Authentications failing after changing the directory password for the Directory User ID in the Identity Source Configuration for RSA Authentication Manager 8.1 SP1
Originally Published: 2017-05-22
Article Number
Applies To
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.1 SP 1 or later
Issue
- An administrator has configured an identity source for mapping user and group information from Microsoft Active Directory to an Authentication Manager deployment.
- The customer has a password policy that requires all Windows passwords must change on a regular basis (e. g., every 90 days) which has an impact on the Directory User ID in the identity source configuration.
- Following the password policy, the directory password for the Directory User ID was changed and the connectivity to the identity source was confirmed being successful using the Test Connection button and/or Validate Connection Information button.
- After the directory password is changed, the end user authentications were found to be failing and users are no longer searchable in the Security Console for the identity source in question.
- The System Activity Monitor (Security Console > Reporting > Real-time Activity Monitors > System Activity Monitor) reports failures for the connecting to the identity source.
Cause
Resolution
Where there is a single replica instance in the Authentication Manager deployment
- From the Operations Console, flush cached data on the replica instance (Maintenance > Flush Cache). You will be prompted to enter the super admin credentials.
- Select Flush all cache objects.
- Click Flush.
- Connect to the replica instance via the local console or via an SSH session using the rsaadmin account.
Note that during Quick Setup another user name may have been selected. Use that user name to login.
- Stop the Authentication Manager services on the replica instance using the command:
/opt/rsa/am/server/rsaserv stop all
- Launch the Operations Console and navigate to Deployment Configuration > Identity Sources > Manage Existing.
- Click on the identity source in question and choose Edit.
- On the Configuration tab, update the Directory Password for the primary and all replica instances listed.
- Use the Test Connection and Validate Connection Information buttons to confirm a successful connection to the identity source from the primary and all replica instances listed.
- Use the Save and Finish button to save the directory password for primary and all replica instances listed.
- From the primary's Operations Console, flush cached data on the primary by selecting Maintenance > Flush Cache. You will be prompted to enter the super admin credentials.
- Select Flush all cache objects.
- Click Flush.
- Connect to the primary instance via the local console or via an SSH session using the rsaadmin account.
Note that during Quick Setup another user name may have been selected. Use that user name to login.
- Restart the Authentication Manager services on the primary instance using the command:
/opt/rsa/am/server/rsaserv restart all
- Connect to the replica instance via the local console or via an SSH session using the rsaadmin account.
- Restart the Authentication Manager services on the replica instance using the command:
/opt/rsa/am/server/rsaserv start all
Where there are multiple replica instances in the Authentication Manager deployment
- From the replica's Operations Console, flush cached data by selecting Maintenance > Flush Cache. You will be prompted to enter the super admin credentials.
- Select Flush all cache objects.
- Click Flush.
- Reboot the appliance from the Operations Console by selecting Maintenance > Reboot Appliance.
- Check Yes, reboot the appliance.
- Click Reboot.
- From the Security Console, verify that users are searchable on the primary and replica instances (Identity > Users > Manage Existing.
- Change the Identity Source name in the Search Criteria and click Search button. It is expected that a list of users are returned. Use the System Activity Monitor in the Security Console (Reporting > Real-time Activity Monitors > System Activity Monitor) to check system activity to the identity source.
- Perform test authentication using the user IDs mapped from the identity source to confirm the Authentication Manager can process those authentications.
Related Articles
CyberArk and RSA Authentication Manager integration is unable to perform password change for RSA Security Console user ID 336Number of Views Duplicate User ID error when running All Users report in RSA Authentication Manager 8.x 1.63KNumber of Views Cannot add or manage a user with user ID <UserID>. User IDs must be unique within a deployment. This user ID is already in… 2.01KNumber of Views Certificate not verified error when changing Active Directory identity source from LDAP to LDAPS in RSA Authentication Man… 643Number of Views How to recover the user id or password of a read only database user from RSA Authentication Manager 8.x 267Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) How to factory reset an RSA Authentication Manager 8.x hardware appliance without a factory reset button from the Operatio… Deploying RSA Authenticator 6.2.2 for Windows Using DISM Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?