Data Protection Central Internal LDAP is Not Working After IDPA Upgrade

Summary: After the IDPA upgrade, Data Protection Central (DPC) server LDAP is not working.

Αυτό το άρθρο ισχύει για Αυτό το άρθρο δεν ισχύει για Αυτό το άρθρο δεν συνδέεται με κάποιο συγκεκριμένο προϊόν. Δεν προσδιορίζονται όλες οι εκδόσεις προϊόντων σε αυτό το άρθρο.

Symptoms

Internal LDAP is not working:

  • Identity Source is there, however shows as disconnected
  • The group is also gone from identify source
  • A role-mapping error is received when trying to add it

In the /var/log/dpc/iam/iam-provider/keycloak.log (as root), the following certificate errors are seen:

2024-10-21 17:17:53,937 ERROR [org.keycloak.services] (executor-thread-17) KC-SERVICES0055: Error when connecting to LDAP: <ACM FQDN>:636: javax.naming.CommunicationException: <AMC FQDN>:636 [Root exception is javax.net.ssl.SSLHandshakeException: PKIX path validation failed: java.security.cert.CertPathValidatorException: signature check failed]

In the /var/log/dpc/iam/iam-service/iam-service.log (as root), the following LDAP group add errors are seen:

2024-10-21 13:22:44,810 INFO https-jsse-nio-9922-exec-9 c.e.c.s.s.IndetitySourceService LDAP instance Id: ae45949d-40dd-46ee-8136-bc40e0d32644 . Adding group role mapping for [cn=dp_admin,ou=Group,dc=idpa,dc=local]

In the /var/log/dpc/elg/elg.log, group add errors are also seen:

2024-10-21 13:22:44,949 ERROR https-jsse-nio-9922-exec-9 c.e.c.s.s.GlobalExceptionHnalder IdentitySourceException:com.emc.clp.security.exception.IdentitySourceException: Failed to create group role mapping. Received error for ldap mapper group [MapperGroup(cn=dp_admin,ou=Group,dc=idpa,dc=local] creation.

Cause

After upgrading IDPA, the DPC server is unable to connect to ACM LDAP server or add the group. 

Resolution

Procedure:

  1. Log in to the DPC CLI as admin using SSH or PuTTY and su - to root user.
  2. Run the following commands:
service dp-iam restart
service msm-elg restart
  1. Log in to the DPC UI and go to Administration > Identity Sources.

Shows DPC UI menu for: Administration > Identity Sources

  1. Add the Identity Source for the ACM LDAP server:

Identity Source, fill in the information as below
 

Type = LDAP

Use SSL = select

Server Address = <ACM FQDN> (Use actual ACM Fully Qualified Domain Name)

Port = 636

Domain = dc=idpa,dc=local

Query User = uid=idpauser,ou=People,dc=idpa,dc=local

Query Password = idpauser password
  1. Click the Next button and then the Save button on the next screen.
  2. Highlight the LDAP server and click the |<- to open the sidebar. Enter the following for Group Search Name and click the Add Group button:
cn=dp_admin,ou=group,dc=idpa,dc=local

 

put in the following for "Group Search Name" and click the "Add Group" button

Once the Identity Source and the group are added, update the ldapIntegrationStatus.xml on the ACM server with the following process.

  1.  Log in to the ACM CLI using PuTTY or SSH as root and move to the following directory:
/usr/local/dataprotection/var/configmgr/server_data/config
  1. Make a backup of the ldpaIntgrationStatus.xml with the following command:
cp ldapIntegrationStatus.xml ldpaIntegrationStatus.xml.backup
  1. Edit ldpaIntegrationStatus.xml by opening it in vi. Find the DATA_PROTECTION_CENTRAL component tag and set it to INTEGRATED if it is not. It should look like the following:
        <component>
            <id>DATA_PROTECTION_CENTRAL</id>
            <status>INTEGRATED</status>
        </component>
  1. Save this change by pressing escape and then typing :x.

Now attempt to log in to DPC UI with idpauser account. 

If login fails, contact Dell Support for assistance with this issue.

Ιδιότητες άρθρου
Article Number: 000269136
Article Type: Solution
Τελευταία τροποποίηση: 11 Δεκ 2025
Version:  4
Βρείτε απαντήσεις στις ερωτήσεις σας από άλλους χρήστες της Dell
Υπηρεσίες υποστήριξης
Ελέγξτε αν η συσκευή σας καλύπτεται από τις Υπηρεσίες υποστήριξης.