To address Active Directory Authentication issues, you will need to examine MonitorSvc.txt and search for instances similar to the ones listed below.


5/20/2026 09:41:46.350,ActiveDirectoryAuth.4,User <AD User.Name> is not part of any authorized role
5/20/2026 09:41:46.350,ActiveDirectoryAuth.6,User <AD User.Name> is a member of: ad_CJIS_Privileged_Training

5/20/2026 09:41:46.350,ActiveDirectoryAuth.6,User <AD User.Name> is a member of: ad_vpn_it
5/20/2026 09:41:46.350,ActiveDirectoryAuth.6,User <AD User.Name> is a member of: ad_okta_server_rdp
5/20/2026 09:41:46.350,ActiveDirectoryAuth.6,User <AD User.Name> is a member of: ad_okta_super_admin
5/20/2026 09:41:46.350,ActiveDirectoryAuth.6,User <AD User.Name> is a member of: ad_questys_view
5/20/2026 09:41:46.350,ActiveDirectoryAuth.6,User <AD User.Name> is a member of: gl_g_infosys_rw
5/20/2026 09:41:46.350,ActiveDirectoryAuth.6,User <AD User.Name> is a member of: ad_is_all
5/20/2026 09:41:46.350,ActiveDirectoryAuth.6,User <AD User.Name>is a member of: ESX Admins
5/20/2026 09:41:46.350,ActiveDirectoryAuth.6,User <AD User.Name> is a member of: paloalto_admins
5/20/2026 09:41:46.350,ActiveDirectoryAuth.6,User <AD User.Name> is a member of: gl_sql_sde_viewer
5/20/2026 09:41:46.350,ActiveDirectoryAuth.6,User <AD User.Name> is a member of: dl_PRTG_Admins
5/20/2026 09:41:46.350,ActiveDirectoryAuth.6,User <AD User.Name> is a member of: ad_GIS_all
5/20/2026 09:41:46.350,ActiveDirectoryAuth.6,User <AD User.Name> is a member of: Schema Admins
5/20/2026 09:41:46.350,ActiveDirectoryAuth.6,User <AD User.Name> is a member of: Enterprise Admins


Ensure that your AD User <AD User.Name> is part of one of the "Authorized" Groups. Navigate to Config Tool -> TotalView -> Web Interface -> Authentication. 


Additionally, consider 

Creating a dedicated group for "TotalView Admins" and placing users in this group. Then, add this group and assign it adequate permissions.