000022768 - RSA Authenticator Utility & RSA SecurID SID800 Authenticator connected authentication with Nortel VPN in New PIN Mode

Document created by RSA Customer Support Employee on Jun 16, 2016Last modified by RSA Customer Support Employee on Apr 21, 2017
Version 2Show Document
  • View in full screen mode

Article Content

Article Number000022768
Applies ToRSA Authenticator Utility (RAU) 1.0
RSA SecurID SID800 Authenticator
RSA SecurID Software Token
Nortel VPN Client 5.x
Nortel and Cisco VPN clients are Software Token aware applications that can use the RSA SecurID SID800 Authenticator in connected mode
RSA SecurID SID800 Authenticators are not like RSA SecurID Software Tokens in regards to generating the next tokencode. With Software Tokens, this can be done without hesitation; however, with RSA SecurID SID800 Authenticators, it must actually wait up to 60 seconds for the next tokencode to be generated. The logic is that upon one failed authentication in connected mode, the next one will be considered for a next tokencode authentication. End users can get one failed authentication and then a successful on the subsequent authentication attempt, if in next tokencode mode.
IssueRSA Authenticator Utility & RSA SecurID SID800 Authenticator connected authentication with Nortel VPN in New PIN Mode
Connected authentication with the Nortel VPN when the token is in new pin mode fails. The error reported by RSA ACE/Server is that a "previous tokencode" was used.
ResolutionThis issue has been resolved in a hot fix for RSA Authenticator Utility (RAU) 1.0. Contact RSA Security Customer Support to request build8 for RSA Authenticator Utility (RAU) 1.0.
Legacy Article IDa27356

Attachments

    Outcomes