RSA Access Manager API cannot connect to 6.2 SP4 Servers due to SSLException illegal_parameter error
Originally Published: 2017-02-10
Article Number
Applies To
RSA Product/Service Type: Access Manager Server, Access Manager Runtime API, Access Manager Administrative API
RSA Version/Condition: 6.2 SP4 Server / 6.2 SP3 and earlier Runtime API / 6.2 SP3 and earlier Administrative API
Issue
sirrus.api.client.TransportException: Cannot connect to the Entitlements Server at <host name> port 5601: javax.net.ssl.SSLException: Received fatal alert: illegal_parameter
at sirrus.api.client.impl.ServerProxy.createSocket(ServerProxy.java:234)
at sirrus.api.client.impl.ServerProxy.connect(ServerProxy.java:135)
at sirrus.api.client.APIServerProxy.connect(APIServerProxy.java:234)
When connecting to the Entitlements Server, the eserver.log file may provide additional information:
sequence_number=3,date=2017-02-10 10:38:55:723 EST,messageID=-2,internal_error,description='No shared ciphers for protocol',details='javax.net.ssl.SSLException: No shared ciphers for protocol'
Cause
EXPORT DES 3DES DES40 NULL RC4
Any clients using the Runtime API or Administrative API, with cipher suites that only match these patterns, will cause the exception.
Resolution
- API libraries and their documentation are available in the sdk subfolder of the Access Manager v6.2 SP4 package.
- See the RSA Access Manager Server 6.2.4 Downloads page to obtain the 6.2 SP4 package for available platforms. A current Access Manager support contract and RSA Link login are required.
Workaround
| This Workaround is not recommended by RSA, and should be used with caution, because it enables cipher suites that have known security vulnerabilities. This Workaround is provided only for situations where there is a compelling reason that the Resolution documented above cannot be used. In that scenario, we recommend compensating controls be introduced as well to mitigate the risk. |
Setting the parameter cleartrust.net.ssl.excluded_cipher_suites in the Access Manager Server configuration files (aserver.conf, eserver.conf, dispatcher.conf, iserver.conf, keyserver.conf, lserver.conf, and selfservice.conf), allows you to override the default list of excluded cipher suites for RSA Access Manager Server. The Server can, therefore, be made backward compatible with the 6.2 SP3 and earlier Runtime API and Administrative API by setting this parameter in the configuration files.
The default setting used by Access Manager Server 6.2 SP4 if the parameter is not specified in the Server configuration files is:
cleartrust.net.ssl.excluded_cipher_suites=_EXPORT_,_DES_,_3DES_,_DES40_,_NULL_,_RC4_
That setting prevents all those weak ciphers from being used.
To allow a specific cipher, you should add this parameter to the Server configuration files, with the required cipher omitted from the list. For example, if 3DES is needed, the parameter should be specified with 3DES omitted, as follows:
cleartrust.net.ssl.excluded_cipher_suites=_EXPORT_,_DES_,_DES40_,_NULL_,_RC4_
If you are unsure of which cipher you need to use, you can remove all ciphers from the exclusion list by setting the parameter to:
cleartrust.net.ssl.excluded_cipher_suites=none For a cipher suite to be available to use, it must also be supported by the underlying JDK on the client platform and on the RSA Access Manager Server.
Notes
- RSA does not support mixed API and Server versions. Access Manager Server v6.2 SP4 is only qualified with 6.2 SP4 APIs.
- More information about allowed cipher suites and the cleartrust.net.ssl.excluded_cipher_suites parameter is in the RSA Access Manager 6.2 SP4 Security Configuration Guide, sections "SSLv3 Vulnerabilities & POODLE Protection" on page 14 and "Freak and LogJam Vulnerability Protection" on page 16.
Related Articles
RSA Identity Governance and Lifecycle failed to connect due to space issue 37Number of Views JavaDoc documentation for the Administration API 6Number of Views SAP AFX Connector Update an Account capability fails to update any SAP account attributes in RSA Identity Governance & Lif… 97Number of Views AFX Connectors lose CyberArk Password Vault settings when AFX is restarted in RSA Identity Governance & Lifecycle 141Number of Views Connection failure with certificate issue due to empty TrustStore in RSA Governance & Lifecycle 41Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?