VCF SSO fails to display all users that are members of a AD group.
Although the AD groups are successfully added to the 'Group Provisioning' configuration, only a subset of users from the group appear in VCF SSO user list.
/var/log/vmware/vc-ws1a-broker/usergroup-service.log:
YYYY-MMM-DDThh:mm:ss INFO <VC-PNID>:usergroup (dirsynclib-Sync-Task-596) [;;;;] com.vmware.vidm.dirsynclib.sync.directory.modelaction.impl.GroupMembersAction -Retrieved 2 groups from AD. 2 groups to be synced after transformationYYYY-MMM-DDThh:mm:ss INFO <VC-PNID>:usergroup (dirsynclib-Sync-Task-596) [;;;;] com.vmware.vidm.dirsynclib.sync.directory.modelaction.impl.GroupMembersAction - Sync in batches: Starting to pull data from the AD with paged controls.YYYY-MMM-DDThh:mm:ss INFO <VC-PNID>:usergroup (dirsynclib-Sync-Task-596) [;;;;] com.vmware.vidm.dirsynclib.datastore.transformers.request.LdapGenericObjectRequestTransformer - Result ldap filter:(&(&(objectClass=user)(objectCategory=person))(|(memberOf=CN=VC- Users,CN=Users,DC=domain,DC=com)(memberOf=CN=VC-Admins,CN=Users,DC=domain,DC=com)))
ldapsearch -x -H "ldaps://<Domain-controller>:3269" -D "[email protected]" -W -b "DC=domain,DC=com" "(&(&(objectClass=user)(objectCategory=person))(|(memberOf=CN=VCUsers,CN=Users,DC=domain,DC=com)(memberOf=CN=VCAdmins,CN=Users,DC=domain,DC=com)))" userPrincipalName
VCF 9.x
The issue is caused by insufficient read permissions assigned to the bind user account configured for AD/LDAP synchronization in VCF SSO.
Use a bind user account with sufficient Active Directory privileges so that VCF SSO can properly enumerate and retrieve all required AD users during configuration.
Engage your Active Directory team to review and confirm that the bind user account used for SSO configuration has the necessary permissions.