NMC: Verify NetWorker Authentication Service is Running

Summary: NetWorker Management Console (NMC) authentication fails, reporting "An error occurred while validating user credentials. Verify NetWorker Authentication Service is Running [Failed to connect to server:9090; No Error]" ...

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Symptoms

The following error appears when attempting to access the NetWorker Management Console (NMC):

NMC Login Error

"An error occurred while validating user credentials. Verify NetWorker Authentication Service is Running [Failed to connect to server:9090; No Error]"
 

Cause

When the NMC server software is installed, a single NetWorker authentication hostname and service port (default 9090) are defined.

Resolution

Prerequisites:

Validate that the NetWorker authentication (authc) service is running, there are no port communication issues, and authentication is functioning:

  • The Authentication Service is running on the NetWorker server:
nsrports -t AUTHC_SERVERNAME -p 9090

Example:

[root@nsr ~]# nsrports -t nsr.amer.lan -p 9090
Forward lookup for nsr.amer.lan
Query time:              0.000 sec
Canonical name (CNAME):  nsr.amer.lan
Address (A):             192.168.9.150
Connect to port 9090:    Succeeded (0.001 sec)

Reverse lookup for 192.168.9.150
Query time:              0.000 sec
Name:                    nsr.amer.lan
  • Authentication on the NetWorker authentication (authc) server is successful:
nsrlogin -u Administrator
If successful:
nsrlogout
Example:
[admin@nsr ~]$ nsrlogin -u Administrator
130136:nsrlogin: Please enter password:
Authentication succeeded
[admin@nsr ~]$ nsrlogout
  • The NetWorker Management Console (NMC) server can connect to port 9090 on the NetWorker authentication (authc) server:
Linux:
curl -v NSR_AUTHC:9090
Example:
[root@nsr ~]# curl -v nsr.amer.lan:9090
*   Trying 192.168.9.150:9090...
* Connected to nsr.amer.lan (192.168.9.150) port 9090 (#0)
> GET / HTTP/1.1
> Host: nsr.amer.lan:9090
> User-Agent: curl/7.76.1
> Accept: */*
>
* Mark bundle as not supporting multiuse
< HTTP/1.1 400
< Content-Type: text/plain;charset=UTF-8
< Connection: close
<
Bad Request
This combination of host and port requires TLS.
* Closing connection 0
Windows (PowerShell):
tnc NSR_AUTHCSERVER -port 9090

Example:

PS C:\Users\administrator.AMER> tnc nsr.amer.lan -port 9090

ComputerName     : nsr.amer.lan
RemoteAddress    : 192.168.9.150
RemotePort       : 9090
InterfaceAlias   : Ethernet0
SourceAddress    : 192.168.9.122
TcpTestSucceeded : True
NOTE: If all the above checks succeed, proceed with the article. If the above steps present a service or communication issue, these must be resolved before proceeding.

Procedure:

  1. Open an elevated prompt on the NetWorker Management (NMC) server.
  2. Stop the NMC server gstd process:
Linux:
systemctl stop gst
Windows:
net stop gstd
  1. Use the gstauthcfg command from the command prompt to change the NetWorker Authentication Service host used by the NMC server.
Linux:
/opt/lgtonmc/bin/gstauthcfg -c -t -h NSR_AUTHCSERVER -p 9090
Example:
[root@nsr ~]# /opt/lgtonmc/bin/gstauthcfg -c -t -h nsr.amer.lan -p 9090
121816:gstauthcfg: Authentication server on nsr.amer.lan is online.
121817:gstauthcfg: Configuration updated successfully.
Windows:
"[INSTALL DRIVE]:\Program Files\EMC NetWorker\Management\GST\bin\gstauthcfg.exe" -c -t -h NSR_AUTHCSERVER -p 9090

Example:

C:\Users\administrator.AMER>"C:\Program Files\EMC NetWorker\Management\GST\bin\gstauthcfg.exe" -c -t -h nsr.amer.lan -p 9090
121816:gstauthcfg: Authentication server on nsr.amer.lan is online.
140643:gstauthcfg: Restart NMC server for the changes to take effect.
121817:gstauthcfg: Configuration updated successfully.
  1. Validate that the NMC server's gstd.conf reflects the correct authsvc_hostname and authsvc_port:
Linux: /opt/lgtonmc/etc/gstd.conf
Windows: [INSTALL DRIVE]:\Program Files\EMC NetWorker\Management\GST\etc\gstd.conf
  1. Start the EMC gstd process:
Linux:
systemctl start gst
Windows:
net start gstd
  1. When managing multiple NetWorker servers from a single NetWorker Management Console (NMC), establish trust and permissions between the NetWorker servers and the Authentication server.
nsrauthtrust -H NSR_AUTHCSERVER -P 9090
nsraddadmin -H NSR_AUTHCSERVER -P 9090
Example:
C:\Users\administrator.AMER>nsrauthtrust -H nsr.amer.lan -P 9090

C:\Users\administrator.AMER>nsraddadmin -H nsr.amer.lan -P 9090
134751:nsraddadmin: Added role 'cn=Administrators,cn=Groups,dc=nsr,dc=amer,dc=lan' to the 'Application Administrators' user group.
134751:nsraddadmin: Added role 'cn=Administrators,cn=Groups,dc=nsr,dc=amer,dc=lan' to the 'Security Administrators' user group.
134751:nsraddadmin: Added role 'cn=Users,cn=Groups,dc=nsr,dc=amer,dc=lan' to the 'Users' user group.

Additional Information

Affected Products

NetWorker, NetWorker Management Console
Article Properties
Article Number: 000034546
Article Type: Solution
Last Modified: 14 Mar 2025
Version:  4
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.