Test Web Services Description Language (WSDL) connectivity for RSA Authentication Manager 8.x
Originally Published: 2015-05-13
Article Number
Applies To
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.x
Issue
Resolution
- Enter the URL https://<fully_qualified_domain_name>:7002/ims-ws/services/CommandServer?wsdl into a supported web browser, where the <fully_qualified_domain_name> is replaced with the fully qualified domain name of your primary RSA Authentication Manager instance.
- The popup below displays:
- The required username and password can be found via the command line of the RSA Authentication Manager primary instance.
- Logon to the RSA Authentication Manager operating system with the rsaadmin account where you are connecting to WSDL
- Navigate to the /opt/rsa/am/utils folder as rsaadmin.
- Use the following commands to get the username and password required
login as: rsaadmin Using keyboard-interactive authentication. Password: <enter operating system password> Last login: Wed Jan 8 16:14:09 2020 from jumphost.vcloud.local RSA Authentication Manager Installation Directory: /opt/rsa/am rsaadmin@am82p:~> cd /opt/rsa/am/utils rsaadmin@am82p:/opt/rsa/am/utils> ./rsautil manage-secrets -a list Please enter OC Administrator username: <enter Operations Console administrator name> Please enter OC Administrator password: <enter Operations Console administrator password> Secrets stored in ./etc/systemfields.properties. Command API Client User ID ............................: CmdClient_r06oo8sc Command API Client User Password ......................: idQl1P2AaphUEFrTe87Wbmz6KyOe8R SSL Server Identity Certificate Private Key Password ..: lBSeudmCmvYIlkeMHM4bkwstOdav8s SSL Server Identity Certificate Keystore File Password : xHZc6S9k1ZGLCLFWJLn9PyA7Uy3i6i Root Certificate Private Key Password .................: FoxETeO49g4fh6Cixbji7RGcPJrCqF Root Certificate Keystore File Password ...............: BB3aNkbU4uaEoNbURcTflnqd7Kcuna The "listkeys" action displays the key names to use when setting the values.
- At the prompt, enter the username and password captured above and press OK.
- If the WSDL interface is working, the Authentication Manager instance will return an XML file, as in the example below:
Notes
- The Command Client User Name and Password cannot be changed, as it would cause serious issues if changed.
- When the correct Command API Client User ID but a bad password is provided to WSDL an Error 401—Unauthorized is returned.
- Authentication looping is due to incorrect logon credentials being provided.
- For more info, check the RSA Authentication Manager Developer's Guide.
- The RSA Authentication Manager SDK and RSA Authentication Manager Developer’s Guide are found in the rsa-am-extras-<version>.zip available via RSA SecurID Access Downloads on RSA Link.
Related Articles
DLP - Issue with Scanning Exchange Mailboxes 34Number of Views Partial Failure - Changes are not published successfully on the Identity Router (IDR) but successfully published on the Cl… 28Number of Views How do I build and run the Java examples in Authentication Manager 7.1 145Number of Views RSA Governance & Lifecycle Generic REST Collector Guide 401Number of Views RSA Authenticator 4.5 for iOS and Android Quick Start Guide (Dutch) 6Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) Artifacts to gather in RSA Identity Governance & Lifecycle RSA Governance & Lifecycle 8.0.0 Administrators Guide RSA Governance & Lifecycle 8.0.0 Installation Guide
Don't see what you're looking for?