WebSphere Application Server & Liberty

 View Only
  • 1.  JSAS0803E: The received admin RSA token failed validation.

    Posted 5 days ago
    I noticed the JSAS0803E error in the SystemOut.log of WAS servers managed by an admin agent. This happens very rarely in my system.
    ----
    JSAS0803E: The received admin RSA token failed validation. The exception message is: The signature of the secret key token was not verified.
    ----
    Can this error be safely ignored?


    ------------------------------
    Yoshiki Yamada
    IBM Japan
    ------------------------------


  • 2.  RE: JSAS0803E: The received admin RSA token failed validation.
    Best Answer

    Posted 5 days ago


    As explained in the following product manual, the admin agent uses the target application server's RSA public key for encryption:

    RSA token authentication mechanism
    https://www.ibm.com/docs/en/was/9.0.5?topic=mechanism-rsa-token-authentication

    Below is a simplified sequence of events:

     1. The admin agent starts and runs.
     2. To manage a target application server, the admin agent retrieves the server's RSA public key using a "bootstrap" MBean request from the target.
     3. The admin agent caches the retrieved RSA public key of the target server (referred to as "target public").
     4. The admin agent uses the cached "target public" to encrypt outgoing messages.
     5. The target application server decrypts the message using its private key ("target private").

    If the target server is stopped or in the process of starting when its public/private keys are renewed, the admin agent cannot retrieve the updated public key via the bootstrap MBean request. Instead, it continues to use the cached public key ("target public"). However, when the target server begins using the new private key, this discrepancy results in the JSAS0803E error.

    Adminagent has a retry logic to deal with this discrepancy situation which was introduced as APAR PM66060.
    https://www.ibm.com/support/pages/apar/PM66060

    In the retry logic, adminagent clears the cache and retrieve the renewed one. However, as you might expect, there could be a situation where JSAS0803E is inevitable on the first attempt after the key renewal because the adminagent has not retrieved the target's renewed public key yet.
    Therefore, if JSAS0803E occurs only a few times immediately after the target server's rsatoken-key.p12 file is updated, it can generally be considered ignorable, provided no other errors occur around the same time.



    ------------------------------
    Yoshiki Yamada
    IBM Japan
    ------------------------------



  • 3.  RE: JSAS0803E: The received admin RSA token failed validation.

    Posted 2 days ago

    I think that the related systems are likely in a time-inconsistent state.

    If the systems are in a time-mismatched state, it can indeed cause the JSAS0803E: The received admin RSA token failed validation error, as time synchronization is critical for token-based authentication.

    I hope the following will be helpful to you.

     

    Impact of Time Mismatch

    1. Token Expiry Validation:
      • RSA tokens used by WebSphere for authentication have a validity period.
      • If the system clocks are not synchronized, the token's validity check might fail because the server might see the token as expired or not yet valid.
    2. SSL/TLS Handshakes:
      • If the clocks of communicating systems are too far apart, SSL/TLS handshakes might fail, causing connectivity issues.

    Synchronize System Clocks

    • Use NTP (Network Time Protocol) to synchronize the clocks across all systems.
      • On Linux systems, install and configure ntpd or chronyd:

    sudo apt install ntp        # For Ubuntu/Debian

    sudo yum install chrony     # For RHEL/CentOS

      • Start the service:

    sudo systemctl start ntpd    # For ntpd

    sudo systemctl start chronyd # For chronyd

      • Verify synchronization:

    ntpq -p

    • On AIX, configure xntpd for time synchronization:

    -x    Makes small time adjustments. (SLEWING)
    # /usr/bin/chssys -s xntpd -a "-x"
    # stopsrc -s xntpd
    # startsrc -s xntpd

      • Verify NTP status:

    ntpq -c peers

    3. Validate Time Zone Settings

    • Ensure all systems are using the same time zone or that time zone differences are accounted for:

    cat /etc/timezone    # Check time zone

    • Correct the time zone if necessary:

    sudo timedatectl set-timezone <time_zone>

     

     

    ───────────────────────────────────────────────────────

    KiHwa Park

    Infrastructure Architect & M/W Specialist
    Kyndryl KOREA.

     

     

     

     

     

     

     

     

     


    Mobile:
       82-10-4995-8877
    e-mail:
       parkkih@kyndryl.com

      IBP(Kyobo Data Center), 10-40 Songdo-dong
      Yeonsu-gu, Incheon, Korea 406-840