Client SDK 5 user contains inconsistent values - AWS CloudHSM

Client SDK 5 user contains inconsistent values

The user list command returns a list of all users, and user properties, in your cluster. If any of a user’s properties have the value "inconsistent", this user is not synchronized across your cluster. This means that the user exists with different properties on different HSMs in the cluster. Based on which property is inconsistent, different repair steps can be taken.

The following table includes steps to resolve inconsistencies for a single user. If a single user has multiple inconsistencies, resolve them by following these steps from top to bottom. If there are multiple users with inconsistencies, work through this list for each user, fully resolving the inconsistencies for that user before moving on the next.

Note

To perform these steps you should ideally be logged in as an admin. If your admin account is not consistent, go through these steps logging in with the admin and repeating the steps until all properties are consistent. After your admin account is consistent, you can proceed to use that admin to synchronize other users in the cluster.

Inconsistent property Example output of user list Implication Recovery method
User "role" is "inconsistent"
{ "username": "test_user", "role": "inconsistent", "locked": "false", "mfa": [], "cluster-coverage": "full" }
This user is a CryptoUser on some HSMs, and an Admin on other HSMs. This can happen if two SDKs attempt to create the same user, at the same time, with different roles.You must remove this user, and re-create it with the desired role.
  1. Login as an admin.

  2. Delete the user on all HSMs:

    user delete --username <user's name> --role admin

    user delete --username <user's name> --role crypto-user

  3. Create the user with the desired role:

    user create --username <user's name> --role <desired role>

User "cluster-coverage" is "inconsistent"
{ "username": "test_user", "role": "crypto-user", "locked": "false", "mfa": [], "cluster-coverage": "inconsistent" }

This user exists on a subset of HSMs in the cluster.This can happen if a user create partially succeeded, or if a user delete partially succeeded.

You must finish your previous operation, either creating or removing this user from your cluster.

If the user should not exist, follow these steps:

  1. Login as an admin.

  2. Run this command:

    user delete --username<user's name> --role admin

  3. Now, run the following command:

    user delete --username<user's name> --role crypto-user

If the user should exist, follow these steps:

  1. Login as an admin.

  2. Run the following command:

    user create --username <user's name> --role <desired role>

User "locked" parameter is "inconsistent" or "true"
{ "username": "test_user", "role": "crypto-user", "locked": inconsistent, "mfa": [], "cluster-coverage": "full" }

This user is locked out on a subset of HSMs.

This can happen if a user uses the wrong password and only connects to a subset of HSMs in the cluster.

You must change the user's credentials to be consistent across the cluster.

If the user has MFA activated, follow these steps:

  1. Login as an admin.

  2. Run the following command to temporarily deactivate MFA:

    user change-mfa token-sign --username <user's name> --role <desired role> --disable

  3. Change the user's password so they can log into all HSMs:

    user change-password --username <user's name> --role <desired role>

If MFA should be active for the user, follow these steps:

  1. Have the user log in and re-enable MFA (this will require them to sign tokens and provide their public key in a PEM file):

    user change-mfa token-sign --username <user's name> --role <desired role> —token <File>

MFA status is "inconsistent"
{ "username": "test_user", "role": "crypto-user", "locked": "false", "mfa": [ { "strategy": "token-sign", "status": "inconsistent" } ], "cluster-coverage": "full" }

This user has different MFA flags on different HSMs in the cluster.

This can happen if an MFA operation only completed on a subset of HSMs.

You must reset the user's password, and allow them to re-enable MFA.

If the user has MFA activated, follow these steps:

  1. Login as an admin.

  2. Run the following command to temporarily deactivate MFA:

    user change-mfa token-sign --username <user's name> --role <desired role> --disable

  3. You will also need to then change the user's password so they can log into all HSMs:

    user change-password --username <user's name> --role <desired role>

If MFA should be active for the user, follow these steps:

  1. Have the user log in and re-enable MFA (this will require them to sign tokens and provide their public key in a PEM file):

    user change-mfa token-sign --username <user's name> --role <desired role> —token <File>