On the NSX Manager, the user account displays messages similar to:
2017-06-29 13:50:21.005 GMT INFO http-nio-127.0.0.1-7441-exec-3 VcConnection:637 - Session info : Session key [####################ed037] for User [EXAMPLE\user]]
2017-06-29 13:50:21.020 GMT INFO http-nio-127.0.0.1-7441-exec-3 VcAuthenticationProvider:176 - SSO user and its groups does not have any role on vSM
In vmware-sts-idmd.log in the SSO server/PSC, you see entries similar to:
[2017-07-05T10:15:46.398-04:00 vsphere.local ffa849d1-####-####-####-1795db720967 INFO ] [VmEventAppender] EventLog: source=[VMware Identity Server], tenant=[vsphere.local], eventid=[USER_NAME_PWD_AUTH_FAILED], level=[ERROR], category=[VMEVENT_CATEGORY_IDM], text=[Failed to authenticate principal [EXAMPLE\user]
. Native platform error [code: -1765328360][null][null]], detailText=[com.vmware.identity.interop.idm.IdmNativeException: Native platform error [code: -1765328360][null][null]
[2017-06-26T14:36:41.032-04:00 vsphere.local 8ab47fb2-####-####-####-7a8aa2b4b285 WARN ] [ServerUtils] cannot bind connection: [ldap://DC01.example.com, null]
[2017-06-26T14:36:41.032-04:00 vsphere.local 8ab47fb2-
####-####-####
-7a8aa2b4b285 ERROR] [ServerUtils] cannot establish connection with uri: [ldap://DC01.example.com]
[2017-06-26T14:36:41.032-04:00 vsphere.local 8ab47fb2-
####-####-####
-7a8aa2b4b285 INFO ] [ActiveDirectoryProvider] removeDcInfo - domain [EXAMPLE.COM],
domainFQDN [DC01.corp.local], domainIpAddress [192.168.247.60]
[2017-06-26T14:36:41.033-04:00 vsphere.local 8ab47fb2-b856-403d-921e-7a8aa2b4b285 ERROR] [ActiveDirectoryProvider] Failed to get non-GC connection to domain CORP.LOCAL - domain controller might be offline com.vmware.identity.interop.idm.IdmNativeException: Native platform error [code: 40287][LW_ERROR_LDAP_LOCAL_ERROR][]
at com.vmware.identity.interop.idm.LinuxIdmNativeAdapter.LdapSaslBind(LinuxIdmNativeAdapter.java:345)
at com.vmware.identity.interop.ldap.LinuxLdapClientLibrary.ldap_sasl_bind_s(LinuxLdapClientLibrary.java:686)
at com.vmware.identity.interop.ldap.LdapConnection.bindSaslConnection(LdapConnection.java:158)
at com.vmware.identity.idm.server.ServerUtils.getLdapConnection(ServerUtils.java:354)
at com.vmware.identity.idm.server.ServerUtils.getLdapConnectionByURIs(ServerUtils.java:250)
Note: The preceding log excerpts are only examples. Date, time, and environmental variables may vary depending on your environment.
This issue occurs because the Likewise Kerberos stack requires all DNS servers to be configured with the Reverse Lookup Zone and that all Active Directory Domain Controller (AD DC) Pointer (PTR) records are available. The Likewise Kerberos stack in the Appliances use both Forward and Reverse Name Lookup to canonically organize hostnames for use in service principal names.
shell.set --enable True
shell
less /etc/resolv.conf
nameserver 10.100.10.213
nameserver 10.10.10.252
shell.set --enable True
shell
less /var/lib/likewise/krb5-affinity.conf
[realms]
DomainA.local = {
kdc = 10.10.10.213
}
DomainB.local = {
kdc = 10.10.10.81
}
ChildDomainA.DomainB.local = {
kdc = 10.10.10.85
}
ChildDomainB.DomainB.Local = {
kdc = 10.10.10.83
}
DomainC.local = {
kdc = 10.10.10.252
kdc = 10.10.10.250
}
ChildDomainC.DomainB.local = {
kdc = 10.10.10.247
kdc = 10.10.10.82
}
ldap://localhost:389]
ldap://dc2-root.DomainA.local]
ldap://Vigrid.local]
ldap://DC-4.DomainB.local]
ldap://dc-us.DomainC.local]
ldap://dc2-nh.DomainB.local]
ldap://sqa-dc-3.DomainB.local]
ldap://dc2-root.DomainA.local]
ldap://DC-4.DomainB.local]
shell.set --enable True
shell
nslookup dc2-root.DomainA.local
nslookup dc2-root.DomainB.local
Server: 10.100.10.213
Address: 10.100.10.213#53
Non-authoritative answer:
Name: dc2-root.DomainB.local
Address: 10.10.10.81
nslookup 10.10.10.81
nslookup 10.10.10.81
Server: 10.100.10.213
Address: 10.100.10.213#53
Non-authoritative answer:
81.10.10.10.in-addr.arpa name = <Incorrect FQDN>.
Authoritative answers can be found from: