How to troubleshoot and fix most invalid proof and failed to send day data errors on the RSA Authentication Agent 7.x for Windows
Originally Published: 2016-08-04
Article Number
Applies To
RSA Product/Service Type: Authentication Agent for Windows
RSA Version/Condition: 7.2.1, 7.3.1, 7.3.3[99], 7.4.2[122] on RSA Link, 7.4.3 build [177] from Customer Support
Issue
One explanation for why offline days do not download is "Invalid proof of authentication data provided by the agent." However, invalid proof is a description of an exception and not necessarily an error. That being said, there have been several bugs with invalid proof that were found and fixed, so updating to the latest agent may be recommended.
- The following error messages display in the authentication activity log, sometimes repeating every two seconds from the same Windows agent. For example,
Offline authentication data download requested by user <userID> from agent <agent_name>' using token < SecurID_token_serial_number> failed with error message 'Invalid proof'
Offline Authentication Data Download Failed. Invalid proof of authentication data provided by the agent
If invalid proof messages are shown every one to two seconds in the authentication activity monitor, as in the example below, this is tracked as AAWIN-2421 (Authentication Agent for Windows 7.3.3 [103] agents get invalid proof every 1-2 seconds), and is fixed by RSA Authentication Agent 7.3.3 [114] for Windows or later.
- The DAService (da_svc).log will show either of the following errors:
DaSvcProofDownloader::process() exiting: DPS_DA_REQUEST_DATABASE_ERROR (212)
or
DA_REQUEST_DATABASE_ERROR
DPS_DA_REQUEST_DATABASE_ERROR (212) {noformat}
DPS_DA_REQUEST_DATABASE_ERROR (212) {noformat}
Cause
There were several bugs affecting offline authentication (OA) or disconnected authentication (DA) dayfile downloads throughout 2016-2018. The issues and errors described above were fixed by RSA Authentication Agent 7.3.3 [114] for Windows, released in January 2018.
However RSA Authentication Agent 7.3.3[99] for Windows did not contain the fix though it remained on RSA Link downloads throughout 2018. GA versions of 7.4.2[122] and 7.4.3 posted to RSA Link during 2019 both contain the fixes for the invalid proof exceptions shown in the Issue section above. As of October 2019, the only known issue in the RSA Authentication Agent for Windows with invalid proof is for fixed passcodes and emergency offline codes, not with hardware or software tokens.
A proof is generated and stored on the Windows agent when you successfully authenticate. The proof is for a specific user ID with a single token serial number (or fixed passcode, if allowed) on a specific Windows agent during a specific time period (valid for 24 hours from successful authentication). When a Windows agent is on the Authentication Manager network (corporate LAN), either physically or through a VPN, the agent presents the proof to any RSA Authentication Manager server to request more offline days. If the Authentication Manager primary or replica server can validate the proof, offline days will be downloaded to that agent for that user and token.
Reasons for an invalid proof include, but are not limited to, the following:
However RSA Authentication Agent 7.3.3[99] for Windows did not contain the fix though it remained on RSA Link downloads throughout 2018. GA versions of 7.4.2[122] and 7.4.3 posted to RSA Link during 2019 both contain the fixes for the invalid proof exceptions shown in the Issue section above. As of October 2019, the only known issue in the RSA Authentication Agent for Windows with invalid proof is for fixed passcodes and emergency offline codes, not with hardware or software tokens.
A proof is generated and stored on the Windows agent when you successfully authenticate. The proof is for a specific user ID with a single token serial number (or fixed passcode, if allowed) on a specific Windows agent during a specific time period (valid for 24 hours from successful authentication). When a Windows agent is on the Authentication Manager network (corporate LAN), either physically or through a VPN, the agent presents the proof to any RSA Authentication Manager server to request more offline days. If the Authentication Manager primary or replica server can validate the proof, offline days will be downloaded to that agent for that user and token.
Reasons for an invalid proof include, but are not limited to, the following:
- The proof is expired, which will happen if you authenticated more than 24 hours ago.
- The request may not have been sent from the agent to the Authentication Manager server; for example, if port 5580 TCP is blocked by a firewall.
- The Windows agent's Offline Authentication Local service is not running.
- A server.cer from the agent installation that is wrong or corrupt.
- Using an alias during authentication instead of the real user ID.
- Overlapping identity sources so that the same user appears in more than one identity source, whether it be two external LDAP identity sources or an external LDAP source and the internal database.
- Bugs in older agents; that is, Authentication Agent 7.3.3[99] for Windows and earlier.
- Offline Authentication policy restrictions. For example, a user has a PINless token and PINless tokens are not enabled under your OA policy.
Resolution
If you are currently running RSA Authentication Agent 7.4.2[122] for Windows or later, and the workarounds do not help, please gather the following information:
- An Authentication Activity report from the RSA Authentication Manager Security Console covering the time period when the Invalid proofs were seen.
- In the Security Console, navigate to Reporting > Reports > Manage Existing if you have already created an Authentication Activity report or Add New if you do not.
- If you have an Authentication Activity report created, run the report job.
- If you need to create one,
- On the Select Template page, select the Authentication Activity template
- Click Next.
- From the Security Domain menu, select the security domain where you want the report to be managed.
- In the Report Name field, enter a unique name for the report.
- Select one of the following options for Run As: The administrator running the report job or the report creator.
- Under Output Columns, move the items that you want to display in the report from the Available column to the Show in Report column.Under Input Parameter Values, either enter values or leave the fields blank.
- Under Email Recipients, either select the checkboxes or leave them blank:
- Click Save.
- Verbose logs from the Windows Agent, see Notes.
- The Authentication Manager primary imsTrace.log(s) after enabling verbose logging on the Authentication Manager server, see Notes
- Note the date and time.
- Download the imsTrace.log files from the primary and replica(s). Note that if the imsTrace.log files are large, there can be more than one. Some will have numbers in the file name. There can be up to 30 of them.
- Launch an SSH client, such as PuTTY.
- Login to the primary Authentication Manager server as rsaadmin and enter the operating system password.
Note that during Quick Setup another user name may have been selected. Use that user name to login.
- Navigate to /opt/rsa/am/server/logs.
Workaround
- Restart the Offline Local service on the Windows agent via the services.msc.
- Authenticate again with a passcode. For example, lock the screen then unlock using a passcode. Do not use the quick unlock option of a password or PIN only. A Test Authentication from within the RSA Control Center would work too if you have access
- Restart the Authentication Manager server services.
- Login to the primary Authentication Manager server as rsaadmin and enter the operating system password.
Note that during Quick Setup another user name may have been selected. Use that user name to login.
- Navigate to /opt/rsa/am/server.
- Run the command ./rsaserv restart all
login as: rsaadmin Using keyboard-interactive authentication. Password: <enter operating system password> Last login: Tue Aug 9 12:29:10 2016 from jumphost.vcloud.local RSA Authentication Manager Installation Directory: /opt/rsa/am rsaadmin@am81p:~> cd /opt/rsa/am/server rsaadmin@am81p:/opt/rsa/am/server> ./rsaserv restart all
- From a command prompt on the Windows agent, run the RSA Authentication Agent Auto-registration command:
sdadmreg.exe -r
Notes
Enabling verbose logging on an RSA Authentication Agent for Windows
- On the Windows agent machine, access the RSA Control Center interface. You may need administrator rights for this.
- From Home, select Advanced Tools.
- Select Tracing.
- Set Trace Level to Verbose.
- Trace logs are written to C:\ProgramData\RSA\LogFiles folder by default. Click Browse to change the location.
- For Components, check the Select All box..
Enabling verbose logging on an RSA Authentication Manager server
- From the Security Console, select Setup > System Settings.
- Under Basic Settings, click Logging.
- Set the Trace Log value to Verbose.
- Click Save.
To avoid filling the server with verbose logs, do not forget to disable Verbose logging when done!
After the invalid proof message is seen, complete the following steps:
- Note the date and time.
- Download the imsTrace.log files from the primary and replica(s). Note that if the imsTrace.log files are large, there can be more than one. Some will have numbers in the file name. There can be up to 30 of them.
- Launch an SSH client, such as PuTTY.
- Login to the primary Authentication Manager server as rsaadmin and enter the operating system password.
Note that during Quick Setup another user name may have been selected. Use that user name to login.
- Navigate to /opt/rsa/am/server/logs.
- List the directory contents.
- Copy all imsTrace*.log files to /tmp.
login as: rsaadmin
Using keyboard-interactive authentication.
Password: <enter operating system password>
Last login: Tue Aug 9 12:29:10 2016 from jumphost.vcloud.local
RSA Authentication Manager Installation Directory: /opt/rsa/am
rsaadmin@am81p:~> cd /opt/rsa/am/server/logs
rsaadmin@am81p:/opt/rsa/am/server/logs> ls -al imsTrace.*
-rw------- 1 rsaadmin rsaadmin 32497 Aug 2 15:56 imsTrace.log
rsaadmin@am81p:/opt/rsa/am/server/logs>
rsaadmin@am81p:/opt/rsa/am/server/logs> cp imsTrace*.log /tmp
- Use a secure copy client such as WinSCP or FileZilla to connect with same operating system account, and copy the imsTrace.log from /tmp to your PC.
Related Articles
Disable offline day downloads yet run offline local Sservice for RSA Authentication Agent 7.2.1 for Windows 650Number of Views Maximum number of offline days allowed for an RSA Authentication Agent for Windows 205Number of Views Troubleshooting failed offline authentication on an RSA Authentication Agent 7.3 or 7.4 for Windows 907Number of Views RSA Authentication Manager 8.x On-Demand Authentication (ODA) via SMS fails with error:"Failed to send message. SSL connec… 588Number of Views Offline days not downloading for RSA Authentication Agent 7.3.x for Windows after enabling Offline Authentication policy i… 1.61KNumber of Views
Trending Articles
Downloading RSA Authentication Manager license files or RSA Software token seed records Unable to login to RSA Authentication Manager Security Console as super admin RSA Authentication Manager 8.9 Release Notes (January 2026) How to manipulate imported RSA SecurID Software Token(s) on an iPhone or iPad device Connection fails to Cloud Authentication Service when connecting through a proxy server from RSA Authentication Manager to…
Don't see what you're looking for?