|
1 | 1 | ---
|
2 |
| -title: Configure external identity source for NSX-T Data Center |
3 |
| -description: Learn how to use the Azure VMware Solution to configure an external identity source for NSX-T Data Center. |
| 2 | +title: Set an external identity source for NSX-T Data Center |
| 3 | +description: Learn how to use Azure VMware Solution to set an external identity source for VMware NSX-T Data Center. |
4 | 4 | ms.topic: how-to
|
5 | 5 | ms.service: azure-vmware
|
6 | 6 | ms.date: 11/06/2023
|
7 | 7 | ms.custom: engagement-fy23
|
8 |
| - |
9 |
| - |
10 | 8 | ---
|
11 |
| -# Configure an external identity source for NSX-T Data Center |
12 |
| - |
13 |
| -In this article, you will learn how to configure an external identity source for the NSX-T Data Center in an Azure VMware Solution. The NSX-T Data Center can be configured to use an external LDAP directory service to authenticate users, enabling a user to log in using their Active Directory account credentials, or those from a 3rd party LDAP server. The account can then be assigned an NSX-T Data Center Role, like you have with on-premises environments, to provide RBAC for each NSX-T user. |
14 |
| - |
15 |
| - |
16 | 9 |
|
| 10 | +# Set an external identity source for NSX-T Data Center |
17 | 11 |
|
18 |
| -## Prerequisites |
| 12 | +In this article, learn how to set up an external identity source for VMware NSX-T Data Center in an instance of Azure VMware Solution. |
19 | 13 |
|
20 |
| -- A working connection from your Active Directory network to your Azure VMware Solution private cloud. </br> |
21 |
| -- A network path from your Active Directory server to the management network of Azure VMware solution where NSX-T is deployed. </br> |
22 |
| -- Best practice: Two domain controllers located in Azure in the same region as the Azure VMware Solution SDDC. </br> |
23 |
| -- Active Directory Domain Controller(s) with a valid certificate. The certificate could be issued by an [Active Directory Certificate Services Certificate Authority (CA)](https://social.technet.microsoft.com/wiki/contents/articles/2980.ldap-over-ssl-ldaps-certificate.aspx) or a [third-party CA](/troubleshoot/windows-server/identity/enable-ldap-over-ssl-3rd-certification-authority). |
| 14 | +You can set up NSX-T Data Center to use an external Lightweight Directory Access Protocol (LDAP) directory service to authenticate users. A user can sign in by using their Windows Server Active Directory account credentials or credentials from a third-party LDAP server. Then, the account can be assigned an NSX-T Data Center role, like in an on-premises environment, to provide role-based access for NSX-T Data Center users. |
24 | 15 |
|
| 16 | +:::image type="content" source="media/nsxt/azure-vmware-solution-to-ldap-server.png" alt-text="Screenshot that shows NSX-T Data Center connectivity to the LDAP Windows Server Active Directory server."::: |
25 | 17 |
|
26 |
| ->[!Note] |
27 |
| -> Self-sign certificates are not recommended for production environments. |
| 18 | +## Prerequisites |
28 | 19 |
|
29 |
| - |
30 |
| -- An account with Administrator permissions</br> |
31 |
| -- The Azure VMware Solution DNS zones and the DNS servers have been correctly deployed. See: [Configure NSX-T Data Center DNS for resolution to your Active Directory Domain and Configure DNS forwarder for Azure VMware Solution](configure-dns-azure-vmware-solution.md)</br> |
| 20 | +- A working connection from your Windows Server Active Directory network to your Azure VMware Solution private cloud. |
| 21 | +- A network path from your Windows Server Active Directory server to the management network of the instance of Azure VMware Solution in which NSX-T Data Center is deployed. |
| 22 | +- A Windows Server Active Directory domain controller that has a valid certificate. The certificate can be issued by a [Windows Server Active Directory Certificate Services Certificate Authority (CA)](https://social.technet.microsoft.com/wiki/contents/articles/2980.ldap-over-ssl-ldaps-certificate.aspx) or by a [third-party CA](/troubleshoot/windows-server/identity/enable-ldap-over-ssl-3rd-certification-authority). |
32 | 23 |
|
| 24 | + We recommend that you use two domain controllers that are located in the same Azure region as the Azure VMware Solution software-defined datacenter. |
33 | 25 |
|
34 |
| ->[!NOTE] |
35 |
| -> For more information about LDAPS and certificate issuance, see with your security or identity management team. |
| 26 | + > [!NOTE] |
| 27 | + > Self-signed certificates are not recommended for production environments. |
36 | 28 |
|
37 |
| -</br> |
| 29 | +- An account that has Administrator permissions. |
| 30 | +- Azure VMware Solution DNS zones and DNS servers that are correctly configured. For more information, see [Configure NSX-T Data Center DNS for resolution to your Windows Server Active Directory domain and set up DNS forwarder](configure-dns-azure-vmware-solution.md). |
38 | 31 |
|
39 |
| -## Configure NSX-T to use Active Directory as LDAPS identity source |
| 32 | +> [!NOTE] |
| 33 | +> For more information about Secure LDAP (LDAPS) and certificate issuance, contact your security team or your identity management team. |
40 | 34 |
|
41 |
| -1. Sign-in to NSX-T Manager and navigate to System, User Management, LDAP and click on “ADD IDENTITY SOURCE” |
42 |
| - |
43 |
| - |
| 35 | +## Use Windows Server Active Directory as an LDAPS identity source |
44 | 36 |
|
| 37 | +1. Sign in to NSX Manager, and then go to **System** > **User Management** > **LDAP** > **Add Identity Source**. |
45 | 38 |
|
46 |
| -2. Enter the Name, Domain Name (FQDN), the Type and base DN. Optionally add a description. |
47 |
| -The base DN is the container where your user accounts are kept, it is the starting point that an LDAP server uses when searching for users for an authentication request. For example CN=users,dc=azfta,dc=com. |
48 |
| ->[!NOTE] |
49 |
| -> You can use more than one directory as an LDAP provider, i.e. with multiple AD domains when using AVS as a way to consolidate workloads. |
50 |
| -</br> |
| 39 | + :::image type="content" source="media/nsxt/configure-nsx-t-pic-1.png" alt-text="Screenshot that shows NSX Manager with the options highlighted."::: |
51 | 40 |
|
52 |
| - |
| 41 | +1. Enter values for **Name**, **Domain Name (FQDN)**, **Type**, and **Base DN**. You can add a description (optional). |
53 | 42 |
|
| 43 | + The base DN is the container where your user accounts are kept. The base DN is the starting point that an LDAP server uses when it searches for users in an authentication request. For example, **CN=users,dc=azfta,dc=com**. |
54 | 44 |
|
55 |
| -3. Next, click Set (!) as shown on the screenshot above, then click on "ADD LDAP SERVER" and fill in the following fields |
| 45 | + > [!NOTE] |
| 46 | + > You can use more than one directory as an LDAP provider. An example is if you have multiple Windows Server Azure Directory domains, and you use Azure VMware Solution as a way to consolidate workloads. |
56 | 47 |
|
57 |
| - |
58 |
| -| Field | Explanation| |
59 |
| -|----------------------|------------| |
60 |
| -| Hostname/IP | This is the LDAP server’s FQDN or IP address. For example either azfta-dc01.azfta.com or 10.5.4.4| |
61 |
| -| LDAP Protocol | Select LDAPS| |
62 |
| -| Port Choose 636 | This is the default secure LDAP port.| |
63 |
| -| Enabled | Leave as ‘Yes’| |
64 |
| -| Use StartTLS | Only required if non-secured LDAP is being used.| |
65 |
| -| Bind Identity | Use your account with domain administrator permissions. For example [email protected] | |
66 |
| -| Password | Enter the password for the LDAP server, this is the password for the example [email protected] account. | |
67 |
| -| Certificate | Leave empty (see step 6)| |
| 48 | + :::image type="content" source="media/nsxt/configure-nsx-t-pic-2.png" alt-text="Screenshot that shows the User Management Add Identity Source page in NSX Manager." lightbox="media/nsxt/configure-nsx-t-pic-2.png"::: |
68 | 49 |
|
| 50 | +1. Next, under **LDAP Servers**, select **Set** as shown in the preceding screenshot. |
69 | 51 |
|
| 52 | +1. On **Set LDAP Server**, select **Add LDAP Server**, and then enter or select values for the following items: |
70 | 53 |
|
71 |
| - |
| 54 | + | Name | Action | |
| 55 | + |----------------------|------------| |
| 56 | + | **Hostname/IP** | Enter the LDAP server’s FQDN or IP address. For example, **azfta-dc01.azfta.com** or **10.5.4.4**. | |
| 57 | + | **LDAP Protocol** | Select **LDAPS**. | |
| 58 | + | **Port** | Leave the default secure LDAP port. | |
| 59 | + | **Enabled** | Leave as **Yes**. | |
| 60 | + | **Use Start TLS** | Required only if you use standard (unsecured) LDAP. | |
| 61 | + | **Bind Identity ** | Use your account that has domain Administrator permissions. For example, `<[email protected]>`. | |
| 62 | + | **Password ** | Enter the password for the LDAP server. This password is the one that you use with the example `<[email protected]>` account. | |
| 63 | + | **Certificate** | Leave empty (see step 6). | |
72 | 64 |
|
| 65 | + :::image type="content" source="media/nsxt/configure-nsx-t-pic-3.png" alt-text="Screenshot that shows the Set LDAP Server page to add an LDAP server."::: |
73 | 66 |
|
74 |
| -4. The screen will update, click Click ADD, then APPLY |
75 |
| - |
76 |
| - |
| 67 | +1. After the page updates and displays a connection status, select **Add**, and then select **Apply**. |
77 | 68 |
|
78 |
| -5. Back on the User Management screen, click "SAVE" to complete the changes. |
79 |
| - |
80 |
| -6. To add a second domain controller, or another external identity provider, go back to step 1. |
| 69 | + :::image type="content" source="media/nsxt/configure-nsx-t-pic-4.png" alt-text="Screenshot that shows details of a successful certificate retrieval."::: |
81 | 70 |
|
82 |
| ->[!NOTE] |
83 |
| -> Best practice is to have two domain controllers to act as LDAP servers. You can also put the LDAP servers behind a load balancer. |
| 71 | +1. On **User Management**, select **Save** to complete the changes. |
84 | 72 |
|
| 73 | +1. To add a second domain controller or another external identity provider, return to step 1. |
85 | 74 |
|
86 |
| -## Assign other NSX-T Data Center roles to Active Directory identities |
| 75 | +> [!NOTE] |
| 76 | +> A recommended practice is to have two domain controllers to act as LDAP servers. You can also put the LDAP servers behind a load balancer. |
87 | 77 |
|
88 |
| -After adding an external identity, you can assign NSX-T Data Center Roles to Active Directory security groups based on your organization's security controls. |
| 78 | +## Assign roles to Windows Server Active Directory identities |
89 | 79 |
|
90 |
| -1. Sign in to NSX-T Manager and navigate to System > Users Management > User Role Assignment and click Add |
| 80 | +After you add an external identity, you can assign NSX-T Data Center roles to Windows Server Active Directory security groups based on your organization's security controls. |
91 | 81 |
|
92 |
| - |
| 82 | +1. In NSX Manager, go to **System** > **User Management** > **User Role Assignment** > **Add**. |
93 | 83 |
|
94 |
| -2. Select **Add** > **Role Assignment for LDAP**. |
| 84 | + :::image type="content" source="media/nsxt/configure-nsx-t-pic-5.png" alt-text="Screenshot that shows the User Management page in NSX Manager." lightbox="media/nsxt/configure-nsx-t-pic-5.png"::: |
95 | 85 |
|
96 |
| - a. Select the external identity provider-this will be the Identity provider selected in Step 3 in the previous section. “NSX-T External Identity Provider” |
| 86 | +1. Select **Add** > **Role Assignment for LDAP**. |
97 | 87 |
|
98 |
| - b. Enter the first few characters of the user's name, sign in ID, or a group name to search the LDAP directory, then select a user or group from the list that appears. |
| 88 | + 1. Select the external identity provider that you selected in step 3 in the preceding section. For example, **NSX-T External Identity Provider**. |
99 | 89 |
|
100 |
| - c. Select a role, in this case we are assigning FTAdmin the role of CloudAdmin |
| 90 | + 1. Enter the first few characters of the user's name, the user's sign-in ID, or a group name to search the LDAP directory. Then select a user or group from the list of results. |
101 | 91 |
|
102 |
| - d. Select Save. |
103 |
| - |
104 |
| - |
| 92 | + 1. Select a role. In this example, assign the FTAdmin user the CloudAdmin role. |
105 | 93 |
|
| 94 | + 1. Select **Save**. |
106 | 95 |
|
| 96 | + :::image type="content" source="media/nsxt/configure-nsx-t-pic-6.png" alt-text="Screenshot that shows the Add User page in NSX Manager." lightbox="media/nsxt/configure-nsx-t-pic-6.png"::: |
107 | 97 |
|
108 |
| -3. Verify the permission assignment is displayed under **User Role Assignment**. |
109 |
| - |
110 |
| - |
| 98 | +1. Under **User Role Assignment**, verify that the permissions assignment appears. |
111 | 99 |
|
| 100 | + :::image type="content" source="media/nsxt/configure-nsx-t-pic-7.png" alt-text="Screenshot that shows the User Management page confirming that the user was added." lightbox="media/nsxt/configure-nsx-t-pic-7.png"::: |
112 | 101 |
|
113 |
| -4. Users should now be able to sign in to NSX-T Manager using their Active Directory credentials. |
| 102 | +Your users should now be able to sign in to NSX Manager by using their Windows Server Active Directory credentials. |
114 | 103 |
|
115 |
| -## Next steps |
116 |
| -Now that you configured the external source, you can also learn about: |
| 104 | +## Related content |
117 | 105 |
|
118 |
| -- [Configure external identity source for vCenter Server](configure-identity-source-vcenter.md) |
119 | 106 | - [Azure VMware Solution identity concepts](concepts-identity.md)
|
120 |
| -- [VMware product documentation](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-DB5A44F1-6E1D-4E5C-8B50-D6161FFA5BD2.html) |
| 107 | +- [Set an external identity source for vCenter Server](configure-identity-source-vcenter.md) |
| 108 | +- [VMware product documentation](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-DB5A44F1-6E1D-4E5C-8B50-D6161FFA5BD2.html) |
0 commit comments