YYYY-MM-DDTHH:MM:SS.824+0300 ERROR [common,d35bff1c456a4b5d,f0e8] [c.v.e.s.e.h.LocalizableRuntimeExceptionHandler,http-nio-127.0.0.1-7100-exec-68] [RR02NT] IDENTITY_PROVIDER_BAD_REQUEST Identity Bad requestcom.vmware.evo.sddc.identity.rest.api.error.IdentityProviderBadRequestException: Identity Bad request at com.vmware.evo.sddc.identity.rest.api.controller.v1.IdentityProviderController.addEmbeddedIdentitySource(IdentityProviderController.java:159) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43).. at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:63) at java.base/java.lang.Thread.run(Thread.java:840)Caused by: com.vmware.vim.sso.admin.exception.DirectoryServiceConnectionException: Failed to probe provider connectivity [URI: ldap://IPofLDAPServer:389 ]; tenantName [vsphere.local], userName [ssuc\svcadmin]Caused by: Strong(er) authentication required at com.vmware.vim.sso.admin.client.vmomi.impl.VmomiClientCommand.execute(VmomiClientCommand.java:147) at com.vmware.vim.sso.admin.client.vmomi.impl.VmomiClientCommand.executeEnsuringDomainErrorIs(VmomiClientCommand.java:248) at com.vmware.vim.sso.admin.client.vmomi.impl.IdentitySourceManagementImpl.registerLdap(IdentitySourceManagementImpl.java:98) at com.vmware.evo.sddc.identity.services.IdentityProviderServiceImpl.addEmbeddedIdentitySource(IdentityProviderServiceImpl.java:986)VMware Cloud Foundation 5.2
The "Strong(er) authentication required is a direct error message originating from the Active Directory server, it explicitly signifies that the Active Directory server demands a stronger authentication method. Given that we are trying to configure SDDC manager for "Active Directory over LDAP" (which typically implies an unencrypted, non-SSL/TLS LDAP connection), this error directly indicates a mismatch between the SDDC manager's client-side authentication method and the Active Directory server's enforced security policies https://support.microsoft.com/en-us/topic/2020-2023-and-2024-ldap-channel-binding-and-ldap-signing-requirements-for-windows-kb4520412-ef185fb8-00f7-167d-744c-f299a66fc00a
Change the domain controller setting as following to use LDAP:
Computer Configuration > Policies > Security Settings > Local Policies > Security Options.
Domain controller: LDAP server channel binding token requirements – “When Supported”
Domain controller: LDAP server signing requirements – “None”
Domain controller: LDAP server signing requirements Enforcement – “Disabled”
Network security: LDAP client encryption requirements – “Negotiate Sealing”
Network security: LDAP client signing requirements – “Negotiate Signing”
Once configured, reboot the AD server and then add the Identity provider in SDDC manager.