Installing VMware vCenter Converter Standalone fails with the error: Insufficient permissions to connect to IP_Address
search cancel

Installing VMware vCenter Converter Standalone fails with the error: Insufficient permissions to connect to IP_Address

book

Article ID: 316578

calendar_today

Updated On:

Products

VMware vSphere ESXi

Issue/Introduction

Symptoms:

  • Cannot install VMware vCenter Converter Standalone
  • Installing vCenter Converter Standalone fails
  • You see the error:
    • Insufficient permissions to connect to IP_Address 

    • Permission Denied after selecting Ignore SSL error or clicking View Source Details

  • The source machine is running Windows 2008, Windows Vista, Windows 7, or Windows 11



Environment

VMware vCenter Converter Standalone 4.0.x
VMware vCenter Converter Standalone 4.3.x
VMware vCenter Converter Standalone 6.0.x

Cause

This issue occurs if User Account Control (UAC) is enabled while you are trying to install the Converter Standalone Agent on the source machine.  

Resolution

To resolve this issue, log in to the Windows machine as the local administrator and disable UAC.

To disable UAC on Windows Vista or Windows 2008:
 
  1. Open Control Panel.
  2. Click User Accounts.
  3. In User Accounts window, click User Accounts.
  4. In the User Accounts tasks window, click Turn User Account Control on or off. If UAC is configured, you see a message.
  5. Click Continue.
  6. Deselect the Use User Account Control (UAC) to help protect your computer option and then click OK.
  7. Restart the system for the changes to take effect.
To disable UAC on Windows 7 or Windows 2008 R2:
 
  1. Open Control Panel.
  2. Click User Accounts.
  3. In the User Accounts window, click User Accounts.
  4. In the User Accounts tasks window, click Change User Account Control settings.
  5. Drag the slider in the next window to Never notify.
  6. Restart the system for changes to take effect.
To disable UAC on Windows 10 follow the below steps:
  1. Type control panel in the search bar of Windows 10 and click this app in the result to open it.
  2. Go to User Accounts > Change User Account Control settings.
  3. Drag the slider control to Never notify
  4. Click OK to apply the change.
If after disabling UAC and the issue is still present, perform the following:
  1. Run gpedit.msc
  2. Computer Configuration
  3. Windows Settings
  4. Security Settings
  5. Local Policies
  6. Security Option
  7. Network Access:Ssharing and security model for local accounts
  8. Change setting to "Classic - local users authenticate as themselves." 
To disable UAC on Windows 10 follow the below steps:
Step 1: Access Group Policy Management Console

Open GPMC by searching for “Group Policy Management” in the Start menu or by executing gpmc.msc.

Step 2: Create or Edit a Group Policy Object
    • To create a new GPO, right-click on the desired domain or OU and select “Create a GPO in this domain, and Link it here…”.
    • To modify an existing GPO, locate it under the appropriate domain or OU, right-click on it, and choose “Edit”.
Step 3: Navigate to UAC Settings

In the Group Policy Management Editor, go to: Computer Configuration → Policies → Windows Settings → Security Settings → Local Policies → Security Options.

Step 4: Configure UAC Policy
    • Locate and open the policy “User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode”.
    • Set this policy to “Prompt for consent” or “Prompt for credentials” based on your organizational security policy.
      • Prompt for consent: This option will prompt administrators to approve elevation requests without entering a password.
      • Prompt for credentials: This requires administrators to enter their credentials to approve elevation requests.
Step 5: Apply and Enforce the GPO
    • Click “OK” or “Apply” to enforce the new settings.
    • Link the GPO to the relevant OU(s).
    • The policy will be applied at the next Group Policy refresh cycle. To apply it immediately, use gpupdate /force on the client machines.

Advanced Configuration and Use Cases

      1. High-Security Environments: In environments where security is paramount, such as in financial or government sectors, enforcing admin approval for UAC can significantly enhance security.
      2. Compliance and Regulatory Standards: Certain regulatory frameworks may require stringent user account control settings. This configuration can help in meeting those compliance standards.
      3. Different Policies for Different User Groups: You might need more stringent UAC settings for users with access to sensitive data, while others may have standard settings.

Additional Information

Security Considerations

  • Balancing Security and Usability:
    • Ensure that UAC settings do not hinder productivity. Overly aggressive UAC prompts can lead to ‘click fatigue’, causing users to approve prompts without proper scrutiny.
  • Regular Policy Review:
    • Continually evaluate the effectiveness of the UAC settings and make adjustments as needed to align with evolving security practices and organizational needs.