Contents
11
RSA Authentication Manager 8.1 Administrator’s Guide
Device Settings for Risk-Based Authentication..............................................................289
Configure Device Registration for a Risk-Based Authentication Policy ................289
Configure Device History Settings for a Risk-Based Authentication Policy..........290
Custom Solutions for Web-Based Applications 
for Risk-Based Authentication..............................................................................291
Chapter 13: Administering RSA RADIUS
.....................................................293
RSA RADIUS Overview................................................................................................293
RSA RADIUS Authentication Process....................................................................293
RADIUS Network Topology...................................................................................294
Communication Between RADIUS Servers and Clients.........................................295
Managing RSA RADIUS Servers...................................................................................296
Management Consoles for RSA RADIUS Administration .....................................297
View RADIUS Servers............................................................................................298
RADIUS Data Replication.......................................................................................298
Configure RSA RADIUS to Use System-Generated PINs......................................302
Restart a RADIUS Server........................................................................................303
RADIUS Clients .............................................................................................................305
Add a RADIUS Client.............................................................................................306
EAP-POTP Settings.................................................................................................308
Replace a RADIUS Server Certificate.....................................................................309
Add a Trusted Root Certificate................................................................................310
Managing User Access.....................................................................................................311
RADIUS Profiles.....................................................................................................311
Add a RADIUS Profile............................................................................................314
RADIUS Profile Associations.................................................................................315
Profile Assignment Example...................................................................................317
Specify the Default RADIUS Profile.......................................................................317
RADIUS User Attributes................................................................................................318
User Attribute Assignment Example.......................................................................319
Add a Custom RADIUS User Attribute Definition.................................................319
Assign RADIUS User Attributes to Users...............................................................320
Map a RADIUS User Attribute Definition to an Identity Source Attribute............321
Monitoring and Analyzing System Usage......................................................................322
RADIUS Server Authentication Statistics...............................................................322
RADIUS Client Statistics ........................................................................................324
RADIUS Server Log Files.......................................................................................327
Standard RADIUS Accounting Attributes...............................................................330
Chapter 14: Logging and Reporting
...............................................................333
Log Messages Overview.................................................................................................333
Log Types ................................................................................................................333
Logging Levels ........................................................................................................333
Download Troubleshooting Files....................................................................................334
Converting pdf to powerpoint slides - Library software class:C# Create PDF from PowerPoint Library to convert pptx, ppt to PDF in C#.net, ASP.NET MVC, WinForms, WPF
Online C# Tutorial for Creating PDF from Microsoft PowerPoint Presentation
www.rasteredge.com
Converting pdf to powerpoint slides - Library software class:VB.NET Create PDF from PowerPoint Library to convert pptx, ppt to PDF in vb.net, ASP.NET MVC, WinForms, WPF
VB.NET Tutorial for Export PDF file from Microsoft Office PowerPoint
www.rasteredge.com
12
Contents
RSA Authentication Manager 8.1 Administrator’s Guide
Real-time Monitoring......................................................................................................335
Real-time Monitoring Using Activity Monitors ......................................................336
View Messages in the Activity Monitor..................................................................337
Reports ............................................................................................................................337
Reports Permitted for Each Administrative Role ....................................................338
Scheduled Report Jobs.............................................................................................340
Custom Reports........................................................................................................340
Add a Report............................................................................................................340
Completed Reports ..................................................................................................341
Sample Reports........................................................................................................342
Log Rotation Policy for the Appliance Logs..................................................................346
Configure Appliance Log Settings..................................................................................346
Working with Log Files..................................................................................................347
Log Archives............................................................................................................347
Verify the Integrity of an Archived Log File...........................................................348
Log Messages in Local Files ...................................................................................349
Set the Maximum Number of Local Log Files .......................................................350
Set the Maximum Size of Each Local Log file........................................................351
Mask Token Serial Numbers in Logs......................................................................352
Advanced Logging and Troubleshooting........................................................................353
SNMP Overview......................................................................................................353
Configure SNMP.....................................................................................................354
Log Files for Troubleshooting.................................................................................356
Trace Logs ...............................................................................................................359
Configure the Remote Syslog Host for Real Time Log Monitoring .......................359
Configure Critical System Event Notification.........................................................360
Critical System Event Types...................................................................................  361
Chapter 15: System Maintenance and Disaster Recovery
................363
Deployment Maintenance...............................................................................................363
Promotion for Maintenance ............................................................................................364
Things to Consider...................................................................................................364
Promote a Replica Instance Using Promotion for Maintenance..............................365
View the Next Steps for Promotion for Maintenance..............................................367
View the Progress Monitor for Promotion for Maintenance...................................370
Restore Administration on the Primary Instance.....................................................370
Manually Reset the Original Primary Instance as a Replica Instance.....................371
Start and Synchronize the Original Primary Instance..............................................371
Deployment Problem Troubleshooting...........................................................................372
Symptoms of Missing Data on the Primary or Replica Instance.............................372
Symptoms of an Unresponsive Primary Instance....................................................372
Symptoms of an Unresponsive Replica Instance.....................................................373
Symptoms of an Unresponsive Web Tier................................................................373
Symptoms of Replication Problems ........................................................................373
Library software class:VB.NET PowerPoint: Complete PowerPoint Document Conversion in VB.
Control to render and convert target PowerPoint document to or document formats, such as PDF, BMP, TIFF and VB.NET guide for converting PowerPoint document to
www.rasteredge.com
Library software class:VB.NET PowerPoint: Process & Manipulate PPT (.pptx) Slide(s)
library SDK, this VB.NET PowerPoint processing control add PDF document, image to pdf files and for capturing, viewing, processing, converting, compressing and
www.rasteredge.com
Contents
13
RSA Authentication Manager 8.1 Administrator’s Guide
Deployment Problem Solutions ......................................................................................373
Reboot the Appliance...............................................................................................374
Check Replication Status.........................................................................................374
Synchronize a Replica Instance...............................................................................376
Flush the Cache........................................................................................................376
Deployment Backup........................................................................................................377
Backup File Contents...............................................................................................377
Create a Backup Using Back Up Now.....................................................................378
Create a Backup Using Schedule Backups..............................................................379
Primary or Replica Instance VMware Snapshots ....................................................380
Primary or Replica Instance Hyper-V Checkpoints ................................................381
Primary Instance Data Restoration ..........................................................................381
Restoring Primary Instance Data on a Standalone Deployment..............................382
Restoring Primary Instance Data on a Replicated Deployment ..............................382
Restore from Backup...............................................................................................383
Primary Instance Restoration..........................................................................................385
Primary Instance Replacement ................................................................................385
Replica Instance Promotion for Disaster Recovery.................................................388
Promote a Replica Instance for Disaster Recovery .................................................391
Reverting the Primary Instance to a VMware Snapshot..........................................393
Restoring the Primary Instance to a Hyper-V Checkpoint ......................................395
Replica Instance Restoration...........................................................................................396
Replacing a Replica Instance...................................................................................396
Reverting a Replica Instance to a VMware Snapshot..............................................397
Restoring a Replica Instance to a Hyper-V Checkpoint..........................................398
Restore Web Tier............................................................................................................399
Trusted Relationship Repair............................................................................................400
Repair a Trust Relationship with a Version 8.0 or 8.1 Realm.................................400
Repair a Trust Relationship with a Version 7.1 Realm...........................................402
Repair Trusted Realm Discrepancy When the Backup is Incomplete.....................403
Repairing a Trusted Legacy Realm.........................................................................405
Factory Reset...................................................................................................................406
Consequences of a Factory Reset............................................................................406
Perform a Factory Reset Using the Appliance Boot Menu .....................................407
Perform a Factory Reset Using a Command Line Utility........................................409
Perform a Factory Reset Using the Operations Console .........................................410
Chapter 16: Advanced Administration
..........................................................413
Troubleshooting and Advanced Administration 
Using the Appliance Operating System.......................................................................413
Enable SSH on the Appliance..................................................................................413
Log On to the Appliance Operating System with SSH ...........................................414
Log On to the Virtual Appliance with the VMware vSphere Client .......................414
Library software class:VB.NET PowerPoint: Sort and Reorder PowerPoint Slides by Using VB.
image, clip art or screenshot to PowerPoint document slide PDF document, image to pdf files and for capturing, viewing, processing, converting, compressing and
www.rasteredge.com
Library software class:VB.NET PowerPoint: Convert & Render PPT into PDF Document
Using this VB.NET PowerPoint to PDF converting demo code below, you can easily convert all slides of source PowerPoint document into a multi-page PDF file.
www.rasteredge.com
14
Contents
RSA Authentication Manager 8.1 Administrator’s Guide
Log on to the Virtual Appliance 
with the Hyper-V Virtual Machine Manager Console..........................................415
Log on to the Virtual Appliance with the Hyper-V Manager..................................415
Run Clam Antivirus Software.........................................................................................416
RSA Authentication Manager Services ..........................................................................417
RSA Authentication Manager Services That Start Automatically ..........................417
Manage RSA Authentication Manager Services Manually.....................................417
Super Admin Restoration................................................................................................419
Restore the Super Admin.........................................................................................419
RSA Authentication Manager Updates...........................................................................421
View Software Version Information...............................................................................421
Verify an IP Address or Hostname.................................................................................422
Chapter 17: Administering Trusted Realms
...............................................423
Trusted Realms ...............................................................................................................423
Creating a Trust Relationship .........................................................................................425
Add a Trusted Realm...............................................................................................425
Configure an Agent for Trusted Realm Authentication...........................................426
Duplicate Agent Record for Access Control ...........................................................428
Add a Trusted User..................................................................................................429
Allow Trusted Users to Authenticate Using RSA RADIUS ...................................430
Add a Trusted User Group.......................................................................................430
Add Trusted Users to a Trusted User Group...........................................................430
Creating a Trust Relationship with a Legacy Realm......................................................431
Configure Ports for Trusted Legacy Realm Authentication....................................431
Trusted Relationship Repair............................................................................................433
Appendix A: Changing the Instance Network Settings
......................435
Primary or Replica Instance Network Settings Updates.................................................435
Change the Primary Instance IPv4 Network Settings.....................................................436
Update the Primary Instance Hostname and IP Address on a Replica Instance.............440
Change the Replica Instance IPv4 Network Settings......................................................440
Static Routes ...................................................................................................................444
Add a Persistent IPv4 Static Route..........................................................................444
Add a Persistent IPv6 Static Route..........................................................................446
Add a Non-Persistent IPv4 Static Route..................................................................447
Add a Non-Persistent IPv6 Static Route..................................................................448
Delete a Persistent IPv4 or IPv6 Static Route..........................................................449
Delete a Non-Persistent IPv4 or IPv6 Static Route .................................................450
Recovery from Incorrect Network Settings ....................................................................452
Recover from an Incorrect IP Address Change.......................................................453
Recover from an Incorrect Subnet Mask.................................................................454
Recover from an Incorrect Gateway........................................................................455
Library software class:VB.NET PowerPoint: Use PowerPoint SDK to Create, Load and Save PPT
users also can get the precise PowerPoint slides count as Save as local PowerPoint document file for capturing, viewing, processing, converting, compressing and
www.rasteredge.com
Library software class:VB.NET PowerPoint: Extract & Collect PPT Slide(s) Using VB Sample
please read this VB.NET PowerPoint slide processing PDF document, image to pdf files and for capturing, viewing, processing, converting, compressing and
www.rasteredge.com
Contents
15
RSA Authentication Manager 8.1 Administrator’s Guide
Appendix B: Managing RSA SecurID Tokens Using the Microsoft 
Management Console
.............................................................................................457
Overview.........................................................................................................................457
Access the RSA Token Management Snap-in................................................................457
Token Management Using the RSA Token Management Snap-In.................................458
Assign a Hardware Token Using the RSA Token Management Snap-in................458
Assigning a Software Token Using the RSA Token Management Snap-In............459
Appendix C: Deploying IPv4/IPv6 Authentication Agents
................461
Overview.........................................................................................................................461
IPv4/IPv6 Agent Name............................................................................................461
Deploying an IPv4/IPv6 Authentication Agent..............................................................462
Configure an IPv4/IPv6 Agent ................................................................................462
Load a New Node Secret.........................................................................................464
Resolving Common IPv4/ IPv6 Issues............................................................................465
Create IPv6 Network Settings on a Primary or Replica Instance ...................................465
Enabling IPv6 in the VMware or Hyper-V Infrastructure..............................................466
Glossary
...........................................................................................................................467
Index
...................................................................................................................................477
Library software class:VB.NET PowerPoint: Merge and Split PowerPoint Document(s) with PPT
in VB.NET to finish PowerPoint document splitting you want to see more PDF processing functions for capturing, viewing, processing, converting, compressing and
www.rasteredge.com
Library software class:C# Tiff Convert: How to Convert PowerPoint Document to Tiff Image
RasterEdge.XDoc.PDF.dll. C# Class Code for PowerPoint to Tiff Converting. provide an example of using C# class code to convert the whole PowerPoint document to
www.rasteredge.com
Library software class:C# PowerPoint: C# Guide to Add, Insert and Delete PPT Slide(s)
detailed guide for each PowerPoint slide processing profession imaging controls, PDF document, tiff capturing, viewing, processing, converting, compressing and
www.rasteredge.com
Library software class:VB.NET PowerPoint: Add Image to PowerPoint Document Slide/Page
or delete any certain PowerPoint slide without & profession imaging controls, PDF document, tiff capturing, viewing, processing, converting, compressing and
www.rasteredge.com
Revision History
17
RSA Authentication Manager 8.1 Administrator’s Guide
Revision History
Revision 
Number
Date
Revision
1
December 2014 Updated for RSA Authentication Manager 8.1 Service Pack 1 
(SP1). Added information for Hyper-V support. and added 
information about using QR codes with dynamic seed 
provisioning (CT-KIP).
Preface
19
RSA Authentication Manager 8.1 Administrator’s Guide
Preface
About This Guide
This guide describes how to administer RSA
®
Authentication Manager 8.1. It is 
intended for administrators and other trusted personnel.
RSA
Authentication Manager 8.1 Documentation
For information about RSA Authentication Manager 8.1, see the following 
documentation. RSA recommends that you store the product documentation in a 
location on your network that is accessible to administrators. 
Release Notes. Describes what is new and changed in this release, as well as 
workarounds for known issues.
Hardware Appliance Getting Started. Describes how to deploy a hardware appliance 
and perform the Authentication Manager Quick Setup process.
Virtual Appliance Getting Started. Describes how to deploy a virtual appliance and 
perform the Authentication Manager Quick Setup process.
Planning Guide. Describes the high-level architecture of Authentication Manager and 
how it integrates with your network.
Setup and Configuration Guide. Describes how to set up and configure 
Authentication Manager.
Administrator’s Guide. Provides an overview of Authentication Manager and its 
features. Describes how to configure the system and perform a wide range of 
administration tasks, including manage users and security policies. 
Help Desk Administrator’s Guide. Provides instructions for the most common tasks 
that a Help Desk Administrator performs on a day-to-day basis. 
SNMP Reference Guide. Describes how to configure Simple Network Management 
Protocol (SNMP) to monitor an instance of Authentication Manager on a hardware 
appliance or a virtual appliance.
Troubleshooting Guide. Describes the most common error messages in RSA 
Authentication Manager and provides the appropriate actions to troubleshoot each 
event. 
Developer’s Guide. Provides information about developing custom programs using 
the RSA Authentication Manager application programming interfaces (APIs). 
Includes an overview of the Authentication Manager APIs and the related Javadoc.
Performance and Scalability Guide. Describes what to consider when tuning your 
deployment for optimal performance. 
6.1 to 8.1 Migration Guide. Describes how to migrate from an RSA Authentication 
Manager 6.1 deployment to an RSA Authentication Manager 8.1 deployment. 
20
Preface
RSA Authentication Manager 8.1 Administrator’s Guide
7.1 to 8.1 Migration Guide: Migrating to a New Hardware Appliance or Virtual 
Appliance. Describes how to migrate from an RSA Authentication Manager 7.1 
deployment to an RSA Authentication Manager 8.1 deployment on a new hardware 
appliance or virtual appliance. 
7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 on Existing 
Hardware. Describes how to migrate from an RSA Authentication Manager 7.1 
deployment to an RSA Authentication Manager 8.1 deployment on existing, 
supported RSA SecurID Appliance 3.0 hardware.
Security Console Help. Describes day-to-day administration tasks performed in the 
Security Console. 
Operations Console Help. Describes configuration and setup tasks performed in the 
Operations Console. 
Self-Service Console Help. Describes how to use the Self-Service Console. To view 
the Help, on the Help tab in the Self-Service Console, click Self-Service Console 
Help.
RSA Token Management Snap-In Help. Describes how to use software that works 
with the Microsoft Management Console (MMC) for deployments that have an Active 
Directory identity source. Using this snap-in, you can enable or disable a token, assign 
a token, or perform other token-related tasks without logging on to the Security 
Console.
Related Documentation
RADIUS Reference Guide. Describes the usage and settings for the initialization 
files, dictionary files, and configuration files used by RSA RADIUS.
Security Configuration Guide. Describes the security configuration settings available 
in RSA Authentication Manager. It also describes secure deployment and usage 
settings, secure maintenance, and physical security controls.
Support and Service
RSA SecurCare Online offers a knowledgebase that contains answers to common 
questions and solutions to known problems. It also offers information on new releases, 
important technical news, and software downloads.
RSA SecurCare Online
https://knowledge.rsasecurity.com
Customer Support Information
www.emc.com/support/rsa/index.htm
RSA Solution Gallery
https://gallery.emc.com/community/ma
rketplace/rsa?view=overview
Documents you may be interested
Documents you may be interested