Authentication-Related Messages
Privileged Access Manager Authentication-Related Messages.
capam33
PAM-CMN-0899 = Invalid authentication method: {0}.
PAM-CMN-0900 = Bad User ID ({0}) or Password.
PAM-CMN-0901 = You are not allowed to login at this time.
PAM-CMN-0902 = To login you have to accept the terms of the license.
PAM-CMN-0903 = This account is deactivated. See your CA PAM Administrator.
PAM-CMN-0904 = No Email Contact to Alert: {0}
PAM-CMN-0905 = Email alert sent to user {0}: {1}
PAM-CMN-0906 = User {0} deactivated due to reaching the password failure limit.
PAM-CMN-0907 = Account {0} has expired. See your CA PAM Administrator.
PAM-CMN-0908 = Account {0} is not yet activated. See your CA PAM Administrator.
PAM-CMN-0909 = Account {0} has been deactivated due to extended inactivity. See your CA PAM Administrator.
PAM-CMN-0910 = Unable to create security context for user {0}.
PAM-CMN-0911 = Due to account modifications, please change your password.
PAM-CMN-0912 = Due to password timeout, please change your password.
PAM-CMN-0913 = Due to increased password security, please change your password.
PAM-CMN-0914 = User {0} has logged into the CA Privileged Access Manager appliance {1}.
PAM-CMN-0915 = User {0} logged in.
PAM-CMN-0916 = This CA PAM appliance is in maintenance mode. Only admin level users can login.
PAM-CMN-0917 = User {0} logged in successfully via {1} authentication.
PAM-CMN-0918 = User deactivated.
PAM-CMN-0919 = Deactivated account {0}. Exceeded inactivity limit.
PAM-CMN-0920 = Deactivated account {0}. Account expired.
PAM-CMN-0921 = Single Sign On authentication failed. Please retry login.
PAM-CMN-0922 = You are logged out of CA PAM.
PAM-CMN-0923 = Single sign-on session expired. Please re-login.
PAM-CMN-0924 = Multiple CA PAM user accounts map to the same SAML identity ({0}). Rejecting the SAML authentication request and deactivating all the user accounts. Please activate one account that will be used to map to the SAML identity.
PAM-CMN-0925 = User {0} from SAML enabled group {1} has the same SAML user name {2} from SAML attribute {3}. User account deactivated.
PAM-CMN-0926 = Single sign-on authentication failed. Please contact your system administrator.
PAM-CMN-0927 = SAML user {0} not found in CA PAM or does not belong to a SAML enabled group.
PAM-CMN-0928 = SAML assertion {0} timestamp exceeds validity window by approximately {1} minutes. Assertion Issued: {2}.
PAM-CMN-0929 = SAML assertion issuer, {0}, does not match configured issuer {1}.
PAM-CMN-0930 = Invalid SAML assertion recipient URL: {0}.
PAM-CMN-0931 = SAML assertion recipient, {0}, not recognized. Valid recipients are: {1}.
PAM-CMN-0932 = SAML assertion received by authentication service at time {0} is before SAML Not-Before Condition {1}.
PAM-CMN-0933 = SAML assertion received by authentication service at time {0} is after SAML Not-On-Or-After Condition {1}.
PAM-CMN-0934 = SAML assertion received with a non-successful status code {0}.
PAM-CMN-0935 = CA PAM appliance in FIPS mode. SAML SSO disabled.
PAM-CMN-0936 = User attempted to login via SAML SSO but SAML SSO is not enabled.
PAM-CMN-0937 = SAML assertion not found in request.
PAM-CMN-0938 = Unable to decode SAML assertion.
PAM-CMN-0939 = SAML assertion failed schema validation.
PAM-CMN-0940 = Verification of SAML assertion failed: Certificate of SAML assertion producer has not been uploaded to CA PAM.
PAM-CMN-0941 = Saving the SAML assertion to a temporary file failed.
PAM-CMN-0942 = SAML assertion failed signature verification.
PAM-CMN-0943 = There are no user or user groups with an authentication method of SAML.
PAM-CMN-0944 = Login failed for user {0} due to multiple active RADIUS users having the same login name. All RADIUS users with login name {1} will be deactivated.
PAM-CMN-0945 = Login Failed. Please contact your system administrator for further assistance.
PAM-CMN-0946 = Authentication Daemon communication failure: {0}
PAM-CMN-0947 = Authentication Daemon access rejected message: {0}
PAM-CMN-0948 = Authentication Daemon General Error occurred ({0}). Please check if the Authentication Daemon is properly set up.
PAM-CMN-0949 = RADIUS user is not registered. Contact your CA PAM Administrator.
PAM-CMN-0950 = Authentication failed for RADIUS user {0}. RADIUS authentication succeeded but unable to retrieve the user's RADIUS group.
PAM-CMN-0951 = Authentication failed for RADIUS user {0}. RADIUS authentication succeeded but the user's RADIUS group changed from {1} to {2}. The new RADIUS group is not registered with CA PAM. User account deleted.
PAM-CMN-0952 = RADIUS user {0} moved from RADIUS group {1} to RADIUS group {2}.
PAM-CMN-0953 = Authentication failed for RADIUS user {0}. RADIUS authentication succeeded but the user's RADIUS group, {1}, is not registered. User will be logged out.
PAM-CMN-0954 = Adding RADIUS user {0} to CA PAM failed with message(s): {1}.
PAM-CMN-0955 = Authentication user {0} returned an invalid {1} challenge response for {2} authentication. Authentication request denied.
PAM-CMN-0956 = Unrecognized RADIUS challenge type {0}. Authentication request for user {1} denied.
PAM-CMN-0957 = SAML RADIUS authentication succeeded but the RADIUS group was not passed to CA PAM. User will be deleted and logged out.
PAM-CMN-0958 = Cisco SSO RADIUS user {0} moved to registered RADIUS group {1}.
PAM-CMN-0959 = User is not logged in.
PAM-CMN-0960 = Verify user credentials does not support the authentication method configured for the user.
PAM-CMN-0961 = User not found.
PAM-CMN-0962 = Determining the least-loaded CA PAM appliance for user ({0})'s session failed. Granting the user a session on this appliance.
PAM-CMN-0963 = Invalid attempt to acquire a session on this CA PAM appliance as user {0} via CA PAM load balance redirect.
PAM-CMN-0964 = Login failed for user {0} due to multiple active RSA users having the same login name. All RSA users with login name {1} will be deactivated.
PAM-CMN-0965 = Login Failed. Please contact your system administrator for further assistance.
PAM-CMN-0966 = User {0} selected to authenticate via {1} but the configured authentication method for the user is {2}.
PAM-CMN-0967 = The Active Directory user with user principal name {0} or samAccountName {1} is not registered with CA PAM.
PAM-CMN-0968 = The LDAP user with attribute {0}={1} is not registered with CA PAM
PAM-CMN-0969 = User {0} session is set for post-authentication load balancing to member {1}. The user's session will be destroyed on this member and resumed on member {2}.
PAM-CMN-0970 = User {0} session has been post-authentication load balanced to this member. The user's session will be resumed on this member.
PAM-CMN-0971 = User {0} failed LDAP+RSA authentication. The LDAP authentication failed.
PAM-CMN-0972 = User {0} failed LDAP+RSA authentication. The RSA authentication failed with RSA user name {1}.
PAM-CMN-0973 = User {0} attempted to access from an unauthorized IP: {1}. The only authorized networks are [{2}].
PAM-CMN-0974 = You have attempted to gain access from an invalid network. Please contact your administrator.
PAM-CMN-0975 = You have not been authorized to connect.
PAM-CMN-0976 = User {0} attempted an invalid PKI authentication.
PAM-CMN-0977 = PKI authentication failed with error: {0}
PAM-CMN-0978 = PKI user {0} not approved for access. Registration deleted.
PAM-CMN-0979 = LDAP authentication failed for user {0} with error code ({1}) and error string ({2}).
PAM-CMN-0980 = User {0} selected to authenticate via {1} but the user is required to authenticate via SAML from the SAML authentication inherited from the following group(s): {2}.
PAM-CMN-0981 = User {0} with authentication type SAML is mapped to the same SAML user name, {1}, as other CA PAM accounts. User account deactivated.
PAM-CMN-0982 = SAML SSO Authentication Failure: Status Code: {0}. Status Message: {1}. SubStatus Code: {2}.
PAM-CMN-0983 = Just-In-Time provisioning of user {0} failed because the userGroup attribute of the SAML assertion does not contain a valid CA PAM user group name. The groups specified in the SAML assertion are: {1}.
PAM-CMN-0984 = Just-In-Time provisioning of user {0} failed due to the following errors: {1}.
PAM-CMN-0985 = Just-In-Time provisioning of user {0} failed due to missing required attribute {1}.
PAM-CMN-0986 = SAML user {0} was not found on CA PAM but the remote identity provider {1} is configured for Just In Time provisioning. CA PAM will attempt to provision an account for the user in the following CA PAM groups: {2}.
PAM-CMN-0987 = The user initiated a SAML SSO Test to remote identity provider {0}.
PAM-CMN-0988 = The validation of the SAML assertion of user identity {0} from remote IdP {1} succeeded but mapping the user to a SAML-enabled CA PAM account failed.
PAM-CMN-0989 = User {0} logged in successfully via {1} authentication from remote IdP {2}.
PAM-CMN-0990 = A SAML reauthentication request was received for a password view request but the remote IdP entity ID is missing from the user's session.
PAM-CMN-0991 = The SAML reauthentication to view the password for account {0} failed: Status Code: {1}. Status Message: {2}. SubStatus Code: {3}.
PAM-CMN-0992 = The SAML reauthentication to view the password for account {0} failed: {1}.
PAM-CMN-0993 = The user attempted to verify their password to view an account password using SAML authentication but the user did not authenticate to CA PAM via SAML authentication.
PAM-CMN-0994 = The SAML reauthentication to view the password for account {0} failed. The user identity in the SAML assertion, {1}, does not match the identity of the CA PAM user that initiated the password view request.
PAM-CMN-0995 = Your LDAP password has been reset. You are required to change your password.
PAM-CMN-0996 = Your LDAP password has expired. You are required to change your password.
PAM-CMN-0997 = The user's LDAP domain is not configured with CA PAM to use TLS and therefore CA PAM will not enable the user to change their password.
PAM-CMN-0998 = User {0} logged in successfully via {1} authentication but will be required to change their password.
PAM-CMN-0999 = A user authenticated with login name {0} but a user with the specified login name is not registered with CA PAM.
PAM-CMN-1000 = User {0} failed LDAP+RADIUS authentication. The LDAP authentication failed.
PAM-CMN-1001 = User {0} failed LDAP+RADIUS authentication. The RADIUS authentication failed with RADIUS user name {1}.
PAM-CMN-1002 = PKI user(s) {0} not approved for access.
PAM-CMN-1003 = Invalid pending PKI user ids specified: {0}.
PAM-CMN-1004 = PKI user(s) {0} approved for access.
PAM-CMN-1005 = Unable to approve the pending PKI user {0} for access: {1}.
PAM-CMN-1006 = CA PAM as a SAML SP received an authentication request for unknown SAML identity provider {0}.
PAM-CMN-1007 = An error occurred while processing SAML assertion: {0}.
PAM-CMN-1008 = SAML SSO Authentication Failure: The received assertion did not include a subject name identifier nor the userName SAML attribute.
PAM-CMN-1009 = SAML password view request out-of-sync ({0} != {1}): The user's internal id did not match the id contained in the user's session.
PAM-CMN-1010 = Please accept the license to proceed.
PAM-CMN-1011 = The user was required to accept the license but canceled. Access denied.
PAM-CMN-1012 = The following group names contained in the SAML assertion do not exist in CA PAM and will be ignored in the Just In Time provisioning of the user {0}: {1}.
PAM-CMN-1013 = User {0} re-logged in successfully via {1} authentication.
PAM-CMN-1014 = User {0} failed {1} re-authentication.
PAM-CMN-1015 = Authentication type mismatch on re-authentication.
PAM-CMN-1016 = User mismatch on re-authentication.
PAM-CMN-1017 = Proxy authentication failed. Cannot find corresponding CA PAM user.
PAM-CMN-1018 = Configuration Password is still the default value.
PAM-CMN-1019 = PKI user {0} approved. User was created.
PAM-CMN-1020 = Attempt to approve PKI user {0} failed. Message was {1}.
PAM-CMN-1021 = SAML SSO of Just-In-Time provisioned user {0} failed due to missing required attribute {1}.
PAM-CMN-1022 = SAML SSO of Just-In-Time provisioned user {0} failed because the userGroup attribute of the SAML assertion does not contain a valid CA PAM user group name. The groups specified in the SAML assertion were: {1}.
PAM-CMN-1023 = The user groups of the Just-In-Time provisioned user {0} has been updated: {1}.
PAM-CMN-1024 = The user groups of the Just-In-Time provisioned user {0} has been updated: {1}. The following user groups contained in the assertion are not valid CA PAM user groups and will be ignored: {2}.
PAM-CMN-1025 = SAML SSO Authentication Failed: Updating the user groups of SAML SSO Just-In-Time provisioned user {0} failed: {1}
PAM-CMN-1026 = SAML SSO of Just-In-Time provisioned user {0} succeeded. The user's group membership has not changed. The assertion also contained the following group names that do not exist in CA PAM: {1}.
PAM-CMN-1027 = LDAP user account {0} is disabled in Active Directory.
PAM-CMN-3252 = Authentication failed. Please contact administrator or try again later.
PAM-CMN-3253 = User {0} failed to access device {1}. The primary site is unreachable and the cluster is configured for security-safe mode. Credentials cannot not be serviced from the local database in security safe mode.
PAM-CMN-3254 = Unauthorized access to RADIUS configuration.
PAM-CMN-3255 = Failed to save the RADIUS configuration on member {0}. Unable to establish a connection to the CA PAM appliance.
PAM-CMN-3256 = Saving RADIUS configuration on all cluster members failed for {0}/{1} members: {2}.
PAM-CMN-3257 = RADIUS configuration saved on all cluster members.
PAM-CMN-3258 = GateKeeper RADIUS configuration saved.
PAM-CMN-3259 = Failed to retrieve the RADIUS configuration from primary member {0}. Unable to establish a connection to the CA PAM appliance.
PAM-CMN-3260 = Synchronizing RADIUS configuration from primary cluster member {0} failed.
PAM-CMN-3261 = RADIUS configuration retrieved from primary cluster member successfully.
PAM-CMN-3263 = Gatekeeper RDPProxy configuration saved.
PAM-CMN-3264 = Failed to save the RDP configuration on member {0}. Unable to establish a connection to the CA PAM appliance.
PAM-CMN-3265 = Saving RDPProxy configuration on all cluster members failed for {0}/{1} members: {2}.
PAM-CMN-3266 = RDPProxy configuration saved on all cluster members.
PAM-CMN-3267 = Failed to retrieve the RDPProxy configuration from primary member {0}. Unable to establish a connection to the CA PAM appliance.
PAM-CMN-3268 = Synchronizing RDPProxy configuration from primary cluster member {0} failed.
PAM-CMN-3269 = RDPProxy configuration retrieved from primary cluster member successfully.
PAM-CMN-3351 = The Kerberos Authentication for the device ''{0}'' will be disabled because device is defined by IP address.
PAM-CMN-3352 = The Kerberos Authentication requires device to be defined by it's FQDN. Kerberos for the device ''{0}'' will be disabled.
PAM-CMN-3353 = The device ''{0}'' has more than one Kerberos KDC server defined for on Group level. Kerberos Authentication will be disabled until conflict is resolved.