PowerScale OneFS: Active Directory Provider Goes Missing After Join Attempt for Same Domain

Summary: Active Directory (AD) provider is deleted if an AD provider creates a request for the same provider name is sent and fails.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Symptoms

After performing an AD join with the same name of an AD provider that the cluster is already joined to, the provider may go missing. Administrators may see an error related to the join attempt, though this error could vary depending on the cause.

In the example below, we reproduce the issue with the provider TESTDOMAIN.LOCAL by using the incorrect account to facilitate the join.

Outputs from isi auth status and isi auth ads list -v show that the provider is present prior to running the command:
corebuddy-1# isi auth status
ID                                            Active Server                Status
----------------------------------------------------------------------------------
lsa-activedirectory-provider:TESTDOMAIN.LOCAL winserv2019.testdomain.local online
lsa-activedirectory-provider:DOMAIN2.LOCAL    domain2DC1.domain2.local     online
lsa-local-provider:System                     -                            active
lsa-local-provider:test                       -                            active
lsa-local-provider:domain2                    -                            active
lsa-file-provider:System                      -                            active
----------------------------------------------------------------------------------
Total: 6

corebuddy-1# isi auth ads list -v | grep -i testdomain
                     Name: TESTDOMAIN.LOCAL
           Primary Domain: TESTDOMAIN.LOCAL
                   Forest: testdomain.local
           NetBIOS Domain: TESTDOMAIN
                 Hostname: corebuddy.testdomain.local

Below we run the command. Notice that the incorrect username listed (for our example, we used the group name for 'Administrators' instead of the administrator account):
corebuddy-1# isi auth ads create --name=TESTDOMAIN.LOCAL --user=administrators
password:
Failed to join domain 'TESTDOMAIN.LOCAL' account 'corebuddy' user 'administrators@TESTDOMAIN.LOCAL': (LW_ERROR_KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN) Client not found in Kerberos database
Now the provider is missing. In WebUI, this might show up as unstyled, but in CLI it is not in the output for isi auth status.
orebuddy-1# isi auth status
ID                                         Active Server            Status
---------------------------------------------------------------------------
lsa-activedirectory-provider:DOMAIN2.LOCAL domain2DC1.domain2.local online
lsa-local-provider:System                  -                        active
lsa-local-provider:test                    -                        active
lsa-local-provider:domain2                 -                        active
lsa-file-provider:System                   -                        active
---------------------------------------------------------------------------
Total: 5

Because isi auth status can show that a provider is missing for other reasons, we must validate this further. The command isi auth ads list -v does not display any output matching the provider TESTDOMAIN.LOCAL below. This means that the configuration contains no entries matching the missing domain.
corebuddy-1# isi auth ads list -v |grep -i test
corebuddy-1#

LSASS logs show similar errors observed when running the initial command:
2024-06-11T21:25:21.298318+00:00 <30.4> corebuddy-1(id1) lsass[5467]: [LwKrb5GetTgtImpl /b/mnt/src/isilon/fsp/lwadvapi/threaded/krbtgt.c:247] KRB5 Error code: -1765328378 (Message: Client 'administrators@TESTDOMAIN.LOCAL' not found in Kerberos database)
2024-06-11T21:25:21.299207+00:00 <30.4> corebuddy-1(id1) lsass[5467]: [lsass] Error occurred while joining domain: Error code: 41737 (symbol: LW_ERROR_KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN)
The above scenario is not limited to the usage of incorrect credentials. If there is any condition present that would induce a failure to join the AD provider, then the failure results in the provider being deleted. For example, if the same name for the machine account is used elsewhere within the forest or in a trusted domain, that induces a failure. The only difference may be the error that is provided.

Cause

When performing an AD join against an already joined domain, the presence of conditions that would induce failure results in the AD provider being deleted. This is by design as OneFS would treat this as a "rejoin" attempt. When the failure is encountered, any related configuration to that specified auth provider is deleted.
corebuddy-1# isi auth status
ID                                         Active Server            Status
---------------------------------------------------------------------------
lsa-activedirectory-provider:DOMAIN2.LOCAL domain2DC1.domain2.local online
lsa-local-provider:System                  -                        active
lsa-local-provider:test                    -                        active
lsa-local-provider:domain2                 -                        active
lsa-file-provider:System                   -                        active
---------------------------------------------------------------------------
Total: 5

Resolution

Names of authentication providers are global, so having two providers of the same name is not supported. If there are no other outstanding conditions present that would prevent a join operation, rejoining the domain resolves the issue.

If there is a requirement to join the same AD domain provider with separate machine accounts, then the multi-instancing feature should be used. This is elaborated on in the "Zone-specific authentication providers" section of the OneFS Administration Guides. Remember that the rejoined AD provider must be added back to any access zones that previously had it to restore access.

See article PowerScale OneFS Info Hubs for documentation on your version of OneFS.

Affected Products

PowerScale OneFS
Article Properties
Article Number: 000183837
Article Type: Solution
Last Modified: 07 Nov 2025
Version:  6
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.