sequence_number=XX,date=xxxx-xx-xx xx:xx:xx:xxx PST,messageID=-2,event_type=Internal Error,event_description=Discarding still valid key because MAX_NUM_KEYS threshold (15) has been exceeded.
# Sets the allowable idle time for a given single sign-on token. # This setting determines how long the Key Server must hold on to # keys that are no longer used for encryption but still are valid # for decryption. # # Allowed Values: # Any positive integer followed by a space and one of the following # time identifiers: hour | mins | secs. # # Default Value: # 1 hour # # Dependencies: # The value set here should be greater than the sum of .idle_timeout # and .post_url_idle_ timeout parameters in the webagent.conf file of # RSA Access Manager Agents. It must also be set to at least twice the # value of .session_key_life in order to prevent possible token # decryption failure. # # The value set here should match the value set for # cleartrust.aserver.logoff.session_expiration_time in aserver.conf # cleartrust.keyserver.token_lifetime=1 hour # Specifies how long a session key is valid for encrypting new # single sign-on (SSO) tokens. # # Allowed Values: # Any positive integer followed by a space and one of the following # time identifiers: hour | mins | secs. # # Default Value: # 30 mins # # Dependencies: # See the description of .token_lifetime. # cleartrust.keyserver.session_key_life=30 mins