Announcements

SecurID® Discussions

Browse the SecurID discussion board to get product help and collaborate with other SecurID users.
DanMiller1
Beginner
Beginner

RSA authentication manager 8.2 not creating node secret

Jump to solution

created sdconf.rec and imported into Cisco ISE 2.2. Created policy within ISE to pass authentication to RSA manager. RSA AM 8.2 receives request, fails login attempt and node secret is never generated on either client or server.

 

Error in monitored session

 

Principal authentication

 

User “<username>” attempted to authenticate using authenticator “SecurID_Native”. The user belongs to security domain “SystemDomain”

 

Authentication method failed

Labels (1)
0 Likes
1 Solution

Accepted Solutions
EdwardDavis
Employee
Employee

You will never get a node secret set up, until the first user who logs in, successfully authenticates. Need to solve the reason you are getting auth method failed [which means RSA saw the correct number of characters for the type of authenticators that userid owns, but could not figure out pin or tokencode from it]

 

On new setups it is an encryption/decryption problem, usually. Agent encrypts with some IP address it owns, and RSA server decrypts with the top most entry on the agent setup screen. These have to match. 

 

You can force the Cisco side to encrypt the communication using an IP address you specify (this should be the IP that is actually hitting the RSA server, and is configured on the agent page top most IP address line)

 

1) first, have that userid and token log in somewhere else, [like self-service console], just to prove the token works and no problems with it or the userid.

 

2) make a plain text file named sdopts.rec

 

3) in that file have one line

 

CLIENT_IP=1.2.3.4

 

where 1.2.3.4 is the address you want to encrypt with, change to match your setup,

[it should be the IP address that actually hits the RSA server from the previous attempts]

 

4) On the ISE you need to load this file

 

sdopts.rec:
To add or update the sdopts.rec file:
1. Browse to Administration > Identity Management > External Identity Sources > RSA SecurID.
2.
Edit the RSA SecurID Identity Source, and open the RSA Instance Files tab.
3. Click the
Update Options file link.
4.
Browse to the sdopts.rec file and click OK.
5. Click
Save to save your changes.
6. Reboot the ISE appliance

 

5) Now, the Cisco should be encrypting with the address in the sdopts.rec, and if the RSA server agent entry has the same address also, it should now correctly decrypt and authenticate, and then a node secret will get set up.

View solution in original post

0 Likes
2 Replies
EdwardDavis
Employee
Employee

You will never get a node secret set up, until the first user who logs in, successfully authenticates. Need to solve the reason you are getting auth method failed [which means RSA saw the correct number of characters for the type of authenticators that userid owns, but could not figure out pin or tokencode from it]

 

On new setups it is an encryption/decryption problem, usually. Agent encrypts with some IP address it owns, and RSA server decrypts with the top most entry on the agent setup screen. These have to match. 

 

You can force the Cisco side to encrypt the communication using an IP address you specify (this should be the IP that is actually hitting the RSA server, and is configured on the agent page top most IP address line)

 

1) first, have that userid and token log in somewhere else, [like self-service console], just to prove the token works and no problems with it or the userid.

 

2) make a plain text file named sdopts.rec

 

3) in that file have one line

 

CLIENT_IP=1.2.3.4

 

where 1.2.3.4 is the address you want to encrypt with, change to match your setup,

[it should be the IP address that actually hits the RSA server from the previous attempts]

 

4) On the ISE you need to load this file

 

sdopts.rec:
To add or update the sdopts.rec file:
1. Browse to Administration > Identity Management > External Identity Sources > RSA SecurID.
2.
Edit the RSA SecurID Identity Source, and open the RSA Instance Files tab.
3. Click the
Update Options file link.
4.
Browse to the sdopts.rec file and click OK.
5. Click
Save to save your changes.
6. Reboot the ISE appliance

 

5) Now, the Cisco should be encrypting with the address in the sdopts.rec, and if the RSA server agent entry has the same address also, it should now correctly decrypt and authenticate, and then a node secret will get set up.

0 Likes

That seemed to do it. Weird in that it did see the address in auth logs, but would fail the auth attempt

0 Likes