This article provides steps to enable the use of Active Directory accounts to open SSH sessions on ESXi 6.5 and 6.7 using the domainjoin-cli command.
Symptoms:
[YYYY-MM-DDTHH:MM:SS] warning hostd[2100215] [Originator@6876 sub=Default opID=esxui-dd22-0d56] Rejected password for user domain\user from ##.##.##.##
[YYYY-MM-DDTHH:MM:SS] info hostd[2100215] [Originator@6876 sub=Vimsvc.ha-eventmgr opID=esxui-dd22-0d56] Event 262 : Cannot login domain\user@##.##.##.##
[YYYY-MM-DDTHH:MM:SS] info hostd[2100565] [Originator@6876 sub=Solo.Vmomi] Throw vim.fault.InvalidLogin
VMware vSphere ESXi 6.5
VMware vSphere ESXi 6.7
To join the ESXi host to Active Directory and to enable AD users to log in using SSH:
# esxcli network firewall ruleset set --enabled true --ruleset-id=activeDirectoryAll
likewise
service by running:
# /etc/init.d/lwsmd start
# /usr/lib/vmware/likewise/bin/domainjoin-cli join <domain-fqdn> <AD_admin_username>
#%PAM-1.0 auth sufficient /lib/security/$ISA/pam_lsass.so smartcard_prompt auth sufficient /lib/security/$ISA/pam_unix.so try_first_pass likeauth nullok auth required /lib/security/$ISA/pam_deny.so account sufficient /lib/security/$ISA/pam_lsass.so smartcard_prompt account sufficient /lib/security/$ISA/pam_unix.so account required /lib/security/$ISA/pam_deny.so session sufficient /lib/security/$ISA/pam_unix.so session required /lib/security/$ISA/pam_deny.so
Warning: VMware recommends using the UI when adding ESXi hosts to a domain to prevent configuration issues.