CPU Usage for Offline Authentication service
In the recent past, I've had high CPU utilization rates with my Offline Authentication Service. The fix for this was to upgrade my Window's Authentication Agent to 7.4.4. I am running this on Windows Servers 2016 and 2019 as well as Windows 10 workstations. My RSA AM appliance is 8.5. Now, I am noticing the Offline Authentication service using 10% CPU and edging up. Is this normal behavior? If not, in what CPU utilization range should that service operate?
- Auth Agent
- Authentication Agent
- Community Thread
- Forum Thread
- RSA SecurID
- RSA SecurID Access
Don't have that issue here, that I'm aware of. Assuming they're able to talk to RSA AM over all the necessary agent ports, 5550 stands out to me as being the offline auth port.
Try a clean agent install? Review any possible GPOs/rsop results also.
We just suffer from some 1% random fallout from Offline auth VPN users where they suddenly have no offline days & are unable to auth, until returning to the office. Has been an issue thru several revisions of the agents & is undergoing yet another 3rd case.