|Applies To||RSA Authenticator Utility (RAU) 1.0|
RSA SecurID SID800 Authenticator
RSA SecurID Software Token
Nortel VPN Client 5.x
Nortel and Cisco VPN clients are Software Token aware applications that can use the RSA SecurID SID800 Authenticator in connected mode
RSA SecurID SID800 Authenticators are not like RSA SecurID Software Tokens in regards to generating the next tokencode. With Software Tokens, this can be done without hesitation; however, with RSA SecurID SID800 Authenticators, it must actually wait up to 60 seconds for the next tokencode to be generated. The logic is that upon one failed authentication in connected mode, the next one will be considered for a next tokencode authentication. End users can get one failed authentication and then a successful on the subsequent authentication attempt, if in next tokencode mode.
|Issue||RSA Authenticator Utility & RSA SecurID SID800 Authenticator connected authentication with Nortel VPN in New PIN Mode|
Connected authentication with the Nortel VPN when the token is in new pin mode fails. The error reported by RSA ACE/Server is that a "previous tokencode" was used.
|Resolution||This issue has been resolved in a hot fix for RSA Authenticator Utility (RAU) 1.0. Contact RSA Security Customer Support to request build8 for RSA Authenticator Utility (RAU) 1.0.|
|Legacy Article ID||a27356|