Authentication Manager Log Messages (23001-23091)
a month ago

RSA Authentication Manager Log Messages - 23061

The following table lists AM log messages based on the event category and action ID. It also lists the corresponding action key, description, and log message. The log message has placeholders in the “{number}” format, which represents actual data in the logs and Activity Monitor.

Use this table to understand simple network management protocol (SNMP) trap information captured by a network management system. For more information on the information displayed by the object identifier structure (OID) in the SNMP trap, see RSA Authentication Manager SNMP.

Event Category

Action ID

Action Key

Description

Message

eventAuthn

23061

EAP32_NEW_PEPPER

EAP-32 Authentication

User “{0}” received new EAP-32 Pepper

eventAuthn

23062

TOKEN_EXPIRED

Token Expired

Token serial number “{16}” assigned to user “{0}” in security domain “{1}” from identity source “{2}” is expired

eventAuthn

23066

AUTHMGR_SMS_PIN
_CHANGE

PIN change attempted for On-Demand Tokencode Service

User “{0}” in security domain “{1}” from identity source “{2}” attempted to change pin for On-Demand Tokencode Service

eventAuthn

23067

AUTHMGR_SMS_PASSCODE
_REUSE

Authentication attempted

Passcode reuse or previous token code detected for user “{0}” in security domain “{1}” from “{2}” identity source. Request originated from agent “{3}” with IP address “{4}” in security domain “{5}” with protocol version “{2}”. Authentication method: “{6}” ; Authentication policy exp: “{7}”

eventAuthn

23068

AUTHMGR_SMS_NEW_PIN
_ACTIVATED

New pin mode activated for On-Demand Tokencode Service

New pin mode activated for On-Demand Tokencode Service for user “{0}” in security domain “{1}” from “{2}” identity source

eventAuthn

23069

AUTH_AGENT_TRUSTED
_USER_ACCESS_CHECK

Authentication agent access check

Verifying trusted user “{0}” in security domain “{1}” from identity source “{2}” is allowed access to agent “{3}” with IP address “{4}” in security domain “{5}”

eventAuthn

23070

AUTOREG_UPDATE_FAILED

Agent update failed

Auto-registration update for the agent “{3}” with IP address “{4}” in Security Domain “{5}”

eventAuthn

23071

AUTH_FAILED_BAD
_TOKENCODE_GOOD_PIN

Authentication attempted

Bad tokencode ; but good PIN detected for token serial number “{16}” assigned to user “{0}” in security domain “{1}” from “{2}” identity source

eventAuthn

23072

AUTH_FAILED_BAD_PIN
_GOOD_TOKENCODE

Authentication attempted

Bad PIN ; but good tokencode detected for token serial number “{16}” assigned to user “{0}” in security domain “{1}” from “{2}” identity source

eventAuthn

23073

AUTH_FAILED_BAD_PIN
_PREVIOUS_TOKENCODE

Authentication attempted

Bad PIN ; but previous tokencode detected for token serial number “{16}” assigned to user “{0}” in security domain “{1}” from “{2}” identity source

eventAuthn

23074

TR_R_AUTHMGR_NTC
_ACCEPTED

Trusted realm next token code accepted

Next tokencode mode accepted for token serial number “{11}” assigned to user “{0}” in security domain “{1}” from the trusted realm “{8}”.

eventAuthn

23079

AUTHN_ARTIFACT
_VALIDATION

Authentication artifact validation

Authentication artifact validation on agent “{3}” with IP address “{4}” in security domain “{5}” for user “{0}” in security domain “{1}” from “{2}” identity source

eventAuthn

23080

AUTH_AGENT_DOESNT
_ACCEPT_SECURID

SecurID credential type not accepted

Received a SecurID credential ; which the agent is configured to not accept. Agent “{3}” with IP address “{4}” in security domain “{5}”.

eventAuthn

23081

AUTHN_ARTIFACT
_GENERATION

Generate Authentication Artifact

Authentication artifact was generated for principal “{0}” stored in identity source “{2}” managed in security domain “{1}”

eventAuthn

23089

TR_R_VIA_PRINCIPAL_NOT_DISCOVERED

Discover the user

The user “{0}” could not be discovered in the RSA trusted realm

eventAuthn

23090

TR_R_VIA_OTP_VERIFICATION_FAIL

Verify Authenticate Tokencode

Authenticate Tokencode verification failed for the user “{0}”

eventAuthn

23091

TR_R_VIA_OTP_NODE_SECRET_UNAVAILABLE

Agent node secret verification

Verifying the node secret for the agent “{3}” with IP address “{4}” in security domain “{5}”

eventAuthn

23117

REST_CHECK_AUTH_ACCESS_KEY_IS_DEPRECATED_UNKNOWN

Agent Credentials Usage

Agent with IP "{7}" used credential with Access ID "{6}"