When attempting to add or configure an Identity Source in vSphere, you encounter an error stating - "Check the network settings and make sure you have network access to the identity source"
[URI: ldaps://AD1-server:636]; tenantName [vsphere.local], userName [[email protected]]
Caused by: Can't contact LDAP server.
800Z ERROR ssoAdminServer[146:pool-2-thread-45] [OpId=mdsrlbks-######-auto-gfc-h5:########] [com.vmware.identity.interop.ldap.SslX509EqualityMatchVerificationCallback] Server SSL certificate verification failed for [Subject: ] [SHA1 Fingerprint: ####-#####]##-######-####-####-##-########}].: No match found in the trusted certificates store.WARN ssoAdminServer[146:pool-2-thread-45] [OpId=mdsrlbks-#####-auto-gfc-h5:#######] [com.vmware.identity.interop.ldap.LdapErrorChecker] Error received by LDAP client: com.vmware.identity.interop.ldap.OpenLdapClientLibrary, error code: -1
Cannot establish connection with url: ldaps://<AD1-server:636>
msZ tomcat-http--29 vsphere.local da18bc82-65c3-46c2-b5b0-6ee554d9d030 ERROR com.vmware.identity.idm.server.provider.ldap.LdapWithAdMappingsProvider] Failed to retrieve upnSuffixes in AD over LDAP provider '<example.com>'msZ tomcat-http--50 vsphere.local 5f44813d-fb70-4f4e-9b0c-d7d3ce7ae66f ERROR com.vmware.identity.interop.ldap.SslX509EqualityMatchVerificationCallback] Server SSL certificate verification failed for [Subject: ] [SHA1 Fingerprint: ##:##:##:##:##:##:##:##:##:##:##:##:##:##:##:##:##:##:##:##].: No match found in the trusted certificates store.msZ tomcat-http--50 vsphere.local 5f44813d-fb70-4f4e-9b0c-d7d3ce7ae66f ERROR com.vmware.identity.interop.ldap.OpenLdapClientLibrary] Server SSL certificate not trusted; bytes:msZ INFO websso[46:tomcat-http--8] [CorId=20d483c5-b45c-4ca1-8b10-72dc5eef####] [com.vmware.identity.diagnostics.VmEventAppender] EventLog: source=[VMware Identity Server], tenant=[vsphere.local], eventid=[USER_NAME_PWD_AUTH_FAILED], level=[ERROR], category=[VMEVENT_CATEGORY_STS], text=[Failed to authenticate principal [domain\\AD_user]. Access denied], detailText=[Access denied], corelationId=[20d483c5-b45c-4ca1-8b10-72dc5eef####], timestamp=[####493980814]msZ ERROR websso[46:tomcat-http--8] [CorId=20d483c5-b45c-4ca1-8b10-72dc5eef####] [com.vmware.identity.idm.server.IdentityManager] Failed to authenticate principal [domain\\AD_user]. Access deniedcom.vmware.identity.idm.IDMLoginException: Access denied
msZ INFO websso[46:tomcat-http--8] [CorId=20d483c5-b45c-4ca1-8b10-72dc5eef####] [com.vmware.identity.samlservice.impl.SAMLAuthnResponseSender] Responded with ERROR 401 message Invalid credentials...77193\n\n\n[5]: ObjectId: 1.3.6.1.5.#.#.#.# Criticality=false\nAuthorityInfoAccess [\n [\n accessMethod: caIssuers\n accessLocation: URIName: http://pki.domain.name/CertEnroll/IssuingCA.crt\n, \n accessMethod: caIssuers\n accessLocation: URIName: ldap:///CN=IssuingCA,CN=XYZ,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=name?cACertificate?base?objectClass=certificationAuthority\n]\n]\n\n[6]: ObjectId: 2.5.#.# Criticality=false\nAuthorityKeyIdentifier [\nKeyIdentifier [\n0000: 555 25 71 F1 ## ## ## ## ## ## ## ## F8 7C 18 F9 U%q..w..<.......\n0010: E3 0E ## ## ..&l\n]\n]\n\n[7]: ObjectId: 2.5.#.# Criticality=false\nExtendedKeyUsages [\n 1.3.6.1.5.2.#.#\n serverAuth\n clientAuth\n]\n\n[8]: ObjectId: 2.5.29.15 Criticality=true\nKeyUsage [\n DigitalSignature\n Key_Encipherment\n]\n\n[9]: ObjectId: 2.5.#.# Criticality=false\nSubjectAlternativeName [\n Other-Name: Unrecognized ObjectIdentifier: 1.3.6.1.4.1.311.#.#\n DNSName: FQDN_DC\n]\n\n[10]: ObjectId: 2.5.#.# Criticality=false\nSubjectKeyIdentifier [\nKeyIdentifier [\n0000: 06 16 7F EE ## ## ## ## ## ## ## ## 97 D2 32 9E ......N...df..2.\n0010: XX C4 1F XX ....\n]\n]\n\nUnparseable certificate extensions: 1\n[1]: ObjectId: 2.5.#.# Criticality=false\nUnparseable CRLDistributionPoints extension due to\njava.io.IOException: invalid URI name:ldap:///CN=IssuingCA,CN=01#####1EFGWIN####,CN=EFG,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=domain,DC=name?certificateRevocationList?base?objectClass=cRLDistributionPoint \n\n0000....security.SignatureException: Signature does not match.
msZ ERROR websso[44:tomcat-http--6] [CorId=367d6ff7-4a18-479d-a9cb-d5a9c797####] [com.vmware.identity.interop.ldap.OpenLdapClientLibrary] Server SSL certificate not trusted: Subject (CN=Shortname_DC,OU=Domain Controllers,DC=example,DC=com)msZ WARN websso[44:tomcat-http--6] [CorId=367d6ff7-4a18-479d-a9cb-d5a9c797####] [com.vmware.identity.interop.ldap.LdapErrorChecker] Error received by LDAP client: com.vmware.identity.interop.ldap.OpenLdapClientLibrary, error code: -1msZ WARN websso[44:tomcat-http--6] [CorId=367d6ff7-4a18-479d-a9cb-d5a9c797####] [com.vmware.identity.idm.server.ServerUtils] cannotbind connection: [ldaps://FQDN_DC:636, [email protected]]msZ ERROR websso[44:tomcat-http--6] [CorId=367d6ff7-4a18-479d-a9cb-d5a9c797####] [com.vmware.identity.idm.server.ServerUtils] cannot establish ldap connection with URI: [ldaps://FQDN_DC:636] because [com.vmware.identity.interop.ldap.ServerDownLdapException] with reason [Can't contact LDAP server] therefore will try to attempt to use secondary URIs, if applicablemsZ ERROR websso[44:tomcat-http--6] [CorId=367d6ff7-4a18-479d-a9cb-d5a9c797####] [com.vmware.identity.idm.server.provider.BaseLdapProvider] com.vmware.identity.interop.ldap.ServerDownLdapException: Can't contact LDAP server\nLDAP error [code: -1]msZ ERROR websso[44:tomcat-http--6] [CorId=367d6ff7-4a18-479d-a9cb-d5a9c797####] [com.vmware.identity.idm.server.IdentityManager] Failed to checkUserAccountFlags principal [domain\\AD_user] for tenant [vsphere.local]msZ INFO websso[44:tomcat-http--6] [CorId=367d6ff7-4a18-479d-a9cb-d5a9c797####] [com.vmware.identity.diagnostics.VmEventAppender] EventLog: source=[VMware Identity Server], tenant=[vsphere.local], eventid=[USER_NAME_PWD_AUTH_FAILED], level=[ERROR], category=[VMEVENT_CATEGORY_STS], text=[Failed to authenticate principal [domain\\AD_user]. Login failed], detailText=[Login failed], corelationId=[367d6ff7-4a18-479d-a9cb-d5a9c797####], timestamp=[####491805838]msZ ERROR websso[44:tomcat-http--6] [CorId=367d6ff7-4a18-479d-a9cb-d5a9c797####] [com.vmware.identity.idm.server.IdentityManager] Failed to authenticate principal [domain\\AD_user]. Login failedjavax.security.auth.login.LoginException: Login failed
String[170]\n\n\njava.security.SignatureException: Certificate does not verify with supplied key[timestamp] ERROR ssoAdminServer[134]####-#-######-## [####-#####]##-######-####-####-##-######## [com.vmware.identity.interop.ldap.OpenLdapClientLibrary] Server SSL certificate not trusted: Subject (CN=##-######-####-####-##-########)[timestamp] WARN ssoAdminServer[134]####-#-######-## [####-#####]##-######-####-####-##-######## [com.vmware.identity.interop.ldap.LdapErrorChecker] Error received by LDAP client: com.vmware.identity.interop.ldap.OpenLdapClientLibrary, error code: -1[timestamp] WARN ssoAdminServer[134]####-#-######-## [####-#####]##-######-####-####-##-######## [com.vmware.identity.ldap.server.ServerUtils]cannot bind connections: [ldaps://#####-####-####-##-########, CN=###-####-#####,OU=Service Accounts,OU=###,DC=###,DC=###,DC=###,DC=###][timestamp] ERROR ssoAdminServer[134]####-#-######-## [####-#####]##-######-####-####-##-######## [com.vmware.identity.ldap.server.ServerUtils]cannot establish ldap connection with URI: [ldaps://#####-####-####-##-########] because [com.vmware.identity.interop.ldap.ServerDownLdapException]: withreason [Can't contact LDAP server] therefore will try to attempt to use secondary URIs, if applicable[timestamp] WARN ssoAdminServer[134]####-#-######-## [####-#####]##-######-####-####-##-######## [com.vmware.identity.Idm.server.IdentityManager] Failed to probe provider connectivity [URI: ldaps://#####-####-####-##-######## /] tenantName [vsphere.local], userName [CN=###-####-#####,OU=Service
When comparing the /var/log/vmware/sso/websso.log file entries with the output of the /opt/vmware/bin/sso-config.sh -get_identity_sources command, AD over LDAPS issuer certificates were found to have differing validity periods.
msZ error vpxd[04839] [Originator@6876 sub=User opID=########] Failed to authenticate user <[email protected]>
An expired Active Directory certificate is currently preventing vCenter Server from establishing a connection with the AD server.
To resolve the issue, follow the steps below.
openssl s_client -connect <domain controller>:636 -showcerts
-----BEGIN CERTIFICATE-----
MIIFyjCCBLKgAwIBAgIKYURFHAAAAAAA
BDANBgkqhkiG9w0BADSHDFSJnjdwEQYK
..........snip..........
TmqX6mnsaxcjushyuVGYHGVBJKNW5Z5L
hYZhHKsf9CmZa12j/ODfznFtAgbPNw==
-----END CERTIFICATE-----
Note: If you have an existing Identity Source with the same name, you will not be able to add both at the same time