
OPERATIONAL DEFECT DATABASE
...

...
The user is accessing the NetWorker Management Console (NMC) or nsrlogin command line and receives an error: An error occurred while validating user credentials. Verify that NetWorker Authentication Service is running. [POST failed with HTTP-ERROR: 500 Server Message: Could not parse server-response from json string] The External Authentication Authority was configured using LDAP over SSL option; however, the authentication server is Microsoft Active Directory: Setup > Users and Roles > External Authority > Right-Click External Authority > Properties:
HTTP Error 500 "Internal Server Error." When the LDAP over SSL option is selected, it sets an internal attribute Is Active Directory to false. This prevents successful logins for users who are configured in Microsoft Active Directory through NetWorker.This can be verified from authc_config command line using root or Administrator command prompt: authc_config -u Administrator -e find-all-configs authc_config -u Administrator -e find-config -D config-id=config_id# NOTE: You are prompted to enter the NetWorker Administrator account password. The password can also be specified with the command using -p password. [root@networker-mc ~]# authc_config -u administrator -p 'Pa$$w0rd01' -e find-all-configs The query returns 1 records. Config Id Config Name 2 emclab [root@networker-mc ~]# authc_config -u administrator -p 'Pa$$w0rd01' -e find-config -D config-id=2 | grep -i "is active directory" Is Active Directory : false
The NetWorker Web User Interface (NWUI) external authority wizard has an AD over SSL option; however, the NMC does not.AD over SSL sets the Is Active Directory parameter to true, while maintaining other secure (LDAPS) settings. See Dell article NetWorker: How to configure "AD over SSL" (LDAPS) from The NetWorker Web User Interface (NWUI) Workaround: The authc_config command can be used to update the configuration Is Active Directory value to true. Windows: On the NetWorker (authc) server, open an Admin command prompt.Get the configuration ID of the external authority configuration: authc_config -u Administrator -p NetWorker_Administrator_Password -e find-all-configs The current settings can be reviewed with: authc_config -u Administrator -p NetWorker_Administrator_Password -e find-config -D config-id=config_id# Update the Is Active Directory value with the following command: authc_config -u administrator -p NetWorker_Administrator_Password -e update-config -D config-id=config_id# -D "config-active-directory=y" -D "config-server-address=ldaps://domain_server_hostname:636/dc=domain,dc=com" -D config-user-dn=”cn=service_account,ou=some_group,dc=domain,dc=com" -D config-user-dn-password="Service_Account_Password" NOTE: All required fields except the AD service account password can be collected from authc_config -u Administrator -e find-config -D config-id=config_id#. Example: C:\Users\Administrator.EMCLAB>authc_config -u administrator -p Pa$$w0rd01 -e update-config -D config-id=1 -D "config-active-directory=y" -D "config-server-address=ldaps://winsrvr2k16.emclab.local:636/dc=emclab,dc=local" -D "config-user-dn=cn=administrator,cn=users,dc=emclab,dc=local" -D config-user-dn-password="Pa$$w0rd01" Configuration ad is updated successfully. C:\Users\Administrator.EMCLAB> AD logins through NetWorker should now complete successfully. Linux: On the NetWorker (authc) server, open a root command prompt.Get the configuration ID of the external authority configuration: authc_config -u Administrator -p 'NetWorker_Administrator_Password' -e find-all-configs The current settings can be reviewed with: authc_config -u Administrator -p 'NetWorker_Administrator_Password' -e find-config -D config-id=config_id# Create a hidden text file containing the AD service account password: echo 'Service_Account_Password' > /root/.sapasswd.txt Make the file only accessible to root: chmod 700 /root/.sapasswd.txt Create a script to run the call the password from the hidden file and run the authc_config command to update the configuration: vi authc_update.sh Example: PASSWD=`cat /root/.sapasswd.txt` authc_config -u administrator -p 'NetWorker_Administrator_Password' -e update-config -D config-id=config_id# -D "config-active-directory=y" -D "config-server-address=ldaps://domain_server_hostname:636/dc=domain,dc=com" -D config-user-dn=”cn=service_account,ou=some_group,dc=domain,dc=com" -D config-user-dn-password="$PASSWD" NOTE: Most Linux operating systems do not process the authc_config command correctly if the service account password is specified in clear text using the command. The failure that is returned is LDAP error code 49 - Data 52e, which appears for invalid username or password. The method that is outlined above can be used to hide the password from clear text input. Set permissions on the script so that it is executable: chmod 755 authc_update.sh Run the script: /authc_update.sh Example: [root@networker-mc ~]# cat authc_update.sh PASSWD=`cat /root/.sapasswd.txt` authc_config -u administrator -p 'Pa$$w0rd01' -e update-config -D config-id=2 -D "config-active-directory=y" -D "config-server-address=ldaps://winsrvr2k16.emclab.local:636/dc=emclab,dc=local" -D "config-user-dn=cn=administrator,cn=users,dc=emclab,dc=local" -D config-user-dn-password="$PASSWD" [root@networker-mc ~]# chmod 755 authc_update.sh [root@networker-mc ~]# ./authc_update.sh Configuration emclab is updated successfully. AD logins through NetWorker should now complete successfully.
Click on a version to see all relevant bugs
Dell Integration
Learn more about where this data comes from
Bug Scrub Advisor
Streamline upgrades with automated vendor bug scrubs
BugZero Enterprise
Wish you caught this bug sooner? Get proactive today.