Automic Workload Automation

 View Only

Expand all | Collapse all

LDAP no longer working after 24.3 upgrade from 21.0.11

  • 1.  LDAP no longer working after 24.3 upgrade from 21.0.11

    Posted Feb 18, 2025 10:42 AM

    Hello,

     

    I've recently deployed a 24.3 test instance to test out upgrading our 21.0.11 environment. I've run into a snag with the LDAP integration after the upgrade. LDAP no longer works using the same settings as our 21.0.11. I've tried a few different configurations listed out in the documentation, but nothing seems to change and the error is shown below. The documentation indicates TLS is optional for an on prem deployment so I wouldn't think we would need to stray from our original settings. Did anyone else experience this type of situation on an upgrade? Any help is appreciated

     

    The error I am seeing in the WP log is

     

    Error in WP log (I've removed references to the domain and user account)

     

    20250205/145650.588 - 46     U00045033 Log on to LDAP server 'domain.local:port' with user 'DOMAIN.LOCAL\MYUSERNAME'.

    20250205/145650.595 - 46     U00045014 Exception 'javax.naming.AuthenticationException: "[LDAP: error code 49 - 80090308: LdapErr: DSID-0C090511, comment: AcceptSecurityContext error, data 52e, v4563 ]"' at 'com.sun.jndi.ldap.LdapCtx.mapErrorCode():3259'.

    20250205/145650.598 - 46     U00045040 LDAP check with logon user 'DOMAIN.LOCAL\MYUSERNAME' failed.

     

    Here is our functioning configuration for 21.011

     



  • 2.  RE: LDAP no longer working after 24.3 upgrade from 21.0.11

    Posted Feb 19, 2025 01:44 AM

    Hi Ben,

    the error message number in "data 52e" stands for "invalid credentials". Please check the userid/password of the user.

    regards,
    Peter



    ------------------------------
    Automic Certified Professional/Expert & Broadcom Knight

    For AUTOMIC trainings please check https://www.qskills.de/qs/workshops/automic/
    ------------------------------



  • 3.  RE: LDAP no longer working after 24.3 upgrade from 21.0.11

    Posted Feb 20, 2025 10:47 AM

    Hi Peter,

      I was aware that the 52e was for invalid credentials, but I can assure you that the creds I have tried have all been valid and work in v21. Odd thing I was looking at Olgun's response below and in our V21 test environment I removed the AUTHENTICATION attribute and replaced it with VERSION and then that environment started producing the same 52e error message for LDAP users. I swapped those options back in V21 and it started working again. I had thought the VERSION option was for oracle, we are using SQL not sure if that makes a difference. I'm trying to see if there are additional options for the LDAP VARA I should be using for V24. Thanks for your help




  • 4.  RE: LDAP no longer working after 24.3 upgrade from 21.0.11

    Posted Feb 19, 2025 01:46 AM

    Hi Ben,

    • why you use AUTHENTICATION ? remove and try again.
    • if this same , try to put login on SYNC_LOGIN
    • if this same , try to put VERSION

    Thanks.



    ------------------------------
    Olgun Onur Ozmen
    https://www.linkedin.com/in/olgunonurozmen/
    ------------------------------



  • 5.  RE: LDAP no longer working after 24.3 upgrade from 21.0.11

    Posted Feb 20, 2025 10:52 AM

    Hi Olgun,

      Thanks for your input. The AUTHENTICATION option has always been in our VARA since at least V12.3 I had thought it was a difference between SQL and Oracle databases. I tried your suggestions out and these did not work. The error never changed. I went to our V21 test environment and removed AUTHENTICATION and replaced it with VERSION and then that environment started producing the same error as I am seeing in V24. I'm trying to see if there are additional options for the LDAP VARA I should be using for V24 to map correctly to LDAP. Thanks for your help




  • 6.  RE: LDAP no longer working after 24.3 upgrade from 21.0.11

    Broadcom Employee
    Posted Feb 19, 2025 03:47 AM

    Hello, the reason is that TLS default was modified to Y in v24, whereas it was set to N by default on v21.

    This should be fixed in the documentation soon.

    Please add TLS with value N and that should do.

    Adrian




  • 7.  RE: LDAP no longer working after 24.3 upgrade from 21.0.11

    Posted Feb 20, 2025 11:02 AM

    Hi Adrian,

       I changed up my configuration to include TLS = N but this did not change the behavior. The error remained the same

    Per some of the other responses to this post. I went to our other  V21 test environment and removed AUTHENTICATION and replaced it with VERSION and then that environment started producing the same error as I am seeing in V24. I am not sure if this is telling me there is some sort of attribute mapping issue and I should be using some other option in our LDAP VARA. So the problem persists while I try out some other options. Thanks for your help and any more suggestions you may have.




  • 8.  RE: LDAP no longer working after 24.3 upgrade from 21.0.11

    Posted Feb 21, 2025 08:12 AM
    Edited by Peter Grundler Feb 21, 2025 08:28 AM

    Hi Ben,

    your setting of SYNC_LOGIN is most likely incorrect. This parameter is used to specify the name of a LOGIN object and not a Y/N switch. I don't think that the LOGIN object is named "Y"?

    This is my working LDAP configuration:

    I have tested it on 24.3 with the invalid parameter and was able to log on to Automic. Have you mentioned that you're connecting to MSAD? I am using a different LDAP provider, so it might not be 100% identical ...

    best regards,
    Peter



    ------------------------------
    Automic Certified Professional/Expert & Broadcom Knight

    For AUTOMIC trainings please check https://www.qskills.de/qs/workshops/automic/
    ------------------------------



  • 9.  RE: LDAP no longer working after 24.3 upgrade from 21.0.11

    Posted Feb 19, 2025 05:03 AM

    This is how our LDAP VARA object looks like on our version 21.0.5 hf 4




  • 10.  RE: LDAP no longer working after 24.3 upgrade from 21.0.11

    Posted Feb 20, 2025 11:05 AM

    Hi Cristian,

     Do you use an Oracle or SQL database? The VERSION key doesn't work for me in V21 or V24. I believed this was something used for oracle databases. We are on SQL but I am not sure that makes a difference yet. Thanks for your input.




  • 11.  RE: LDAP no longer working after 24.3 upgrade from 21.0.11

    Posted Feb 20, 2025 11:31 AM

    We use Oracle DB




  • 12.  RE: LDAP no longer working after 24.3 upgrade from 21.0.11

    Posted Feb 20, 2025 01:26 PM

    One thing that I have noticed that makes me thing there is some sort of mapping situation is that when I look in at a successful login in V21.0.11 the message is  as follows.

    U00003205 Logon of 'Ben Baez' ('USERNAME/DOMAIN.LOCAL'), client: '0010' accepted by host 'SERVER'. Client version = '21.0.11+build.1720086822060', type='Java-API' (connection='*CP003#00000027').

    In V24.3 the failure shows  

    U00045033 Log on to LDAP server 'domain.local:port' with user 'DOMAIN.LOCAL\USERNAME'

    I'm not sure if this is just how the logging is displayed or if it is passing the credentials backwards and this is why it is failing.




  • 13.  RE: LDAP no longer working after 24.3 upgrade from 21.0.11

    Posted 10 days ago

    Hi Ben Baez and Team,

    we are also facing same error after upgraded to 24.4 from version 21. Please share me details if you find the solution

    U00045033 Log on to LDAP server 'ldapad.server.abc.abc.abc:389' with user 'prod.ad.abc.abc.abc.com\user1'.
     U00045014 Exception 'javax.naming.CommunicationException: "ldapad.server.abc.abc.abc:389"' at 'com.sun.jndi.ldap.Connection.<init>()'.
     U00045015 The previous error was caused by 'java.net.SocketException: "Connection reset"' at 'sun.nio.ch.NioSocketImpl.implRead()'.
    U00045040 LDAP check with logon user ''prod.ad.abc.abc.abc.com\user1' failed

    -------------------------------------------



  • 14.  RE: LDAP no longer working after 24.3 upgrade from 21.0.11

    Posted 9 days ago
    Hi

    Have you tried adding the Parameter "TLS=N" to your LDAP configuration VARA?
    Before the default was "TLS=N", but from V24.0 the default is "TLS=Y".
    https://docs.automic.com/documentation/webhelp/english/ARA/24.4/DOCU/24.4/CDA%20Guides/Content/Installation_Upgrade/CheckIncompatibilities_21012_240.htm?Highlight=UC_LDAP

    Hope that will help.


    Kind regards
    Peter Gross
    ________________________

    Peter Gross
    Senior System Expert


    [cid:image001.png@01DC011F.323C7870]

    Raiffeisen Schweiz Genossenschaft
    Raiffeisenplatz 4, 9001 St. Gallen
    T 071 225 88 88
    raiffeisen.ch<https: www.raiffeisen.ch>

    [cid:image002.png@01DC011F.323C7870]<https: twitter.com raiffeisen_ch> [cid:image003.png@01DC011F.323C7870] <https: www.linkedin.com company raiffeisen-switzerland mycompany> [cid:image004.png@01DC011F.323C7870] <https: www.facebook.com raiffeisenmemberplus.schweiz> [cid:image005.png@01DC011F.323C7870] <https: www.instagram.com raiffeisen_ch> [cid:image006.png@01DC011F.323C7870] <https: www.youtube.com user raiffeisenschweiz>

    [cid:image007.png@01DC011F.323C7870]


    *****************************************************

    This e-mail may contain confidential material. It is intended only for the person or entity which it is addressed to. In case you should not be supposed to get this e-mail we ask you to delete it without taking notice of its content. Any views or opinions expressed in this e-mail are those of the sender and do not necessarily coincide with those of The Swiss Raiffeisen Group. Therefore this e-mail does not represent a binding agreement nor an offer to deal. E-Mail transmission can be insecure and can contain errors. Information could be intercepted, corrupted, lost, destroyed, incomplete or may contain viruses. Neither The Swiss Raiffeisen Group nor the sender can accept any liability for any kind of damage as the result of viruses or transmission errors.

    *****************************************************




  • 15.  RE: LDAP no longer working after 24.3 upgrade from 21.0.11

    Posted 9 days ago
    Edited by Marcin Uracz 9 days ago

    Hi,

    There is a small difference between V21 and V24 when it comes to LDAP. V24 assumes TLS is on. Here the part of the UC_LDAP_EXAMPLE: 

    • TLS

      Allowed values: Y[es] and N[o]

      • Y - The JWP creates a connection to the LDAP server over TLS

      • N - The JWP creates a connection to the LDAP server without TLS

      Default value: Y[es]  <--- 

      Restart required: No

    In V21 it was this way: 

    • TLS

      Note: This key is used only if the VERSION key is set to 2.

      Allowed values: Y[es] and N[o]

      • Y - The JWP creates a connection to the LDAP server over TLS

      • N - The JWP creates a connection to the LDAP server without TLS

      Restart required: No

    And no surprise here, the default was N.

    Once you upgrade to V24 and do not have explicitly set TLS to N in your UC_LDAP_ * settings, the engine will assume it is supposed to open a TLS connection using a non-tls endpoint 389, which in the end causes the server to reset the connection as it does not expect a TLS connection on that port. 

    Meanwhile this was added to the incompatibilities documentation: 
    https://docs.automic.com/documentation/webhelp/english/ALL/components/DOCU/24.4.0/Automic%20Automation%20Guides/Content/Installation_Upgrade/CheckIncompatibilities_21012_240.htm

    "If you have a non-TLS LDAP connection, before updating, check your configuration in the TLS key in your UC_LDAP_EXAMPLE variable and add TLS=N if it does not already exist. See UC_LDAP_EXAMPLE - LDAP Connection Variable."

    EDIT:  Peter was 1 Minute faster ;) +1 what he said ;) 

    ------------------------------
    Cheers,
    Marcin
    ------------------------------



  • 16.  RE: LDAP no longer working after 24.3 upgrade from 21.0.11

    Posted 9 days ago

    Hi Marcin Uracz  and Peter Gross,

    Thanks for quick response.
    After setting Parameter "TLS=N" to LDAP configuration VARA  :UC_LDAP_* ,  Synchronize is working for LDAP user.

    When try to login in UI below error. User credentials are correct because same working in V21.  Please let me know if any other setting to change.

    Exception 'javax.naming.AuthenticationException: "[LDAP: error code 49 - 80090308: LdapErr: DSID-0C090597, comment: AcceptSecurityContext error, data 52e, v4563^@]"' 


    -------------------------------------------



  • 17.  RE: LDAP no longer working after 24.3 upgrade from 21.0.11

    Posted 9 days ago

    Hi,

    if you use DN information to identify the user please check if the parameter "USE_DISTINGUISHED_NAME" is configured in your LDAP variable. Recently this was the reason for another customer.

    regards,
    Peter



    ------------------------------
    Automic Certified Professional/Expert & Broadcom Knight
    ------------------------------



  • 18.  RE: LDAP no longer working after 24.3 upgrade from 21.0.11

    Posted 9 days ago

    Hi Peter Grundler,

    Thanks for response.

    Issue resolved. Able to login to UC4 UI after adding  parameter "USE_DISTINGUISHED_NAME"  to VARA: UC_LDAP_*.

    we not used above parameter in V21.

    -------------------------------------------



  • 19.  RE: LDAP no longer working after 24.3 upgrade from 21.0.11

    Posted 9 days ago

    Hello BEN,

    in our sandbox installation, we had to adjust the user in the LDAP-Sync-LOGI object in addition to the TLS parameter.
    "domain/user" no longer worked.
    It worked with "user@domain.company.contrycode".

    Best regards,
    André

    -------------------------------------------