NVP vProxy: FLR Data Protection Restore Client returns "Unable to get clients"

Summary: The Data Protection Restore Client (DPRC) is used to perform a VMware Virtual Machine (VM) File Level Restore (FLR). A Microsoft Active Directory (AD) or Linux Lightweight Directory Access Protocol (LDAP) user is used to authenticate the DPRC. After logging in, an error appears stating "Unable to get clients, Non admin user for unknown client requesting client info." ...

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Symptoms

  • NetWorker is integrated with external authorities (Microsoft Active Directory or Linux LDAP Server).
  • After accessing the DPRC using an external authority account, the following message appears.
Dell EMC Data Protection Restore Client

Cause

The user who is used for accessing the Dell EMC Data Protection Restore Client e is not a member of the VMware FLR Users NetWorker User group.

NOTE: This error may appear if the user has permissions but the system accessing the DPRC is not a VM or lacks image-based backups to display.

Resolution

1. Log in to the NetWorker Management Console (NMC) with an administrative account. For example, the default NetWorker Administrator account.
2. From the NMC, connect to the NetWorker server.
3. Go to the Server tab and click User Groups from the left menu.
4. Right-click the VMware FLR Users user group and open the properties.
5. Add the Distinguished Name This hyperlink is taking you to a website outside of Dell Technologies. of the external user or group to the External Roles field.

AD group set in the external roles field of FLR Users
6. From a web browser on a protected virtual machine, access the Data Protection Restore Client: https://networker-hostname:9090/flr
7. Select User and enter the external authority (AD or LDAP) user credentials.

You should be presented with the available backups for the VM.

NOTE: VM File Level Recoveries can be performed from the NMC, NetWorker Web User Interface (NWUI), and command-line on the NetWorker server.

Additional Information

The following methods can be used to help determine the AD/LDAP group a user belongs to. The Distinguished Name (DN) returned can be used in the VMware FLR Users external roles field.

Windows Powershell:

From a windows system on the same domain, run the following Powershell command:

Get-ADPrincipalGroupMembership -Identity USERNAME

Example:

PS C:\Users\Administrator.EMCLAB> Get-ADPrincipalGroupMembership -Identity flradmin

...
...

distinguishedName : CN=FLR_Users,DC=emclab,DC=local
GroupCategory     : Security
GroupScope        : Global
name              : FLR_Users
objectClass       : group
objectGUID        : 058495c7-71c7-42c6-be92-2d8f96a5c2aa
SamAccountName    : FLR_Users
SID               : S-1-5-21-4085282181-485696706-820049737-1104

The distinguishedName outputted by the command could be used in NetWorker to grant the AD user access to the NMC.

For more information about this command, see: https://docs.microsoft.com/en-us/powershell/module/activedirectory/get-adprincipalgroupmembership?view=windowsserver2022-ps This hyperlink is taking you to a website outside of Dell Technologies.


NetWorker authc_mgmt Command:

You can use the authc_mgmt command to query AD/LDAP user/group membership. On the NetWorker server, open a command prompt (or SSH session) and run the following command syntax:

authc_mgmt -u Administrator -e query-ldap-groups-for-user -D query-tenant=TENANT_NAME -D query-domain=DOMAIN_NAME -D user-name=USER_NAME
NOTE: You are prompted to enter the NetWorker Administrator account password.
For example:
PS C:\> authc_mgmt -u Administrator -e query-ldap-groups-for-user -D query-tenant=default -D query-domain=emclab.local -D user-name=flradmin
Enter password:
The query returns 1 records.
Group Name           Full Dn Name
FLR_USERS            CN=FLR_Users,dc=emclab,dc=local

The Full Dn Name of one of the groups can be used to grant this AD user access to the NMC.
The configuration and values that are needed for authc_mgmt commands can be collected by running:

authc_config -u Administrator -e find-all-configs
authc_config -u Administrator -e find-config -D config-id=CONFIG_ID
authc_config -u Administrator -e find-all-tenants

      The following article provides additional information regarding external authentication integration with NetWorker:

    Affected Products

    NetWorker

    Products

    NetWorker Family, NetWorker Series
    Article Properties
    Article Number: 000198107
    Article Type: Solution
    Last Modified: 19 Mar 2025
    Version:  4
    Find answers to your questions from other Dell users
    Support Services
    Check if your device is covered by Support Services.