/var/log/vmware/sso/websso.log/websso.log
[YYYY-MM-DD]T[HH:MM:SS.SSS]Z INFO websso[63:tomcat-http--17] [CorId=5b310f07-xxxx-xxxx-xxxx-240e59dce92b] [com.vmware.identity.diagnostics.VmEventAppender] EventLog: source=[VMware Identity Server], tenant=[vsphere.local], eventid=[USER_NAME_PWD_AUTH_FAILED], level=[ERROR], category=[VMEVENT_CATEGORY_STS], text=[Failed to authenticate principal [<USER>@<DOMAIN>]. Login failed], detailText=[Login failed], corelationId=[5b310f07-xxxx-xxxx-xxxx-240e59dce92b], timestamp=[xxxxxxxxxxxxx]
[YYYY-MM-DD]T[HH:MM:SS.SSS]Z ERROR websso[63:tomcat-http--17] [CorId=5b310f07-xxxx-xxxx-xxxx-240e59dce92b] [com.vmware.identity.idm.server.IdentityManager] Failed to authenticate principal [<USER>@<DOMAIN>]. Login failed
[YYYY-MM-DD]T[HH:MM:SS.SSS]Z ERROR websso[63:tomcat-http--17] [CorId=5b310f07-xxxx-xxxx-xxxx-240e59dce92b] [com.vmware.identity.interop.ldap.OpenLdapClientLibrary] Server SSL certificate not trusted: Subject (CN=<DC-NAME>.<DOMAIN>)
[YYYY-MM-DD]T[HH:MM:SS.SSS]Z ERROR websso[63:tomcat-http--17] [CorId=5b310f07-xxxx-xxxx-xxxx-240e59dce92b] [com.vmware.identity.idm.server.ServerUtils] cannot establish ldap connection with URI: [ldaps://<DOMAIN>] because [com.vmware.identity.interop.ldap.ServerDownLdapException] with reason [Can't contact LDAP server] therefore will try to attempt to use secondary URIs, if applicable
[YYYY-MM-DD]T[HH:MM:SS.SSS]Z ERROR websso[63:tomcat-http--17] [CorId=5b310f07-xxxx-xxxx-xxxx-240e59dce92b] [com.vmware.identity.idm.server.provider.BaseLdapProvider] com.vmware.identity.interop.ldap.ServerDownLdapException: Can't contact LDAP server\nLDAP error [code: -1]
[YYYY-MM-DD]T[HH:MM:SS.SSS]Z ERROR websso[63:tomcat-http--17] [CorId=5b310f07-xxxx-xxxx-xxxx-240e59dce92b] [com.vmware.identity.idm.server.IdentityManager] Failed to authenticate principal [<USER>@<DOMAIN>]. Login failed javax.security.auth.login.LoginException: Login failed
VMware vCenter Server 8.x
The issue was caused by inconsistent SSL certificate trust across Active Directory domain controllers used for LDAPS authentication.
Follow below action plan to address the issue -
openssl s_client -connect <DC_FQDN>:636 -showcertsservice-control --stop --all && service-control --start --all