RSA Authentication Agent 7.3.1 for Microsoft Windows prompts for passcode when used as an RDP jump host
Originally Published: 2016-09-14
Article Number
Applies To
RSA Product/Service Type: Authentication Agent for Windows
RSA Version/Condition: 7.3.1[43] and later, 7.3.1 and 7.2.x
Issue
If this challenged user enters valid SecurID credentials, this is treated as a local agent authentication and sometimes fails with the following error:
Node Secret Mismatch cleared on Agent not on server
If the authentication does not fail with the node secret mismatch error, and the user successfully authenticates on the first machine with a passcode, the user will next see a remote Windows Credential Provider logon prompt, requesting a password if the RSA Authentication Agent is not installed and a passcode if the RSA agent is installed.
Reverting the Windows update typically is not an option even if it returns the Windows platform to its previous method of connecting directly to the remote RDP host and its Credential Provider prompt.
If verbose logging was enabled, the authentication agent's logs will indicate that the Windows update has made the Windows Credential Provider UI call a different RDP application, one that the RSA agent did not expect, so the RSA Credential provider prompts for local SecurID Credentials
Cause
To enable agent verbose logging in the RSA Control Center,
- From Home, select Advanced Tools.
- Select Tracing.
- On the Tracing page, set the Trace Level to Verbose.
- Use the default trace file destination folder or click Browse to select a different location.
- For Selected Components, check Select All.
- When done, click OK.
- Test the connection again.
- In the location defined as the trace files destination folder, there will be a log file that includes the called RDP application name. For example, SIDAuthenticator(RDCMan).log, SIDCredentialProvider(RDCMan).log and other logs with RDCMan in the name that indicate that Remote Desktop Connection Manager is being called, therefore the fix is to set the registry setting to use Remote Desktop Connection Manager.
- Remote Desktop Connection Manager is a stand-alone application from Microsoft that runs on a variety of Windows operating systems.
- Based on a very brief investigation, it appears to be available ONLY as an x86 application, based on agent logs where mstsc.exe was called instead of RDP
- RSA Product Management for the Windows authentication agent did not require that the agent support RDP authentication through any client other than the native Remote Desktop Connection application (mstsc.exe).
- Put these three pieces together and supporting the Remote Desktop Connection Manager will require an enhancement to the Windows authentication agent. Refer to AAWIN-2319 when asking your RSA sales contact about any work being done as an enhancement for this.
2016-09-09 15:53:54.264 764.5496 [I] [Helpers::getModuleLongFilename] szLongNameBuff=C:\Program Files (x86)\Microsoft\Remote Desktop Connection Manager\RDCMan.exe
Resolution
- Launch the registry editor.
- Open or create the key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\RSA\RSA Desktop\Local Authentication Settings.
- Create a REG_SZ value named RDCFileName and populate it with the fully qualified path to the application. For Remote Desktop Connection Manager, that would be C:\Program Files (x86)\Microsoft\Remote Desktop Connection Manager\RDCMan.exe instead of C:\Windows\System32\CredentialUIBroker.exe or C:\Windows\System32\mstsc.exe.
An alternative would be to see if RSA Engineering provides a fix or another work-around through AAWIN-2319, for the capability to run the Remote Desktop Connection Manager from a Windows 2012 R2 Server that is protected by an RSA Authentication Agent to a Windows server that does not have the RSA agent installed. This is deemed a known Issue because using the GPO is a workaround unless/until RSA can re-architect the Windows agent to eliminate the need for elevated privilege.
Workaround
Notes
First, change permissions on the node secret file (named securid by default) to grant read permissions to Authenticated Users. To do this,
- Open Windows Explorer on the machine on which the authentication agent is installed.
- Navigate to C:\Program Files\Common Files\RSA Shared\Auth Data.
- Right click the RSA Shared directory and choose Properties.
- Click on the Security tab.
- Under Group or user names, click the Edit button.
- Click Add...
- Create a new object named Authenticated Users and click OK when done.
- Highlight the Authenticated Users object.
- Under Permissions, check the Allow box next to Read.
- Click Apply.
- Click OK.
- Try to RDP with a challenged user again.
- You will see two prompts here. The first is from the local Windows machine. The second will be on the remote server. There will be a prompt for a passcode if an RSA authentication agent is installed or for password if the RSA agent is not installed.
Related Articles
Default variables under jobs in workflow are not editable in RSA Governance & Lifecycle 2Number of Views Run as a different user prompts for a passcode not password with RSA Authentication Agent 7.4 for Windows 253Number of Views Authentication Issues Using A Third-Party RDP Client And RSA Authentication Agent 7.3.3 for Windows 24Number of Views RSA SecurID prompt does not appear when connecting with Remote Desktop Protocol RDP on Windows Server 2012 with RSA Authen… 646Number of Views L&G: New review appears stuck in parsing users task during review generation 84Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) How to factory reset an RSA Authentication Manager 8.x hardware appliance without a factory reset button from the Operatio… Deploying RSA Authenticator 6.2.2 for Windows Using DISM Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?