NetWorker: AD login fails "nested exception is javax.naming.PartialResultException"

Summary: NetWorker is configured with an external authority resource: either Lightweight Directory Access Protocol (LDAP) or Microsoft Active Directory (AD). External user logins fail with HTTP 404 "Make sure that the server is running." ...

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Symptoms

NetWorker Management Console (NMC) authentication of external (LDAP or AD) users fails with HTTP 404:

HTTP 404 make sure the server is running

NetWorker Web User Interface (NWUI) authentication fails, stating that it failed to authenticate the user:

NWUI authentication failure

This issue is only seen for external users. Local NetWorker user accounts (such as the Administrator account) can authenticate successfully.

The NetWorker authentication server logs the following in the catalina.log.0 file:

Linux: /nsr/authc/logs/catalina.log.0
Windows: C:\Program Files\EMC NetWorker\nsr\authc-server\tomcat\logs\catalina.log.0

May 04, 2025 11:44:37 AM org.apache.catalina.core.StandardWrapperValve invoke
SEVERE: Servlet.service() for servlet [api-latest] in context with path [/auth-server] threw exception
org.springframework.ldap.PartialResultException: Unprocessed Continuation Reference(s); nested exception is javax.naming.PartialResultException: Unprocessed Continuation Reference(s); remaining name ''
NOTE: The NetWorker server is typically the authentication server for the NMC; however, in larger datazones where one NMC manages multiple NetWorker servers, check the NMC server's gstd.conf file to confirm which server is processing authentication for the NMC. 

Determining the authc server:

On the NMC server, open the gstd.conf file:

Linux: /opt/lgtonmc/etc/gstd.conf
Windows: C:\Program Files\EMC NetWorker\Management\GST\etc\gstd.conf

The file contains a authsvc_hostname line which defines the NetWorker authentication server used by the NMC.

[root@nsr ~]# cat /opt/lgtonmc/etc/gstd.conf | grep authsvc
    string authsvc_hostname = "nsr.amer.lan";
    int authsvc_port = 9090;

Cause

The error message indicates that there was an issue during an LDAP search operation. The PartialResultException suggests that the LDAP server returned a referral to another LDAP server or directory, but the referral is not processed correctly.

The external authority resource is configured without a user or group search path:

NetWorker Web User Interface (NWUI)->Authentication Server->External Authorities:

NWUI external authority resource

NOTE: These settings can also be found in the NMC. Log in to the NMC as Administrator and go to Setup->Users and Roles->External Authority.

Resolution

Use one of the following options.

Option 1:

Configure the external authority resource in NetWorker to use search paths. Search paths are used to restrict NetWorker visibility to a specific location and subtree in the domain hierarchy. Meaning, only users and groups under the paths specified are visible to NetWorker. Context referrals are ignored.

There is no specific value that resolves this issue. Settings are environment-specific and may require the domain administrator to determine the most appropriate values. The NetWorker authentication server's authc_mgmt command can be used to determine the paths of users and groups visible to NetWorker.

Query LDAP users visible to NetWorker:

authc_mgmt -u Administrator -p 'NetWorker_Admin_Password' -e query-ldap-users -D query-tenant=TENTANT_NAME -D query-domain=DOMAIN_NAME
Example:
[root@nsr ~]# authc_mgmt -u Administrator -p '!Password1' -e query-ldap-users -D query-tenant=default -D query-domain=amer.lan
The query returns 44 records.
User Name            Full Dn Name
Administrator        CN=Administrator,CN=Users,dc=amer,dc=lan
....
bkupadmin            CN=Backup Administrator,CN=Users,dc=amer,dc=lan

Query LDAP groups visible to NetWorker:

authc_mgmt -u Administrator -p 'NetWorker_Admin_Password' -e query-ldap-groups -D query-tenant=TENTANT_NAME -D query-domain=DOMAIN_NAME
Example:
[root@nsr ~]# authc_mgmt -u Administrator -p '!Password1' -e query-ldap-groups -D query-tenant=default -D query-domain=amer.lan
The query returns 75 records.
Group Name                              Full Dn Name
Administrators                          CN=Administrators,CN=Builtin,dc=amer,dc=lan
...
NetWorker_Admins                        CN=NetWorker_Admins,CN=Users,dc=amer,dc=lan

Query the LDAP group membership of an AD/LDAP user:

authc_mgmt -u Administrator -p 'NetWorker_Admin_Password' -e query-ldap-groups-for-user -D query-tenant=TENTANT_NAME -D query-domain=DOMAIN_NAME -D user-name=EXTERNAL_USERNAME
Example:
[root@nsr ~]# authc_mgmt -u Administrator -p '!Password1' -e query-ldap-groups-for-user -D query-tenant=default -D query-domain=amer.lan -D user-name=bkupadmin
The query returns 1 records.
Group Name       Full Dn Name
NetWorker_Admins CN=NetWorker_Admins,CN=Users,dc=amer,dc=lan

In the example provided, the AD group CN=NetWorker_Admins,CN=Users,DC=amer,DC=lan is used to grant AD users in this group Administrative access to the NMC and NetWorker server. 

Modifying the external authority Group Search path to include CN=Users (excluding Domain Component (DC) values) resolved the issue:

Updated Group Search Path  

NOTE: When specifying a Group Search Path or User Search Path, only entities which exist under the paths specified are visible to NetWorker. Any user (or group) outside of the paths specified cannot be seen. If the NetWorker environment uses both user and group external role definitions, then it may be necessary to define both the User and Group search paths. The NetWorker administrator and Domain Administrator must determine the appropriate user and group search paths to use in the external authority resource.

Option 2:

Consult with the domain administrator regarding configurations on the domain/LDAP server. Ensure that the LDAP server is correctly configured and that the referrals it provides are valid and accessible.

Additional Information

Affected Products

NetWorker

Products

NetWorker Family
Article Properties
Article Number: 000316897
Article Type: Solution
Last Modified: 04 May 2025
Version:  2
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.