NMC: Verify NetWorker Authentication Service is Running
Summary: NetWorker Management Console (NMC) authentication fails, reporting "An error occurred while validating user credentials. Verify NetWorker Authentication Service is Running [Failed to connect to server:9090; No Error]" ...
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Symptoms
The following error appears when attempting to access the NetWorker Management Console (NMC):

"An error occurred while validating user credentials. Verify NetWorker Authentication Service is Running [Failed to connect to server:9090; No Error]"
Cause
When the NMC server software is installed, a single NetWorker authentication hostname and service port (default 9090) are defined.
Resolution
Prerequisites:
Validate that the NetWorker authentication (authc) service is running, there are no port communication issues, and authentication is functioning:
- The Authentication Service is running on the NetWorker server:
nsrports -t AUTHC_SERVERNAME -p 9090
Example:
[root@nsr ~]# nsrports -t nsr.amer.lan -p 9090
Forward lookup for nsr.amer.lan
Query time: 0.000 sec
Canonical name (CNAME): nsr.amer.lan
Address (A): 192.168.9.150
Connect to port 9090: Succeeded (0.001 sec)
Reverse lookup for 192.168.9.150
Query time: 0.000 sec
Name: nsr.amer.lan
- Authentication on the NetWorker authentication (authc) server is successful:
nsrlogin -u Administrator
If successful:
nsrlogout
Example:
[admin@nsr ~]$ nsrlogin -u Administrator
130136:nsrlogin: Please enter password:
Authentication succeeded
[admin@nsr ~]$ nsrlogout
- The NetWorker Management Console (NMC) server can connect to port 9090 on the NetWorker authentication (authc) server:
Linux:
curl -v NSR_AUTHC:9090
Example:
[root@nsr ~]# curl -v nsr.amer.lan:9090
* Trying 192.168.9.150:9090...
* Connected to nsr.amer.lan (192.168.9.150) port 9090 (#0)
> GET / HTTP/1.1
> Host: nsr.amer.lan:9090
> User-Agent: curl/7.76.1
> Accept: */*
>
* Mark bundle as not supporting multiuse
< HTTP/1.1 400
< Content-Type: text/plain;charset=UTF-8
< Connection: close
<
Bad Request
This combination of host and port requires TLS.
* Closing connection 0
Windows (PowerShell):
tnc NSR_AUTHCSERVER -port 9090
Example:
PS C:\Users\administrator.AMER> tnc nsr.amer.lan -port 9090 ComputerName : nsr.amer.lan RemoteAddress : 192.168.9.150 RemotePort : 9090 InterfaceAlias : Ethernet0 SourceAddress : 192.168.9.122 TcpTestSucceeded : True
NOTE: If all the above checks succeed, proceed with the article. If the above steps present a service or communication issue, these must be resolved before proceeding.
Procedure:
- Open an elevated prompt on the NetWorker Management (NMC) server.
- Stop the NMC server gstd process:
Linux:
systemctl stop gstWindows:
net stop gstd
- Use the gstauthcfg command from the command prompt to change the NetWorker Authentication Service host used by the NMC server.
Linux:
/opt/lgtonmc/bin/gstauthcfg -c -t -h NSR_AUTHCSERVER -p 9090
Example:
[root@nsr ~]# /opt/lgtonmc/bin/gstauthcfg -c -t -h nsr.amer.lan -p 9090 121816:gstauthcfg: Authentication server on nsr.amer.lan is online. 121817:gstauthcfg: Configuration updated successfully.Windows:
"[INSTALL DRIVE]:\Program Files\EMC NetWorker\Management\GST\bin\gstauthcfg.exe" -c -t -h NSR_AUTHCSERVER -p 9090
Example:
C:\Users\administrator.AMER>"C:\Program Files\EMC NetWorker\Management\GST\bin\gstauthcfg.exe" -c -t -h nsr.amer.lan -p 9090 121816:gstauthcfg: Authentication server on nsr.amer.lan is online. 140643:gstauthcfg: Restart NMC server for the changes to take effect. 121817:gstauthcfg: Configuration updated successfully.
- Validate that the NMC server's gstd.conf reflects the correct authsvc_hostname and authsvc_port:
Linux: /opt/lgtonmc/etc/gstd.conf
Windows: [INSTALL DRIVE]:\Program Files\EMC NetWorker\Management\GST\etc\gstd.conf
Windows: [INSTALL DRIVE]:\Program Files\EMC NetWorker\Management\GST\etc\gstd.conf
- Start the EMC gstd process:
Linux:
systemctl start gst
Windows:
net start gstd
- When managing multiple NetWorker servers from a single NetWorker Management Console (NMC), establish trust and permissions between the NetWorker servers and the Authentication server.
nsrauthtrust -H NSR_AUTHCSERVER -P 9090 nsraddadmin -H NSR_AUTHCSERVER -P 9090
Example:
C:\Users\administrator.AMER>nsrauthtrust -H nsr.amer.lan -P 9090 C:\Users\administrator.AMER>nsraddadmin -H nsr.amer.lan -P 9090 134751:nsraddadmin: Added role 'cn=Administrators,cn=Groups,dc=nsr,dc=amer,dc=lan' to the 'Application Administrators' user group. 134751:nsraddadmin: Added role 'cn=Administrators,cn=Groups,dc=nsr,dc=amer,dc=lan' to the 'Security Administrators' user group. 134751:nsraddadmin: Added role 'cn=Users,cn=Groups,dc=nsr,dc=amer,dc=lan' to the 'Users' user group.
Additional Information
Affected Products
NetWorker, NetWorker Management ConsoleArticle Properties
Article Number: 000034546
Article Type: Solution
Last Modified: 14 Mar 2025
Version: 4
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.