This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Knowledge Base

Find answers to your questions and identify resolutions for known issues with knowledge base articles written by SecurID experts.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Knowledge Base
  • :
  • Removing a logon alias for users belonging to an external identity source group in the RSA Authentic...
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content

Removing a logon alias for users belonging to an external identity source group in the RSA Authentication Manager Bulk Admin(AMBA)

Article Number

000039718

Applies To

RSA Product Set: RSA SecurID
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.4 Patch 13 or later
O/S Version: Suse Linux Enterprise Server (SLES) 12 SP3 or later
Product Name: Authentication Manager Bulk Administration
Product Description: AMBA

Issue

This article explains how to automate removing a logon alias from a group in external identity sources in the Authentication Manager database as there is not any way available prior to AM8.4 Patch 13.
Note that you can use AMBA to remove a user from a group with the DUG (Delete User from Group) command, but this command does not apply to external identity sources. Authentication Manager cannot remove an Active Directory user from an Active Directory group.

Resolution

This resolution assumes that the administrator is familiar with scripting using the Authentication Manager Bulk Administration (AMBA) software and the RSA Authentication Manager 8.4 patch 13 or later is installed.
AM8.4 Patch 13 updated the CAU (Change or Add User) command with a new RemoveGrpDefLogin option to remove a logon alias from an external identity source group.
See a KB article 000036248 for details on how to automate adding a logon alias for users.

Here is an example of using Authentication Manager Bulk Administration (AMBA) to remove a logon alias from an external identity source group user. You can use the RemoveGrpDefLogin option for the CAU command to remove a logon alias from any group.

1/ Open an SSH session to the Authentication Manager primary or connect directly to the console.
2/ Login as the rsaamin user.
3/ In the AMBA directory(/opt/rsa/am/utils/AMBA), create a file named RemLDAPAlias.csv. The contents of RemLDAPAlias.csv are as follows:

Action,DefLogin,GrpName,GrpDefLogin,IdentitySource,RemoveGrpDefLogin
CAU,testuser,LogonAliases,testalias,AD-TEST,true
NOTE: CAU stands for Change or Add User. Refer to the AMBA documentation for more details.
DefLogin: SAMAccountName
GrpName: AD Group Name
GrpDefLogin: Alias Name
IdentitySource: LDAP Name
RemoveGrpDefLogin: True

4/ Save and close the file when done.
5/ Navigate to /opt/rsa/am/utils directory.
6/ At the command line, run the following:

./rsautil AMBulkAdmin -i AMBA/RemLDAPAlias.csv -o AMBA/RemAliasLDAPUser.log --verbose -a <enter user ID of a superadmin> -P <enter the super admin password>
Prior to run the command is:
Image descriptionImage description

The log output should be similar to the below:

rsaadmin@ehud:/opt/rsa/am/utils> more AMBA/RemAliasLDAPUser.log
BOJ : 2021-05-26 16:15:22 - 8.5.0.3.0 (1419588) - Input = AMBA/RemLDAPAlias.csv
Info : -Output Log File Opened
Info : -Looking up the License Details
Info : -Validating the Enterprise License Check
Info : -Key : CoreLevel, Value : Authentication Manager Enterprise
Info : -Validating the AM Enterprise License Values for [ Enterprise License: coreLevelValue =Authentication Manager Enterprise, expirationDate = null ]
Info : -A Valid Authentication Manager Enterprise License found, skipping the AMBA License Validation.
Info : -Info : License : - License Number: LID000012345X - Issued To : RSA SECURITY - Issued On : Mon Mar 30 09:51:04 AEDT 2015
Info : Line 1 -Header Line
Info : -Entering changeOrAddUser
Info : -Default subdomain value set to :: true
Info : -Entering CommandUtils.updatePrincipal
Info : -CommandUtils.updatePrincipal - Key = GrpDefLogin - Value = testalias
Info : -CommandUtils.updatePrincipal - Key = Action - Value = CAU
Info : -CommandUtils.updatePrincipal - Key = GrpName - Value = LogonAliases
Info : -CommandUtils.updatePrincipal - Key = DefLogin - Value = testuser
Info : -CommandUtils.updatePrincipal - Key = Linenumber - Value = 2
Info : -CommandUtils.updatePrincipal - Key = RemoveGrpDefLogin - Value = true
Info : -CommandUtils.updatePrincipal - Key = IdentitySource - Value = AD-TEST
Info : -CommandUtils.updatePrincipal:
Info : -Leaving CommandUtils.updatePrincipal
Info : -Just entered linkUserWithGroup(...)
Info : -linkUserWithGroup(...) - via defLogin: testuser
Info : -Default subdomain value set to :: true
Info : -linkUserWithGroup(...) - Just before new LinkGroupPrincipalsCommand
Info : -linkUserWithGroup(...) - Search User IS for group name
Info : -linkUserWithGroup(...) - ISName: Internal Database
Info : -linkUserWithGroup(...) - ISName: AD-TEST
Info : -Just entered getGroupGUID(...) for: LogonAliases
Info : -Leaving getGroupGUID(...) for: LogonAliases - groupGUID: ims.1accec024e07760a4ceb482ddb8be397
Info : -Inside isPrincipalLinkedWithGroup(....)
Info : -Principal linked to the group (groupname,isLinked) :: LogonAliases, true
Success: 2021-05-26 16:15:23 : Line 2 - linked user to the Group -testuser,LogonAliases
Success: 2021-05-26 16:15:23 : Line 2 - addUserAuthnSettings -testuser, LogonAliases, testalias
Success: 2021-05-26 16:15:23 : Line 2 - changeOrAddUser -testuser,
Info : -Leaving changeOrAddUser.
Info : Line 3 -Empty Line; Ignored
Info : -Closing input file
Info : -Closing rejected actions file
Info : -Closing unsupported actions file
Info : -Log File Closed
Info : -Exit code: 0
EOJ : 2021-05-26 16:15:23 - Terminating




 
Tags (68)
  • 8
  • 8.4
  • 8.4.x
  • 8.5
  • 8.5.x
  • 8.6
  • 8.6.x
  • 8.x
  • Access
  • AM
  • API
  • API Help
  • API Issue
  • API Issues
  • API Problem
  • Appliance
  • Auth Manager
  • Authentication Manager
  • Availability
  • Break Fix
  • Break Fix Issue
  • Broken
  • Config
  • Configuration
  • Configuration Help
  • Configuration Issue
  • Configuration Problem
  • Configuring Issue
  • Configuring Problem
  • Customer Support Article
  • Functionality
  • Integration
  • Integration Error
  • Integration Failed
  • Integration Failure
  • Integration Issue
  • Integration Problem
  • Issue
  • Issue Configuring
  • Issues
  • KB Article
  • Knowledge Article
  • Knowledge Base
  • Problem
  • Product API
  • REST API
  • RSA AM
  • RSA Auth Manager
  • RSA Authentication Manager
  • RSA SecurID
  • RSA SecurID Access
  • RSA SecurID Suite
  • SecurID
  • SecurID Access
  • SecurID Appliance
  • SecurID Suite
  • Setup Issue
  • Stability
  • Unable To Integrate
  • Uptime
  • Version 8
  • Version 8.4
  • Version 8.4.x
  • Version 8.5
  • Version 8.5.x
  • Version 8.6
  • Version 8.6.x
  • Version 8.x
0 Likes
Was this article helpful? Yes No
Share
No ratings

In this article

Version history
Last update:
‎2021-06-04 09:43 AM
Updated by:
Administrator RSA-KB-Sync Administrator

Related Content

Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.