After the LDAP/LDAPS certificate on the Active Directory servers is updated, VMware Cloud Director is unable to authenticate users using LDAP credentials. All LDAP-based authentication attempts fail, while local and system administrator logins continue to function normally.
Administrators observes the following symptoms:
VMware Cloud Director 10.6.1
This issue occurs when the LDAP/LDAPS certificate on the Active Directory server is updated but the new root and/or intermediate CA certificates are not imported into the VMware Cloud Director trusted store.
VMware Cloud Director requires the full certificate chain to be trusted for LDAPS communication. If the updated certificate chain is missing in VCD's trust store, SSL handshake validation fails, leading to LDAP bind and synchronization failures.
To resolve the issue, import the updated LDAP certificate chain (Root and Intermediate CA certificates) into VMware Cloud Director and validate LDAP connectivity.
Export the Root CA and Intermediate CA certificates used to sign the LDAP server‘s certificate.
Ensure the certificates are saved in PEM (.pem) format.
Log in to the VCD provider portal as a System Administrator, then:
Navigate to:
Administration → Certificates → Trusted Certificates
Click Import
Upload the Root and Intermediate CA PEM files
After upload, ensure they are trusted in the interface
Navigate to:
Administration → Settings → LDAP
Click Test LDAP Connection
Ensure the test completes successfully
Re-run LDAP synchronization
Verify that the process completes without errors
For detailed steps, refer to VMware Cloud Director documentation:
Import Trusted Certificates in VCD
SSL Certificate Creation and Management of Your VMware Cloud Director Appliance
Edit, Test, and Synchronize LDAP Connection
https://techdocs.broadcom.com/us/en/vmware-cis/cloud-director/vmware-cloud-director/10-6/edit-test-and-synchronize-an-ldap-connection-in-your-vcd.html