Repair an RSA SecurID Access Trusted Realm

Document created by RSA Information Design and Development on Jun 13, 2017Last modified by RSA Information Design and Development on Jun 13, 2017
Version 2Show Document
  • View in full screen mode

In RSA Authentication Manager, you can use the repair feature to enter new information about an RSA SecurID Access trusted realm. For example, you can update the hostname or IP address used to contact RSA SecurID Access.

If RSA Authentication Manager has a new IP address or netmask, then you must provide this information to an RSA SecurID Access administrator.

Before you begin 

  • This procedure requires the rsaadmin password.
  • You must be a Super Admin or a Trust Administrator.

Procedure 

  1. Log on to the appliance with the User ID rsaadmin and the operating system password that you defined during Quick Setup:.
    • On a hardware appliance, log on to the appliance using an SSH client.
    • On a virtual appliance, log on to the appliance using an SSH client, the VMware vSphere client, the Hyper-V System Center Virtual Machine Manager Console, or the Hyper-V Manager.
  2. Change directories to /opt/rsa/am/utils. Type:

    cd /opt/rsa/am/utils/

    and press ENTER.

  3. Modify the trusted realm. Type:

    ./rsautil manage-securid-access-trusts -a repair -t trusted_realm

    where trusted_realm is the name of the RSA SecurID Access trusted realm that needs to be modified.

    and press ENTER. You are prompted for the required information.

    Note:  Although it is possible to enter the administrator password on the command line along with the other options, this creates a potential security vulnerability. RSA recommends that you enter passwords only when prompted.

  4. When prompted, enter the Super Admin or Trust Administrator username, and press ENTER.
  5. When prompted, enter the Super Admin or Trust Administrator password, and press ENTER.
  6. When the RSA SecurID Access trusted realm is located, you are prompted to enter updated values for the following items:
    • RSA SecurID Access REST API URL Prefix used to contact RSA SecurID Access. You might want to update the hostname or IP address.
    • The Access ID and Access Key provided by the RSA SecurID Access Super Admin.
    • Trusted realm name.
    • Whether the trusted realm is enabled.
    • Whether the trusted realm is enabled for authentication.
    • Optional notes.

    Press ENTER for each item that you do not want to update.

  7. After the trusted realm is updated, RSA Authentication Manager tests the connection to the trusted realm. After 30 seconds, a message indicates whether the connection test succeeded or failed.

    If the connection test fails, you can view the details in the imsTrace.log file in the /opt/rsa/am/server/logs directory.

  8. To verify the changed details in the Security Console, click Administration > Trusted Realms > Manage Existing.

 

 


Attachments

    Outcomes