Test Web Services Description Language (WSDL) connectivity for RSA Authentication Manager 8.x
Originally Published: 2015-05-13
Article Number
Applies To
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.x
Issue
Resolution
- Enter the URL https://<fully_qualified_domain_name>:7002/ims-ws/services/CommandServer?wsdl into a supported web browser, where the <fully_qualified_domain_name> is replaced with the fully qualified domain name of your primary RSA Authentication Manager instance.
- The popup below displays:
- The required username and password can be found via the command line of the RSA Authentication Manager primary instance.
- Logon to the RSA Authentication Manager operating system with the rsaadmin account where you are connecting to WSDL
- Navigate to the /opt/rsa/am/utils folder as rsaadmin.
- Use the following commands to get the username and password required
login as: rsaadmin Using keyboard-interactive authentication. Password: <enter operating system password> Last login: Wed Jan 8 16:14:09 2020 from jumphost.vcloud.local RSA Authentication Manager Installation Directory: /opt/rsa/am rsaadmin@am82p:~> cd /opt/rsa/am/utils rsaadmin@am82p:/opt/rsa/am/utils> ./rsautil manage-secrets -a list Please enter OC Administrator username: <enter Operations Console administrator name> Please enter OC Administrator password: <enter Operations Console administrator password> Secrets stored in ./etc/systemfields.properties. Command API Client User ID ............................: CmdClient_r06oo8sc Command API Client User Password ......................: idQl1P2AaphUEFrTe87Wbmz6KyOe8R SSL Server Identity Certificate Private Key Password ..: lBSeudmCmvYIlkeMHM4bkwstOdav8s SSL Server Identity Certificate Keystore File Password : xHZc6S9k1ZGLCLFWJLn9PyA7Uy3i6i Root Certificate Private Key Password .................: FoxETeO49g4fh6Cixbji7RGcPJrCqF Root Certificate Keystore File Password ...............: BB3aNkbU4uaEoNbURcTflnqd7Kcuna The "listkeys" action displays the key names to use when setting the values.
- At the prompt, enter the username and password captured above and press OK.
- If the WSDL interface is working, the Authentication Manager instance will return an XML file, as in the example below:
Notes
- The Command Client User Name and Password cannot be changed, as it would cause serious issues if changed.
- When the correct Command API Client User ID but a bad password is provided to WSDL an Error 401—Unauthorized is returned.
- Authentication looping is due to incorrect logon credentials being provided.
- For more info, check the RSA Authentication Manager Developer's Guide.
- The RSA Authentication Manager SDK and RSA Authentication Manager Developer’s Guide are found in the rsa-am-extras-<version>.zip available via RSA SecurID Access Downloads on RSA Link.
Related Articles
DLP - Issue with Scanning Exchange Mailboxes 34Number of Views Partial Failure - Changes are not published successfully on the Identity Router (IDR) but successfully published on the Cl… 28Number of Views How do I build and run the Java examples in Authentication Manager 7.1 145Number of Views RSA Governance & Lifecycle Generic REST Collector Guide 397Number of Views RSA Authenticator 4.5 for iOS and Android Quick Start Guide (Dutch) 6Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?