Zu den Hauptinhalten
  • Bestellungen schnell und einfach aufgeben
  • Bestellungen anzeigen und den Versandstatus verfolgen
  • Profitieren Sie von exklusiven Prämien und Rabatten für Mitglieder
  • Erstellen Sie eine Liste Ihrer Produkte, auf die Sie jederzeit zugreifen können.

NetWorker: NMC Login Fails for AD or LDAP user with "You do not have privileges to use NetWorker Management Console."

Zusammenfassung: When attempting to log in to the NetWorker Management Console (NMC) with an AD or LDAP user, a message appears stating "You do not have privileges to use NetWorker Management Console." The console is accessible from using the NetWorker Administrator or other local NMC account. ...

Dieser Artikel gilt für Dieser Artikel gilt nicht für Dieser Artikel ist nicht an ein bestimmtes Produkt gebunden. In diesem Artikel werden nicht alle Produktversionen aufgeführt.

Symptome

  • The following error appears when attempting to log in to the NMC as an external (AD/LDAP) user:
error message
  • This same AD user can log in using the nsrlogin command-line option.
  • Authentication succeeds for the default NetWorker Administrator account.
  • In some situations, this error may only impact specific users.

nsrlogin

On the NetWorker server, open a command prompt (or SSH session) and run the following command syntax:
nsrlogin -t tenant_name -t domain -u username
  • tenant_name: In most configurations this value will be default; otherwise, it will be the tenant name configured by the NetWorker Administrator.
  • domain: the domain value that you normally use when logging into the NMC.
  • username: AD/LDAP username without domain prefix
For the example shown in the KB this would appear as:

CMD block

 

Ursache

The AD or LDAP user is not a member of an AD group that is set in the "NMC Roles" field.

Lösung

1. Log in to the NetWorker Management Console (NMC) as the default NetWorker Administrator account.
2. Go to Setup->Users and Roles->NMC Roles.
3. Review the Console Users and Application Administrators roles. The External Roles roles fields should contain the Distinguished Name Third party link icon (full path) of an AD group the user belongs to; optionally, the path of a single user can be set. 
For example:

NMC roles

4. Once the AD group DN for the AD user is added to the appropriate NMC Roles for that user, test logging into the NMC with that AD user.
 

Dell EMC header

 

 
 

Weitere Informationen

If the issue persists, you can verify the AD/LDAP group membership with the following options:
 

Windows Powershell:

From a windows system on the same domain, run the following Powershell command:

Get-ADPrincipalGroupMembership -Identity USERNAME

e.g:

PS C:\Users\Administrator.EMCLAB> Get-ADPrincipalGroupMembership -Identity bkupadmin

...
...

distinguishedName : CN=NetWorker_Admins,CN=Users,DC=emclab,DC=local
GroupCategory     : Security
GroupScope        : Global
name              : NetWorker_Admins
objectClass       : group
objectGUID        : 058495c7-71c7-42c6-be92-2d8f96a5c2aa
SamAccountName    : NetWorker_Admins
SID               : S-1-5-21-4085282181-485696706-820049737-1104

The distinguishedName outputted by the command could be used in NetWorker to grant the AD user access to the NMC.

For more information about this command, see: https://docs.microsoft.com/en-us/powershell/module/activedirectory/get-adprincipalgroupmembership?view=windowsserver2022-psThird party link icon

NetWorker authc_mgmt Command:

You can use the authc_mgmt command to query AD/LDAP user/group membership. On the NetWorker server, open a command prompt (or SSH session) and run the following command syntax:

authc_mgmt -u Administrator -e query-ldap-groups-for-user -D query-tenant=TENANT_NAME -D query-domain=DOMAIN_NAME -D user-name=USER_NAME
NOTE: You are prompted to enter the NetWorker Administrator account password.

For example:

 

PS C:\> authc_mgmt -u Administrator -e query-ldap-groups-for-user -D query-tenant=default -D query-domain=emclab.local -D user-name=bkupadmin
Enter password:
The query returns 2 records.
Group Name           Full Dn Name
Remote Desktop Users CN=Remote Desktop Users,CN=Builtin,dc=emclab,dc=local
NetWorker_Admins     CN=NetWorker_Admins,CN=Users,dc=emclab,dc=local

The Full Dn Name of one of the groups can be used to grant this AD user access to the NMC.
The configuration and values that are needed for authc_mgmt commands can be collected by running:
 

authc_config -u Administrator -e find-all-configs
authc_config -u Administrator -e find-config -D config-id=CONFIG_ID
authc_config -u Administrator -e find-all-tenants

 

 

 

Betroffene Produkte

NetWorker, NetWorker Management Console

Produkte

NetWorker Family, NetWorker Series
Artikeleigenschaften
Artikelnummer: 000196070
Artikeltyp: Solution
Zuletzt geändert: 02 Juni 2023
Version:  5
Antworten auf Ihre Fragen erhalten Sie von anderen Dell NutzerInnen
Support Services
Prüfen Sie, ob Ihr Gerät durch Support Services abgedeckt ist.