Share via

Has anyone ran into issues setting up SSO for VMWare vCenter Server.

Troy Marshall 0 Reputation points
2026-04-07T17:55:06.22+00:00

I have 2 different vCenter servers running version 8.0.3 and on one I have sso working without any issues. On the second server it is configured exactly the same and I keep getting Access Denied when trying to log in. I've setup the scim and that's working. Within vCenter I have the same permissions setup as I do on the other vCenter, but don't know what I'm missing.

Microsoft Security | Microsoft Entra | Microsoft Entra ID

1 answer

Sort by: Most helpful
  1. Q&A Assist
    2026-04-07T17:55:28.9+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    For Azure VMware Solution vCenter, SSO with an external identity source (Microsoft Entra ID or Windows Server AD/LDAP) depends on a few AVS‑specific pieces that must be correct on each vCenter. Even if two vCenters look “the same”, a small difference in identity source configuration or permissions can cause Access Denied.

    Use the following checks on the failing vCenter and compare directly with the working one:

    1. Confirm the external identity source is actually registered and resolvable
    • In AVS, external identity sources (Windows Server AD via LDAPS or Entra ID) are added through Run command packages, not directly with native vCenter admin rights.
    • On the failing vCenter’s private cloud in the Azure portal, go to Run command → Packages → Microsoft.AVS.Identity and:
      • Verify the identity source was created successfully (for LDAPS, via New-LDAPSIdentitySource).
      • Use the command that lists all existing external identity sources and confirm the domain/identity provider entry matches the working vCenter (same DomainName, DomainAlias, URLs, etc.).
    • Ensure DNS resolution from AVS to the identity source works (NSX/DNS forwarder configured and pointing to the correct AD DNS servers), as required in the identity source setup.
    1. If using Windows Server AD via LDAPS, validate all New‑LDAPSIdentitySource parameters On the failing vCenter, re‑open Microsoft.AVS.Identity → New‑LDAPSIdentitySource and compare each parameter to the working vCenter:
    • PrimaryUrl / SecondaryUrl: Correct ldaps:// hostnames and port (636) and reachable from AVS.
    • DomainName: Correct AD FQDN.
    • DomainAlias: Correct NetBIOS name (e.g., DOMAIN), used in logon format DOMAIN\user.
    • BaseDNUsers / BaseDNGroups: Correct DNs that actually contain the users/groups being used.
    • Credential: A valid domain account that can query the directory.
    • SSLCertificatesSasUrl: If used, points to the correct LDAPS certificate(s); otherwise, ensure the certificate that vCenter downloads automatically is valid. Any mismatch here can cause successful SCIM sync but failed interactive sign‑in.
    1. If using Microsoft Entra ID as identity source, confirm vCenter privileges were granted via Run Command For Entra ID federation (vSphere 8.0 U2+), AVS CloudAdmin does not natively have the VcIdentityProviders.Manage privilege. AVS provides a Run Command to grant this:
    • Ensure Add‑VCenterCloudAdminRoleVcIdentityProvidersManagePrivilege was run on the failing vCenter before configuring the Entra ID identity provider.
    • If the identity provider was created without this step, remove and re‑add it using the documented Run Commands so that vCenter trusts Entra ID correctly.
    1. Verify group membership and role assignment in vCenter Even with a valid identity source, Access Denied occurs if the user’s group/role mapping differs:
    • Sign in to vCenter on the failing instance as CloudAdmin.
    • Navigate to an inventory object (for example, the vCenter root or a datacenter), then Actions → Add Permission.
    • In Domain, select the external identity source (AD or Entra ID) and search for the same user/group that works on the other vCenter.
    • Confirm:
      • The user is a member of the group configured in GroupName (for LDAPS) or the equivalent Entra group.
      • The group is assigned the expected role (for example, CloudAdmin or another vCenter role) and Propagate to children is set as needed.
    • Compare the Permissions tab on both vCenters to ensure identical domain, group, and role assignments.
    1. Check that the CloudAdmin emergency account is not being used for integration
    • The built‑in CloudAdmin account is intended only for break‑glass access.
    • Ensure the external identity integration (LDAPS or Entra ID) is configured using directory accounts/groups, not by trying to extend or reuse CloudAdmin beyond its supported scope.
    1. Re‑run the identity source Run Commands in order If any doubt remains about the configuration sequence on the failing vCenter:
    • Follow the documented order of Run Commands for identity source setup (certificate export/upload if used, DNS, New‑LDAPSIdentitySource or Entra ID provider commands, then role assignment).
    • Run them one at a time and confirm each completes successfully.

    If, after these checks, SCIM provisioning still works but interactive SSO fails only on one vCenter, focus on:

    • Differences in DomainAlias and BaseDNUsers/BaseDNGroups between the two vCenters.
    • Missing or different vCenter role assignments for the same groups.
    • Entra ID provider not created/managed via the AVS Run Commands on the failing instance.

    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.