- Cannot add a vCenter Single Sign On (SSO) Active Directory Identity Source
- Adding an Active Directory Single Sign On Identity Source with a Primary Server URL starting with
ldap://
orldaps://
fails - Test Connection fails with one of these errors:
[LDAP: error code 8 - 00002028: LdapErr: DSID-0C0901FC, comment: The server requires binds to turn on integrity checking if SSL\TLS are not already active on the connection, data 0, v1db1]
simple bind failed
Cause
This issue occurs if the Active Directory Domain is configured with a
Group Policy that requires all LDAP connections to be secured with SSL
(ldaps required) and the Domain controller: LDAP server signing requirements policy is set to
A certificate that establishes trust for the LDAPS endpoint of the Active Directory server is required when you use
Require signing
.A certificate that establishes trust for the LDAPS endpoint of the Active Directory server is required when you use
ldaps://
in the primary or secondary LDAP URL.Resolution
To resolve this issue:
- Log in to the vSphere Web Client using the
Admin@System-Domain
credentials. - Browse to Administration > Sign-On and Discovery > Configuration in the vSphere Web Client.
- Open the Edit Identity Source by right-clicking on the dialog of the Identity Source you want to edit.
- Change the URL from
ldap://...
toldaps://...
A Choose Certificate button appears below the settings.
- Click Choose Certificate.
- Select the correct
.cer
Root CA certificate of your AD/OpenLdap Identity Source. - Click Test Connection.
- Click OK.
No comments:
Post a Comment