~ # kubectl-vsphere login --server <IP_Address> --insecure-skip-tls-verify --tanzu-kubernetes-cluster-namespace intl -u <[email protected]> --tanzu-kubernetes-cluster-name <cluster_name>
Password:
ERRO[0004] invalid or missing credentials
YYYY-MM-DDTHH:MM:SS.Z WARN websso[82:tomcat-http--44] [CorId=d######-####-####-####-########4] [com.vmware.identity.idm.server.ServerUtils] cannot bind connection: [ldap://######@domainname, CN=Username\\,user.id,CN=Users,DC=corp,DC=domain,DC=com]YYYY-MM-DDTHH:MM:SS.Z INFO websso[82:tomcat-http--44] [CorId=d######-####-####-####-########4] [com.vmware.identity.diagnostics.VmEventAppender] EventLog: source=[VMware Identity Server], tenant=[vsphere.local], eventid=[USER NAME PWD AUTH FAILED], category=[VMEVENT_CATEGORY_STS], text=[Failed to authenticate principal [username @domain.com]. Login failed], detailText=[Login failed], correlationId=[d######-####-####-####-########4], timestamp=[1757400051669]YYYY-MM-DDTHH:MM:SS.Z INFO websso[82:tomcat-http--44] [CorId=d######-####-####-####-########4] [com.vmware.identity.idm.server.IdentityManager] Authentication failed for user [username @domain.com] in tenant [vsphere.local] in [411] milliseconds with provider [domain.com] of type [com.vmware.identity.idm.server.provider.ldap.LdapWithAdMappingsProvider]YYYY-MM-DDTHH:MM:SS.Z ERROR websso[82:tomcat-http--44] [CorId=d######-####-####-####-########4] [com.vmware.identity.samlservice.impl.SAMLAuthnResponseSender] Responded with ERROR 401 message Invalid credentialsYYYY-MM-DDTHH:MM:SS.Z INFO websso[82:tomcat-http--44] [CorId=d######-####-####-####-########4] [com.vmware.identity.BaseSsoController] End processing. Session not created.
vSphere with Tanzu
VMware vCenter Server
vCenter login with AD users fails because the secure channel (trust) between vCenter’s machine account and Active Directory is broken, most often due to password sync issues, time skew, or DNS failures.
To resolve this issue, take a snapshot of the VCSA VM and the disjoin and re-join VC to the active directory domain by following below
You should successfully be able to login with the AD accounts to both vCenter and the k8s guest clusters via jumphost.