Access Denied when using AD user to login to NSX manager after upgrade to 4.2.1
search cancel

Access Denied when using AD user to login to NSX manager after upgrade to 4.2.1

book

Article ID: 410521

calendar_today

Updated On:

Products

VMware NSX

Issue/Introduction

  • After upgrading the local managers to to 4.2.1 or above, the Active Directory (AD) users face authentication error.
  • AD users cannot log in to any NSX manager. The authentication with the Local User (Admin) works fine.
  • The Access Denied page URL displays error message code:
    ErrorMessageCode=noroles
  • When the role binding is applied directly to the user, the login works fine.
  • However, when role bindings are assigned to an LDAP group (the user is a member of), the login results in an authorization error and the below could be observed in the logs:

    root@NSX-Manager: /var/log# tail -f syslog | grep -i username 
    2024-12-24T10:10:10.974Z NSX-Manager.domain.local NSX 76567 SYSTEM [nsx@6868 comp="nsx-manager" errorCode="MP401" level="ERROR" subcomp="manager"] User [email protected] with groups [] and incoming roles null is not authorized to access API with rbac_feature utilities_backup having required_permission read.

 

Environment

VMware NSX

Resolution

Delete and re-add the LDAP integration using the UI

  1. Go to System -> User Management -> Authentication Providers
  2. Add it again.

Note: Use the same name for the LDAP integration to avoid having to re-add the AD groups.

Additional Information