Contents
11
RSA Authentication Manager 8.1 Administrator’s Guide
Device Settings for Risk-Based Authentication..............................................................289
Configure Device Registration for a Risk-Based Authentication Policy................289
Configure Device History Settings for a Risk-Based Authentication Policy..........290
Custom Solutions for Web-Based Applications 
for Risk-Based Authentication..............................................................................291
Chapter 13: Administering RSA RADIUS
.....................................................293
RSA RADIUS Overview................................................................................................293
RSARADIUS Authentication Process....................................................................293
RADIUS Network Topology...................................................................................294
Communication Between RADIUS Servers and Clients.........................................295
Managing RSARADIUS Servers...................................................................................296
Management Consoles for RSA RADIUS Administration.....................................297
View RADIUS Servers............................................................................................298
RADIUS Data Replication.......................................................................................298
Configure RSA RADIUS to Use System-Generated PINs......................................302
Restart a RADIUS Server........................................................................................303
RADIUS Clients.............................................................................................................305
Add a RADIUS Client.............................................................................................306
EAP-POTP Settings.................................................................................................308
Replace a RADIUS Server Certificate.....................................................................309
Add a Trusted Root Certificate................................................................................310
Managing User Access.....................................................................................................311
RADIUS Profiles.....................................................................................................311
Add a RADIUS Profile............................................................................................314
RADIUS Profile Associations.................................................................................315
Profile Assignment Example...................................................................................317
Specify the Default RADIUS Profile.......................................................................317
RADIUS User Attributes................................................................................................318
User Attribute Assignment Example.......................................................................319
Add a Custom RADIUS User Attribute Definition.................................................319
Assign RADIUS User Attributes to Users...............................................................320
Map a RADIUS User Attribute Definition to an Identity Source Attribute............321
Monitoring and Analyzing System Usage......................................................................322
RADIUS Server Authentication Statistics...............................................................322
RADIUS Client Statistics........................................................................................324
RADIUS Server Log Files.......................................................................................327
Standard RADIUS Accounting Attributes...............................................................330
Chapter 14: Logging and Reporting
...............................................................333
Log Messages Overview.................................................................................................333
Log Types................................................................................................................333
Logging Levels........................................................................................................333
Download Troubleshooting Files....................................................................................334
Can a pdf be compressed - Compress reduce PDF size in C#.net, ASP.NET, MVC, Ajax, WinForms, WPF
C# Code & .NET API to Compress & Decompress PDF Document
compress pdf; pdf paper size
Can a pdf be compressed - VB.NET PDF File Compress Library: Compress reduce PDF size in vb.net, ASP.NET, MVC, Ajax, WinForms, WPF
VB.NET PDF Document Compression and Decompression Control SDK
300 dpi pdf file size; best pdf compressor online
12
Contents
RSA Authentication Manager 8.1 Administrator’s Guide
Real-time Monitoring......................................................................................................335
Real-time Monitoring Using Activity Monitors......................................................336
View Messages in the Activity Monitor..................................................................337
Reports............................................................................................................................337
Reports Permitted for Each Administrative Role....................................................338
Scheduled Report Jobs.............................................................................................340
Custom Reports........................................................................................................340
Add a Report............................................................................................................340
Completed Reports..................................................................................................341
Sample Reports........................................................................................................342
Log Rotation Policy for the Appliance Logs..................................................................346
Configure Appliance Log Settings..................................................................................346
Working with Log Files..................................................................................................347
Log Archives............................................................................................................347
Verify the Integrity of an Archived Log File...........................................................348
Log Messages in Local Files...................................................................................349
Set the Maximum Number of Local Log Files .......................................................350
Set the Maximum Size of Each Local Log file........................................................351
Mask Token Serial Numbers in Logs......................................................................352
Advanced Logging and Troubleshooting........................................................................353
SNMP Overview......................................................................................................353
Configure SNMP.....................................................................................................354
Log Files for Troubleshooting.................................................................................356
Trace Logs...............................................................................................................359
Configure the Remote Syslog Host for Real Time Log Monitoring.......................359
Configure Critical System Event Notification.........................................................360
Critical System Event Types................................................................................... 361
Chapter 15: System Maintenance and Disaster Recovery
................363
Deployment Maintenance...............................................................................................363
Promotion for Maintenance............................................................................................364
Things to Consider...................................................................................................364
Promote a Replica Instance Using Promotion for Maintenance..............................365
View the Next Steps for Promotion for Maintenance..............................................367
View the Progress Monitor for Promotion for Maintenance...................................370
Restore Administration on the Primary Instance.....................................................370
Manually Reset the Original Primary Instance as a Replica Instance.....................371
Start and Synchronize the Original Primary Instance..............................................371
Deployment Problem Troubleshooting...........................................................................372
Symptoms of Missing Data on the Primary or Replica Instance.............................372
Symptoms of an Unresponsive Primary Instance....................................................372
Symptoms of an Unresponsive Replica Instance.....................................................373
Symptoms of an Unresponsive Web Tier................................................................373
Symptoms of Replication Problems........................................................................373
VB.NET TIFF: How to Convert TIFF to PDF in a VB.NET Doc Imaging
A TIFF file can be compressed with several methods, but this If you want to restore the file with a smallest possible size, you should choose TIFF over PDF.
pdf page size dimensions; change font size in fillable pdf
VB.NET PDF Convert to Tiff SDK: Convert PDF to tiff images in vb.
When converting PDF document to TIFF image using VB.NET program, do you TIFF stands for Tagged Image File Format which can be compressed and uncompressed by
change file size of pdf document; pdf files optimized
Contents
13
RSA Authentication Manager 8.1 Administrator’s Guide
Deployment Problem Solutions......................................................................................373
Reboot the Appliance...............................................................................................374
Check Replication Status.........................................................................................374
Synchronize a Replica Instance...............................................................................376
Flush the Cache........................................................................................................376
Deployment Backup........................................................................................................377
Backup File Contents...............................................................................................377
Create a Backup Using Back Up Now.....................................................................378
Create a Backup Using Schedule Backups..............................................................379
Primary or Replica Instance VMware Snapshots....................................................380
Primary or Replica Instance Hyper-V Checkpoints................................................381
Primary Instance Data Restoration..........................................................................381
Restoring Primary Instance Data on a Standalone Deployment..............................382
Restoring Primary Instance Data on a Replicated Deployment..............................382
Restore from Backup...............................................................................................383
Primary Instance Restoration..........................................................................................385
Primary Instance Replacement................................................................................385
Replica Instance Promotion for Disaster Recovery.................................................388
Promote a Replica Instance for Disaster Recovery.................................................391
Reverting the Primary Instance to a VMware Snapshot..........................................393
Restoring the Primary Instance to a Hyper-V Checkpoint......................................395
Replica Instance Restoration...........................................................................................396
Replacing a Replica Instance...................................................................................396
Reverting a Replica Instance to a VMware Snapshot..............................................397
Restoring a Replica Instance to a Hyper-V Checkpoint..........................................398
Restore Web Tier............................................................................................................399
Trusted Relationship Repair............................................................................................400
Repair a Trust Relationship with a Version 8.0 or 8.1 Realm.................................400
Repair a Trust Relationship with a Version 7.1 Realm...........................................402
Repair Trusted Realm Discrepancy When the Backup is Incomplete.....................403
Repairing a Trusted Legacy Realm.........................................................................405
Factory Reset...................................................................................................................406
Consequences of a Factory Reset............................................................................406
Perform a Factory Reset Using the Appliance Boot Menu.....................................407
Perform a Factory Reset Using a Command Line Utility........................................409
Perform a Factory Reset Using the Operations Console.........................................410
Chapter 16: Advanced Administration
..........................................................413
Troubleshooting and Advanced Administration 
Using the Appliance Operating System.......................................................................413
Enable SSH on the Appliance..................................................................................413
Log On to the Appliance Operating System with SSH...........................................414
Log On to the Virtual Appliance with the VMware vSphere Client.......................414
C# Word: How to Compress, Decompress Word in C#.NET Projects
can save both the original and compressed files to project in your VS program, you can simply copy powerful & profession imaging controls, PDF document, image
batch pdf compression; best way to compress pdf file
VB.NET Image: RasterEdge JBIG2 Codec Image Control for VB.NET
compressed bitonal images into PDF files and decompress images from PDF files quickly with the smallest quality loss. The encoded images in PDF file can also
change font size in pdf form; adjust file size of pdf
14
Contents
RSA Authentication Manager 8.1 Administrator’s Guide
Log on to the Virtual Appliance 
with the Hyper-V Virtual Machine Manager Console..........................................415
Log on to the Virtual Appliance with the Hyper-V Manager..................................415
Run Clam Antivirus Software.........................................................................................416
RSA Authentication Manager Services..........................................................................417
RSA Authentication Manager Services That Start Automatically..........................417
Manage RSAAuthentication Manager Services Manually.....................................417
Super Admin Restoration................................................................................................419
Restore the Super Admin.........................................................................................419
RSA Authentication Manager Updates...........................................................................421
View Software Version Information...............................................................................421
Verify an IP Address or Hostname.................................................................................422
Chapter 17: Administering Trusted Realms
...............................................423
Trusted Realms...............................................................................................................423
Creating a Trust Relationship.........................................................................................425
Add a Trusted Realm...............................................................................................425
Configure an Agent for Trusted Realm Authentication...........................................426
Duplicate Agent Record for Access Control...........................................................428
Add a Trusted User..................................................................................................429
Allow Trusted Users to Authenticate Using RSA RADIUS...................................430
Add a Trusted User Group.......................................................................................430
Add Trusted Users to a Trusted User Group...........................................................430
Creating a Trust Relationship with a Legacy Realm......................................................431
Configure Ports for Trusted Legacy Realm Authentication....................................431
Trusted Relationship Repair............................................................................................433
Appendix A: Changing the Instance Network Settings
......................435
Primary or Replica Instance Network Settings Updates.................................................435
Change the Primary Instance IPv4 Network Settings.....................................................436
Update the Primary Instance Hostname and IP Address on a Replica Instance.............440
Change the Replica Instance IPv4 Network Settings......................................................440
Static Routes...................................................................................................................444
Add a Persistent IPv4 Static Route..........................................................................444
Add a Persistent IPv6 Static Route..........................................................................446
Add a Non-Persistent IPv4 Static Route..................................................................447
Add a Non-Persistent IPv6 Static Route..................................................................448
Delete a Persistent IPv4 or IPv6 Static Route..........................................................449
Delete a Non-Persistent IPv4 or IPv6 Static Route.................................................450
Recovery from Incorrect Network Settings....................................................................452
Recover from an Incorrect IP Address Change.......................................................453
Recover from an Incorrect Subnet Mask.................................................................454
Recover from an Incorrect Gateway........................................................................455
VB.NET Image: JPEG 2000 Codec for Image Encoding and Decoding in
For example, you can use our VB.NET image to display, view and process images compressed or decompressed Integrate PDF, Tiff, Word compression add-on with JPEG
adjust pdf size preview; pdf compression settings
C# Image: How to Encode & Decode JPEG 2000 Images Using C#.NET JP2
image file format for JPEG 2000 compressed data) adopts image codec SDK has provided can also help powerful & profession imaging controls, PDF document, image
best pdf compression tool; adjust size of pdf
Contents
15
RSA Authentication Manager 8.1 Administrator’s Guide
Appendix B: Managing RSA SecurID Tokens Using the Microsoft 
Management Console
.............................................................................................457
Overview.........................................................................................................................457
Access the RSA Token Management Snap-in................................................................457
Token Management Using the RSA Token Management Snap-In.................................458
Assign a Hardware Token Using the RSA Token Management Snap-in................458
Assigning a Software Token Using the RSA Token Management Snap-In............459
Appendix C: Deploying IPv4/IPv6 Authentication Agents
................461
Overview.........................................................................................................................461
IPv4/IPv6 Agent Name............................................................................................461
Deploying an IPv4/IPv6 Authentication Agent..............................................................462
Configure an IPv4/IPv6 Agent................................................................................462
Load a New Node Secret.........................................................................................464
Resolving Common IPv4/ IPv6 Issues............................................................................465
Create IPv6 Network Settings on a Primary or Replica Instance...................................465
Enabling IPv6 in the VMware or Hyper-V Infrastructure..............................................466
Glossary
...........................................................................................................................467
Index
...................................................................................................................................477
VB.NET Image: Free VB.NET Guide to Convert Image to Byte Array
Byte array can be compressed and preserved in other data If necessary, you can also use this VB.NET Image Conversion Control to convert Word or PDF document to
pdf edit text size; best pdf compression
JPEG to PDF Converter | Convert JPEG to PDF, Convert PDF to JPEG
JPEG to PDF Converter can be used on Windows 95 Support a batch conversion of JPG to PDF with amazingly high speed; Get a compressed PDF file after
change page size of pdf document; pdf compress
VB.NET PowerPoint: How to Convert PowerPoint Document to TIFF in
can be compressed to reduce the file size by using LZW compression and can be converted to many other image and document formats, such as JPEG, GIF and PDF, by
best online pdf compressor; change font size on pdf text box
C# TIFF: How to Insert & Burn Picture/Image into TIFF Document
That is to say, you add a compressed image to Our .NET TIFF Processing Toolkit can be incorporated powerful & profession imaging controls, PDF document, tiff
pdf file size limit; change font size in pdf fillable form
Revision History
17
RSA Authentication Manager 8.1 Administrator’s Guide
Revision History
Revision 
Number
Date
Revision
1
December 2014 4 Updated for RSA Authentication Manager 8.1 Service Pack 1 
(SP1). Added information for Hyper-V support. and added 
information about using QR codes with dynamic seed 
provisioning (CT-KIP).
Preface
19
RSA Authentication Manager 8.1 Administrator’s Guide
Preface
About This Guide
This guide describes how to administer RSA
®
Authentication Manager 8.1. It is 
intended for administrators and other trusted personnel.
RSA
Authentication Manager 8.1 Documentation
For information about RSA Authentication Manager 8.1, see the following 
documentation. RSA recommends that you store the product documentation in a 
location on your network that is accessible to administrators. 
Release Notes. Describes what is new and changed in this release, as well as 
workarounds for known issues.
Hardware Appliance Getting Started. Describes how to deploy a hardware appliance 
and perform the Authentication Manager Quick Setup process.
Virtual Appliance Getting Started. Describes how to deploy a virtual appliance and 
perform the Authentication Manager Quick Setup process.
Planning Guide. Describes the high-level architecture of Authentication Manager and 
how it integrates with your network.
Setup and Configuration Guide. Describes how to set up and configure 
Authentication Manager.
Administrator’s Guide. Provides an overview of Authentication Manager and its 
features. Describes how to configure the system and perform a wide range of 
administration tasks, including manage users and security policies. 
Help Desk Administrator’s Guide. Provides instructions for the most common tasks 
that a Help Desk Administrator performs on a day-to-day basis. 
SNMP Reference Guide. Describes how to configure Simple Network Management 
Protocol (SNMP) to monitor an instance of Authentication Manager on a hardware 
appliance or a virtual appliance.
Troubleshooting Guide. Describes the most common error messages in RSA 
Authentication Manager and provides the appropriate actions to troubleshoot each 
event. 
Developer’s Guide. Provides information about developing custom programs using 
the RSA Authentication Manager application programming interfaces (APIs). 
Includes an overview of the Authentication Manager APIs and the related Javadoc.
Performance and Scalability Guide. Describes what to consider when tuning your 
deployment for optimal performance. 
6.1 to 8.1 Migration Guide. Describes how to migrate from an RSA Authentication 
Manager 6.1 deployment to an RSA Authentication Manager 8.1 deployment. 
20
Preface
RSA Authentication Manager 8.1 Administrator’s Guide
7.1 to 8.1 Migration Guide: Migrating to a New Hardware Appliance or Virtual 
Appliance. Describes how to migrate from an RSA Authentication Manager 7.1 
deployment to an RSA Authentication Manager 8.1 deployment on a new hardware 
appliance or virtual appliance. 
7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 on Existing 
Hardware. Describes how to migrate from an RSA Authentication Manager 7.1 
deployment to an RSA Authentication Manager 8.1 deployment on existing, 
supported RSA SecurID Appliance 3.0 hardware.
Security Console Help. Describes day-to-day administration tasks performed in the 
Security Console. 
Operations Console Help. Describes configuration and setup tasks performed in the 
Operations Console. 
Self-Service Console Help. Describes how to use the Self-Service Console. To view 
the Help, on the Help tab in the Self-Service Console, click Self-Service Console 
Help.
RSA Token Management Snap-In Help. Describes how to use software that works 
with the Microsoft Management Console (MMC) for deployments that have an Active 
Directory identity source. Using this snap-in, you can enable or disable a token, assign 
a token, or perform other token-related tasks without logging on to the Security 
Console.
Related Documentation
RADIUS Reference Guide. Describes the usage and settings for the initialization 
files, dictionary files, and configuration files used by RSA RADIUS.
Security Configuration Guide. Describes the security configuration settings available 
in RSA Authentication Manager. It also describes secure deployment and usage 
settings, secure maintenance, and physical security controls.
Support and Service
RSA SecurCare Online offers a knowledgebase that contains answers to common 
questions and solutions to known problems. It also offers information on new releases, 
important technical news, and software downloads.
RSA SecurCare Online
https://knowledge.rsasecurity.com
Customer Support Information
www.emc.com/support/rsa/index.htm
RSA Solution Gallery
https://gallery.emc.com/community/ma
rketplace/rsa?view=overview
Documents you may be interested
Documents you may be interested