RSA Authentication Manager 8.5 Patch 1 Readme
RSA Authentication Manager 8.5 Patch 1 Readme
RSA Authentication Manager 8.5 Patch 1 Readme
Prerequisite Release:
RSA Authentication Manager 8.5
Contents
Before Installing This Patch ....................................................................................................................... 1
Installing This Patch ................................................................................................................................... 2
Rolling Back This Patch ............................................................................................................................. 6
New Features and Enhancements in Patch 1............................................................................................ 7
Defects Fixed in This Patch ........................................................................................................................ 7
Support and Service.................................................................................................................................... 9
Note: All RSA Authentication Manager 8.5 patch releases are cumulative. You only need to apply the
most recent patch to obtain all of the software fixes and updates that are included in the previous patches
for version 8.5.
Before installing this patch, review the following guidelines:
• You must upgrade RSA Authentication Manager to version 8.5 before installing this patch. For
more information, see “Upgrading RSA Authentication Manager” on RSA Link at
https://community.rsa.com/docs/DOC-100620.
• You must have at least 4 GB of free disk space to apply the patch.
• You must apply this patch to the primary and all replica instances in your RSA Authentication
Manager 8.5 deployment. Make sure you apply the patch to the primary instance before applying
the patch to the replica instances.
• Before using the Security Console wizard to connect Authentication Manager directly to the
Cloud Authentication Service, you must upgrade your primary instance and all replica instances.
• If you have a replicated environment, all replica instances must be running and replicating
successfully before you apply the patch to the primary or replica instances. On the primary
instance, the replication status displays “Internal Replication Error” or another error message
until all replica instances have been upgraded or patched.
• SSH clients and SCP clients can no longer connect to the appliance with weaker algorithms, for
example, MD5 and 96-bit MAC algorithms. It may be necessary to upgrade your SSH and SCP
clients to more recent versions that can handle more restrictive SSH algorithms.
• An updated web-tier server (available here) is also available with Patch 1. See the web-tier server
Readme for information on the updates to the web-tier server.
RSA Customer Communication - Confidential
Procedure
1. In the Operations Console, click Maintenance > Update & Rollback.
2. On the Update & Rollback page, the default update source is your local browser. To change that
setting, click Configure Update Source.
3. On the Configure Update Sources page, specify a location for updates.
• To apply a specific update, select Use your web browser to upload an update. You do not
need to scan for updates.
• To scan for updates on an NFS share, select Use NFS as the update source. Enter the full
path, including the IP address or hostname where updates are stored. For example:
192.168.1.2:/updates
• To scan for updates on a Windows shared folder, select Use Windows Share as the update
source.
o In the Windows Share Path field, enter the full path, including the IP address or
hostname where updates are stored. For example: \\192.168.1.2\updates
o (Optional) In the Windows Username field, enter a username.
o (Optional) In the Windows Password field, enter a password only if it is required by
2 November 2020
RSA Customer Communication - Confidential
Next Steps
Do one of the following:
• If you configured your local web browser as the method to apply an update, see Apply Product
Update on page 4.
• If you configured an NFS share, a Windows shared directory, or a DVD/CD as an update
location, see Scan for Product Updates on page 3.
Procedure
1. In the Operations Console, click Maintenance > Update & Rollback.
2. Click Scan for Updates.
The system displays the progress of the scan on the Basic Status View tab. You can view more
detailed information on the Advanced Status View tab.
3. Click Done to return to the Update & Rollback page.
4. In the Applied Updates section, click Download Detailed History Log for a complete update
history.
The Applied Updates section displays the updates applied to the instance. This section includes
the update version numbers, the time and date that each update was applied, and which
administrator applied the update.
Note: After you scan for updates, the new list displays for 24 hours. Logging out of the Operations
Console does not remove the list from the system cache. If you restart the Operations Console, download
additional updates, or change the product update locations, you must perform another scan to see the most
current list.
Next Steps
Apply the patch to the RSA Authentication Manager deployment.
November 2020 3
RSA Customer Communication - Confidential
Procedure
1. In the Operations Console, click Maintenance > Update & Rollback.
2. RSA recommends that you apply the most recent update. Do one of the following, depending on
your configuration:
• To apply an update through your local web browser, do the following:
a. Click Upload & Apply Update. Because browser uploads require additional processing,
the Upload & Apply window may open slowly.
b. Under Update Location, click Browse to navigate to the location of the update. You
cannot type the update location in the Update Path field.
c. Click Upload.
• If you have configured an NFS share, a Windows shared directory, or a DVD/CD as an
update location, do the following:
a. Click Scan for Updates. Available Updates displays all of the updates that can be
applied.
b. Next to the update to apply, click Apply Update.
4 November 2020
RSA Customer Communication - Confidential
3. Check the update details, enter the password for the User ID rsaadmin, and then click Apply.
As the update process begins, the following occurs:
• In the Upload & Apply window, the Basic Status View tab shows the progress of the update
preparation process. More detailed information appears on the Advanced Status View tab.
• When the update preparation is complete, the Upload & Apply window closes, and a new
browser window opens in which to complete the update process.
Note: When applying the update, a certificate warning might appear. In this case, you can
safely click Continue to this website to proceed with the update.
• In the new browser window, the Update Installer applies the update. The Basic Status View
tab shows the progress of the update as it is applied. More detailed information appears on the
Advanced Status View tab.
4. When the update is complete, click Done.
The Operations Console opens to the Log On page.
Applying the patch results in the following:
• In the Operations Console, on the Update & Rollback page, the update appears in the
Applied Updates section. To save the high-level update history, click Download Detailed
History Log.
• In the Security Console, the Software Version Information page is updated with the patch
number.
Next Steps
• You can download a detailed log file containing the information that was displayed on the
Advanced Status View tab. The file is named update-version-timestamp.log, where version is
the update version number and timestamp is the time that the update completed. For instructions,
see the Operations Console Help topic “Download Troubleshooting Files.”
• After you have upgraded the primary instance and all of the replica instances, verify that
replication and RADIUS replication is functioning correctly on the primary instance and each
replica instance.
• An updated web-tier server (available (available here) is also available with Patch 1. See the web-
tier server Readme for information on the updates to the web-tier server.
November 2020 5
RSA Customer Communication - Confidential
Procedure
1. In the Operations Console, click Maintenance > Update & Rollback.
Under Applied Updates, a list of updates displays with the following information:
• Version. The version of the update. To see the current version of the Authentication Manager
instance, refer to the top of the Update & Rollback page.
• Updated on. When the update was applied. If a log file is available, you can click Download
log to save and read information about the update process.
• Updated by. The user who applied the update.
• Action. Displays the Roll Back Update button or the message “Cannot be rolled back.”
2. To roll back the last update that was applied, click Roll Back Update. Only a reversible update
can be rolled back.
3. Enter the password for the User ID rsaadmin, and then click Rollback.
As the patch rollback process begins, the following occurs:
• In the Confirm Rollback Update window, the Basic Status View tab shows the progress of
the rollback preparation process. More detailed information appears on the Advanced Status
View tab.
• When the update preparation is complete, the Confirm Rollback Update window closes, and
a new browser window opens in which to complete the rollback process.
• In the new browser window, the Update Installer rolls back the update. The Basic Status
View tab shows the progress of the update as it is rolled back. More detailed information
appears on the Advanced Status View tab.
4. When the rollback is complete, click Done.
The Operations Console opens to the Log On page.
6 November 2020
RSA Customer Communication - Confidential
November 2020 7
RSA Customer Communication - Confidential
AM-39489. Fixed an issue that caused email notifications to be sent based upon the last saved workflow
policy, instead of the workflow policy for the user domain
AM-39488. When Authentication Manager is configured to not require a PIN for any tokens,
Authenticate Tokencode users are no longer prompted to create a PIN.
AM-39486. Fixed an issue that caused a memory leak while backing up data
AM-39484. Updated the system log to provide more information on which Active Directory connection is
being used. The system log now reports when the Directory URL (primary AD connection) fails and
when the primary connection is restored
AM-39469. Can now delete CT-KIP activation codes for deleted users.
AM-39468. Resolved an issue with regenerating the root CA for trusted realms.
AM-39466. Resolved a certificate issue that blocked access to the Identity Router Setup Console.
AM-38418. The patch installer restores the PAM configuration to the auto-generated, default state. This
could eliminate unsupported changes to this configuration which might cause problems in the RSA
Authentication Manager.
AM-32381, AM-32382, AM-32383, AM-32384. Reject some cross-site scripting attempts as invalid.
8 November 2020
RSA Customer Communication - Confidential
Copyright © 1994-2020 RSA Security LLC or its affiliates. All rights reserved. RSA Conference logo,
RSA, and other trademarks are trademarks of RSA Security LLC or its affiliates. For a list of RSA
trademarks, https://www.rsa.com/en-us/company/rsa-trademarks. Other trademarks are trademarks of
their respective owners.
November 2020
Revised: December 2020
November 2020 9