When attempting to configure Integrated Windows Authentication (IWA) or Active Directory (AD) over LDAPS as an identity source in VMware vCenter Server, the following errors may occur:
opt/likewise/bin/domainjoin-cli join <ad-domain> <ad-username>
KRB5KDC_ERR_CLIENT_REVOKED: Clients credentials have been revoked
opt/likewise/bin/domainjoin-cli join <ad-domain> <ad-username>
Error: NERR_DCNotFound code 0x00000995
These errors prevent successful addition of the AD identity source and block AD user logins to vCenter Server, resulting in authentication failures.
VMware vCenter Server
The errors occur due to insufficient permissions in the Active Directory environment, which prevent the successful execution of the domainjoin-cli join command or the addition of the AD identity source through the vSphere Client. Common causes include:
To resolve the issue, follow these steps:
Step 1: Involve the AD Team
Engage your organization's Active Directory (AD) team and request the following checks:
• Verify that the AD user account is active, not locked or expired.
• Ensure that the user account used to join the domain has the required permissions to:
Step 2: Validate Permissions
• Confirm that the account has “Create Computer Objects” and “Read/Write” permissions within the target OU.
• For more restrictive environments, ensure delegated control is explicitly assigned to the joining user account.
Step 3: Retry Adding the AD Identity Source:
• These errors can occur even if network connectivity and port requirements (e.g., TCP 636 for LDAPS) are fully satisfied.
To test basic LDAP connectivity:curl -v telnet://<AD-Domain-Controller>:636
• For environments with firewall restrictions, validate that all required ports for domain join and SSO authentication are open.