Attempts to log in to vCenter Server through a PingFederate federation setup may fail with the following error:Access Denied. Unable to Authenticate the User
The login failure occurs during the OIDC authentication flow between vCenter and PingFederate, preventing users from being authorized.
User login attempt fails with Access Denied.
UI displays Access Denied. Unable to Authenticate the User
vCenter Server 8.x
vCenter configured with Identity Federation using PingFederate
Federation handled by vc-ws1a-broker
service
The vc-ws1a-broker service relies on a Java keystore to validate certificates.
If the PingFederate server’s signing certificate chain is missing from the keystore, federation requests cannot be validated.
This leads to OIDC token validation failure and results in the access_denied
error.
To resolve the issue, import the PingFederate certificate chain into the Java keystore used by the vc-ws1a-broker service:
Locate the JRE used by vc-ws1a-broker:/storage/containers/vc-ws1a-broker/<container-hash>/rootfs/usr/local/jre-<version>/
Export the path to use the correct keytool binary:export PATH=/storage/containers/vc-ws1a-broker/<container-hash>/rootfs/usr/local/jre-<version>/bin:$PATH
which keytool
keytool -importcert -alias ping-dev -file <path-to-chain.crt> \
-keystore /storage/containers/vc-ws1a-broker/<container-hash>/rootfs/usr/local/jre-<version>/lib/security/cacerts \
-storepass changeit
service-control --restart vc-ws1a-broker
Ensure the entire certificate chain (leaf + intermediate + root CA) is imported; otherwise, validation may still fail.
If the environment uses custom CA-signed certificates for PingFederate, verify that the chain is complete and valid.
For details on vCenter Identity Federation and supported IdPs, see:
If issues persist, open a case with Broadcom VMware Technical Support and provide:
Federation logs from /var/log/vmware/vc-ws1a-broker/federation-service.log
Details of the imported certificates