1.2.0

Table Of Contents
5 (Optional) To filter the attributes that the search returns, select the Filter attributes check box.
Selecting this check box makes searching in LDAP faster. However, you might need to use some extra
LDAP attributes for automation later.
6 (Optional) Select the Ignore referrals check box to disable referral handling.
When you select the check box, the system does not display any referrals.
7 In the Host reachable timeout text box, enter a value in milliseconds.
This value determines the timeout period for the test checking the status of the destination host.
8 Click Apply changes.
On the LDAP tab, the red triangle changes to a green circle to indicate that the component is now configured
correctly.
What to do next
Proceed with the database configuration.
Common Active Directory LDAP Errors
When you encounter the LDAP:error code 49 error message and experience problems connecting to your LDAP
authentication server, you can check which LDAP function is causing the problem.
Table 6-4 lists the most common Active Directory LDAP authentication errors.
Table 6-4. Common Active Directory LDAP Errors
Error Description
525 The user is not found.
52e The user credentials are not valid.
530 The user is not allowed to log in at this time.
531 The user is not allowed to log in to this workstation.
532 The password has expired.
533 This user account has been disabled.
701 This user account has expired.
773 The user must reset their password.
775 The user account has been locked.
Password Encryption and Hashing Mechanism
Orchestrator utilizes PBE with MD5 and DES encryption mechanism to encode the stored passwords used to
connect to the database, LDAP, and Orchestrator servers.
Table 6-5 shows the password encryption and hashing mechanisms used by Orchestrator.
Lifecycle Manager Installation and Configuration Guide
38 VMware, Inc.