Change the maximum emergency passcode lifetime assigned by an RSA Authentication Manager Prime Kit Help Desk Admin Portal (HDAP) administrator
Originally Published: 2020-06-04
Article Number
Applies To
RSA Product/Service Type: RSA Authentication Manager Prime Kit
Issue
Resolution
- Go to <PrimeKit_installation_directory>/configs/hdap/config.
- Make a copy of the lap.properties file.
- Open the lap.properties file in a text editor.
- Locate the following setting in the properties file:
emergency.access.max.days=30
- Update emergency.access.max.days to the preferred value. For example, to set the maximum lifetime for an Emergency Access Code to 5 days, the setting should look like what is shown here:
emergency.access.max.days=5
- Restart the HDAP service for the change to take effect.
Notes
- The RSA Authentication Manager Prime installation directory will differ from one environment to the other. The administrator should be aware of the installation directory. The subdirectories and file names will not change.
- Restarting the service steps will differ from one environment to the other. The administrator should know how to restart services in their environment.
Related Articles
RSA SecurID Help Desk Administration Portal logon fails in RSA Authentication Manager Prime 111Number of Views RSA Authentication Manager Prime Help Desk Admin Portal Unlock User option grayed out 160Number of Views Modify the RSA SecurID Access Prime Self-Service Portal (SSP) or Help Desk Admin Portal (HDAP) session timeout value 104Number of Views Unauthorized error when logging in to RSA Authentication Manager Help Desk Admin Portal (HDAP) or Self-Service Portal (SSP… 102Number of Views Authentication failed error for users with a specific administrative role when logging in to RSA Authentication Manager Pr… 115Number of Views
Trending Articles
RSA Authentication Manager Upgrade Process RSA Release Notes for RSA Authentication Manager 8.8 RSA RADIUS Server service failed to start in the RSA Authentication Manager 8.1 Operations Console Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide RSA Release Notes: Cloud Access Service and RSA Authenticators
Don't see what you're looking for?