CONNECTIONS_API_V2_KEY
variable in the AD/LDAP Connector configuration file.
AD LDAP Connector
).troubleshoot.cmd
file.C:\Program Files (x86)\Auth0\AD LDAP Connector\troubleshoot.cmd
.
AD LDAP Connector
).node troubleshoot.js
command.user
object.
This behavior requires the AD/LDAP Connector to perform additional queries against Active Directory, which can significantly increase the duration of the authentication process.
If you do not need groups to be returned on the user profile, Auth0 recommends that you explicitly disable the GROUPS
variable in the AD/LDAP Connector configuration file.
GROUPS_CACHE_SECONDS
variable in the AD/LDAP Connector configuration file.
nltest
command. For example, to test if a specific machine can reach the fabrikam.local
domain, use nltest /dsgetdc:fabrikam.local
.
To see to which domain the current server is connected to, use nltest /dsgetdc:
.
If a domain does not exist or cannot be reached, nltest
will return an error message: Getting DC name failed: Status = 1355 0x54b ERROR_NO_SUCH_DOMAIN
.
HTTP_PROXY
system environment variable, or you can set the HTTP_PROXY
variable in the AD/LDAP Connector configuration file. If using an authenticated proxy, the URL must be in the format http://USERNAME:PASSWORD@SERVER_URL:PORT
.
HTTP_PROXY
URL must be the URL of the proxy itself and cannot point to a .pac
(auto-config) file. If your proxy is configured through a .pac
file, download the .pac
file and find the proxy URL there.
An incorrectly configured proxy can result in several errors, such as Auth0 servers not reachable
and SELF_SIGNED_CERT_IN_CHAIN
errors.
If you have configured a proxy URL and restarted the AD/LDAP Connector, but are still seeing SELF_SIGNED_CERT_IN_CHAIN
errors, make sure that your server is trusting the root certificate of the proxy. On a Windows machine, you can check this by opening certmgr.msc
and looking for your proxy’s certificate. To learn more, read Proxy auto config (PAC) on Wikipedia.
https://{yourDomain}
).
To verify this, open a browser and navigate to https://{yourDomain}/test
.
read
permissions on the AD/LDAP server, and must be capable of querying groups for users.
DEBUG=kerberos-server
as a system environment variable.GROUPS_CACHE_SECONDS
variable in the AD/LDAP Connector configuration file, with a default value of 600 (seconds).
The purpose of this second-level cache is to minimize execution time. By default, the AD/LDAP Connector retrieves all group membership of a user recursively, which can be an expensive process in some AD/LDAP installations. This cache is deleted every time you restart the AD/LDAP Connector.
PROVISIONING_TICKET
configuration variable to https://{yourDomain}/p/ad/jUG0dN0R
.UNABLE_TO_GET_ISSUER_CERT_LOCALLY
error after configuring an AD/LDAP Connector, the Certificate Authority could be missing from your machine.
C:\Program Files (x86)\Auth0\AD LDAP Connector\logs.log
/var/log/auth0-adldap.log