Test Web Services Description Language (WSDL) connectivity for RSA Authentication Manager 8.x
Originally Published: 2015-05-13
Article Number
Applies To
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.x
Issue
Resolution
- Enter the URL https://<fully_qualified_domain_name>:7002/ims-ws/services/CommandServer?wsdl into a supported web browser, where the <fully_qualified_domain_name> is replaced with the fully qualified domain name of your primary RSA Authentication Manager instance.
- The popup below displays:
- The required username and password can be found via the command line of the RSA Authentication Manager primary instance.
- Logon to the RSA Authentication Manager operating system with the rsaadmin account where you are connecting to WSDL
- Navigate to the /opt/rsa/am/utils folder as rsaadmin.
- Use the following commands to get the username and password required
login as: rsaadmin Using keyboard-interactive authentication. Password: <enter operating system password> Last login: Wed Jan 8 16:14:09 2020 from jumphost.vcloud.local RSA Authentication Manager Installation Directory: /opt/rsa/am rsaadmin@am82p:~> cd /opt/rsa/am/utils rsaadmin@am82p:/opt/rsa/am/utils> ./rsautil manage-secrets -a list Please enter OC Administrator username: <enter Operations Console administrator name> Please enter OC Administrator password: <enter Operations Console administrator password> Secrets stored in ./etc/systemfields.properties. Command API Client User ID ............................: CmdClient_r06oo8sc Command API Client User Password ......................: idQl1P2AaphUEFrTe87Wbmz6KyOe8R SSL Server Identity Certificate Private Key Password ..: lBSeudmCmvYIlkeMHM4bkwstOdav8s SSL Server Identity Certificate Keystore File Password : xHZc6S9k1ZGLCLFWJLn9PyA7Uy3i6i Root Certificate Private Key Password .................: FoxETeO49g4fh6Cixbji7RGcPJrCqF Root Certificate Keystore File Password ...............: BB3aNkbU4uaEoNbURcTflnqd7Kcuna The "listkeys" action displays the key names to use when setting the values.
- At the prompt, enter the username and password captured above and press OK.
- If the WSDL interface is working, the Authentication Manager instance will return an XML file, as in the example below:
Notes
- The Command Client User Name and Password cannot be changed, as it would cause serious issues if changed.
- When the correct Command API Client User ID but a bad password is provided to WSDL an Error 401—Unauthorized is returned.
- Authentication looping is due to incorrect logon credentials being provided.
- For more info, check the RSA Authentication Manager Developer's Guide.
- The RSA Authentication Manager SDK and RSA Authentication Manager Developer’s Guide are found in the rsa-am-extras-<version>.zip available via RSA SecurID Access Downloads on RSA Link.
Related Articles
Delete an Application Trust Certificate 9Number of Views AFX test connector settings button times out and the test connector capabilities work or the test connector capabilities f… 383Number of Views RSA Authenticator 4.5 for iOS and Android Quick Start Guide (Dutch) 6Number of Views RSA Governance & Lifecycle Generic REST Collector Guide 388Number of Views DLP - Issue with Scanning Exchange Mailboxes 34Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?