Troubleshooting Active Directory Authentication / AD login issues
Last updated February 7, 2025
āHelp! My users canāt log into the PaperCut User Web Interface, Client, or Mobility Print using their Active Directory Domain credentials, but internal user accounts can sign-in just fine. Whatās going on?ā
This could be an issue if youāve linked your PaperCut Application Server to use Active Directory as its user directory source (check out the How to sync users and groups with Active Directory details)ā¦. and for some reason the App Server is no longer to ātalkā to your Active Directory (AD).
Any internal user accounts that youāre using would not be impacted, since the authentication (and password) is managed entirely by PaperCut. For the same reason, the built in āadminā account would also not be impacted by any issues with the AD communication.
Check the obvious stuff
- Is numlock or caps lock on? (We have to ask.)
- Confirm the problem only affects domain-synced accounts. See if someone can authenticate with an internal user account, like the built-in admin (by logging into the user web interface, or printing through Mobility). If so, then the problem might only be affecting Windows Active Directory accounts.
- Make sure the password for the account youāre testing with is absolutely correct. What happens when you reset the userās password in Active Directory, and then copy/paste it into the user web interface login page?
- If this is impacting all logins or all authentication, we recommend running the PaperCut services (in this case the āPaperCut Application Serverā service) with a domain user account to see if security policies are blocking the āSYSTEMā account used by PaperCut services by default.
Further troubleshooting
Make sure the Netlogon Service is running on the PaperCut server
At least one customer let us know that domain users stopped being able to authenticate after they upgraded their Windows print server from 2012 to 2016. They were able to resolve the issue by following the steps in this Microsoft article on the netlogon service. (See the āResolutionā section, which highlights how to change the Netlogon service Startup type to Automatic, and make sure the service is then started).
The article also then recommends a server restart, even though not strictly required.
Check the Windows Security Logs
Check to see if Windows is handling the authentication requests at all. Open the Local Group Policy Editor: hit Start, type gpedit.msc
, and then select the resulting entry.
- Go to Local Computer Policy > Computer Configuration > Windows Settings > Security Settings > Local Policies > Audit Policy.
- In the right-hand pane, double-click Audit logon events.
- Check Success and Failure then click OK.
- To view these events, go to Event Viewer then Windows Logs > Security.
A successful login attempt for PaperCut services should have four events in the log:
If the authentication attempts donāt make it into the Security log, your client system is probably pointed at the wrong Domain Controller.
Check the IP protocol settings on the App Server
On the Application Server, run ipconfig /all
to determine if itās pointed to the organizationās DNS IP.
If the domain DNS IP is missing, then youāll have a bad time establishing connections to the domain controller, which will affect your ability to authenticate users via the Application Server.
Try running ānltestā
Run C:\Windows> nltest /sc_query:DOMAINNAME.COM
A successful secure channel connection to the domain controller should look like this:
If you donāt have any results for the secure channel, start troubleshooting with the basics:
- Is my NIC connected?
- Do I have a valid IP?
- Can I ping anything outside of the App Server?
- Do I have DNS server IPs configured?
- Are the dns servers responding?
(Test with:nslookup -type=soa test.com
, replacingtest.com
with the dns name of your Active Directory domain, which is probably what is listed in the Primary Dns Suffix line of ipconfig /all.)
Repair the connection if needed
You can repair the App Serverās domain connection without rebooting: use the PowerShell command Test-ComputerSecureChannel
with the āCredential
āRepair
options. Check out the Test-ComputerSecureChannel documentation from Microsoft.
Run the command, sign out, and then sign in back in with domain credentials.
For example, to repair the relationship with the test.paper.com domain, issue the command: @@Test-ComputerSecureChannel ācredential test.paper.com\Administrator āRepair
Keep in mind that only Powershell 3.0 and later have the -credential option for Test-ComputerSecureChannel.
If all else failsā¦
Try re-joining the App Server to the domain. This is a more painful option, but when things just donāt seem to be working correctly, it can sometimes save the day.
Still have questions?
Let us know! We love chatting about whatās going on under the hood. Feel free to leave a comment below or visit our Support Portal for further assistance.
Categories: Troubleshooting Articles , Authentication
Keywords: login error , authentication error , log in , ad , AD , active directory
Comments