SecurID Access Application Portal still using old certificate after it was replaced
Originally Published: 2021-11-16
Article Number
Applies To
RSA Product/Service Type: Cloud Authentication Service
RSA Version/Condition: Identity Router
Issue
Cause
-
For VMware and Hyper-V identity routers, go to one of the following:
- https://<identityrouterIP>/setup.jsp (for an identity router with two network interfaces)
- https://<identityrouterIP>:9786/setup.jsp (for an identity router with one network interface),
where <identityrouterIP> is the IP address of the identity router's management interface.
- For Amazon cloud-based identity routers, go to https://<identityrouterIP>:9786/setup.jsp,
where <identityrouterIP> is the private IP address of the identity router.
Once at the identity router's setup page, check what certificate is presented to the browser (search the internet for how to do this for the particular browser being used, if needed.)
Either the old certificate or the new certificate will be seen.
- If the old certificate is still seen, then it is possible that the changes made when uploading the new public certificate to the Cloud Administration Console were not saved and/or published, so the identity router did not get updated with the new certificate.
- If the new certificate is seen, this indicates that the identity router was updated with the new certificate. This scenario very likely means that users are accessing the Application Portal through a load balancer and that the load balancer is still presenting the old certificate when the Application Portal is accessed.
Resolution
- If the old certificate was seen on the identity router's setup page, verify that the new public certificate is uploaded to the Cloud Administration Console > My Account > Company Settings > Company Information page, save these settings, and then publish the new changes. Once the publish completes, browse to the Application Portal and verify that the new certificate is presented to the browser.
- If the new certificate was seen on the identity router's setup page, check to see if the load balancer used with the identity router(s) for the Application Portal needs to be updated to use the new public certificate or if it needs to have its cache cleared so that it presents the new certificate.
Related Articles
Old Radius Shared Secret is still in use even after changing it in agent record from Security Console 91Number of Views Replaced default Web Tier certificate but old certificate is presented in RSA Authentication Manager 8.x 413Number of Views RSA Identity Governance & Lifecycle Attribute Change Rule for Managed Attributes with argument "Set to old value of" does … 52Number of Views Grouping Users By Business Unit shows the old Business Unit name in RSA Identity Governance & Lifecycle 7.0.2 25Number of Views How to overcome ORA-01555: Snapshot too old errors in the RSA Identity Governance & Lifecycle 370Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?