Users are unable to log in to the vCenter Server vSphere Client using Active Directory (AD) credentials. Logins using local SSO accounts (e.g., [email protected]) continue to work.
This issue commonly occurs after the SSL certificate on the external Active Directory Load Balancer or Domain Controller (the LDAPS provider) has been renewed or changed.
vCenter's Single Sign-On (SSO) component caches the certificate from the LDAPS provider (e.g., your Active Directory Load Balancer) to build a secure trust.
When your AD LB certificate is renewed, vCenter is still configured with the old, cached certificate. This no longer matches the new certificate presented by the LB. This trust mismatch causes the secure LDAPS connection to fail, and as a result, all Active Directory logins stop working.
The solution is to update the existing Identity Source configuration in vCenter with the new certificate. This requires you to log in using a local SSO administrator account (like [email protected]).
After saving, Active Directory logins should be restored immediately.
If the "Edit" method does not resolve the issue, you can remove and re-add the identity source.
Warning: Before removing the identity source, take screenshots of all its settings (Primary server URL, Base DN for users, Base DN for groups, etc.). You will also need to re-add your AD groups to vCenter roles (under "Global Permissions" or other objects) after re-adding the source.