This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Knowledge Base

Find answers to your questions and identify resolutions for known issues with knowledge base articles written by SecurID experts.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Knowledge Base
  • :
  • Java exception error during restore of default console certificate on RSA Authentication Manager 8.2...
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content

Java exception error during restore of default console certificate on RSA Authentication Manager 8.2 and higher

Article Number

000036460

Applies To

RSA Product Set: SecurID
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.2, 8.3, 8.4, 8.5 
 

Issue

This article explains the following two scenarios:
  1. How to regenerate the deleted Authentication Manager default server certificate.
  2. How to resolve the following Java exception error that occurs when running the rsautil reset-server-cert command to restore the default console certificate on RSA Authentication Manager:

java.lang.NullPointerException
        at com.rsa.authmgr.install.tools.CertManager.resetServerCert(CertManager
        at com.rsa.authmgr.install.tools.CertManager.execute(CertManager.java:15
        at com.rsa.authmgr.install.tools.CertManager.main(CertManager.java:260)

Resolution

  1. Open an SSH session using an SSH client, such as PuTTy, to the RSA Authentication Manager primary server.
  2. Login as rsaadmin and enter the operating system password. 

Note that during Quick Setup another username may have been selected. Use that username to login.

  1. Go to /opt/rsa/am/utils/.

login as: rsaadmin
Using keyboard-interactive authentication.
Password:<enter operating system password>
Last login: Wed Jun 20 05:24:51 2018 from jumphost.vcloud.local
RSA Authentication Manager Installation Directory: /opt/rsa/am
rsaadmin@am82p:~> cd /opt/rsa/am/utils
  1. Run the ./rsautil manage-ssl-cert --regen-internal-ca command to regenerate the RSA  Authentication Manager default console certificate.
  2. When prompted, enter the Operations Console administrator username and password:

rsaadmin@am82p:/opt/rsa/am/utils> ./rsautil manage-ssl-cert --regen-internal-ca
Please enter OC Administrator username: <enter Operations Console administrator name>
Please enter OC Administrator password: <enter Operations Console administrator password> 
Manage SSL Certificate Utility 8.2.0.2.0 (1388711)
Copyright (C) 2016 RSA Security Inc. All rights reserved.
Regenerating internal certificate authority and SSL certificates...
Created backup of current keystores at: /opt/rsa/am/server/security/JKS_BACKUP_3472436041899343669
Created primary keystore ZIP: primary-keystores.zip
Copy this file to each Replica instance and run this tool providing this file as the
parameter to the "--keystore-zip" option.
Command completed successfully.
rsaadmin@am82p:/opt/rsa/am/utils>
 

The above command will also create a backup of the current keystores which will be saved to /opt/rsa/am/server/security/JKS_BACKUP_XXXXXXXXXXXXXXXXXXX

  1. Once these steps are complete, elevate privileges to root and reboot the appliance by issuing the commands below:

rsaadmin@am82p:~> sudo su - root
rsaadmin's password: <enter operating system password>
am82p:/home/rsaadmin # reboot

Broadcast message from root (pts/0) (Wed Jun 20 08:15:08 2018):

The system is going down for reboot NOW!
am82p:/home/rsaadmin #
  1. Now the Java error will not occur while running the ./rsautil reset-server-cert command.
  2. After reverting to the default certificate, the expired certificate will be listed as Inactive in the Operations Console under Deployment Configuration > Certificates > Console Certificate Management.

Notes

To revert back to default self-signed certificates refer to article 000017506 - Reverting back to the RSA self-signed default certificates on Authentication Manager 8.1.
Tags (51)
  • 8
  • 8.2
  • 8.2.x
  • 8.3
  • 8.3.x
  • 8.4
  • 8.4.x
  • 8.5
  • 8.5.x
  • 8.x
  • AM
  • Auth Manager
  • Authentication Manager
  • Break Fix
  • Break Fix Issue
  • Broken
  • CLI
  • CLI Issue
  • CLI Problem
  • Command Line
  • Command-Line
  • Command-Line Issue
  • Console
  • Console Issue
  • Console Problem
  • Customer Support Article
  • Issue
  • Issues
  • KB Article
  • Knowledge Article
  • Knowledge Base
  • Problem
  • RSA AM
  • RSA Auth Manager
  • RSA Authentication Manager
  • RSA SecurID
  • RSA SecurID Access
  • RSA SecurID Suite
  • SecurID
  • SecurID Access
  • SecurID Suite
  • Version 8
  • Version 8.2
  • Version 8.2.x
  • Version 8.3
  • Version 8.3.x
  • Version 8.4
  • Version 8.4.x
  • Version 8.5
  • Version 8.5.x
  • Version 8.x
0 Likes
Was this article helpful? Yes No
Share
No ratings

In this article

Version history
Last update:
‎2021-06-04 08:46 AM
Updated by:
Administrator RSA-KB-Sync Administrator

Related Content

Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.