<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: LDAP/AD authentication failed in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/LDAP-AD-authentication-failed/m-p/80001#M83558</link>
    <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/21997"&gt;@desind&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One of the only things I can think of that could have the results you are seeing is if the func_svc_zab_cdh user belongs to another Domain Controller.&amp;nbsp; You could try looking at the user's LDAP DN as a clue, but if I'm right, you can try using the Global Catalog to see if that allows you and the func_svc_zab_cdh user to authenticate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In your &lt;STRONG&gt;Administration --&amp;gt; Settings&lt;/STRONG&gt; search for &lt;STRONG&gt;LDAP URL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are using ldap, change the port to 3268&lt;/P&gt;&lt;P&gt;If you are using ldaps, change the port to 3269&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For instance:&lt;/P&gt;&lt;P&gt;change ldap://ad.example.com to ldap://ad.example.com:3268&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Save the change &lt;STRONG&gt;Restart&lt;/STRONG&gt; Cloudera Manager (service cloudera-scm-server restart)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reasoning:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- The exception shows that &lt;STRONG&gt;no&lt;/STRONG&gt; result was returned for a search for &lt;STRONG&gt;userPrincipalName=func_svc_zab_cdh@vsp.sas.com&lt;/STRONG&gt; in the &lt;STRONG&gt;dc=vsp,dc=sas,dc=com&lt;/STRONG&gt; subtree&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- You see in an Active Directory UI that the func_svc_zab_cdh user does have that UPN value&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- You can log in&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All these factors seem to indicate that the ldap search just cannot return the user's object.&amp;nbsp; Global Catalog keeps a copy of user objects that span DCs so if that user is in the domain (which the user appears to be) then a search of the GC may get the results you seek.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 18 Sep 2018 18:36:32 GMT</pubDate>
    <dc:creator>bgooley</dc:creator>
    <dc:date>2018-09-18T18:36:32Z</dc:date>
    <item>
      <title>LDAP/AD authentication failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/LDAP-AD-authentication-failed/m-p/79859#M83553</link>
      <description>&lt;P&gt;Authentication failure&amp;nbsp;&lt;/P&gt;&lt;P&gt;2018-09-15 16:39:59,185 INFO 1985572916@scm-web-8:org.springframework.security.ldap.SpringSecurityLdapTemplate: Ignoring PartialResultException&lt;/P&gt;&lt;P&gt;2018-09-15 16:08:13,360 ERROR 1386832780@scm-web-13:com.cloudera.server.web.cmf.CmfLdapAuthenticationProvider: LDAP/AD authentication failed&lt;BR /&gt;org.springframework.dao.IncorrectResultSizeDataAccessException: Incorrect result size: expected 1, actual 0&lt;BR /&gt;at org.springframework.security.ldap.SpringSecurityLdapTemplate.searchForSingleEntryInternal(SpringSecurityLdapTemplate.java:239)&lt;BR /&gt;at org.springframework.security.ldap.authentication.ad.ActiveDirectoryLdapAuthenticationProvider.searchForUser(ActiveDirectoryLdapAuthenticationProvider.java:258)&lt;BR /&gt;at org.springframework.security.ldap.authentication.ad.ActiveDirectoryLdapAuthenticationProvider.doAuthentication(ActiveDirectoryLdapAuthenticationProvider.java:114)&lt;BR /&gt;at org.springframework.security.ldap.authentication.AbstractLdapAuthenticationProvider.authenticate(AbstractLdapAuthenticationProvider.java:61)&lt;BR /&gt;at com.cloudera.server.web.cmf.CmfLdapAuthenticationProvider.authenticate(CmfLdapAuthenticationProvider.java:107)&lt;BR /&gt;at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:156)&lt;BR /&gt;at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:174)&lt;BR /&gt;at org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter.attemptAuthentication(UsernamePasswordAuthenticationFilter.java:94)&lt;BR /&gt;at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:194)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:323)&lt;BR /&gt;at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:105)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:323)&lt;BR /&gt;at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:87)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:323)&lt;BR /&gt;at org.springframework.security.web.session.ConcurrentSessionFilter.doFilter(ConcurrentSessionFilter.java:125)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:323)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:173)&lt;BR /&gt;at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:237)&lt;BR /&gt;at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:167)&lt;BR /&gt;at org.mortbay.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1212)&lt;BR /&gt;at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:88)&lt;BR /&gt;at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:76)&lt;BR /&gt;at org.mortbay.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1212)&lt;BR /&gt;at org.mortbay.jetty.servlet.ServletHandler.handle(ServletHandler.java:399)&lt;BR /&gt;at org.mortbay.jetty.security.SecurityHandler.handle(SecurityHandler.java:216)&lt;BR /&gt;at org.mortbay.jetty.servlet.SessionHandler.handle(SessionHandler.java:182)&lt;BR /&gt;at org.mortbay.jetty.security.SecurityHandler.handle(SecurityHandler.java:216)&lt;BR /&gt;at org.mortbay.jetty.security.SecurityHandler.handle(SecurityHandler.java:216)&lt;BR /&gt;at org.mortbay.jetty.handler.ContextHandler.handle(ContextHandler.java:767)&lt;BR /&gt;at org.mortbay.jetty.webapp.WebAppContext.handle(WebAppContext.java:450)&lt;BR /&gt;at org.mortbay.jetty.handler.HandlerWrapper.handle(HandlerWrapper.java:152)&lt;BR /&gt;at org.mortbay.jetty.handler.StatisticsHandler.handle(StatisticsHandler.java:53)&lt;BR /&gt;at org.mortbay.jetty.handler.HandlerWrapper.handle(HandlerWrapper.java:152)&lt;BR /&gt;at org.mortbay.jetty.Server.handle(Server.java:326)&lt;BR /&gt;at org.mortbay.jetty.HttpConnection.handleRequest(HttpConnection.java:542)&lt;BR /&gt;at org.mortbay.jetty.HttpConnection$RequestHandler.content(HttpConnection.java:945)&lt;BR /&gt;at org.mortbay.jetty.HttpParser.parseNext(HttpParser.java:756)&lt;BR /&gt;at org.mortbay.jetty.HttpParser.parseAvailable(HttpParser.java:218)&lt;BR /&gt;at org.mortbay.jetty.HttpConnection.handle(HttpConnection.java:404)&lt;BR /&gt;at org.mortbay.io.nio.SelectChannelEndPoint.run(SelectChannelEndPoint.java:410)&lt;BR /&gt;at org.mortbay.thread.QueuedThreadPool$PoolThread.run(QueuedThreadPool.java:582)&lt;BR /&gt;2018-09-15 16:08:13,368 INFO 1386832780@scm-web-13:com.cloudera.server.web.cmf.AuthenticationFailureEventListener: Authentication failure for user: 'func_svc_zab_cdh' from 10.99.195.186&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) I have added the group "cloudera_manager_API" in&amp;nbsp;LDAP User Groups.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2)&amp;nbsp;func_svc_zab_cdh is a member of "cloudera_manager_API" group.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) The configuration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AdGroupSettings.PNG" style="width: 600px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/4821iADB8A904289A1D44/image-size/large?v=v2&amp;amp;px=999" role="button" title="AdGroupSettings.PNG" alt="AdGroupSettings.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Sep 2018 20:40:51 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/LDAP-AD-authentication-failed/m-p/79859#M83553</guid>
      <dc:creator>desind</dc:creator>
      <dc:date>2018-09-15T20:40:51Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP/AD authentication failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/LDAP-AD-authentication-failed/m-p/79921#M83554</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/21997"&gt;@desind&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A couple of things I noticed:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(1)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Based on the stack trace, you have configured Cloudera Manager's External Authentication with &lt;STRONG&gt;External Authentication Type: Active Directory&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This means that the username specified in the login page will be concatenated with the &lt;STRONG&gt;Active Directory Domain&lt;/STRONG&gt; value to form a &lt;STRONG&gt;userPrincipalName&lt;/STRONG&gt; value.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example, if I use a login name of "user1" and my Active Directory Domain is "example.com" the result will be a search for an object that has &lt;STRONG&gt;userPrincipalName=user1@example.com&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The stack trace shows that the query did not find any such match for that search.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your users' userPrincipalName values do not contain the string they nornally use to log in as (commonly the sAMAccountName) then you will need to use the &lt;STRONG&gt;LDAP&lt;/STRONG&gt; value for &lt;STRONG&gt;External Authentication Type&lt;/STRONG&gt; in the Cloudera Manager configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(2)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Based on your screen shot, it appears your &lt;STRONG&gt;LDAP User Search Filter&lt;/STRONG&gt; may not be configured in a way that will return any search results.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You have:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;(&amp;amp;(objectclass=user)(memberof:1.2.840.113556.1.4.1941:={0}))&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't think that search filter is doing what you want it to do (though I think the issue I mentioned above is causing the direct failure you are seeing now.&amp;nbsp; When using the LDAP Matching Rule in chain, you would need the {0} to be a group Distinguished Name as mentioned on the following page:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/windows/desktop/adsi/search-filter-syntax" target="_blank"&gt;https://docs.microsoft.com/en-us/windows/desktop/adsi/search-filter-syntax&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example, this may be more in line with what you were intending:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;(&amp;amp;(objectclass=user)(sAMAccountName={0})(memberof:1.2.840.113556.1.4.1941:=CN=hadoop_group,DC=Example,DC=COM))&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the above, only users who are a member of "hadoop_group" or any of the nested groups can auth.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Sep 2018 18:24:55 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/LDAP-AD-authentication-failed/m-p/79921#M83554</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2018-09-17T18:24:55Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP/AD authentication failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/LDAP-AD-authentication-failed/m-p/79924#M83555</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/4054"&gt;@bgooley&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) So when i login into cloudera manager as func_svc_zab_cdh that will be converted to func_svc_zab_cdh@vsp.sas.com&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I logged into AD and see the same in the "userPrincipalname" which looks correct. Please find the attachment.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Regarding the second point we want to keep it wide open . {0} will be replaced by the username that was used to login screen.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also tried removing all groups from "LDAP User Groups"&amp;nbsp; as a test and allowing everyone to login. I , my colleage can login. however "func_svc_zab_cdh" cannot login with the same error. If i enter a wring password for this user i get bad credentials.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also tried open the search filter to to wide open . event that does not work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you look at maybe debug logs ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="func_svc_zab_cdh.PNG" style="width: 600px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/4825i326F4E0ECEC24976/image-size/large?v=v2&amp;amp;px=999" role="button" title="func_svc_zab_cdh.PNG" alt="func_svc_zab_cdh.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Sep 2018 18:54:22 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/LDAP-AD-authentication-failed/m-p/79924#M83555</guid>
      <dc:creator>desind</dc:creator>
      <dc:date>2018-09-17T18:54:22Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP/AD authentication failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/LDAP-AD-authentication-failed/m-p/79928#M83556</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/21997"&gt;@desind&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The stack shows that whatever search was generated by spring framework didn't return any matches.&lt;/P&gt;&lt;P&gt;You can get more information by enabling TRACE level logging for the springframework classes involved.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(1)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit &lt;STRONG&gt;/etc/cloudera-scm-server/log4j.properties&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Add the following lines:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;log4j.logger.org.springframework.ldap=TRACE&lt;BR /&gt;log4j.logger.org.springframework.security.ldap=TRACE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(2)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Restart Cloudera Manager:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# service cloudera-scm-server restart&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In general, when encountering the problems you describe, I recommend using the "LDAP" External Authentication Type so you have better control over the search filters.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I still note that it appears your LDAP User Search Filter is not going to return what you expect since the syntax requires "DN" rather than a username.&amp;nbsp; The {0} will be replaced with your username, so I don't believe the search will return any users.&amp;nbsp; The user search filter is only used if you are using the "LDAP" External Authentication so you won't see problems with it unless you do use LDAP (vs Active Directory).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please feel free to share the debug output from a failed login as it should shed light on the problem.&amp;nbsp; Your UPN does look correct, so it is hard to say why the search is failing to return a result.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Sep 2018 19:58:08 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/LDAP-AD-authentication-failed/m-p/79928#M83556</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2018-09-17T19:58:08Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP/AD authentication failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/LDAP-AD-authentication-failed/m-p/79981#M83557</link>
      <description>&lt;P&gt;After&amp;nbsp;making changes to log4j and removing all entries from&amp;nbsp;LDAP User Search Filter,LDAP User Search Base,LDAP Group Search Filter,LDAP Group Search Base . Which as you said are only used when ldap is present.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In-addition to following this doc :&amp;nbsp;&lt;A href="https://www.cloudera.com/documentation/enterprise/5-15-x/topics/cm_sg_external_auth.html" target="_blank"&gt;https://www.cloudera.com/documentation/enterprise/5-15-x/topics/cm_sg_external_auth.html&lt;/A&gt; using "Active directory" method i found the below&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Active Directory Domain&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;property, provide the domain to authenticate against.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p"&gt;&lt;STRONG&gt;LDAP URL&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Active Directory&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;are the only settings required to allow anyone in Active Directory to log in to Cloudera Manager.&amp;nbsp;&lt;/P&gt;&lt;P class="p"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p"&gt;So i just provided LDAP URL and Active directory, after making this change and restarting cloudera-scm-server . I am able to login however "func_svc_zab_cdh"&amp;nbsp; is not able to login.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P class="p"&gt;LDAP User Groups - same as screenshot above.&amp;nbsp;&lt;/P&gt;&lt;P class="p"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p"&gt;LOGS:&amp;nbsp;&lt;/P&gt;&lt;P class="p"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p"&gt;When i login:&amp;nbsp;&lt;/P&gt;&lt;P class="p"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p"&gt;2018-09-18 10:03:47,198 DEBUG 936018027@scm-web-6:org.springframework.security.ldap.authentication.ad.ActiveDirectoryLdapAuthenticationProvider: Processing authentication request for user: desind&lt;BR /&gt;2018-09-18 10:03:47,324 DEBUG 936018027@scm-web-6:org.springframework.security.ldap.SpringSecurityLdapTemplate: Searching for entry under DN '', base = 'dc=vsp,dc=sas,dc=com', filter = '(&amp;amp;(objectClass=user)(userPrincipalName={0}))'&lt;BR /&gt;2018-09-18 10:03:47,335 DEBUG 936018027@scm-web-6:org.springframework.security.ldap.SpringSecurityLdapTemplate: Found DN: cn=desind,ou=Users,ou=Consulting,ou=SAS,dc=vsp,dc=sas,dc=com&lt;BR /&gt;2018-09-18 10:03:47,345 INFO 936018027@scm-web-6:org.springframework.security.ldap.SpringSecurityLdapTemplate: Ignoring PartialResultException&lt;BR /&gt;2018-09-18 10:03:47,347 DEBUG 936018027@scm-web-6:org.springframework.security.ldap.authentication.ad.ActiveDirectoryLdapAuthenticationProvider: 'memberOf' attribute values: [CN=logon_elv_u_cicld_all,OU=Logon,OU=Groups,OU=CICLD,OU=Customers,OU=AWSSYD,OU=Sites,DC=gsp,DC=vsp,DC=sas,DC=com, CN=CICLD.LOB,OU=ServiceNow,OU=Groups,OU=CICLD,OU=Customers,OU=AWSSYD,OU=Sites,DC=gsp,DC=vsp,DC=sas,DC=com, CN=CICLD Jira - Confluence,OU=Atlassian,OU=Groups,OU=CICLD,OU=Customers,OU=AWSSYD,OU=Sites,DC=gsp,DC=vsp,DC=sas,DC=com, CN=logon_elv_w_cicld_all,OU=Logon,OU=Groups,OU=CICLD,OU=Customers,OU=AWSSYD,OU=Sites,DC=gsp,DC=vsp,DC=sas,DC=com, CN=logon_elv_w_ssovd_desind-dt,OU=Logon,OU=Groups,OU=SSOVD,OU=SL1,DC=vsp,DC=sas,DC=com, CN=SASDB.LOB,OU=ServiceNow,OU=Groups,OU=SASDB,OU=SL1,DC=vsp,DC=sas,DC=com, CN=logon_std_u_dig_dig93au,OU=Logon,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=logon_std_u_dig_dig95au,OU=Logon,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=logon_std_u_dig_dig96au,OU=Logon,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=logon_std_u_dig_dig99au,OU=Logon,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=logon_std_u_dig_dig97au,OU=Logon,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=logon_std_u_dig_dig98au,OU=Logon,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=logon_std_u_dig_dig94au,OU=Logon,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=logon_ncx_deny,OU=Logon,OU=Groups,OU=NCX,OU=SL1,DC=vsp,DC=sas,DC=com, CN=logon_std_u_dig_dig92au,OU=Logon,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=logon_std_u_dig_dig91au,OU=Logon,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=logon_tool_securevault,OU=Groups,OU=Infrastructure,OU=SAS,DC=vsp,DC=sas,DC=com, CN=logon_ncj_deny,OU=Logon,OU=Groups,OU=NCJ,OU=SL1,DC=vsp,DC=sas,DC=com, CN=sasdbasudo,OU=Groups,OU=SAS DBA,OU=SAS,DC=vsp,DC=sas,DC=com, CN=logon_std_u_dig_dig64au,OU=Logon,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=logon_std_u_dig_dig65au,OU=Logon,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=logon_elv_u_dig_all,OU=Logon,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=ITM.LOB,OU=ServiceNow,OU=Groups,OU=ITM,OU=SL1,DC=vsp,DC=sas,DC=com, CN=dba,OU=Unix Resources,OU=SAS,DC=vsp,DC=sas,DC=com, CN=SSO Hadoop Administration,OU=Groups,OU=Atlassian,OU=Functional,OU=SAS,DC=vsp,DC=sas,DC=com, CN=DIG Cloudera Manager Admins,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=CICLD.AllUsers,OU=Groups,OU=CICLD,OU=Customers,OU=AWSSYD,OU=Sites,DC=gsp,DC=vsp,DC=sas,DC=com, CN=digsudo,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=digsasauth,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=logon_elv_u_aid_all,OU=Logon,OU=Groups,OU=AID,OU=SL1,DC=vsp,DC=sas,DC=com, CN=sas_samviewer,OU=Groups,OU=Functional,OU=SAS,DC=vsp,DC=sas,DC=com, CN=DIG.LOB,OU=ServiceNow,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=logon_elv_w_dig_all,OU=Logon,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=logon_elv_w_aid_all,OU=Logon,OU=Groups,OU=AID,OU=SL1,DC=vsp,DC=sas,DC=com, CN=AID.LOB,OU=ServiceNow,OU=Groups,OU=AID,OU=SL1,DC=vsp,DC=sas,DC=com, CN=DIG Jira - Confluence,OU=Atlassian,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=digunix,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=digapp,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=DIG RDC,OU=Groups,OU=DIG,OU=SL1,DC=vsp,DC=sas,DC=com, CN=MISTK.LOB,OU=ServiceNow,OU=Groups,OU=MISTK,OU=SL1,DC=vsp,DC=sas,DC=com, CN=logon_tool_vpn_rdp,OU=Groups,OU=Infrastructure,OU=SAS,DC=vsp,DC=sas,DC=com, CN=SAS.LOBi,OU=Internal LOBs,OU=ServiceNow,OU=Functional,OU=SAS,DC=vsp,DC=sas,DC=com, CN=SASDB Jira - Confluence,OU=Atlassian,OU=Groups,OU=SASDB,OU=SL1,DC=vsp,DC=sas,DC=com, CN=SASDB.AllUsers,OU=Groups,OU=SASDB,OU=SL1,DC=vsp,DC=sas,DC=com, CN=SAS Solutions OnDemand.LOBi,OU=Internal LOBs,OU=ServiceNow,OU=Functional,OU=SAS,DC=vsp,DC=sas,DC=com, CN=MISTK.AllUsers,OU=Groups,OU=MISTK,OU=SL1,DC=vsp,DC=sas,DC=com, CN=ITM.AllUsers,OU=Groups,OU=ITM,OU=SL1,DC=vsp,DC=sas,DC=com, CN=AID.AllUsers,OU=Groups,OU=AID,OU=SL1,DC=vsp,DC=sas,DC=com, CN=dbasudo,OU=Groups,OU=SAS DBA,OU=SAS,DC=vsp,DC=sas,DC=com, CN=AID Jira - Confluence,OU=Atlassian,OU=Groups,OU=AID,OU=SL1,DC=vsp,DC=sas,DC=com, CN=SAS Internal - ASP,OU=Groups,OU=Atlassian,OU=Functional,OU=SAS,DC=vsp,DC=sas,DC=com, CN=jira-users,OU=Groups,OU=Atlassian,OU=Functional,OU=SAS,DC=vsp,DC=sas,DC=com, CN=confluence-users,OU=Groups,OU=Atlassian,OU=Functional,OU=SAS,DC=vsp,DC=sas,DC=com, CN=SAS Internal - All,OU=Groups,OU=Atlassian,OU=Functional,OU=SAS,DC=vsp,DC=sas,DC=com, CN=SSO Database Administration,OU=Groups,OU=Atlassian,OU=Functional,OU=SAS,DC=vsp,DC=sas,DC=com, CN=SSO Demo,OU=Groups,OU=Atlassian,OU=Functional,OU=SAS,DC=vsp,DC=sas,DC=com, CN=SSO Share Access,OU=Groups,OU=SSO,OU=SAS,DC=vsp,DC=sas,DC=com, CN=SAS Employees,OU=SAS,DC=vsp,DC=sas,DC=com, CN=ssosvn,OU=Groups,OU=SSO,OU=SAS,DC=vsp,DC=sas,DC=com, CN=SSO Developers,OU=Groups,OU=SSO,OU=SAS,DC=vsp,DC=sas,DC=com, CN=SSO Users,OU=Groups,OU=SSO,OU=SAS,DC=vsp,DC=sas,DC=com, CN=SW-UltraEdit32,OU=Groups,OU=SSO,OU=SAS,DC=vsp,DC=sas,DC=com, CN=SAS Admins,OU=Groups,OU=SASAdmins,OU=SAS,DC=vsp,DC=sas,DC=com, CN=sasdba,OU=Groups,OU=SAS DBA,OU=SAS,DC=vsp,DC=sas,DC=com, CN=SAS Admin Restricted,OU=Groups,OU=SASAdmins,OU=SAS,DC=vsp,DC=sas,DC=com]&lt;BR /&gt;2018-09-18 10:03:47,357 DEBUG 936018027@scm-web-6:org.springframework.security.ldap.userdetails.LdapUserDetailsMapper: Mapping user details from context with DN: cn=desind,ou=Users,ou=Consulting,ou=SAS,dc=vsp,dc=sas,dc=com&lt;BR /&gt;2018-09-18 10:03:48,209 INFO 936018027@scm-web-6:com.cloudera.server.web.cmf.AuthenticationSuccessEventListener: Authentication success for user: 'desind' from 10.99.195.186&lt;BR /&gt;2018-09-18 10:03:51,430 INFO avro-servlet-hb-processor-1:com.cloudera.server.common.AgentAvroServlet: (23 skipped) AgentAvroServlet: heartbeat processing stats: average=79ms, min=26ms, max=839ms.&lt;/P&gt;&lt;P class="p"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p"&gt;&lt;STRONG&gt;#############When "func_svc_zab_cdh" user logins################&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p"&gt;2018-09-18 10:04:40,227 DEBUG 1978563421@scm-web-13:org.springframework.security.ldap.authentication.ad.ActiveDirectoryLdapAuthenticationProvider: Processin g authentication request for user: func_svc_zab_cdh&lt;BR /&gt;2018-09-18 10:04:40,290 DEBUG 1978563421@scm-web-13:org.springframework.security.ldap.SpringSecurityLdapTemplate: Searching for entry under DN '', base = 'd c=vsp,dc=sas,dc=com', filter = '(&amp;amp;(objectClass=user)(userPrincipalName={0}))'&lt;BR /&gt;2018-09-18 10:04:40,290 INFO 1978563421@scm-web-13:org.springframework.security.ldap.SpringSecurityLdapTemplate: Ignoring PartialResultException&lt;BR /&gt;2018-09-18 10:04:40,292 ERROR 1978563421@scm-web-13:com.cloudera.server.web.cmf.CmfLdapAuthenticationProvider: LDAP/AD authentication failed&lt;BR /&gt;org.springframework.dao.IncorrectResultSizeDataAccessException: Incorrect result size: expected 1, actual 0&lt;BR /&gt;at org.springframework.security.ldap.SpringSecurityLdapTemplate.searchForSingleEntryInternal(SpringSecurityLdapTemplate.java:239)&lt;BR /&gt;at org.springframework.security.ldap.authentication.ad.ActiveDirectoryLdapAuthenticationProvider.searchForUser(ActiveDirectoryLdapAuthenticationProv ider.java:258)&lt;BR /&gt;at org.springframework.security.ldap.authentication.ad.ActiveDirectoryLdapAuthenticationProvider.doAuthentication(ActiveDirectoryLdapAuthenticationP rovider.java:114)&lt;BR /&gt;at org.springframework.security.ldap.authentication.AbstractLdapAuthenticationProvider.authenticate(AbstractLdapAuthenticationProvider.java:61)&lt;BR /&gt;at com.cloudera.server.web.cmf.CmfLdapAuthenticationProvider.authenticate(CmfLdapAuthenticationProvider.java:107)&lt;BR /&gt;at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:156)&lt;BR /&gt;at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:174)&lt;BR /&gt;at org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter.attemptAuthentication(UsernamePasswordAuthenticationFilter.j ava:94)&lt;BR /&gt;at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:194)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:323)&lt;BR /&gt;at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:105)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:323)&lt;BR /&gt;at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:87)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:323)&lt;BR /&gt;at org.springframework.security.web.session.ConcurrentSessionFilter.doFilter(ConcurrentSessionFilter.java:125)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:323)&lt;BR /&gt;at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:173)&lt;BR /&gt;at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:237)&lt;BR /&gt;at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:167)&lt;BR /&gt;at org.mortbay.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1212)&lt;BR /&gt;at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:88)&lt;BR /&gt;at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:76)&lt;BR /&gt;at org.mortbay.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1212)&lt;BR /&gt;at org.mortbay.jetty.servlet.ServletHandler.handle(ServletHandler.java:399)&lt;BR /&gt;at org.mortbay.jetty.security.SecurityHandler.handle(SecurityHandler.java:216)&lt;BR /&gt;at org.mortbay.jetty.servlet.SessionHandler.handle(SessionHandler.java:182)&lt;BR /&gt;at org.mortbay.jetty.security.SecurityHandler.handle(SecurityHandler.java:216)&lt;BR /&gt;at org.mortbay.jetty.security.SecurityHandler.handle(SecurityHandler.java:216)&lt;BR /&gt;at org.mortbay.jetty.handler.ContextHandler.handle(ContextHandler.java:767)&lt;BR /&gt;at org.mortbay.jetty.webapp.WebAppContext.handle(WebAppContext.java:450)&lt;BR /&gt;at org.mortbay.jetty.handler.HandlerWrapper.handle(HandlerWrapper.java:152)&lt;BR /&gt;at org.mortbay.jetty.handler.StatisticsHandler.handle(StatisticsHandler.java:53)&lt;BR /&gt;at org.mortbay.jetty.handler.HandlerWrapper.handle(HandlerWrapper.java:152)&lt;BR /&gt;at org.mortbay.jetty.Server.handle(Server.java:326)&lt;BR /&gt;at org.mortbay.jetty.HttpConnection.handleRequest(HttpConnection.java:542)&lt;BR /&gt;at org.mortbay.jetty.HttpConnection$RequestHandler.content(HttpConnection.java:945)&lt;BR /&gt;at org.mortbay.jetty.HttpParser.parseNext(HttpParser.java:756)&lt;BR /&gt;at org.mortbay.jetty.HttpParser.parseAvailable(HttpParser.java:218)&lt;BR /&gt;at org.mortbay.jetty.HttpConnection.handle(HttpConnection.java:404)&lt;BR /&gt;at org.mortbay.io.nio.SelectChannelEndPoint.run(SelectChannelEndPoint.java:410)&lt;BR /&gt;at org.mortbay.thread.QueuedThreadPool$PoolThread.run(QueuedThreadPool.java:582)&lt;BR /&gt;2018-09-18 10:04:40,298 INFO 1978563421@scm-web-13:com.cloudera.server.web.cmf.AuthenticationFailureEventListener: Authentication failure for user: 'func_sv c_zab_cdh' from 10.99.195.186&lt;BR /&gt;2018-09-18 10:04:51,465 INFO avro-servlet-hb-processor-1:com.cloudera.server.common.AgentAvroServlet: (23 skipped) AgentAvroServlet: heartbeat processing stats: average=68ms, min=25ms, max=839ms.&lt;/P&gt;&lt;P class="p"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p"&gt;&lt;STRONG&gt;func_svc_zab_cdh i&lt;/STRONG&gt;s like any other user and must be able to login and user is present in the vsp.sas.com domain and in group "&lt;STRONG&gt;cloudera_manager_API"&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 14:11:34 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/LDAP-AD-authentication-failed/m-p/79981#M83557</guid>
      <dc:creator>desind</dc:creator>
      <dc:date>2018-09-18T14:11:34Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP/AD authentication failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/LDAP-AD-authentication-failed/m-p/80001#M83558</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/21997"&gt;@desind&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One of the only things I can think of that could have the results you are seeing is if the func_svc_zab_cdh user belongs to another Domain Controller.&amp;nbsp; You could try looking at the user's LDAP DN as a clue, but if I'm right, you can try using the Global Catalog to see if that allows you and the func_svc_zab_cdh user to authenticate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In your &lt;STRONG&gt;Administration --&amp;gt; Settings&lt;/STRONG&gt; search for &lt;STRONG&gt;LDAP URL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are using ldap, change the port to 3268&lt;/P&gt;&lt;P&gt;If you are using ldaps, change the port to 3269&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For instance:&lt;/P&gt;&lt;P&gt;change ldap://ad.example.com to ldap://ad.example.com:3268&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Save the change &lt;STRONG&gt;Restart&lt;/STRONG&gt; Cloudera Manager (service cloudera-scm-server restart)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reasoning:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- The exception shows that &lt;STRONG&gt;no&lt;/STRONG&gt; result was returned for a search for &lt;STRONG&gt;userPrincipalName=func_svc_zab_cdh@vsp.sas.com&lt;/STRONG&gt; in the &lt;STRONG&gt;dc=vsp,dc=sas,dc=com&lt;/STRONG&gt; subtree&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- You see in an Active Directory UI that the func_svc_zab_cdh user does have that UPN value&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- You can log in&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All these factors seem to indicate that the ldap search just cannot return the user's object.&amp;nbsp; Global Catalog keeps a copy of user objects that span DCs so if that user is in the domain (which the user appears to be) then a search of the GC may get the results you seek.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 18:36:32 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/LDAP-AD-authentication-failed/m-p/80001#M83558</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2018-09-18T18:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP/AD authentication failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/LDAP-AD-authentication-failed/m-p/80307#M83559</link>
      <description>&lt;P&gt;I was able to resolve this issue by moving the user and group under one OU. I think most likely it cannot do a backward search.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/4054"&gt;@bgooley&lt;/a&gt;&amp;nbsp;much appreciated. I learnt a few things in this process.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 19:10:44 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/LDAP-AD-authentication-failed/m-p/80307#M83559</guid>
      <dc:creator>desind</dc:creator>
      <dc:date>2018-09-25T19:10:44Z</dc:date>
    </item>
  </channel>
</rss>

