Summary:
On February 18, 2020, Google will slowly roll out a change to the cookie behavior in Google Chrome version 80 or later. This changed cookie behavior does not affect most RSA SecurID Access users. However, there is a possibility that users who have version 80 and authenticate to the RSA SecurID Access Application Portal might experience step-up authentication failure if the authentication session is longer than two minutes. This does not affect deployments that use RADIUS or relying parties.
If this issue affects your users, do the following:
- Update your identity router to 12.8.0.2.1. The identity router will not display OUT-OF-DATE status because this is a patch. For update instructions see Update Identity Router Software for a Cluster.
- Update your load balancer configuration if you have configured High Availability in your SSO Agent deployment and have configured both your load balancer to use the SPBALANCEID cookie for session persistence and SameSite to be enforced by the users' browsers. Modify your load balancer configuration to set SPBALANCEID as Secure and SameSite=None.
If you manage session persistence in another way, you do not need to make this load balancer change.
For additional information about the Google Chrome change, see https://chromereleases.googleblog.com/ and https://www.chromium.org/updates/same-site?pli=1#20200210.
For additional documentation, downloads, and more, visit the RSA SecurID Access page on RSA Link.
EOPS Policy:
RSA has a defined End of Primary Support policy associated with all major versions. Please refer to the Product Version Life Cycle for additional details.
Related Articles
ERR_SSL_PROTOCOL_ERROR when accessing RSA Authentication Manager Security and Operations Consoles with Google Chrome 117 a… 1.1KNumber of Views Missing tabs and skewed buttons in the RSA Identity Governance & Lifecycle user interface after Google Chrome updates 197Number of Views Console and web tier virtual host certificates no longer trusted by Google Chrome 58.0.3029.81 in RSA Authentication Manag… 255Number of Views Google Chrome reports NET::ERR_CERT_COMMON_NAME_INVALID due to missing Subject Alternative Names when accessing the RSA Id… 176Number of Views An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x 1.19KNumber of Views
Trending Articles
RSA Authentication Manager Upgrade Process RSA Release Notes for RSA Authentication Manager 8.8 RSA RADIUS Server service failed to start in the RSA Authentication Manager 8.1 Operations Console Microsoft Entra ID External MFA - Relying Party Configuration Using OIDC - RSA Ready Implementation Guide RSA Release Notes: Cloud Access Service and RSA Authenticators