How to troubleshoot problems with LDAP Broker
In this topic, you will learn how to troubleshoot typical problems with the operation of the Portnox™ Active Directory Broker.
| Error | Reason | Solutions |
|---|---|---|
| The Portnox Cloud portal does not list the broker |
|
|
| Broker status: Dormant | The broker hasn’t sent any data or logs to the cloud for more than 30 minutes |
|
| Broker status: Not operational | There are issues with the access to the directory cluster. |
|
| Broker status: Wrong LDAP credentials | The LDAP credentials are missing or wrong. This might happen if someone changed the admin credentials on the LDAP server, or if someone changed the LDAP server address in Portnox Cloud. |
|
| Broker status: Misconfigured | The directory cluster settings are missing or wrong. This is not a common status, such an issue can happen due to having old directory clusters with wrong settings, or if the cluster was deleted. |
|
| Broker status: Not updated | The broker is an old version. This can happen due to communication issues or if a new version of broker was published but not installed. |
|
| Broker status: Unreachable | There are issues with establishing a relay connection. |
|
| Broker status: Active | The LDAP Broker seems to work properly, but there are still issues. |
|
| Broker installation fails at Verifying PAP | A domain-level group policy restricts NLTM authentication. LDAP Broker uses NLTM to bind to Active Directory over LDAP for PAP verification. |
Adding LDAP Broker to the NTLM exception list in Group Policy:
|
| SSL (LDAPS) communication not working | The domain controllers were defined using IP addresses. |
|
| Multiple brokers configured but only one in Portnox Cloud | The Windows virtual machines were cloned and have the same system GUID. Check the GUID in the following registry key: | Create the Windows virtual machine for each broker from scratch, not by using the clone option. |
| AD/LDAP groups are not populated in Portnox Cloud. There is a log entry that says: Fail to access registry: Value cannot be null. | The Windows registry was damaged during installation. | Reinstall the broker. |
| Broker service not running | The LDAP Broker service must be set to Automatic and the service must be started. | Open the Windows Services console, look for Portnox™ Centraal Active Directory Broker, check its Properties, make sure that Startup type is set to Automatic, and click on the Start button. |
| Event logs: LDAP account 'apc' is missing. | LDAP Broker installation is corrupt. | Uninstall LDAP Broker using the Windows Control Panel. Download the latest version of LDAP Broker () and then install it. |
| During LDAP Broker update, a security tool may flag EXE files with random-looking names, for example kmcu3cji.suo.exe. | These temporary EXE files are part of the process of building a new broker version. Portnox signs them and they are not harmful. | Ignore the warnings from your security tool during the broker update about these temporary EXE files. |
| A device continues to authenticate successfully even after the user account has been removed from the Active Directory group mapped to a Cloud group. This behavior differs from the expected outcome, where removal from the AD group should revoke authentication. |
Group membership changes in AD are not enforced immediately. The account used by the device will remain authenticated until the next successful AD synchronization or the next reauthentication. If authentication still persists, the likely cause is cached authentication on the NAS device. The NAS may cache successful authentication results for a device or user. If the cache is not cleared or refreshed, the NAS may continue to allow access based on cached session data even after group removal. |
As a workaround, create a new account in AD, add it to the appropriate group, and remove or disable the original account in both AD and Portnox Cloud. Using RADIUS CoA (Change of Authorization) is the recommended long-term solution. RADIUS CoA allows the RADIUS server to dynamically enforce policy changes or disconnect active sessions without waiting for reauthentication or synchronization cycles. |
