After our backup domain controller was taken ofline we are unable to log into Portal. We are running LSF 9.004 and are bound to LDAP via ADAM. We have multiple endpoints and SSO is configured for https for login only. LDAPBIND reports we are pointing to our primary domain controller which is online. Windows and Lid login authentication works fine. Obviously something is still pointing at our backup DC. Anyone know where else we might look?
Did you recycle/restart your system after the backup DC went down?
Have you reviewed your SSOP service to make sure it's pointing to the primary DC?
Stupid question: your backup DC would not happen to be the only GC right?
Did you check to see if your network settings > TCPIP > DNS is not pointing to the backup DC? Check them all for your Portal server, App server, LDAP server, database server. They should only be pointing to your other DCs with exception of the backup DC.
For example, if your LDAP server is using your backup DC as DNS, the second you shut off backupDC, LDAP goes offline regardless of where your LDAPBIND is point to.
Yes. We originally had both primary and secondary DC's defined in TCPIP setup in the correct order and removed the secondary altogether to no avail - Lawson was still going out to the backup DC. We ran a Wireshark trace and the log shows a sucessful user CN lookup to the primary DC and immediately after that our lawson server is issuing another lookup to the backup DC.
Posted By Joe O'Toole on 03/16/2010 02:39 PM No load balancer that I am aware of. We were able to resolve this with the help of Lawson and the issue seems to be related to stale or cached DNS information. We ran Wireshark traces and found that after the initial call from Lawson to the pimary DC was made to verify a users credentials, information was returned to Lawson informing it that a secondary AD store exists and Lawson than made a call to to the backup DC (although it didn't need any additional information). To resolve the issue we took the following steps: 1) Moved the backup DC to new IP address. 2) Deleted all DNS entries on both DC's related to backup DC's old IP address (foward lookup, reverse, forest entries, etc.) 3) Changed Lawson ssoconfig to call primary DC by IP rather than name. 4) Flush DNS cache on both DC's and the Lawson server 5) Reboot Lawson server (this step was key - without reboot there were still some references hiding to backup DC's old address). We also learned that although the backup DC serves as a failover for Windows authentication that LSF 9.00X can only point to 1 DC so if we lost our primary DC a manual change would be required to get Lawson authenticating again. According to Lawson support this limitation was addressed in LSF 9.01X and more than one DC and be defined in sso.
Anyone know how to define multiple DC in sso in 9.0.1.X? I looked everywhere and can't find it.