"Password management operation failed"
2023-03-28T20:29:42.487+0000 DEBUG [vcf_om,e76c9c17e51fce97,50f3] [c.v.v.p.helper.NsxtApiUtil,om-exec-5] Failed to get NSXT user details : {"module_name":"com mon-services","error_message":"The credentials were incorrect or the account specified has been locked.","error_code":403} with status : 2023-03-28T20:29:42.509+0000 ERROR [vcf_om,e76c9c17e51fce97,50f3] [c.v.v.p.u.c.AbstractPasswordChanger,om-exec-5] The credentials were incorrect or the account specified has been locked. com.vmware.vcf.passwordmanager.exception.PasswordUpdateException: The credentials were incorrect or the account specified
echo "" >/etc/security/opasswd
/etc/init.d/nsx-mp-api-server stop
passwd
passwd admin
passwd audit
/var/vmware/nsx/reset_cluster_credentials
/etc/init.d/nsx-mp-api-server start
pam_tally2 -u root -r
pam_tally2 -u admin -r
pam_tally2 -u audit -r
echo "" >/etc/security/opasswd
/etc/init.d/nsx-edge-api-server stop
passwd
passwd admin
passwd audit
touch /var/vmware/nsx/reset_cluster_credentials
/etc/init.d/nsx-edge-api-server start
pam_tally2 -u root -r
pam_tally2 -u admin -r
clear user admin password-expiration
clear user root password-expiration
clear user audit password-expiration
nsxtmgr> set user admin password-expiration 9999 nsxtmgr> set user audit password-expiration 9999 nsxtmgr> set user root password-expiration 9999
curl http://localhost/locks | json_pp > releaseLock.json curl -X PUT -H "Content-Type:application/json" http://localhost/locks -d @releaseLock.json
2021-04-09T13:41:44.830+0000 INFO [vcf_lcm,0000000000000000,0000,precheckId=########-####-####-####-25e8fb993243,resourceType=NSX_T,resourceId=nsx.test.local] [c.v.e.s.l.p.i.nsxt.NsxtPrimitiveImpl,pool-3-thread-49] Completed precheck task NSX_T_PASSWORD_VALIDITY_CHECK on resource id nsx.test.local with status RED
get user admin password-expiration
" on NSX-T Manager may show as "Password expiration not configured for this user
".
set user admin password-expiration 9999
" (as admin) OR 'chage -M 9999 root
' (as root) before performing precheck/upgrade or remediation/rotation.
set auth-policy api lockout-period 0 && set auth-policy api lockout-reset-period 0