettings] Caught error: 0x2
[sidChallenge::checkCachedSettings] userLocation = LOCATION_UNKNOWN
 

Task

  1. Procure a Windows platform that has Powershell.
  2. Ensure PowerShell includes the Active Directory Module.
  3. Test individual UserID lookups by SamAccountName or another identifying attribute, for example
        Get-ADUser -Identity <UserID>

Details
  1. Procure a Windows platform that has Powershell
    Image descriptionImage description
     
  2. Ensure PowerShell includes the Active Directory Module.
    Image descriptionImage description
    If the AD Module is not installed in PowerShell, you will get the CommandNotFoundException
    Get-ADUser : The term 'Get-ADUser' is not recognized as the name of a cmdlet, function, script file, or operable program. Check the spelling of the name, or if a path was included, verify that the path is correct and try again.
     
  3. Test individual UserID lookups by SamAccountName or another identifying attribute, e.g.
        Get-ADUser -Identity <UserID>

    Image descriptionImage description

Resolution

Once you are satisfied that PowerShell is working and its Active Directory Module is installed, the basic command to lookup a UserID or SamAccountName is:

     Get-ADUser -Identity <UserID>
Where <UserID> is a logon name or SamAccountName.

A Successful lookup returns information about the UserID.
Image descriptionImage description

Notice that you can optionally search a specific Domain Controller Server with the -server setting.

An unsuccessful lookup returns User Not found, ObjectNotFound.

Image descriptionImage description
If you cannot find a specific UserID or SamAccountName with Get-ADUser -Identity from the Windows Agent, check the Authentication Manager Security Console to see if this userID exists in AM. Search across all Identity Sources if necessary.

Image descriptionImage description

If you have demonstrated that a UserID is visible in AM, but you have been unsuccessful in finding the same UserID with Get-ADUser -Identity, You might need to try various PowerShell Get-AD* commands in order to find an exact match on SamAccountName, or to search for an entire Domain by all users in specific organizational unit ou.

     Get-ADUser -Filter "SamAccountName -eq '<UserID>'" 
     Get-ADUser -server "<DomainControllerName>" -Identity <UserID>
     Get-ADUser -Filter * -SearchBase 'OU=vcloud Users,DC=2k12-vcloud,DC=local'              
- this last command gets all vcloud users from the ou – thousands!!!

You can check a found user's group memberships with the following commands
    Get-ADPrincipalGroupMembership <SamAccountName>
 
  Get-ADPrincipalGroupMembership <UserID> | select name

Image descriptionImage description
    
If you have multiple Domains and Forests, you might need to Get-ADUser -Identity for several different users from different Domains, Forests, or Authentication Manager Identity Sources.

 

Notes

Ultimately you might need to bring in the Directory team to get an understanding of the entire structure, in order to search across all directories.  Sometimes you will find it is simply easier and more secure, to challenge everyone and avoid the need to lookup across multiple forests.
Tags (48)
  • 7
  • 7.3
  • 7.3.x
  • 7.4
  • 7.4.x
  • 7.x
  • Agent
  • Auth
  • Auth Agent
  • Auth Failure
  • Auth Issue
  • Authentication
  • Authentication Agent
  • Authentication Failed
  • Authentication Failure
  • Authentication Issue
  • Break Fix
  • Break Fix Issue
  • Broken
  • Customer Support Article
  • Failed Auth
  • Failure
  • Issue
  • Issues
  • KB Article
  • Knowledge Article
  • Knowledge Base
  • Login Issue
  • Microsoft
  • Microsoft Windows
  • Microsoft Windows Agent
  • Problem
  • RSA SecurID
  • RSA SecurID Access
  • RSA SecurID Suite
  • SecurID
  • SecurID Access
  • SecurID Agent
  • SecurID Suite
  • Version 7
  • Version 7.3
  • Version 7.3.x
  • Version 7.4
  • Version 7.4.x
  • Version 7.x
  • Windows
  • Windows Agent
  • Windows Authentication Agent
0 Likes
Was this article helpful? Yes No
Share
No ratings

In this article

Version history
Last update:
‎2021-04-24 04:28 AM
Updated by:
Administrator RSA-KB-Sync Administrator

Related Content

Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.