Troubleshooting
Problem
MFA (Multi-Factor Authentication) and Federation functionality may stop working after upgrading from ISVA versions prior to 10.0.9 to ISVA 10.0.9 or later, or to IVIA 11.0.0 or later.
Symptom
- Federation operations return errors
- MFA may fail silently, allowing users to access pages without MFA authentication
- Runtime Server responses return HTTP 503 errors when accessing the /mga junction on the reverse proxy
Cause
In ISVA 10.0.9, the Runtime Server certificate configuration was enhanced to allow separate settings for client-side (outbound) and server-side (inbound) operations.
Reference: What's new in ISVA 10.0.9
Runtime Tuning Parameters Enhancement:
The tuning of the runtime profile SSL connection properties is split into distinct values for inbound and outbound connections. Outbound connections use the existing Keystore, Keystore Label and Truststore properties. Inbound connections use the new Inbound Keystore, Inbound Keystore Label and Inbound Truststore properties.
What happens during upgrade:
When the ISVA/IVIA Runtime Server has customized server certificate settings:
- Pre-upgrade settings are preserved as outbound (client-side) configuration
- Inbound (server-side) configuration is reset to default values (Keystore Label: Unset)
When incorrect server certificates are used for inbound connections, access to the /mga junction on the reverse proxy returns HTTP 503 errors, causing MFA to fail.
Environment
- Product: IBM Security Verify Access (ISVA) / IBM Verify Identity Access (IVIA)
- Versions Affected: Upgrades from pre-10.0.9 to ISVA 10.0.9 or later, or IVIA 11.0.0 or later
- Component: Runtime Server
Diagnosing The Problem
- Enable pdweb.debug tracing and verify that the Runtime Server response returns HTTP 503 errors.
Check Runtime Parameters:
Navigate to LMI > AAC > Runtime Parameter page
Verify that the Keystore and Keystore Label have been customized from default values
Default values:
Keystore: rt_profile_keys
Keystore Label: Unset
If the Inbound Keystore and Inbound Keystore Label are set to default values while the outbound settings are customized, this indicates the issue.
Resolving The Problem
Configure the inbound (server-side) certificate settings to match your customized server certificate configuration:
- Log in to the LMI (Local Management Interface)
- Navigate to AAC > Runtime Parameter page
- Set the correct server certificate values for:
Inbound Keystore
Inbound Keystore Label - Deploy the changes and restart the Runtime Server if necessary
Document Location
Worldwide
Product Synonym
ISVA; IVIA
Was this topic helpful?
Document Information
Modified date:
11 May 2026
UID
ibm17272516