- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Suspending Downloads of RSA Authentication Manager 8.3 Patch 1
RSA Temporarily Suspending Downloads of RSA Authentication Manager 8.3 Patch 1 and the Associated Web-Tier Server Update
What is the risk and impact to customer that already deployed the patch
- Tags:
- AM
- Auth Manager
- Authentication Manager
- Community Thread
- Discussion
- Forum Thread
- RSA Authentication Manager
- RSA SecurID
- RSA SecurID Access
- SecurID
- suspending downloads of rsa authentication manager 8.3
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Syed,
I have moved this thread to the RSA SecurID Suite" data-type="space so that you can get an answer to your question.
You can post future questions and discussions directly to that community by clicking on the Ask a Question or Start a Discussion button on the RSA SecurID Suite" data-type="space page.
Thanks,
Jeff
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
And will doing a rollback to 8.3.0.0 be useful? The release note for 8.3.0.1 mentions that a rollback won't undo changes to OS, Java, etc.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Just ran this by Continuing Engineering, if P1 applied you should leave it, do not roll back.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
If patch installed and system is working, the recommendation is you should leave the patch and not roll back. The 8.3 Patch 1 appears to only affect some (not all) Hardware models, but to be safe RSA pulled the patch for everyone, VM, Hyper-V, Amazon Web Services, both Intel and Dell hardware appliances all models, not just the specific models with the problem.
For those who have downloaded but not applied P1, the original advisory stands, do not apply P1 and wait for further details. But if you have already successfully applied, don't roll back based on everything we know right now
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
So this only really applies to Hardware Appliance?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Initial reports were some hardware models, and VMs worked, but we're still collecting all the data. What is clear so far is if patch applied, you should leave it applied, not roll-back
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I’m rocking AM 8.3 P1 on VMware and Hyper-V. No problems so far
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yes we are running on VM's and didn't notice any issues yet
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Just got email from RSA. Only hardware appliances affected
