Backups are scheduled on the RSA appliance via the
Operation Console. However, we will need to retrieve the backup at times.
Where are the backup files residing in the system?
1. Login using the account emcsrv and key in the password when prompted.
2. Change to root and key in the password when prompted:
bash-3.00$ sudo su -
3. Navigate to the directory where the backup files reside:
[root@Primary/ ]# cd /var/cap/backups/
6. List the backup files using the below command:
[root@Primary/ ]# ls -ltr
7. The backup files will be display as follows:
THIS IS A TECHNICAL BLOG TO RECORD THE OCCURRENCES, EXPERIENCES OR OBSERVATIONS WHICH I HAD IN THE COURSE OF MY WORK AS AN IT PROFESSIONAL. IT IS MEANT FOR MY PERSONAL REFERENCE. I WOULD BE GLAD IF IT IS USEFUL TO WHOEVER WHO CAME ACROSS THIS BLOG. I WILL NOT BE RESPONSIBLE FOR ANY KIND OF LOSS OR DAMAGES TO YOUR ORGANISATION.
Showing posts with label RSA SecurID. Show all posts
Showing posts with label RSA SecurID. Show all posts
Wednesday, October 1, 2014
Thursday, July 24, 2014
Changing NTP Server On RSA Appliances
In order to change the NTP server, we will have to carry out the following steps via Putty (An open source telnet and SSH Client for the Windows and Unix platforms):
1. Login using the account emcsrv and key in the password when prompted.
2. Change to root and key in the password when prompted:
bash-3.00$ sudo su
3. Navigate to the directory where the NTP configuration file resides:
bash-3.00$ cd /etc
4. Edit the file NTP.CONF and locate the “server” line. Specify the NTP server to be added and save the file:
bash-3.00$ vi ntp.conf
For example:
# server mytrustedtimeserverip
server 192.168.7.22
5. Enter the below command to enable the NTPD service to start when the appliance is rebooted:
[root@Primary/ ]# /sbin/chkconfig –levels 2345 ntpd on
6. Restart the NTPD service for the change to take effect:
[root@Primary/ ]# /sbin/service ntpd restart
7. The appliance immediately synchronizes its time with the NTP server and sets the hardware clock automatically. You can verify that the NTPD service is running using the below command:
[root@Primary/ ]# ntpq –p
Repeat the above steps at the Replica.
1. Login using the account emcsrv and key in the password when prompted.
2. Change to root and key in the password when prompted:
bash-3.00$ sudo su
3. Navigate to the directory where the NTP configuration file resides:
bash-3.00$ cd /etc
4. Edit the file NTP.CONF and locate the “server” line. Specify the NTP server to be added and save the file:
bash-3.00$ vi ntp.conf
For example:
# server mytrustedtimeserverip
server 192.168.7.22
5. Enter the below command to enable the NTPD service to start when the appliance is rebooted:
[root@Primary/ ]# /sbin/chkconfig –levels 2345 ntpd on
6. Restart the NTPD service for the change to take effect:
[root@Primary/ ]# /sbin/service ntpd restart
7. The appliance immediately synchronizes its time with the NTP server and sets the hardware clock automatically. You can verify that the NTPD service is running using the below command:
[root@Primary/ ]# ntpq –p
Repeat the above steps at the Replica.
Monday, October 28, 2013
Security Certificate Issued Was Not From A Trusted Certificate Authority
Since we migrated to the new RSA SecurID Appliances 3.0, we always get a Security Alert notification that the security certificate was not from a trusted Certificate Authority when logging on to the RSA Security Console.
To remove this alert, the following steps need to be
carried out to save the RSA Self-Signed Root certificate on the RSA
Authentication Manager’s admin console:
1.
Log on to the RSA Security Console via URL: https://<FQDN>:7004/console-ims
2.
Since this certificate is not trusted by the browser,
a Security Alert warning is displayed. In
Windows Internet Explorer, click Continue to this website (not recommended).
3.
Next, a red Address Bar and a certificate warning
appears.
4. Click the Certificate error
button to open the information window
5.
Click View Certificates to continue. The web
certificate is presented to you. Click on the top tab labelled Certification
Path.
6.
Double click on the untrusted certificate "RSA
Authentication Manager Root CA" and click Install Certificate...
7.
The Certificate Import Wizard appears. Click Next to
continue.
8.
Choose "Automatically select the certificate
store based on the type of certificate" and click Next to continue.
10. Continue to click OK through the screens to get back to the main window.
Monday, September 30, 2013
RSA Secure Logon via SecurID Passcode
Our RSA administrators
are required to use 2 Factors Authentication (2FA) for access to the RSA
Security Console. However, the RSA
Secure Logon prompts for Password by default.
The administrator is not able to logon using SecurID Passcode (i.e. RSA
2FA).
The administrators will now able to access the Security Console using 2FA via the SecurID Passcode (i.e. PIN + RSA token code).
In order to
enable the administrators to access the RSA Security Console using RSA 2FA, the
following steps are carried out to enable logon via SecurID Passcode:
1.
Access the Security Console via https://<FQDN>:7004/console-ims and select Authentication Methods under the Setup tab. You will notice that the Console
Authentication was configured to accept either LDAP_Password or RSA_Password.
2.
Append /SecurID_Native immediately
after RSA_Password/LDAP_Password under
Console Authentication and click Save.
3.
When the Confirmation Required dialog box appears,
click on the box beside Update Authentication Methods Configuration
Confirmation: to update authentication methods configuration and click on
Update Authentication Methods Configuration.
4.
The next screen will shows the below message:
Updated authentication configuration setting.
5.
Logout off from the Security Console and re-access the
Security Console via https://<FQDN>:7004/console-ims.
6.
You will notice that the RSA Secure Logon allows the
administrator to select the different Authentication Method (i.e. either
Password or SecurID Passcode).
The administrators will now able to access the Security Console using 2FA via the SecurID Passcode (i.e. PIN + RSA token code).
Friday, September 27, 2013
Error 1324: The path RSA Security contains an invalid character (2)
Due to a security vulnerability found in the older version of the RSA agent, we upgraded the RSA agent for all Windows 2003 servers to 7.1.2. Majority of the upgrade were smooth except the 2 Exchange 2003 servers. When trying to upgrade the RSA agent on the Exchange servers to version 7.1.2, we encountered the below error
message:
Error 1324: The path RSA Security
contains an invalid character.
Removing the RSA related folders and
registry settings mentioned in the previous blog post
does not help.
We found out that the service “RSA Authentication
Agent Offline Local” still appear under Services although we have uninstalled the RSA agent which is of an older version. The Status is blank although the Startup Type
= Automatic.
Did a search for the registry key related to “RSA
Authentication Agent Offline Local” and found the below registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\OASVC_Local
We deleted the key and did a reboot of the Windows
2003 x86 server. After that, we re-install the RSA Agent again without any
problem.
Thursday, July 25, 2013
Mounting A USB Drive On RSA SecurID Appliance
We copied all the token seed files into a USB drive
and we do not have access to the USB port of the Windows terminal which we used
to manage the RSA SecurID Appliance. In
order to import the token seed files, we carried out the belowmentioned steps:
Bus 002 Device 004: ID 0a16:9005 Trek Technology (S) PTE. Ltd
Bus 002 Device 003: ID 0424:2514 Standard Microsystems Corp.
Bus 002 Device 002: ID 8087:0020
Bus 002 Device 001: ID 1d6b:0002
Bus 001 Device 002: ID 8087:0020
Bus 001 Device 001: ID 1d6b:0002
sd 0:0:0:0: [sda] Attached SCSI disk
sd 4:0:0:0: [sdb] Attached SCSI removable disk
sd 5:0:0:0: [sdb] Attached SCSI removable disk
[root@kandti tmp]# mount –t vfat /dev/sdb tmp
1. Using a third-party utility such as PuTTY, open an SSH
connection to the Primary Appliance.
2. Login using the account emcsrv and key in the password
when prompted.
3. Change to root and key in the password when prompted:
-bash-3.00$
sudo su –
4. Plug the USB drive into one of the USB ports behind
the Appliance.
5. Key in the below command to check that the USB drive
is listed:
[root@kandti ~]# lsusbBus 002 Device 004: ID 0a16:9005 Trek Technology (S) PTE. Ltd
Bus 002 Device 003: ID 0424:2514 Standard Microsystems Corp.
Bus 002 Device 002: ID 8087:0020
Bus 002 Device 001: ID 1d6b:0002
Bus 001 Device 002: ID 8087:0020
Bus 001 Device 001: ID 1d6b:0002
The above
information shows that the Appliance recognises one USB drive named “Trek
Technology (S) PTE. Ltd”.
6. Next, find out the device which is attached to the USB
drive:
[root@kandti
~]# dmesg | grep –i disksd 0:0:0:0: [sda] Attached SCSI disk
sd 4:0:0:0: [sdb] Attached SCSI removable disk
sd 5:0:0:0: [sdb] Attached SCSI removable disk
From the
output, the device is sdb.
7. Navigate to the directory where the USB drive is to be
mounted and mount it:
[root@kandti
~]# cd /usr/tmp[root@kandti tmp]# mount –t vfat /dev/sdb tmp
8. To confirm that the USB drive is mounted, key in the
below command to display the files in the directory tmp:
[root@kandti tmp]# ls –l
9. Copy the required token seed files from the USB
drive’s mount point to the desktop of the Windows terminal via WINSCP, a
third-party utility.
10. Unmount the USB drive by issuing the below command:
[root@kandti
var]# umount /dev/sdb
11. Proceed to import the token seeds via Security
Console.
Tuesday, July 16, 2013
Unable To Logon Using An Unchallenged Account After RSA Agent Upgraded
We
upgraded the RSA agent for some of the Windows 2003 servers from version 6.1.3
to version 7.1.2. However, it was found out that we are not able to logon to
the servers using an unchallenged account (i.e. an account which is not a
member of the domain group where the members will be challenged). For those
servers still using 6.1.3 agent, there is no issue when we logon using the same
unchallenged account.
The
below message will appears:
The system could not log you on. Make sure your User name and
domain are correct, then type your password again. Letters in passwords must be
typed using the correct case.
After
some troubleshooting, it was found out that the logon problem happened due to
AD name translation failure for the challenged group KANDTI\RSAUsers.
The
below steps were carried out to ensure that the challenged group has the same
sAMAccountName and Common Name:
1. Logon to a domain
controller and click Start > Administrative Tools > Active Directory
Users and Computers.
2. On the View menu,
select Advanced Features.
3. Search for the group
KANDTI\RSAUsers, right-click the group and open the Properties dialog.
4. Click on the Object
tab and note down the Canonical name of object (i.e. kandti.com/Users/RSAUsers).
5. Click OK and exit
from Active Directory Users and Computers.
6. Click Start > Run
and type adsiedit.msc and click OK.
7. Under ADSI EDIT,
expand DC=kandti,DC=com.
8. Select CN=Users and
look for CN=RSAUsers.
9. Right-click
CN=RSAUsers and open the Properties dialog.
10. Click on the
Attribute Editor tab and scroll down the attributes list to find the
sAMAccountName attribute.
11. Make sure the Value
for the sAMAccountName is the same as the CN (i.e. both sAMAccountName and CN
should be RSAUsers).
We
are able to logon successfully after making the necessary change to
sAMAccountName.Monday, July 15, 2013
Error 1324: The path RSA Security contains an invalid character (1)
When trying to uninstall the RSA agent on a Windows
2003 x86 server in order to upgrade the agent to version 6.1.3, we encountered
the below error message:
Error 1324: The path RSA Security contains an invalid character.
As advised by RSA Support, the following steps were carried out:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
- "RSANotificationIcon"="\"C:\\Program Files\\Common
Files\\RSA Shared\\RSA Security Center\\RSANotificationIcon.exe\""
Error 1324: The path RSA Security contains an invalid character.
As advised by RSA Support, the following steps were carried out:
1. Logon to the server
using the local administrator account to remove the belowmentioned folders and
registry settings:
File locations:
C:\Program Files\RSA
Security\RSA Authentication Agent
C:\Program Files\Common
Files\RSA Shared
Registry:
[HKEY_CLASSES_ROOT\rsaconf]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\rsaconf]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Control
Panel\Cpls] - "RSASecurityCenter"="C:\\Program Files\\Common
Files\\RSA Shared\\RSA Security Center\\SCACPL.cpl"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]-
"UIService"="\"C:\\Program Files\\Common Files\\RSA
Shared\\BackendUI\\UIService.exe\""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDlls]-
"C:\\Program Files\\RSA Security\\RSA Authentication Agent……….
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDlls]-
"C:\\Program Files\\Common Files\\RSA Shared……….
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon] - "GinaDLL"="C:\\Program Files\\RSA
Security\\RSA Authentication Agent\\AceGina.dll"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders]-
"C:\\Program Files\\Common Files\\RSA Shared……….
[HKEY_LOCAL_MACHINE\SOFTWARE\RSA
Security]
[HKEY_LOCAL_MACHINE\SOFTWARE\RSAACEAgents]
[HKEY_LOCAL_MACHINE\SOFTWARE\SDTI\ACECLIENT]
2. Reboot the server.
3. Proceed to install the
RSA Authentication Agent version 6.1.3.
Friday, May 31, 2013
Accessing RSA SecurID's Security Console
Since
we migrates the existing appliances to RSA SecurID Appliances 3.0, we have been
accessing the Security Console via https://<ipaddress>:7004/console-ims.
After logging on to the Security Console, we will be shown with the error
message:
The error will disappear after clicking on other tabs. The URL
link will be redirected to FQDN after that (i.e. https://<FQDN>:7004/console-ims)
and everything is back to normal.
This was escalated to RSA Support. We were informed that:
1. Neither
IP address nor short-name is supported for Security Console’s access.
2. IP
address is supported for Operations Console’s access though.
We tried accessing the
Security Console via https://<FQDN>:7004/console-ims and
the error message does not appear anymore.
Monday, May 20, 2013
Creating, Updating And Listing of Operations Console Administrator Accounts
By default, RSA
SecurID has only 1 Operations Console Administrator account (i.e. rsaadmin)
created. At times, there may be a need to have an additional Operations Console
Administrator if there is a secondary RSA SecurID administrator or even third
one.
In order to create the additional Operations Console Administrators, we will have to carry out the following steps via Putty (An open source telnet and SSH Client for the Windows and Unix platforms):
In order to create the additional Operations Console Administrators, we will have to carry out the following steps via Putty (An open source telnet and SSH Client for the Windows and Unix platforms):
1. Login using the
account emcsrv and key in the password
when prompted.
2. Change to root and key in the password when prompted:
-bash-3.00$ sudo su
3. Change to rsaadmin:
[root@Primary/ ]# su rsaadmin
4. Navigate to the
directory where the superadmin restoration utility resides to create the
temporary superadmin account:
bash-3.00$ cd
/usr/local/RSASecurity/RSAAuthenticationManager/utils
bash-3.00$ ./rsautil manage-oc-administrator –a
create
[create] –
create Operations Console Administrator account
Super Administrator’s name: rsaadmin
Enter Super Administrator’s Password: **********
Enter User Name: OCAdmin1
Enter User Password: **********
Confirm User Password: **********
User ‘OCAdmin1’ created successfully.
5. To change the password for
the Operations Console Administrator created.
bash-3.00$ ./rsautil manage-oc-administrator –a
update
[update] –
change Operations Console Administrator account password
Enter User Name: OCAdmin1
Enter User Password: **********
Confirm User Password: **********
User ‘OCAdmin1’ updated successfully.
6. To list out all Operations
Console Administrators.
bash-3.00$ ./rsautil manage-oc-administrator –a list
[list] –
provide the list of items to be selling
Super Administrator’s name: rsaadmin
Enter Super Administrator’s Password: **********
Userlisting
(./etc/systemfields.properties)
..
3)
OcAdmin1 Groups:
Operations Console - Administrator
4)
OcAdmin2 Groups:
Operations Console – Administrator
..
8)
rsaadmin Groups:
Operations Console – Administrator
Subscribe to:
Posts (Atom)