"Cannot configure identity source due to Failed to probe provider connectivity [URI:ldaps://<LDAP_Server_or_DC_FQDN/IP>:636 ]; tenantName [###.###], userName [cn=###,dc=###,dc=###] Caused by: Can't contact LDAP server"/var/log/vmware/sso/ssoAdminServer.log on the vCenter Server indicate an inability to establish proper communication with the LDAP server:YYYY-MM-DDThh:mm:ss INFO ssoAdminServer[##:pool-#-thread-#] [OpId=###-###-###] [auditlogger] {\"user\":\"<vsphere_user>@<local_sso>\",\"client\":\"\",\"timestamp\":\"#####\",\"description\":\"Updating ldap identity source '<domain>:' details to...YYYY-MM-DDThh:mm:ss WARN ssoAdminServer[##:pool-#-thread-#] [OpId=###-###-###] [com.vmware.identity.idm.server.ServerUtils] cannot bind connection: [ldaps://<LDAP_Server_or_DC_FQDN/IP>:636,<domainUser>@<domain>]YYYY-MM-DDThh:mm:ss ERROR ssoAdminServer[##:pool-#-thread-#] [OpId=###-###-###] [com.vmware.identity.idm.server.ServerUtils] cannot establish ldap connection with URI: [ldaps://<LDAP_Server_or_DC_FQDN/IP>:636] because [com.vmware.identity.interop.ldap.ServerDownLdapException] with reason [Can't contact LDAP server] therefore will try to attempt to use secondary URIs, if applicableYYYY-MM-DDThh:mm:ss WARN ssoAdminServer[##:pool-#-thread-#] [OpId=###-###-###] [com.vmware.identity.idm.server.IdentityManager] Failed to probe provider connectivity [URI: ldaps://<LDAP_Server_or_DC_FQDN/IP>:636 ]; tenantName [<local_sso>], userName [<domainUser>@<domain>]YYYY-MM-DDThh:mm:ss ERROR ssoAdminServer[##:pool-#-thread-#] [OpId=###-###-###] [com.vmware.identity.idm.server.ServerUtils] Exception 'com.vmware.identity.idm.IDMLoginException: Failed to probe provider connectivity [URI: ldaps://<LDAP_Server_or_DC_FQDN/IP>:636 ]; tenantName [<local_sso>], userName <domainUser>@<domain>]'YYYY-MM-DDThh:mm:ss ERROR ssoAdminServer[##:pool-#-thread-#] [OpId=###-###-###] [com.vmware.identity.admin.server.ims.impl.IdentitySourceManagementImpl] Failed to probe provider connectivity [URI: ldaps://<LDAP_Server_or_DC_FQDN/IP>:636 ]; tenantName [<local_sso>], userName [<domainUser>@<domain>]YYYY-MM-DDThh:mm:ss INFO ssoAdminServer[##:pool-#-thread-#] [OpId=###-###-###] [com.vmware.identity.admin.vlsi.IdentitySourceManagementServiceImpl] Failed to probe provider connectivity [URI: ldaps://<LDAP_Server_or_DC_FQDN/IP>:636 ]; tenantName [<local_sso>], userName [<domainUser>@<domain>]
root@<vcenter> [ ~ ]# nslookup <AD_server_fqdn/domain>Server: <DNS_server_fqdn>Address: <DNS_server_IP>Name: <AD_server_fqdn/domain>Address: <AD_server/domaincontroller_IP>
root@<vcenter> [ ~ ]# nslookup <AD_server/domaincontroller_IP>Server: <DNS_server_fqdn>Address: <DNS_server_IP><AD_server/domaincontroller_IP>.in-addr.arpa name = <AD_server_fqdn/domain>
openssl command from the vCenter Server shows the LDAP server certificates are not reaching the vCenter despite and LDAPS port 636 being open:root@<vcenter> [ ~ ]# openssl s_client -connect <AD_server/domaincontroller_fqdn_or_IP>:636 -showcertsCONNECTED(00000003) write:errno=104 --- no peer certificate available --- No client certificate CA names sent --- SSL handshake has read 0 bytes and written 314 bytes Verification: OKopenssl query from an alternate node (e.g., another vCenter Server or a client in a different network segment) where in the certificate chain is received by the client node confirming that the LDAP service is functioning correctly:root@alternate-node [ ~ ]# openssl s_client -connect <AD_server/domaincontroller_fqdn_or_IP>:636 -showcertsCONNECTED(00000003)depth=1 DC = ####### CN = #####verify return:1---Certificate chain0 s:CN = ####### i:DC = #######, CN = #######---This issue can occur when vCenter server is not receiving the LDAPs server certificates to establish a proper communication which can be further verified by executing a packet capture on the vCenter Server for port 636 to verify the traffic behavior using the following command:
tcpdump -i eth0 -w /tmp/ldap_trace.pcap port 636
Reviewing the packet capture and filtering by the LDAP server IP address would show that the vCenter Server sends the Client Hello but does not receive a Server Hello or associated certificates.
This is not a Broadcom issue as it is environmental and falls outside the vSphere stack.
Engage your network administration team to investigate every hop and resolve packet blockage or packet size limitations due to firewall, etc on the network path between the Domain Controller and the vCenter Server.