This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Knowledge Base

Find answers to your questions and identify resolutions for known issues with knowledge base articles written by SecurID experts.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Knowledge Base
  • :
  • Unable to login to RSA Authentication Manager Security Console as super admin
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content

Unable to login to RSA Authentication Manager Security Console as super admin

Article Number

000017467

Applies To

RSA Product Set:  SecurID
RSA Product/Service Type:  Authentication Manager
RSA Version/Condition:  7.1, 8.1
 

Issue

If super admin credentials do not allow access to the RSA Authentication Manager Security Console, the rsautil named restore-admin can be used to create a temporary administrative user that can access the Security Console and reset the initial admin's credentials.

New Content!  
For a follow along video on the password reset process, please watch the companion video.

Cause

Super admin credentials will fail to the Security Console if one or more of the following are true:
  • The super admin password is incorrect;
  • The super admin account is locked;
  • Authentication settings were changed to settings that will not allow login; and/or
  • All known super admin users were deleted from the database.

Resolution

The preferred method to fix this issue is to have another super admin login to the Security Console and unlock the affected admin(s) then fix the authentication settings, as appropriate.  If the lockout policy that applies to the super admin allows auto-unlock, wait for the account to unlock.

If the methods above do not resolve the issue, the restore-admin utility can be used to create a temporary super admin and the authentication policy can be reset to the default.   

Prerequisites

  • SSH access to the server must be enabled.  To do this, login to the Operations Console and select Administration >Operating System Access and check the option to enable SSH on eth0 then click Save.
  • Operating system password for the rsaadmin user.
  • Operations Console admin user name and password.
 

On the command line

To begin,
  1. Access the operating system using SSH, the vSphere client for a virtual appliance or with a keyboard and monitor connection to a hardware appliance.
  2. Login as the rsaadmin user.
  3. Navigate to /opt/rsa/am/utils
  4. Enter the command ./rsautil restore-admin -u <temporary admin user name> -p <temporary admin user password>, as in the example below.

When creating the password, please note that the password must be between 8 and 32 characters, have at least one alphabetic character, and at least one special character, excluding spaces, @, and ~.   

  1. When prompted for the Operations Console administrator username, enter the information and press Enter.
  2. When prompted, enter the password for the Operations Console administrator keyed in above and press Enter.
  3. A prompt will display asking "Are you sure you want to continue? (Y/N)," type Y and press Enter.
login as: rsaadmin
Using keyboard-interactive authentication.
Password: <enter OS user password>
Last login: Fri Sep 18 18:18:20 2015 from jumphost.vcloud.local
RSA Authentication Manager Installation Directory: /opt/rsa/am
rsaadmin@am81p:~> cd /opt/rsa/am/utils
rsaadmin@am81p:/opt/rsa/am/utils> ./rsautil restore-admin -u tempAdmin -p tempPassword!
Please enter OC Administrator username: <enter Operations Console admin name>
Please enter OC Administrator password: <enter Operations Console admin's password>
A temporary admin will be created with user ID 'tempAdmin'.
Are you sure you want to continue? (Y/N): y
Admin created successfully.
*****************************************************************************
Note
    1) The 'tempAdmin's console access will expire on Tue Sep 29 09:20:56 EDT 2015.
    2) Console authentication policy is changed to RSA_Password/LDAP_Password. In order to make the 
       policy change effective please flush the cache through operations console.
*****************************************************************************
rsaadmin@am81p:/opt/rsa/am/utils>


In the user interface

  1. Login to the Operations Console using the Operations Console admin's credentials.
  2. Click Maintenance > Flush Cache. If prompted, enter the credentials for the super admin user created above and click OK.
  3. Under Flush Cache, select Flush all cache objects and click Flush.
  4. Using the temporary admin account created above, login to the Security Console.
  5. Select Identity > Users > Manage Existing and search for the initial super admin that was not able to login to the Security Console. From the context arrow next to the admin name choose Edit.  
  6. Review the super admin account:
    1. If the super admin is in the internal database and uses a password to authenticate to the Security Console,
      1. Scroll to the Password section, update the password for the admin.  Click Save when done.
      2. Scroll to the Account Information section.  If the user is locked, unlock the user and click Save.
    2. If the super admin is in an external identity source database and uses an LDAP password to authenticate,
      1. Update the password through the external identity source's GUI.  Note that RSA recommends that super admin users exist in the internal database and not in an external identity source.  This allows admin users the ability to login to the Security Console and Operations Console even if connectivity to the external identity source is down.
  7. If the super admin uses a token to authenticate, navigate to Authentication > SecurID Tokens > Manage Existing and search for the super admin's token.  From the context arrow, click Resynchronize.  At the prompt, have the admin provide the tokencode seen on the token without the PIN.  If the admin has a software token, enter 0000 into the token app to ensure only the tokencode (digits seen on the token) and not the passcode (PIN + tokencode) is used for resynchronizing the token.
  8. Launch the authentication activity monitor (Reporting > Real Time Activity Monitors > Authentication Activity Monitor).
  9. Using a different browser, have the admin try to login to the Security Console to confirm the changes worked and authentication is now successful.
  10. When creating the new admin, the following message displayed in the console session:  Console authentication policy is changed to RSA_Password/LDAP_Password.  If that needs to be updated, select Setup > Security Console Authentication Methods.  Under Console Authentication, add or remove the methods available based on your company's security policies.  Click Save.  Making a change here requires that the cache be flushed again as in steps 2 - 3.
Tags (51)
  • 7
  • 7.1
  • 7.1.x
  • 7.x
  • 8
  • 8.1
  • 8.1.x
  • 8.x
  • AM
  • Appliance
  • Auth
  • Auth Issue
  • Auth Manager
  • Authentication
  • Authentication Issue
  • Authentication Manager
  • Break Fix
  • Break Fix Issue
  • Broken
  • Can't Log In
  • Can't Login
  • Cannot Log In
  • Customer Support Article
  • Failed Login
  • Issue
  • Issues
  • KB Article
  • Knowledge Article
  • Knowledge Base
  • Login
  • Login Issue
  • Problem
  • RSA AM
  • RSA Auth Manager
  • RSA Authentication Manager
  • RSA SecurID
  • RSA SecurID Access
  • RSA SecurID Suite
  • SecurID
  • SecurID Access
  • SecurID Appliance
  • SecurID Suite
  • Unable to log In
  • Version 7
  • Version 7.1
  • Version 7.1.x
  • Version 7.x
  • Version 8
  • Version 8.1
  • Version 8.1.x
  • Version 8.x
1 Like
Was this article helpful? Yes No
Share
100% helpful (1/1)

In this article

Version history
Last update:
‎2020-12-12 08:57 PM
Updated by:
Administrator RSA-KB-Sync Administrator

Related Content

Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.