|Applies To||RSA Product Set: SecurID Access|
RSA Product/Service Type: Identity Router, Cloud
|Issue||When end user authentications are not working as planned, some routine steps can be taken to gather the data needed to troubleshoot the issue. These same steps apply to single sign-on and multifactor authentications, regardless of the type of authentication used (SAML, HTTP Federation, Trusted Headers, RADIUS or Relying Party).|
If required, this information can be passed to RSA for assistance with troubleshooting.
|Cause||Authentication problems are usually caused by a configuration issue. Places to look for such errors include the RSA Cloud Administration Console, the application, network devices, digital certificates or some combination of these.|
|Resolution||Follow the steps below until a solution is found.|
If these steps do not allow you to resolve the issue, continue with the Workaround section below to get assistance.
- Review the SecurID Access and target application configuration to check for any errors. The following resources may be useful:
- Integration Guides on RSA Link for "out of the box" applications. Search the page to see if a specific guide is available for the application you are working with.
- RSA SecurID Access Help. Application, policy, authentication, IDR setup and other configuration guidance is given here.
- Product documentation for the application you are working with.
- Check Cloud, IDR and network configuration against the values in your deployment's Solution Architecture Workbook.
- Try the appropriate Troubleshooting steps for the problem.
- Gather troubleshooting data:
- Set the Identity Router Logging Level to DEBUG on all IDRs in your deployment.
- Start client tracing and logging:
- If you are using a web browser to access the application, Start a Fiddler trace for that web browser. Make sure decrypt mode is turned on in Fiddler.
- If you are using a client to access the application, such as a RADIUS or VPN client, start any network tracing or logging facility that may be available in the client.
- If you are using RSA Authentication Manager, start the Authentication Activity monitor.
- Test: Reproduce the issue, and note the date, time and timezone of the attempt and the URL accessed. Capture and save screenshot(s) of all errors displayed.
- Stop client tracing and logging:
- If you ran a Fiddler trace, stop and save it.
- If you were using a client application, stop and save all available data from its network trace and logging facilities.
- Set the Identity Router Logging Level back to INFO, or whatever previous level it was, on all IDRs in your deployment.
- Generate and Download an Identity Router Log Bundle from all IDRs in your deployment.
- If you are using the RSA Authenticate app for step-up authentication, save the RSA Authenticate app logs from the mobile device used during the test.
- Applicable third-party logs. For example:
- Audit, application and system logs from the application you are trying to log in to.
- Identity source logs, such as Microsoft Active Directory Windows events.
- Analyze the data gathered above to look for errors or unusual traffic. Explore these items:
- Authentication Manager's Authentication Activity monitor events logged during the test (if applicable).
- Fiddler or any client trace or log.
- The Contents of Identity Router Log Bundle . When the issue was reproduced, the authentication may have been sent to any IDR in your deployment (determined by your load balancer configuration) so all bundle logs must be reviewed.
- The RSA Authenticate app logs from the mobile device used during the test (if applicable).
- Third party logs.
If RSA assistance is needed to help troubleshoot, contact RSA Customer Support if you have not done so already. Save all the data gathered above to send to Support. RSA Support will normally require these items:
When you have an opened support case, you can Upload the files to RSA Customer Support for analysis.
- Description of the problem (expected versus actual, frequency, scope, etc), business impact and steps to reproduce.
- History of the problem, including:
- date and time (with timezone) of when the problem started
- application, network and configuration changes made before the problem started
- any steps that have been taken to try to fix the problem
- date and time (with timezone) of IDR upgrades before and after the problem started
- Screenshots, URL(s), date and time (with timezone of the end user's device(s)) of the test done above.
- User id of affected user(s) for the test that was done.
- Fiddler trace file or client trace and logs captured during the test done above
- All IDR bundle logs downloaded after the test done above
- If Authentication Manager is used:
- Use the Authentication Activity report template to generate a report of all activity details for the test done above.
- Current timezone set in your Authentication Manager deployment so that we can correlate the Authentication Manager's Authentication Activity events to the UTC-time events recorded by the Cloud Authentication Service.
- If the RSA Authenticate app is used for step-up authentication, the RSA Authenticate app logs.
- Grant RSA Customer Support Access to Your Account and provide the configured name of the affected application(s) or authentication client(s). If that is not possible, then please provide screenshots of the relevant configuration detail screens(s) in the Cloud Authentication Service (Application, Authentication Client, Policy, etc), showing the configuration when the problem occurs.
Your application support team, system administrators, network administrators or vendor support should be contacted for any third-party product assistance that is required.
- It is strongly recommended to do all the steps above in the order shown. However, you may skip any item that is not possible in your situation.
- Contact RSA Customer Support if you need help with these troubleshooting steps or have questions.