Auth agent203ADFS Admin Guide
Auth agent203ADFS Admin Guide
3
for Microsoft® AD FS
Administrator's Guide
Revision 2
Contact Information
RSA Link at https://community.rsa.com contains a knowledgebase that answers common questions and
provides solutions to known problems, product documentation, community discussions, and case management.
Trademarks
RSA Conference Logo, RSA, and other trademarks, are trademarks of RSA Security LLC or its affiliates ("RSA").
For a list of RSA trademarks, go to https://www.rsa.com/en-us/company/rsa-trademarks. Other trademarks
are trademarks of their respective owners.
License Agreement
This software and the associated documentation are proprietary and confidential to RSA Security LLC or its
affiliates are furnished under license, and may be used and copied only in accordance with the terms of such
license and with the inclusion of the copyright notice below. This software and the documentation, and any
copies thereof, may not be provided or otherwise made available to any other person.
No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby
transferred. Any unauthorized use or reproduction of this software and the documentation may be subject to
civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment by RSA.
Third-Party Licenses
This product may include software developed by parties other than RSA. The text of the license agreements
applicable to third-party software in this product may be viewed on the product documentation page on RSA
Link. By using this product, a user of this product agrees to be fully bound by terms of the license agreements.
This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export
of encryption technologies, and current use, import, and export regulations should be followed when using,
importing or exporting this product.
Distribution
Use, copying, and distribution of any RSA Security LLC or its affiliates ("RSA") software described in this
publication requires an applicable software license. RSA believes the information in this publication is accurate
as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." RSA MAKES NO REPRESENTATIONS OR
WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY
DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
©
Copyright 2007-2020 RSA Security LLC or its affiliates. All Rights Reserved.
July 2020
Contents
Revision History 6
Preface 7
Audience 7
Chapter 1: Overview 9
Feature Support 11
Language Support 13
Network Requirements 16
Next Steps 25
3
RSA Authentication Agent 2.0.3 for Microsoft AD FS Administrator's Guide
Restart AD FS Services 38
Configure Logging 42
Repair an Installation 44
4
RSA Authentication Agent 2.0.3 for Microsoft AD FS Administrator's Guide
Chapter 5: Troubleshooting 47
Installation Logs 48
5
RSA Authentication Agent 2.0.3 for Microsoft AD FS Administrator's Guide
Revision History
6 Revision History
RSA Authentication Agent 2.0.3 for Microsoft AD FS Administrator's Guide
Preface
Audience
This guide is for network and system administrators who deploy, configue, and manage RSA Authentication
Agent for Microsoft AD FS.
The document assumes you have experience using Microsoft Active Directory® Federation Services (AD FS) for
Windows Server ® . It also assumes you have experience with RSA Authentication Manager or the Cloud
Authentication Service, or you are working with an administrator for those products.
You can access community and support information on RSA Link at https://community.rsa.com. RSA Link
contains a knowledgebase that answers common questions and provides solutions to known problems, product
documentation, community discussions, and case management.
The RSA Ready Partner Program website at www.rsaready.com provides information about third-party hardware
and software products that have been certified to work with RSA products. The website includes
Implementation Guides with step-by-step instructions and other information on how RSA products work with
third-party products.
Preface 7
RSA Authentication Agent 2.0.3 for Microsoft AD FS Administrator's Guide
Chapter 1: Overview
Feature Support 11
Language Support 13
Chapter 1: Overview 9
RSA Authentication Agent 2.0.3 for Microsoft AD FS Administrator's Guide
RSA Authentication Agent for Microsoft AD FS is authentication software that connects your Microsoft Active
Directory Federation Services (AD FS) server to RSA SecurID Access using the REST protocol to provide
multifactor authentication capabilities for AD FS.
When a user attempts to access an AD FS-protected resource, the user enters username and password
credentials for primary authentication. Agent for AD FS then prompts the user to complete one or more
additional authentication methods, depending on the configured authentication mode.
Windows Server 2019 AD FS allows you to select RSA SecuID for primary authentication and Windows
authentication for secondary authentication. This configuration is not supported with earlier versions of AD FS.
l RSA Authentication Manager. Connects the agent to an existing RSA Authentication Manager
instance in your deployment, making the SecurID Token method available for user authentication. You
use the Operations Console, Security Console, and Self-Service Console to manage identity sources,
users, and tokens.
l RSA Authentication Manager 8.5 as a secure proxy server for the Cloud Authentication
Service. You can use RSA Authentication Manager as a secure proxy server that sends any
authentication requests that Authentication Manager cannot validate directly to the Cloud Authentication
Service. This authentication mode supports the all of the authentication methods supported by the Agent
for AD FS. It does not support certain Authentication Manager features, such as agent reporting,
enabling and disabling or restricting agents, and failover to replica instances for agents.
l Cloud Authentication Service. Connects the agent to the Cloud Authentication Service, making the
Authenticate Tokencode, Approve, Device Biometrics, SMS Tokencode, and Voice Tokencode methods
available. If Authentication Manager is integrated with the Cloud Authentication Service, RSA SecurID
Token can also be used to authenticate in this mode. You use the Cloud Administration Console to
manage identity sources, users, access policies, and authentication methods.
Note: RSA recommends Cloud Authentication Service mode for most deployments. For a complete list of
features and benefits, see Cloud Authentication Service Overview on RSA Link.
There are two distinct integration methods by which you can connect your Microsoft AD FS environment to the
Cloud Authentication Service:
l RSA Authentication Agent for Microsoft AD FS (the agent described in this document)
l SAML identity provider configuration
By integrating Microsoft AD FS with the Cloud Authentication Service using the agent, you can continue to use
your AD FS environment for authentication and SSO, while adding advanced RSA authentication methods for
additional security. When authenticating through the agent, users have a streamlined experience that is
presented entirely within the AD FS authentication interface.
In a SAML identity provider configuration, users are redirected from the AD FS interface to the RSA SecurID
10 Chapter 1: Overview
RSA Authentication Agent 2.0.3 for Microsoft AD FS Administrator's Guide
Access interface and back again, resulting in a functional but less-streamlined experience. If either of the
following conditions apply to your deployment, RSA recommends using SAML identity provider configuration:
l You need to use FIDO authentication (the agent does not support FIDO)
l You do not want to install or maintain additional software on your AD FS servers (the agent must be
installed on each AD FS server)
For more information on using SAML identity provider configuration to integrate Microsoft AD FS with the Cloud
Authentication Service, see https://community.rsa.com/docs/DOC-79812.
Feature Support
l RSA SecurID Token authentication through RSA Authentication Manager using the REST API endpoint
over IPv4 or IPv6.
l Up to 15 RSA Authentication Manager replicas
l Agent reporting (agent sends hostname, agent version, and operating system version to Authentication
Manager 8.3 or later)
l Multifactor authentication through the Cloud Authentication Service using the REST protocol, with
support for these methods:
l RSA SecurID Token
l RSA SecurID Authenticate Tokencode
l Approve
l Device Biometrics
l SMS Tokencode
l Voice Tokencode
l Emergency Tokencode
l FIDO authentication
l Authentication method combinations that include FIDO
l RSA SecurID authentication using legacy RSA SecurID UDP protocol
l RSA SecurID authentication using RADIUS protocol
l On-Demand authentication using RADIUS protocol
l Risk-based authentication through RSA Authentication Manager
l Risk-based authentication with single sign-on through RSA Authentication Manager
l Secondary RADIUS server support
l RSA SecurID software token automation
l RSA SecurID 800 Authenticator automation
l RSA SecurID protection of administrative interface
Chapter 1: Overview 11
RSA Authentication Agent 2.0.3 for Microsoft AD FS Administrator's Guide
Note: It is not possible to upgrade older versions of Agent for AD FS to version 2.0.
12 Chapter 1: Overview
RSA Authentication Agent 2.0.3 for Microsoft AD FS Administrator's Guide
Language Support
Localized (translated) authentication web pages for RSA Authentication Agent for Microsoft AD FS are available
on RSA Link. You must download and enable the localized pages to make non-English languages available to
users. When enabled, the localized pages display according to the language preferences set for the user's web
browser. For instructions, see Add Localized Authentication Pages on page 40.
Localized pages are provided for US English and the following languages:
l French (fr)
l German (de)
l Italian (it)
l Japanese (ja)
l Korean (ko)
l Portuguese (pt)
l Russian (ru)
l Simplified Chinese (zh-Hans)
l Spanish (es)
Chapter 1: Overview 13
RSA Authentication Agent 2.0.3 for Microsoft AD FS Administrator's Guide
Before deploying RSA Authentication Agent for Microsoft AD FS, make sure your environment meets the
following requirements.
Note: You must have system administrator privileges on the AD FS server, and Microsoft Active Directory
Services must be running before you install Agent for AD FS.
Network Requirements
Port Description
Used by default for REST protocol communication between the agent and Authentication Manager primary
5555 and replica instances when the agent is configured in Authentication Manager mode. The Authentication
Manager administrator can change which port is used for this purpose.
Used for REST protocol communication between the agent and the Cloud Authentication Service when the
443
agent is configured in Cloud Authentication Service mode.
RSA Authentication Manager 8.5 is required to use Authentication Manager as a secure proxy server to the Cloud
Authentication Service.
For Cloud Authentication Service mode, users must install and register the RSA SecurID Authenticate app on a
compatible device to authenticate using the Approve, Device Biometrics, or Authenticate Tokencode methods.
SMS Tokencode and Voice Tokencode require that the user's phone number is recorded in an identity source
connected to RSA SecurID Access, and the phone number attribute is synchronized with the Cloud
Authentication Service. To use the RSA SecurID Token method, Authentication Manager must be integrated with
the Cloud Authentication Service, and users must have SecurID hardware or software tokens. The access policy
configured for the agent must allow the authentication methods you want to make available to AD FS users.
Note: The RSA SecurID 800 Hybrid Authenticator (SecurID 800) can be used in disconnected mode only.
You configure the basic settings required to set up the agent using the installer. You can edit those settings and
additional options from the Agent for AD FS Configuration Utility after installing the agent. For instructions, see
Edit Settings Using the Agent for AD FS Configuration Utility on page 41.
The following table describes how to configure each setting. Before you install the agent, review these settings
and obtain the necessary configuration information from your RSA Authentication Manager or Cloud
Authentication Service administrator.
Note: The settings you can configure depend on the authentication mode you select.
Setting Details
Select an authentication mode:
Note: RSA recommends Cloud Authentication Service mode for most deployments. For a
complete list of features and benefits, see Cloud Authentication Service Overview on RSA
Link.
Enter the REST authentication URL for either the Cloud Authentication Service or your primary
Authentication Manager instance using the following format:
https://HOSTNAME:PORT/mfa/v1_1/
If you are using Authentication Manager as a secure proxy server, enter the REST authentication
Server URL URL for your Authentication Manager primary instance.
For Authentication Manager, obtain the HOSTNAME value from the Fully Qualified Domain
Name field on the Administration > Network > Appliance Network Settings page of the
Operations Console. The default PORT is 5555.
For the Cloud Authentication Service, obtain the HOSTNAME value from the Cloud Administration
Setting Details
Console. Click My Account > Company Settings > Authentication API Keys. Copy the
RSA SecurID Authentication API REST URL.The default PORT is 443.
Enter the REST authentication API access key for either RSA Authentication Manager or the Cloud
Authentication Service, depending on your authentication mode.
If you are using Authentication Manager as a secure proxy server, use an Authentication
Manager access key.
Access Key
To obtain the API access key, see the following on RSA Link:
l For RSA Authentication Manager, see Configure the RSA SecurID Authentication API for
Authentication Agents.
l For the Cloud Authentication Service, see Add an RSA SecurID Authentication API Key.
Enter a name for the agent. The name you specify is used to identify the agent in Authentication
Manager or in mobile notifications sent through the Cloud Authentication Service.
If a name is not specified, Authentication Manager uses the name "Authenticate" for the Approve
Agent Name method.
Note: The agent name must be the exact name that is used for the authentication agent record
in the Security Console. REST protocol authentication agents can use a logical name, and the
agent name is not used for DNS resolution.
Enter the REST authentication URLs for the Authentication Manager replica instances in your
deployment. If communication with the primary instance is interrupted, the agent attempts to
connect to each replica in the order that they are configured.
In the Install Wizard, you enter the URL for one replica at a time and click + to add it to the list,
or select a URL from the list and click - to remove it.
Replica Server
URLs In the configuration utility, choose an option for configuring replica server URLs:
Modify Existing Replica URL. Enter the number of the URL you want to modify from the list,
then enter the modified URL when prompted.
Delete Replica URL. Enter the number of the URL you want to delete from the list.
Enter the exact name (including case sensitivity) of the access policy that the agent will use as
specified in the Cloud Administration Console. An access policy is required when the agent
Access Policy connects directly to the Cloud Authentication Service or uses RSA Authentication Manager 8.5 as
a secure proxy server for the Cloud Authentication Service.
For information on viewing and adding access policies, see Manage Access Policies on RSA Link.
Enter the maximum number of seconds allowed for the agent to complete each transaction with
Authentication Manager or the Cloud Authentication Service.
Range: 1-180
Request
Timeout Default: 180
Read Timeout Enter the maximum number of seconds allowed for the agent to connect to the authentication
Setting Details
server and read the response.
Range: 1-180
Default: 60
Enter the number of times the agent will try to contact the Cloud Authentication Service or an
Authentication Manager instance if the first attempt is unsuccessful.
If the agent is in Authentication Manager mode and replicas are configured, the agent attempts
Retry Count to contact the next replica when the retry count is reached. When the retry count is reached in
Cloud Authentication Service mode, the connection fails.
Range: 1-5
Default: 3
Enter the number of minutes between polling attempts to determine whether the Authentication
Server Manager service is available.
Refresh
Minimum: 5
Interval
Default: 5
Select whether to enable collection of device fingerprint data and other information during
authentication, which the Cloud Authentication Service can use to establish a level of identity
confidence for a user. Access policies can use the Identity Confidence attribute to make it easier
for users with high identity confidence to authenticate. See Condition Attributes for Access
Risk Collection Policies on RSA Link for more information.
Note: Regardless of this setting, the agent always collects initiating IP address, user agent,
and HTTP header information during user authentication, which the Cloud Authentication
Service can use to determine authentication requirements according to the configured access
policy.
Select whether to enable collection of HTML5 geolocation data during user authentication, which
includes longitude, latitude, and a timestamp. Access policies can use the Trusted Location
attribute to make it easier for users to authenticate from specific locations. For more
Location information, see Condition Attributes for Access Policies on RSA Link.
Collection
Note: Regardless of this setting, the agent always collects initiating IP address, user agent,
and HTTP header information during user authentication, which the Cloud Authentication
Service can use to determine authentication requirements according to the configured access
policy.
Before installing Agent for AD FS, complete the preparation tasks for the authentication mode you will configure.
l Distribute hardware or software tokens. Provide instructions for importing a software token to the RSA
SecurID app on new software token users’ devices.
l Provide instructions for setting a PIN. Agent for AD FS supports User-Created PIN and System-Generated
PIN.
l Provide authentication instructions.
For instructions and guidance, see the RSA Authentication Manager 8.4 Administrator's Guide on RSA Link.
For instructions and guidance, see Cloud Authentication Service Help on RSA Link.
You can install the AD FS Agent 2.0.3 or upgrade directly to AD FS Agent 2.0.3 from AD FS Agent 2.0.1 or 2.0.2.
l Install Wizard. The Install Wizard guides you through the installation process. Run the Install Wizard
on each AD FS server in your deployment.
l Command Line. The installer relies on command line options and an input file to define installation
parameters, and can be run in silent mode, suppressing all interface elements. Run the command line
installation on each AD FS server in your deployment.
Note: If Windows Server is installed in Server Core mode, you must invoke the installer from the
command line.
Procedure
1. Sign into the AD FS server where you want to install Agent for AD FS.
2. Double-click RSA Authentication Agent v2 for Microsoft AD FS x64.msi to start the Install
Wizard.
3. Click Next.
4. Read and accept the license agreement, then click Next.
5. Provide the required configuration parameters. See Configuration Settings and Required Information on
page 17 for details.
6. Click Next.
7. Click Install.
8. When installation is complete, click Finish.
Obtain the API access key for either RSA Authentication Manager or the Cloud Authentication Service, depending
on the authentication mode. To use Authentication Manager as a secure proxy server, you need an
Authentication Manager access key.
To obtain the API access key, see the following on RSA Link:
l For RSA Authentication Manager, see Configure the RSA SecurID Authentication API for Authentication
Agents.
l For the Cloud Authentication Service, see Add an RSA SecurID Authentication API Key.
Procedure
1. Create a text file with any file name and extension. For example, input.txt.
2. Add the following string to specify the Authentication Mode:
AUTHENTICATION_MODE= <#>
where <#> is either 1 for RSA Authentication Manager mode or 2 for Cloud Authentication Service mode.
To use RSA Authentication Manager 8.5 as a secure proxy server for the Cloud Authentication Service,
select Cloud Authentication Service mode.
If you are using Authentication Manager as a secure proxy server, enter the REST authentication URL for
your Authentication Manager primary instance.
Note: The agent name must be the exact name that is used for the authentication agent record in the
Security Console. REST protocol authentication agents can use a logical name, and the agent name is not
used for DNS resolution.
If you are using Authentication Manager as a secure proxy server, use an Authentication Manager access
key.
An access policy is required when the agent connects directly to the Cloud Authentication Service
or when the agent uses RSA Authentication Manager 8.5 as a secure proxy server to the Cloud
Authentication Service.
7. (Optional) For Cloud Authentication Service mode, add the following string if you need to disable
collection of risk data during authentication:
RISK_COLLECTION_ENABLED= false
If you do not add this string, risk data collection is enabled by default.
Note: If you disable risk collection, you cannot use the Identity Confidence access policy attribute to
determine user authentication requirements.
8. (Optional) For Cloud Authentication Service mode, add the following string to disable collection of
location data during authentication:
LOCATION_COLLECTION_REQUIRED= false
If you do not add this string, location data collection is enabled by default.
Note: If you disable location collection, you cannot use the Trusted Location access policy attribute to
determine user authentication requirements.
9. Save the file to the AD FS server where you want to install the agent.
l Point to the input file you created by including the following in the console command when you install the
agent using the command line:
INPUTFILE=<absolute\file\path\input.txt>
where <absolute\file\path\input.txt> is the absolute file path for the input file.
l Secure or delete the input file after you install the agent, as it contains sensitive data.
This procedure assumes that you are familiar with installing software using the msiexec command line.
Create an input file to pass configuration parameters to the installer. For instructions, see Create a Configuration
Procedure
1. Open an administrator command prompt.
2. Navigate to the directory that contains the RSA Authentication Agent v2 for Microsoft AD FS
x64.msi package file, or provide the full pathname to the package file on the command line.
3. To install RSA Authentication Agent for Microsoft AD FS, use a command similar to the following:
msiexec /i "RSA Authentication Agent v2 for Microsoft AD FS x64.msi" /L*v
install.log /q INPUTFILE=<absolute\file\path\input.txt>
where <absolute\file\path\input.txt> is the absolute file path for the input file you created.
The /q switch instructs the installer to run in silent mode.
Next Steps
After installing RSA Authentication Agent for Microsoft AD FS, perform these steps:
1. Register the agent in RSA Authentication Manager. For instructions, see Register the Agent in RSA
Authentication Manager on page 30.
2. Register the agent in the Windows Server Manager. For instructions, see Register or Unregister the
Agent with Microsoft AD FS on page 30.
3. Import the trusted root CA certificate from either Authentication Manager or the Cloud Authentication
Service. For instructions, see Import Trusted Root Certificate on page 38
4. Configure multifactor authentication settings for your environment. For instructions, see Configure
Multifactor Authentication (MFA) on page 30.
5. (Optional) Configure additional settings such as Request Timeout, Read Timeout, and Retry Count using
the configuration utility. For more information, see Edit Settings Using the Agent for AD FS Configuration
Utility on page 41.
6. (Windows Server 2019 only) Change the AD FS theme from a right alignment to a center alignment. For
instructions, see Change the AD FS Theme on Windows Server 2019 on page 42.
You can upgrade to AD FS Agent 2.0.3 from AD FS Agent 2.0.1 or AD FS Agent 2.0.2.
Procedure
1. Unregister the current AD FS Agent 2.0.1 or 2.0.2 on the primary federation server:
a. Sign into the primary AD FS server where you installed the agent.
b. Open a PowerShell command prompt, and enter the following to run the Agent for AD FS
Configuration Utility:
cd 'C:\Program Files\RSA\RSA Authentication Agent\AD FS MFA
Adapter\scripts' .\MFAAuthProviderConfigSettings.ps1
c. From the Main Menu, enter 5 to select Unregister Agent.
2. On each federation server in your AD FS deployment, extract the files from the AD FS Agent kit. You can
run the .msi file from any directory.
3. From a command prompt, change the directory to the .msi file location, and run the following:
msiexec /i "RSA Authentication Agent v2 for Microsoft AD FS x64.msi"
REINSTALL=ALL REINSTALLMODE=vomus
If you encounter problems with the upgrade or want to create an installation log, run the following
command instead:
msiexec /i "RSA Authentication Agent v2 for Microsoft AD FS x64.msi" /l*v
install.log REINSTALL=ALL REINSTALLMODE=vomus
4. Repeat steps 2 and 3 to install or upgrade the AD FS agent on all federation servers in your AD FS
deployment.
5. Register the agent on the primary federation server:
a. Sign into the Primary AD FS server where you installed the agent.
b. Open a PowerShell command prompt.
c. Enter the following to run the Agent for AD FS Configuration Utility:
cd 'C:\Program Files\RSA\RSA Authentication Agent\AD FS MFA
Adapter\scripts' .\MFAAuthProviderConfigSettings.ps1
d. From the Main Menu, enter 4 to select Register Agent.
6. Restart Active Directory Federation Services (adfssrv) on each federation server in your AD FS
deployment:
a. Sign into each AD FS server where you installed the agent.
b. Open a PowerShell command prompt.
c. Enter the following to run the Agent for AD FS Configuration Utility:
cd 'C:\Program Files\RSA\RSA Authentication Agent\AD FS MFA
Adapter\scripts' .\MFAAuthProviderConfigSettings.ps1
d. From the Main Menu, enter 3 to select Restart AD FS.
l Test multifactor authentication on the AD FS agent. For instructions, see Test MFA on Windows Server
2019 or 2016 in Desktop Experience Mode on page 34, Test MFA on Windows Server 2019 or 2016 in
Server Core Mode on page 36, or Test MFA on Windows Server 2012 R2 on page 37. If you are unable to
authenticate, see Troubleshooting on page 47.
l (Windows Server 2019 only) Change the AD FS theme from a right alignment to a center alignment. For
instructions, see Change the AD FS Theme on Windows Server 2019 on page 42.
l (Optional) To allow users to set a Windows Hello for Business PIN, you must download and deploy the
updated RSA GPO templates that are available for AD FS Agent 2.0.2 or later and then disable the
“Validate the Authentication Context” policy setting. For instructions, see Chapter 2, "Deploying Group
Policy Object Templates" in the RSA Authentication Agent 2.0.3 for Microsoft AD FS GPO Template Guide.
Restart AD FS Services 38
Configure Logging 42
Repair an Installation 44
After you install the Authentication Agent for AD FS, you must register it with Authentication Manager if you are
using Authentication Manager mode.
Make sure you know the Agent Name you specified when installing Agent for AD FS.
Procedure
1. Sign into the RSA Security Console.
2. Click Access > Authentication Agents > Add New.
3. Enter the required information. Make sure the Agent Type is set to Standard Agent (default setting).
Authentication Manager uses this setting to determine how to communicate with Microsoft AD FS.
4. Click Save.
After installing RSA Authentication Agent for Microsoft AD FS on all federation servers in your AD FS deployment,
you must register the agent on the primary federation server using the RSA Agent for AD FS Configuration
Utility. If you need to uninstall the agent, you must unregister it first.
Procedure
1. Sign into the primary AD FS server where you installed the agent.
2. Open a PowerShell command prompt.
3. Enter the following to run the Agent for AD FS Configuration Utility:
cd 'C:\Program Files\RSA\RSA Authentication Agent\AD FS MFA Adapter\scripts'
.\MFAAuthProviderConfigSettings.ps1
4. From the Main Menu, do one of the following:
l Enter 4 to select Register Agent.
l Enter 5 to select Unregister Agent.
Restart Active Directory Federation Services (adfssrv) on each server in the AD FS deployment. For instructions,
see Restart AD FS Services on page 38.
After installing and registering Agent for AD FS, you must configure the Microsoft AD FS global authentication
policy to enforce multifactor authentication using the agent. Perform the procedure appropriate for the
operating system on your AD FS server.
Windows Server 2016 with AD FS 4.0 and Windows Server 2012 R2 with AD FS 3.0 support selecting Windows
credentials as the primary authentication method and requiring RSA SecurID for additional authentication.
Windows Server 2019 AD FS supports two approaches for user authentication on AD FS-protected resources:
l You can select RSA SecurID as the primary authentication method and only use Windows authentication
as a secondary authentication method.
l You can select Windows credentials as the primary authentication method and require RSA SecurID for
additional authentication.
RSA SecurID allows your users to authenticate with any of the multifactor authentication methods supported by
RSA Authentication Manager or the Cloud Authentication Service, such as Authenticate Tokencode, Approve, or
RSA SecurID Tokens.
For additional information on configuring AD FS authentication methods on Windows Server 2019, see
https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/additional-authentication-
methods-ad-fs.
For additional information on configuring AD FS authentication methods on Windows Server 2019, see
https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/additional-authentication-
methods-ad-fs.
You can select RSA SecurID as the primary authentication method and use Windows authentication as a
secondary authentication method.
Make sure to set the policy setting "Validate the AD FS for authentication context" to Disabled.
After disabling this policy setting, unregister the Agent for AD FS and then register the agent again. For
instructions, see Register or Unregister the Agent with Microsoft AD FS on the previous page.
Procedure
1. Click Start > Server Manager.
2. Click Tools > AD FS Management.
3. In the left-hand frame, click Service > Authentication Methods.
4. In the center frame, in the Primary Authentication Methods section, click Edit.
The Edit Authentication Methods window appears.
5. Select the Allow additional authentication providers as primary checkbox.
6. A warning message is displayed. Click OK.
7. On the Edit Authentication Methods window, click Apply and click OK.
8. Again, in the Primary Authentication Methods section, click Edit.
9. Verify that RSA SecurID Access Authentication Agent v2.0 checkbox is displayed in the Extranet
and Intranet sections. Select the RSA SecurID Access Authentication Agent v2.0 checkbox in both
sections.
10. On the Additional tab, select the Forms Authentication checkbox.
11. Click Apply and click OK.
l Restart Microsoft Active Directory Federation Services (adfssrv). For instructions, see Restart AD FS
Services on page 38.
l (Optional) Test the MFA configuration using the AD FS test page. For instructions, see Test MFA on
Windows Server 2019 or 2016 in Desktop Experience Mode on page 34.
You can select Windows credentials as the primary authentication method and require RSA SecurID for
additional authentication.
Procedure
1. Click Start > Server Manager.
2. Click Tools > AD FS Management.
3. In the left-hand frame, click Service > Authentication Methods.
4. In the center frame, in the Additional Authentication Methods section, click Edit.
The Edit Authentication Methods window appears.
5. On the Additional tab, select the checkbox for RSA SecurID Access Authentication Agent v2.0.
6. Click OK.
l Restart Microsoft Active Directory Federation Services (adfssrv). For instructions, see Restart AD FS
Services on page 38.
l (Optional) Test the MFA configuration using the AD FS test page. For instructions, see Test MFA on
Windows Server 2019 or 2016 in Desktop Experience Mode on page 34.
Note: If RSA Authentication Agent 1.0.2 for Microsoft AD FS is also installed in your AD FS environment,
it appears on this page as RSA SecurID Authentication, and can be enabled or disabled using the
corresponding checkbox.
6. Click OK.
l Restart Microsoft Active Directory Federation Services (adfssrv). For instructions, see Restart AD FS
Services on page 38.
l (Optional) Test the MFA configuration using the AD FS test page. For instructions, see Test MFA on
Windows Server 2019 or 2016 in Desktop Experience Mode on the next page or Test MFA on Windows
Server 2012 R2 on page 37, depending on your operating system.
For additional information on configuring AD FS authentication methods on Windows Server 2019, see
https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/additional-authentication-
methods-ad-fs.
You can select RSA SecurID as the primary authentication method and only use Windows authentication as a
secondary authentication method.
Make sure to set the policy setting "Validate the AD FS for authentication context" to Disabled.
After disabling this policy setting, unregister the Agent for AD FS and then register the agent again. For
instructions, see Register or Unregister the Agent with Microsoft AD FS on page 30.
Procedure
1. Sign into the AD FS server where you installed the agent.
2. Open a PowerShell command prompt.
3. Enter the following two commands to add Agent for AD FS as an additional authentication provider:
Set-AdfsGlobalAuthenticationPolicy -AllowAdditionalAuthenticationAsPrimary
$true
Set-AdfsGlobalAuthenticationPolicy -PrimaryIntranetAuthenticationProvider
SecurIDv2Authentication -PrimaryExtranetAuthenticationProvider
SecurIDv2Authentication -AdditionalAuthenticationProvider FormsAuthentication
4. Enter the following command, and verify that SecurIDv2Authentication is set as the Primary
Authentication Provider and FormsAuthentication is set as the Additional Authentication Provider:
Get-AdfsGlobalAuthenticationPolicy
l Restart Microsoft Active Directory Federation Services (adfssrv). For instructions, see Restart AD FS
Services on page 38.
l (Optional) Test the MFA configuration using the AD FS test page (Windows Server 2016 only). For
instructions, see Test MFA on Windows Server 2019 or 2016 in Server Core Mode on page 36.
You can select Windows credentials as the primary authentication method and require RSA SecurID for
additional authentication.
Procedure
1. Sign into the AD FS server where you installed the agent.
2. Open a PowerShell command prompt.
3. Enter the following command to add Agent for AD FS as an additional authentication provider:
Set-AdfsGlobalAuthenticationPolicy -AdditionalAuthenticationProvider
"SecurIDv2Authentication"
4. Enter the following command, and verify that SecurIDv2Authentication appears in the list of
authentication providers returned:
Get-AdfsGlobalAuthenticationPolicy
l Restart Microsoft Active Directory Federation Services (adfssrv). For instructions, see Restart AD FS
Services on page 38.
l (Optional) Test the MFA configuration using the AD FS test page (Windows Server 2016 only). For
instructions, see Test MFA on Windows Server 2019 or 2016 in Server Core Mode on page 36.
Note: If RSA Authentication Agent 1.0.2 for Microsoft ADFS is also installed in your ADFS environment,
additional commands may be required. For instructions, see Configure Multifactor Authentication for
Multiple Agent Versions on page 37.
l Restart Microsoft Active Directory Federation Services (adfssrv). For instructions, see Restart AD FS
Services on page 38.
l (Optional) Test the MFA configuration using the AD FS test page (Windows Server 2016 only). For
instructions, see Test MFA on Windows Server 2019 or 2016 in Server Core Mode on page 36 or Test
MFA on Windows Server 2012 R2 on page 37, depending on your operating system.
Procedure
1. Sign into the server where you installed the agent.
2. Open a Powershell command prompt.
3. Enter the following command to enable the test page:
Set-AdfsProperties -EnableIdPInitiatedSignonPage:$true
4. Click Start > Server Manager.
5. Click Tools > AD FS Management.
6. In the left-hand frame, click Application Groups.
7. In the right-hand frame, click Add Application Group.
8. In the Name field, enter a name for the application group.
9. Select Template > Web browser accessing a web application.
10. Click Next.
11. In the Redirect URI field, enter:
https://<youradfs>.<yourdomain.com>/adfs/ls/idpinitiatedsignon
where <youradfs> is the name of your AD FS server, and <yourdomain.com> is the name of your
domain.
12. Click Add.
13. Click Next.
14. Select Choose an access control policy > Permit everyone and require MFA.
15. Click Next.
16. Click Next.
17. Click Close.
18. In the center frame, select the application group you specified in Step 8.
19. In the right-hand frame, select Properties.
20. Select <Name> - Web application
where <Name> is the application group you specified in Step 8.
21. Click Edit.
22. Under Identifiers > Relying party identifier, enter:
http://<youradfs>.<yourdomain.com>/adfs/services/trust
where <youradfs> is the name of your AD FS server, and <yourdomain.com> is the name of your
domain.
To get the correct value, run the get-adfsproperties command from PowerShell, and look for the
identifier value.
23. Click Add.
24. Click OK.
25. In the left-hand frame, select Access Control Policies.
26. Double-click Permit everyone and require MFA.
27. Select the Assigned To tab.
28. Verify that <Name> - Web application is present in the Application Name list
where <Name> is the application group you specified in Step 8.
29. Restart Microsoft Active Directory Federation Services (adfssrv). For instructions, see Restart AD FS
Services on page 38.
Procedure
1. Sign into the server where you installed the agent.
2. Open a Powershell command prompt.
3. Enter the following command to enable the test page:
Set-AdfsProperties -EnableIdPInitiatedSignonPage:$true
4. Enter the following, and record the Identifier value returned by the command:
Get-AdfsProperties
5. Enter the following commands to add the application group:
New-AdfsApplicationGroup -Name <GroupName>
Set-AdfsApplicationGroup -TargetApplicationGroupIdentifier <GroupName>
where <GroupName> is a name you choose for the application group.
6. Enter the following command to add the ADFS Native Client Application to the application group:
Add-AdfsNativeClientApplication -Name <ClientAppName> -Identifier <ID> -
ApplicationGroupIdentifier <GroupName> -RedirectUri <IDPSignOnURL>
where <ClientAppName> is the ADFS client application name, <ID> is an alphanumeric string you
choose, <GroupName> is the name of the group you chose in Step 5, and <IDPSignOnURL> is the fully
qualified URL for the IDPInitiatedSignOn page.
7. Open a web browser and navigate to:
https://<youradfs>.<yourdomain.com>/adfs/ls/idpinitiatedsignon
where <youradfs> is the name of your AD FS server, and <yourdomain.com> is the name of your
domain.
8. Enter the following commands to add the ADFS Web API Application:
$IDs = @("<ID>","<IDPSignOnID>")
Add-AdfsWebApiApplication -Name <WebAPIAppName> -Identifier $IDs -AccessControlPolicyName
"Permit everyone and require MFA" -ApplicationGroupIdentifier <GroupName>
where <ID> is the alphanumeric string you specified in Step 6, <IDPSignOnID> is the Identifier value
you obtained in Step 4, <WebAPIAppName> is the ADFS web API application name, and <GroupName> is
the group name specified in Step 5.
9. Restart Microsoft Active Directory Federation Services (adfssrv). For instructions, see Restart AD FS
Services on page 38.
10. Open a web browser and navigate to:
https://<youradfs>.<yourdomain.com>/adfs/ls/idpinitiatedsignon
where <youradfs> is the name of your AD FS server, and <yourdomain.com> is the name of your
domain.
11. Enter appropriate credentials, and verify that authentication works properly.
Procedure
1. Open a web browser and navigate to:
https://<youradfs>.<yourdomain.com>/adfs/ls/idpinitiatedsignon
where <youradfs> is the name of your AD FS server, and <yourdomain.com> is the name of your
domain.
2. Enter appropriate credentials, and verify that authentication works properly.
You can install RSA Authentication Agent 2.0 for Microsoft AD FS in an AD FS environment where version 1.0.2
of the agent already exists. When both versions of the agent are installed, you can choose which version AD FS
uses for multifactor authentication, or you can enable both versions to let users choose the version they prefer
when prompted to authenticate. Perform this procedure to configure the AD FS multifactor authentication policy
for multiple agent versions.
l Always install and register version 1.0.2 before installing and registering version 2.0
l If you unregister and uninstall version 1.0.2, you must re-register version 2.0.
l Registering version 2.0 disables all other multifactor authentication providers configured for AD FS.
Always reconfigure MFA after installing and registering version 2.0. For instructions, see Configure
Multifactor Authentication (MFA) on page 30.
Procedure
1. Sign into the server where you installed both versions of the agent.
2. Open a PowerShell command prompt.
3. Do one of the following, depending on the agent or agents you want AD FS to use for multifactor
authentication:
l To enable only agent version 1.0.2, enter the following command:
Set-AdfsGlobalAuthenticationPolicy -AdditionalAuthenticationProvider
"SecurIDAuthentication"
l To enable only agent version 2.0, enter the following command:
Set-AdfsGlobalAuthenticationPolicy -AdditionalAuthenticationProvider
"SecurIDv2Authentication"
l To enable both agent versions, enter the following set of commands:
$METHODS = @("SecurIDAuthentication","SecurIDv2Authentication")
Set-AdfsGlobalAuthenticationPolicy -AdditionalAuthenticationProvider $METHODS
Restart Microsoft Active Directory Federation Services (adfssrv). For instructions, see Restart AD FS Services
below.
Restart AD FS Services
After installing and registering Agent for AD FS, you must restart Active Directory Federation Services (adfssrv)
on each AD FS server in your deployment.
Procedure
1. Sign into the AD FS server where you installed the agent.
2. Open a PowerShell command prompt.
3. Enter the following to run the Agent for AD FS Configuration Utility:
cd 'C:\Program Files\RSA\RSA Authentication Agent\AD FS MFA Adapter\scripts'
.\MFAAuthProviderConfigSettings.ps1
4. From the Main Menu, enter 3 to select Restart AD FS.
After installing the agent, you must import the trusted root CA certificate from RSA Authentication Manager or
the Cloud Authentication Service, depending on whether the agent connects to Authentication Manager or the
Cloud Authentication Service.
If you are using Authentication Manager as a secure proxy server, you must import the trusted root
CA certificate from Authentication Manager.
You can obtain this certificate from your Authentication Manager or Cloud Authentication Service administrator.
(For instructions, see the knowledgebase article How to export RSA SecurID Access Authentication Manager or
Cloud Authentication Service Root Certificate.)
Perform the procedure appropriate for the operating system on your AD FS server.
Obtain the trusted root CA certificate from your Authentication Manager or Cloud Authentication Service
administrator and copy it to a location on the AD FS server.
Procedure
1. Sign into the AD FS server where you installed the agent.
2. Run mmc.exe to open the Microsoft Management Console.
3. Click File > Add/Remove Snap-In.
4. Double-click Certificates.
5. Select Computer Account, then click Next.
6. Select Local Computer, then click Finish.
7. Click OK.
8. Navigate to Certificates(Local Computer) > Trusted Root Certification Authorities >
Certificates.
9. Right-click Certificates and select All Tasks > Import.
10. Click Next.
11. Click Browse, then select the certificate you would like to import and click Open.
12. Click Next.
13. Select Place all certificates in the following store.
14. Click Browse, then select Trusted Root Certification Authorities and click OK.
15. Click Next.
16. Click Finish & OK.
Obtain the trusted root CA certificate from your Authentication Manager or Cloud Authentication Service
administrator and copy it to a location on the AD FS server.
Procedure
1. Sign into the AD FS server where you installed the agent.
2. Open a PowerShell command prompt.
3. Enter the following commands to import the certificate:
IMPORT-MODULE PKI
SET-LOCATION CERT:
Get-ChildItem –Path <c:\CertDirectory\mycert.cer> | Import-Certificate –
CertStoreLocation cert:\LocalMachine\Root
where <c:\CertDirectory\mycert.cer> is the full file path of the certificate.
Perform this procedure to make non-English Authentication Agent for AD FS authentication pages available
according to the language preferences set in each user's web browser.
Procedure
1. Sign into the AD FS server where you installed the agent.
2. Copy the contents of ADFSAgentv2LocalizedPages.zip to C:\Program Files\RSA\RSA
Authentication Agent\AD FS MFA Adapter\lang\, replacing any duplicate files.
3. Open a PowerShell command prompt.
4. Enter the following to run the Agent for AD FS localization script:
cd 'C:\Program Files\RSA\RSA Authentication Agent\AD FS MFA Adapter\lang'
.\MFAAuthProviderLocalization.ps1
5. Enter 1 to add and enable the localized language resource files.
6. Enter 3 to exit.
Restart Microsoft Active Directory Federation Services (adfssrv). For instructions, see Restart AD FS Services on
page 38.
Perform this procedure to remove non-English Authentication Agent for AD FS authentication pages from the AD
FS server.
Procedure
1. Sign into the AD FS server where you installed the agent.
2. Open a PowerShell command prompt.
3. Enter the following to run the Agent for AD FS localization script:
cd 'C:\Program Files\RSA\RSA Authentication Agent\AD FS MFA Adapter\lang'
.\MFAAuthProviderLocalization.ps1
4. Enter 2 to remove localized language resource files.
5. Enter 3 to exit.
6. Delete the language files from C:\Program Files\RSA\RSA Authentication Agent\AD FS MFA
Adapter\lang\.
Restart Microsoft Active Directory Federation Services (adfssrv). For instructions, see Restart AD FS Services on
page 38.
When you install Agent for AD FS, you configure basic settings using the installation wizard. If you need to
modify those settings after installation, you can use the Agent for AD FS Configuration Utility. The configuration
utility provides options to view and edit agent settings, restart the AD FS service, and register or unregister the
agent with Microsoft AD FS. Some settings are only available in the configuration utility.
Procedure
1. Sign into the AD FS server where you installed the agent.
2. Open a PowerShell command prompt.
3. Enter the following to run the Agent for AD FS Configuration Utility:
cd 'C:\Program Files\RSA\RSA Authentication Agent\AD FS MFA Adapter\scripts'
.\MFAAuthProviderConfigSettings.ps1
4. From the Main Menu, enter 2 to select Edit Settings.
Note: You can enter 1 to select View Current Settings if you want to check the current configuration
without making changes.
5. From the Edit Settings menu, enter the number of the setting you want to modify. This menu displays
different options depending on the currently configured authentication mode.
6. Provide the required configuration parameters. See Configuration Settings and Required Information on
page 17 for details.
7. Enter Y when prompted to return to the Main Menu, or enter N to proceed to the next configurable
setting.
8. When you are done editing settings, enter 3 from the Main Menu to restart the AD FS service, and enter
6 from the Main Menu to exit the configuration utility.
The Federal Information Processing Standard (FIPS) is a United States government computer security standard
used to approve cryptographic modules. Perform this procedure to enable FIPS on Windows Server 2019, 2016,
or 2012 R2.
Procedure
1. Sign into the AD FS server as an administrator.
2. Click Start > Control Panel > Administrative Tools > Local Security Policy.
The Local Security Settings window appears.
3. In the navigation pane, click Local Policies, then Security Options.
4. In the right-side pane, double-click System cryptography: Use FIPS compliant algorithms for
encryption, hashing, and signing.
5. In the dialog box that appears, click Enabled or Disabled based on your deployment requirements, and
then click Apply.
6. Click OK.
7. Close the Local Security Settings window.
After installing and registering Agent for AD FS on Windows Server 2019, you must change the AD FS theme
from a right alignment to a center alignment. This change allows authentication windows to display correctly.
Windows Server 2016 with AD FS 4.0 and Windows Server 2012 R2 with AD FS 3.0 do not require this
procedure.
Procedure
1. On the Windows Server 2019 on which you installed or upgraded the agent, open a PowerShell
command prompt.
2. Enter the following to get details of the current theme:
Get-AdfsWebConfig
3. Enter the following to see the different themes that are supported by AD FS 2019:
Get-AdfsWebTheme | Select Name
4. Enter the following to change to a center alignment theme that is introduced in AD FS 2019:
Set-AdfsWebConfig -ActiveThemeName DefaultAdfs2019
Configure Logging
Logging is enabled by default when you install Agent for AD FS. You can customize logging options by manually
editing the log4net.config file in the C:\Program Files\RSA\RSA Authentication Agent\AD FS MFA
Adapter\config directory. You can change the following parameters using the log file syntax provided.
Note: You must restart Microsoft Active Directory Federation Services (adfssrv) after modifying
log4net.config. For instructions, see Restart AD FS Services on page 38.
You can specify the logging format. Specify either SizeBasedRotation or TimeBasedRotation as shown:
<root>
<appender-ref ref="SizeBasedRotation"/>
</root>
Log Rotation
You can enable log rotation by setting the appender tag as shown:
You can specify the name of the log file. For example:
You can specify the maximum log file size. For example:
You can specify the maximum number of log files to be saved. When the maximum log file count is reached,
older log files are overwritten.
Log Levels
Agent features log levels in the following sequence: Debug > Info > Warn > Error > Fatal
The agent will log all messages between the minimum and maximum levels you specify. The following example
values will log all messages for the Info, Warn, Error, and Fatal levels, but will not log Debug messages:
<filter type="log4net.Filter.LevelRangeFilter">
</filter>
Log Rotation
You can enable log rotation by setting the appender tag as shown:
Log Levels
Agent features log levels in the following sequence: Debug > Info > Warn > Error > Fatal
The agent will log all messages between the minimum and maximum levels you specify. The following example
values will log all messages for the Info, Warn, Error, and Fatal levels, but will not log Debug messages:
<filter type="log4net.Filter.LevelRangeFilter">
</filter>
You can specify the name of the log file. For example:
The log file name will be appended with the date pattern you specify. For example:
The RSA Group Policy Object (GPO) template files allow you to configure additional settings for Authentication
Agent for AD FS. For more information, see the Group Policy Object Template Guide. available on RSA Link:
https://community.rsa.com/community/products/securid/authentication-agent-AD FS
If you change the service account used for managing the AD FS server, you must transfer the required Agent for
AD FS file permissions to the new service account. To transfer file permissions, run the ACL update script:
C:\Program Files\RSA\RSA Authentication Agent\AD FS MFA
Adapter\scripts\MFAAuthProviderACLSettings.ps1.
Repair an Installation
Repairing an installation replaces missing files in a damaged installation. You can repair the installation using
the Install Wizard or the command line.
Note: The installer may prompt you to close files or applications that will be modified during the repair
process.
You can uninstall the agent using Windows Control Panel, the Install Wizard, or the command line. To uninstall
the product from multiple AD FS servers simultaneously, you must use the command line.
If you added non-English Authentication Agent for AD FS authentication pages, remove them from the AD FS
server. For instructions, see Remove Localized Authentication Pages on page 40.
On Windows Server 2019 with AD FS 2019, if RSA SecurID Access is configured as the primary authentication
method, perform one of the following procedures to remove this setting:
l Server Core Mode. Open a PowerShell command prompt, and execute the following two commands:
Set-AdfsGlobalAuthenticationPolicy -AllowAdditionalAuthenticationAsPrimary
$false
Set-AdfsGlobalAuthenticationPolicy -PrimaryIntranetAuthenticationProvider
WindowsAuthentication, FormsAuthentication, MicrosoftPassportAuthentication -
PrimaryExtranetAuthenticationProvider FormsAuthentication,
MicrosoftPassportAuthentication -AdditionalAuthenticationProvider $null
Restart Microsoft Active Directory Federation Services (adfssrv). For instructions, see Restart AD FS
Services on page 38.
Chapter 5: Troubleshooting
Installation Logs 48
Chapter 5: Troubleshooting 47
RSA Authentication Agent 2.0.3 for Microsoft AD FS Administrator's Guide
Installation Logs
If you encounter problems while installing, repairing, or uninstalling the agent, check install.log, repair.log, or
uninstall.log, respectively, for status and troubleshooting information. The log files are saved in the folder
where you run the installer. This table describes the messages that may appear in the logs.
The following section contains details on issues you might encounter while using Authentication Agent for AD FS,
troubleshooting information, and descriptions of common error messages. For additional troubleshooting
information, sign into RSA Link at https://community.rsa.com.
The following table lists sample log messages that the agent records for common error scenarios.
2018-04-27 04:41:22,877 [23] INFO interrupted due to network connection problems. The agent
ConnectionHandler - Retry Count:4 attempts the configured number of connection retries, then
switches to the next configured replica instance.
2018-04-27 04:41:43,892 [23] INFO
ConnectionHandler - Retry Count:3
48 Chapter 5: Troubleshooting
RSA Authentication Agent 2.0.3 for Microsoft AD FS Administrator's Guide
The following table lists error messages that the agent displays to users for common error scenarios.
Chapter 5: Troubleshooting 49
RSA Authentication Agent 2.0.3 for Microsoft AD FS Administrator's Guide
Unsuccessful l The user attempted to cancel and retry an Approve or Device Biometrics
authentication. Try again. authentication multiple times in rapid succession, causing messages to
arrive out of sequence.
l A corrupted message chain error occurred during authentication with any
method.
The following table lists sample messages that the agent records in Microsoft Event Viewer for common error
scenarios.
Additional Data
Protocol Name:
Saml
at
Microsoft.IdentityServer.Web.Authentication.External.ExternalAuthentication
Handler.Process(ProtocolContext context)
50 Chapter 5: Troubleshooting
RSA Authentication Agent 2.0.3 for Microsoft AD FS Administrator's Guide
at Microsoft.IdentityServer.Web.PassiveProtocolListener.OnGetContext
(WrappedHttpListenerContext context)
Encountered error during federation passive request.
Additional Data
Protocol Name:
Saml
Relying Party:
http://server.domain.com/AD FS/services/trust
Exception details:
at
Microsoft.IdentityServer.Web.PassiveProtocolListener.GetAuthMethodsFromA
uthPolicyRules(PassiveProtocolHandler protocolHandler, ProtocolContext
protocolContext)
at
Microsoft.IdentityServer.Web.PassiveProtocolListener.GetAuthenticationMeth
ods(PassiveProtocolHandler protocolHandler, ProtocolContext
protocolContext)
at Microsoft.IdentityServer.Web.PassiveProtocolListener.OnGetContext
(WrappedHttpListenerContext context)
Agent files are either missing or
An error occurred loading an authentication provider.
corrupt.
Fix configuration errors using PowerShell cmdlets and restart the Federation
Do the following:
Service.
1. Use the installer to repair
Identifier: SecurIDv2Authentication
the agent.
Context: Proxy TLS pipeline
2. Reconfigure settings
Additional Data using the Configuration
Utility.
Exception details:
3. Run
An error occurred initializing the 'SecurIDv2Authentication' authentication
MFAAuthProviderACLS
provider.
ettings.ps1.
Chapter 5: Troubleshooting 51