How to configure an RSA Authentication Manager 8.1 server to accept a system-generated PIN when a token is in new PIN mode when a user authenticates from a RADIUS client
Originally Published: 2016-03-07
Article Number
Applies To
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.1, 7.1
Issue
- New PIN cancelled for user and request originated from agent messages when authenticating.
- "New PIN cancelled for user" and "request originated from agent"
- Real time authentication activity report has an entry in the Description column of "New PIN cancelled for user "<user name>". Request originated from agent "<agent_FQDN>" with IP address "<IP_address>" in security domain "<security_domain>"
- Real time authentication activity report has an entry in the Reason column as: N/A
2. The Authentication Manager token policy is configured to require a system-generated PIN (Authentication > Policies > Token Policies > Manage Existing).
3. If the Authentication Manager SecurID PIN format is configured for user-generated PINs in the RSA token policy, the issue is not seen.
4. The user successfully authenticates from the RADIUS client with the user-generated PIN.
Resolution
1. Login to the Operations Console on the RSA Authentication Manager instance hosting the RADIUS server.
2. Click Deployment Configuration > RADIUS Servers.
3. If prompted, enter the Super Admin user ID and password, and click OK.
4. Select the RADIUS server hosted on this instance, and select Manage Server Files from the context menu.
5. Select securid.ini and click Edit.
6. Navigate to the SecurID General options section in the file.
7. Change ;AllowSystemPins = 0 to AllowSystemPins = 1 (Remove the ";" to uncomment the line and change the value from 0 to 1)
8. When done, click Save and Restart RADIUS Server.
9. The user will now be able to successfully authenticates from the RADIUS client with the system-generated PIN.
Notes
- Changes made to the securid.ini file on one RADIUS server are not automatically replicated to other RADIUS servers in the deployment. You must manually edit the securid.ini files of each RADIUS replica server in the deployment.
- For more information on the securid.ini file, see page 30 of the RSA Authentication Manager 8.1 RADIUS Reference Guide.
Related Articles
Radius Client Authentication failed For PIN+Token profile (New PIN Mode) with Cisco Anyconnect VPN 580Number of Views When replacing an RSA SecurID software token with a new software token the token PIN is not carried over to the new token 609Number of Views New PIN cancelled for user and request originated from agent messages when authenticating with RSA Authentication Manager 267Number of Views Unassign a Token from a User 44Number of Views Why is my RSA SecurID token PIN is not being accepted when logging in to the RSA Community? 65Number of Views
Trending Articles
RSA Authentication Manager Upgrade Process RSA Release Notes for RSA Authentication Manager 8.8 RSA RADIUS Server service failed to start in the RSA Authentication Manager 8.1 Operations Console Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide RSA Release Notes: Cloud Access Service and RSA Authenticators
Don't see what you're looking for?