AFX Connectors remain in a Not Deployed state after patching or upgrading RSA Identity Governance & Lifecycle
Originally Published: 2020-06-22
Article Number
Applies To
RSA Version/Condition: 7.1.1 P07+, 7.2.0 P01+
Issue
It is not known at this time how many connector types are affected. We have seen this problem with the following connector types:
- Generic SSH Connectors
- Office365 Connectors
The following error message is displayed in the user interface when using the Test Connector Settings button.
java.io.IOException: Auth cancel
at net.sf.commons.ssh.jsch.JschConnectionFactory.connectUsingPassword(JschConnectionFactory.java:82)
The following error is logged to the aveksaServer.log file ($AVEKSA_HOME/wildfly/standalone/log/aveksaServer.log):
06/15/2020 17:19:26.641 ERROR (default task-2) [com.aveksa.afx.server.service.handler.AFXPrimaryRequestHandler] Exception putting together connector deployment for <Connector name> java.lang.NullPointerException at java.lang.String.replace(String.java:2240) at com.aveksa.afx.server.service.handler.flow.EndpointSubstitutor.substituteCodes(EndpointSubstitutor.java:233) at com.aveksa.afx.server.service.handler.flow.EndpointSubstitutor.substitute(EndpointSubstitutor.java:106) at com.aveksa.afx.server.service.handler.AFXPrimaryRequestHandler.processConnectors(AFXPrimaryRequestHandler.java:284) at com.aveksa.afx.server.service.handler.AFXPrimaryRequestHandler.processRequest(AFXPrimaryRequestHandler.java:42) at com.aveksa.afx.plugin.integration.service.AFXRequestDispatcherProvider.dispatchRequest(AFXRequestDispatcherProvider.java:51) at com.aveksa.afx.AFXServlet.doPost(AFXServlet.java:24) at javax.servlet.http.HttpServlet.service(HttpServlet.java:707) at javax.servlet.http.HttpServlet.service(HttpServlet.java:790)Please refer to RSA Knowledge Base Article 000030327 -- Artifacts to gather in RSA Identity Governance & Lifecycle to find the location of the aveksaServer.log for your specific deployment, if you are on a WildFly cluster or a non-WildFly platform. The aveksaServer.log may also be downloaded from the RSA Identity Governance & Lifecycle user interface (Admin > System > Server Nodes tab > under Logs.)
Cause
This issue occurs when the physical word Password or password is used as a reference or part of a reference in the Command Code section of the connector capability definition. (AFX > Connectors > {Connector name} > Edit > Capability tab.)
Resolution
Workaround
Related Articles
Unique constraint (AVUSER.PK_WP_USER_DATA) violated error while upgrading RSA Identity Governance & Lifecycle 277Number of Views Invalid Request error accessing workflows after patching/upgrading RSA Identity Governance & Lifecycle 157Number of Views Backup and scan for updates using NFS fails after upgrading to RSA Authentication Manager 8.4 313Number of Views Guidelines and resources for upgrading to SecurID Governance & Lifecycle 7.5.2 585Number of Views How to manually update the internal SHA-1 certificates used by earlier versions of Authentication Manager after upgrading … 980Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?