000032722 - Unable to create managed connection errors in the System Activity Monitor for RSA Authentication Manager 8.x

Document created by RSA Customer Support Employee on Jun 14, 2016Last modified by RSA Customer Support on Jan 8, 2020
Version 3Show Document
  • View in full screen mode

Article Content

Article Number000032722
Applies ToRSA Product Set: SecurID
RSA Product/Service Type: RSA Authentication Manager
RSA Version/Condition: 8.x
IssueInitially, the Identity Source Directory Password and Directory User ID was working where the Test Connection reported Test Connection(s) successful.

Users are still searchable in the Security Console via Identity > Users > Manage Existing when selecting the identity source in the Search criteria.

System Activity Monitor reports a directory access error where the exception is:
'javax.resource.spi.ResourceAdapterInternalException: Unable to create managed connection
[LDAP: error code 49 - 80090308: LdapErr: DSID-0C0903A9, comment: AcceptSecurityContext error, data 52e, v1db1]'
CauseThe Directory User ID used in the Identity Source Connection(s) was found to be a locked account or the password has been changed.
  1. An administrator must check the Directory User ID is an unlocked account and/or update the Directory Password in the Identity Source Connection(s) configuration found in the Operations Console.
  2. Flush the cache in all of the Authentication Manager instance(s) deployed. 
    1. From the Operations Console select Maintenance > Flush Cache
    2. Enter super admin credentials. 
    3. Click OK
    4. Select Flush all cache objects.
    5. Click Flush.
  3. Restart the RSA Authentication Manager services, either from the UI or by command line

  • From the UI,

  1. login to the Operations Console.
  2. Select Maintenance > Reboot Appliance.
  3. Select Yes, reboot the appliance > Reboot.

  • From command line, 

  1. Launch an SSH client, such as PuTTY.
  2. Login to the primary Authentication Manager server as rsaadmin and enter the operating system password.
  3. To stop RSA Authentication Manager services run the command /opt/rsa/am/server/rsaserv stop all.
  4. When returned to the prompt, start services by running the command /opt/rsa/am/server/rsaserv start all.

  1. Check users are still searchable in the Security Console (Identity > Users > Manage Existing)
  2. Select the identity source in the Search Criteria > Search.
  3. Start a System Activity Monitor using (Reporting > Real-time Activity Monitors > System Activity Monitor) to check that there are no further directory access errors occurring.