You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> * Export the certificate for LDAPS authentication
22
21
> * Upload the LDAPS certificate to blob storage and generate a SAS URL
23
22
> * Configure NSX-T DNS for resolution to your Active Directory Domain
@@ -28,28 +27,27 @@ In this article, you learn how to:
28
27
> * Remove AD group from the cloudadmin role
29
28
> * Remove existing external identity sources
30
29
31
-
32
-
33
30
## Prerequisites
34
31
35
32
- Connectivity from your Active Directory network to your Azure VMware Solution private cloud must be operational.
36
33
37
34
- For AD authentication with LDAPS:
38
35
39
-
- You will need access to the Active Directory Domain Controller(s) with Administrator permissions.
40
-
- Your Active Directory Domain Controller(s) must have LDAPS enabled with a valid certificate. The certificate could be issued by an [Active Directory Certificate Services Certificate Authority (CA)](https://social.technet.microsoft.com/wiki/contents/articles/2980.ldap-over-ssl-ldaps-certificate.aspx) or a [Third-party/Public CA](/troubleshoot/windows-server/identity/enable-ldap-over-ssl-3rd-certification-authority).
36
+
- You'll need access to the Active Directory Domain Controller(s) with Administrator permissions.
37
+
- Your Active Directory Domain Controller(s) must have LDAPS enabled with a valid certificate. The certificate could be issued by an [Active Directory Certificate Services Certificate Authority (CA)](https://social.technet.microsoft.com/wiki/contents/articles/2980.ldap-over-ssl-ldaps-certificate.aspx) or a [Third-party/Public CA](/troubleshoot/windows-server/identity/enable-ldap-over-ssl-3rd-certification-authority).
38
+
- You need to have a valid certificate. To create a certificate, follow the steps shown in [create a certificate for secure LDAP](https://learn.microsoft.com/azure/active-directory-domain-services/tutorial-configure-ldaps#create-a-certificate-for-secure-ldap). Make sure the certificate meets the requirements that are listed after the steps you used to create a certificate for secure LDAP.
41
39
>[!NOTE]
42
40
>Self-sign certificates are not recommended for production environments.
43
41
-[Export the certificate for LDAPS authentication](#export-the-certificate-for-ldaps-authentication) and upload it to an Azure Storage account as blob storage. Then, you'll need to [grant access to Azure Storage resources using shared access signature (SAS)](../storage/common/storage-sas-overview.md).
44
42
45
43
- Ensure Azure VMware Solution has DNS resolution configured to your on-premises AD. Enable DNS Forwarder from Azure portal. See [Configure DNS forwarder for Azure VMware Solution](configure-dns-azure-vmware-solution.md) for further information.
46
44
47
45
>[!NOTE]
48
-
>For further information about LDAPS and certificate issuance, consult with your security or identity management team.
46
+
>For more information about LDAPS and certificate issuance, see with your security or identity management team.
49
47
50
48
## Export the certificate for LDAPS authentication
51
49
52
-
First, verify that the certificate used for LDAPS is valid.
50
+
First, verify that the certificate used for LDAPS is valid. If you don't already have a certificate, follow the steps to [create a certificate for secure LDAP](https://learn.microsoft.com/azure/active-directory-domain-services/tutorial-configure-ldaps#create-a-certificate-for-secure-ldap) before you continue.
53
51
54
52
1. Sign in to a domain controller with administrator permissions where LDAPS is enabled.
55
53
@@ -61,53 +59,52 @@ First, verify that the certificate used for LDAPS is valid.
61
59
1. Expand the **Personal** folder under the **Certificates (Local Computer)** management console and select the **Certificates** folder to list the installed certificates.
62
60
63
61
:::image type="content" source="media/run-command/ldaps-certificate-personal-certficates.png" alt-text="Screenshot showing displaying the list of certificates." lightbox="media/run-command/ldaps-certificate-personal-certficates.png":::
64
-
62
+
65
63
1. Double click the certificate for LDAPS purposes. The **Certificate** General properties will display. Ensure the certificate date **Valid from** and **to** is current and the certificate has a **private key** that corresponds to the certificate.
66
64
67
-
:::image type="content" source="media/run-command/ldaps-certificate-personal-general.png" alt-text="Screenshot showing the properties of the certificate." lightbox="media/run-command/ldaps-certificate-personal-general.png":::
68
-
65
+
:::image type="content" source="media/run-command/ldaps-certificate-personal-general.png" alt-text="Screenshot showing the properties of the certificate." lightbox="media/run-command/ldaps-certificate-personal-general.png":::
66
+
69
67
1. On the same window, select the **Certification Path** tab and verify that the **Certification path** is valid, which it should include the certificate chain of root CA and optionally intermediate certificates and the **Certificate Status** is OK.
70
68
71
69
:::image type="content" source="media/run-command/ldaps-certificate-cert-path.png" alt-text="Screenshot showing the certificate chain." lightbox="media/run-command/ldaps-certificate-cert-path.png":::
72
-
70
+
73
71
1. Close the window.
74
72
75
73
Now proceed to export the certificate
76
74
77
75
1. Still on the Certificates console, right select the LDAPS certificate and select **All Tasks** > **Export**. The Certificate Export Wizard prompt is displayed, select the **Next** button.
78
76
79
-
1. In the **Export Private Key** section, select the 2nd option, **No, do not export the private key** and select the **Next** button.
80
-
1. In the **Export File Format** section, select the 2nd option, **Base-64 encoded X.509(.CER)** and then select the **Next** button.
77
+
1. In the **Export Private Key** section, select the second option, **No, do not export the private key** and select the **Next** button.
78
+
1. In the **Export File Format** section, select the second option, **Base-64 encoded X.509(.CER)** and then select the **Next** button.
81
79
1. In the **File to Export** section, select the **Browse...** button and select a folder location where to export the certificate, enter a name then select the **Save** button.
82
80
83
81
>[!NOTE]
84
82
>If more than one domain controller is LDAPS enabled, repeat the export procedure in the additional domain controller(s) to also export the corresponding certificate(s). Be aware that you can only reference two LDAPS server in the `New-LDAPSIdentitySource` Run Command. If the certificate is a wildcard certificate, for example ***.avsdemo.net** you only need to export the certificate from one of the domain controllers.
85
83
86
84
## Upload the LDAPS certificate to blob storage and generate a SAS URL
87
85
88
-
- Upload the certificate file (.cer format) you just exported to an Azure Storage account as blob storage. Then [grant access to Azure Storage resources using shared access signature (SAS)](../storage/common/storage-sas-overview.md).
86
+
- Upload the certificate file (.cer format) you just exported to an Azure Storage account as blob storage. Then [grant access to Azure Storage resources using shared access signature (SAS)](../storage/common/storage-sas-overview.md).
89
87
90
88
- If multiple certificates are required, upload each certificate individually and for each certificate, generate a SAS URL.
91
89
92
90
> [!IMPORTANT]
93
-
> Make sure to copy each SAS URL string(s), because they will no longer be available once you leave the page.
91
+
> Make sure to copy each SAS URL string(s), because they will no longer be available once you leave the page.
94
92
95
93
> [!TIP]
96
94
> Another alternative method for consolidating certificates is saving the certificate chains in a single file as mentioned in [this VMware KB article](https://kb.vmware.com/s/article/2041378), and generate a single SAS URL for the file that contains all the certificates.
97
95
98
96
## Configure NSX-T DNS for resolution to your Active Directory Domain
99
97
100
-
A DNS Zone needs to be created and added to the DNS Service, follow the instructions in [Configure a DNS forwarder in the Azure portal](./configure-dns-azure-vmware-solution.md) to complete these two steps.
98
+
A DNS Zone needs to be created and added to the DNS Service, follow the instructions in [Configure a DNS forwarder in the Azure portal](./configure-dns-azure-vmware-solution.md) to complete these two steps.
101
99
102
100
After completion, verify that your DNS Service has your DNS zone included.
103
101
:::image type="content" source="media/run-command/ldaps-dns-zone-service-configured.png" alt-text="Screenshot showing the DNS Service that includes the required DNS zone." lightbox="media/run-command/ldaps-dns-zone-service-configured.png":::
104
102
105
103
Your Azure VMware Solution Private cloud should now be able to resolve your on-premises Active Directory domain name properly.
106
104
107
-
108
105
## Add Active Directory over LDAP with SSL
109
106
110
-
In your Azure VMware Solution private cloud you'll run the `New-LDAPSIdentitySource` cmdlet to add an AD over LDAP with SSL as an external identity source to use with SSO into vCenter Server.
107
+
In your Azure VMware Solution private cloud, you'll run the `New-LDAPSIdentitySource` cmdlet to add an AD over LDAP with SSL as an external identity source to use with SSO into vCenter Server.
111
108
112
109
1. Browse to your Azure VMware Solution private cloud and then select **Run command** > **Packages** > **New-LDAPSIdentitySource**.
113
110
@@ -124,7 +121,7 @@ In your Azure VMware Solution private cloud you'll run the `New-LDAPSIdentitySou
124
121
|**SecondaryURL**| Secondary fall-back URL if there's primary failure. For example, **ldaps://yourbackupldapserver.avslab.local:636**. |
125
122
|**DomainAlias**| For Active Directory identity sources, the domain's NetBIOS name. Add the NetBIOS name of the AD domain as an alias of the identity source. Typically the **avsldap\** format. |
126
123
|**DomainName**| The FQDN of the domain, for example **avslab.local**. |
127
-
|**Name**| User-friendly name of the external identity source, for example, **avslab.local**. This is how it will be displayed in vCenter. |
124
+
|**Name**| User-friendly name of the external identity source. For example, **avslab.local**, is how it will be displayed in vCenter. |
128
125
|**Retain up to**| Retention period of the cmdlet output. The default value is 60 days. |
129
126
|**Specify name for execution**| Alphanumeric name, for example, **addexternalIdentity**. |
130
127
|**Timeout**| The period after which a cmdlet exits if taking too long to finish. |
@@ -134,14 +131,14 @@ In your Azure VMware Solution private cloud you'll run the `New-LDAPSIdentitySou
134
131
## Add Active Directory over LDAP
135
132
136
133
>[!NOTE]
137
-
>We don't recommend this method. Instead, use the [Add Active Directory over LDAP with SSL](#add-active-directory-over-ldap-with-ssl) method.
134
+
>We recommend you use the [Add Active Directory over LDAP with SSL](#add-active-directory-over-ldap-with-ssl) method.
138
135
139
-
You'll run the `New-LDAPIdentitySource` cmdlet to add AD over LDAP as an external identity source to use with SSO into vCenter Server.
136
+
You'll run the `New-LDAPIdentitySource` cmdlet to add AD over LDAP as an external identity source to use with SSO into vCenter Server.
1. Provide the required values or change the default values, and then select **Run**.
144
-
141
+
145
142
|**Field**|**Value**|
146
143
| --- | --- |
147
144
|**Name**| User-friendly name of the external identity source, for example, **avslab.local**. This is how it will be displayed in vCenter. |
@@ -189,23 +186,23 @@ You'll run the `Get-ExternalIdentitySources` cmdlet to list all external identit
189
186
1. Provide the required values or change the default values, and then select **Run**.
190
187
191
188
:::image type="content" source="media/run-command/run-command-get-external-identity-sources.png" alt-text="Screenshot showing how to list external identity source. ":::
192
-
189
+
193
190
|**Field**|**Value**|
194
191
| --- | --- |
195
192
|**Retain up to**|Retention period of the cmdlet output. The default value is 60 days. |
196
193
|**Specify name for execution**| Alphanumeric name, for example, **getExternalIdentity**. |
197
194
|**Timeout**| The period after which a cmdlet exits if taking too long to finish. |
198
195
199
196
1. Check **Notifications** or the **Run Execution Status** pane to see the progress.
200
-
197
+
201
198
:::image type="content" source="media/run-command/run-packages-execution-command-status.png" alt-text="Screenshot showing how to check the run commands notification or status." lightbox="media/run-command/run-packages-execution-command-status.png":::
202
199
200
+
## Assign more vCenter Server Roles to Active Directory Identities
203
201
204
-
## Assign additional vCenter Server Roles to Active Directory Identities
205
-
After you've added an external identity over LDAP or LDAPS you can assign vCenter Server Roles to Active Directory security groups based on your organization's security controls.
202
+
After you've added an external identity over LDAP or LDAPS, you can assign vCenter Server Roles to Active Directory security groups based on your organization's security controls.
206
203
207
204
1. After you sign in to vCenter Server with cloudadmin privileges, you can select an item from the inventory, select **ACTIONS** menu and select **Add Permission**.
208
-
205
+
209
206
:::image type="content" source="media/run-command/ldaps-vcenter-permission-assignment-1.png" alt-text="Screenshot displaying hot to add permission assignment." lightbox="media/run-command/ldaps-vcenter-permission-assignment-1.png":::
210
207
211
208
1. In the Add Permission prompt:
@@ -214,14 +211,14 @@ After you've added an external identity over LDAP or LDAPS you can assign vCente
214
211
1.*Role*. Select the desired role to assign.
215
212
1.*Propagate to children*. Optionally select the checkbox if permissions should be propagated down to children resources.
216
213
:::image type="content" source="media/run-command/ldaps-vcenter-permission-assignment-2.png" alt-text="Screenshot displaying assign the permission." lightbox="media/run-command/ldaps-vcenter-permission-assignment-3.png":::
217
-
214
+
218
215
1. Switch to the **Permissions** tab and verify the permission assignment was added.
219
216
:::image type="content" source="media/run-command/ldaps-vcenter-permission-assignment-3.png" alt-text="Screenshot displaying the add completion of permission assignment." lightbox="media/run-command/ldaps-vcenter-permission-assignment-3.png":::
220
217
1. Users should now be able to sign in to vCenter Server using their Active Directory credentials.
221
218
222
219
## Remove AD group from the cloudadmin role
223
220
224
-
You'll run the `Remove-GroupFromCloudAdmins` cmdlet to remove a specified AD group from the cloudadmin role.
221
+
You'll run the `Remove-GroupFromCloudAdmins` cmdlet to remove a specified AD group from the cloudadmin role.
@@ -236,7 +233,6 @@ You'll run the `Remove-GroupFromCloudAdmins` cmdlet to remove a specified AD gro
236
233
237
234
1. Check **Notifications** or the **Run Execution Status** pane to see the progress.
238
235
239
-
240
236
## Remove existing external identity sources
241
237
242
238
You'll run the `Remove-ExternalIdentitySources` cmdlet to remove all existing external identity sources in bulk.
@@ -253,16 +249,13 @@ You'll run the `Remove-ExternalIdentitySources` cmdlet to remove all existing ex
253
249
254
250
1. Check **Notifications** or the **Run Execution Status** pane to see the progress.
255
251
256
-
257
252
## Next steps
258
253
259
254
Now that you've learned about how to configure LDAP and LDAPS, you can learn more about:
260
255
261
256
-[How to configure storage policy](configure-storage-policy.md) - Each VM deployed to a vSAN datastore is assigned at least one VM storage policy. You can assign a VM storage policy in an initial deployment of a VM or when you do other VM operations, such as cloning or migrating.
262
-
263
257
-[Azure VMware Solution identity concepts](concepts-identity.md) - Use vCenter Server to manage virtual machine (VM) workloads and NSX-T Manager to manage and extend the private cloud. Access and identity management use the cloudadmin role for vCenter Server and restricted administrator rights for NSX-T Manager.
264
258
-[Configure external identity source for NSX-T](configure-external-identity-source-nsx-t.md)
0 commit comments