Skip to content

Commit 7ef0e12

Browse files
authored
Merge pull request #215446 from suzizuber/szuber/update-configure-identity-source-vcenter
Update configure-identity-source-vcenter.md
2 parents 5005a02 + d68e5ce commit 7ef0e12

File tree

1 file changed

+28
-35
lines changed

1 file changed

+28
-35
lines changed

articles/azure-vmware/configure-identity-source-vcenter.md

Lines changed: 28 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,11 @@ title: Configure external identity source for vCenter Server
33
description: Learn how to configure Active Directory over LDAP or LDAPS for vCenter Server as an external identity source.
44
ms.topic: how-to
55
ms.service: azure-vmware
6-
ms.date: 04/22/2022
6+
ms.date: 10/21/2022
77
---
88

99
# Configure external identity source for vCenter Server
1010

11-
12-
1311
[!INCLUDE [vcenter-access-identity-description](includes/vcenter-access-identity-description.md)]
1412

1513
>[!NOTE]
@@ -18,6 +16,7 @@ ms.date: 04/22/2022
1816
In this article, you learn how to:
1917

2018
> [!div class="checklist"]
19+
>
2120
> * Export the certificate for LDAPS authentication
2221
> * Upload the LDAPS certificate to blob storage and generate a SAS URL
2322
> * Configure NSX-T DNS for resolution to your Active Directory Domain
@@ -28,28 +27,27 @@ In this article, you learn how to:
2827
> * Remove AD group from the cloudadmin role
2928
> * Remove existing external identity sources
3029
31-
32-
3330
## Prerequisites
3431

3532
- Connectivity from your Active Directory network to your Azure VMware Solution private cloud must be operational.
3633

3734
- For AD authentication with LDAPS:
3835

39-
- You will need access to the Active Directory Domain Controller(s) with Administrator permissions.
40-
- Your Active Directory Domain Controller(s) must have LDAPS enabled with a valid certificate. The certificate could be issued by an [Active Directory Certificate Services Certificate Authority (CA)](https://social.technet.microsoft.com/wiki/contents/articles/2980.ldap-over-ssl-ldaps-certificate.aspx) or a [Third-party/Public CA](/troubleshoot/windows-server/identity/enable-ldap-over-ssl-3rd-certification-authority).
36+
- You'll need access to the Active Directory Domain Controller(s) with Administrator permissions.
37+
- Your Active Directory Domain Controller(s) must have LDAPS enabled with a valid certificate. The certificate could be issued by an [Active Directory Certificate Services Certificate Authority (CA)](https://social.technet.microsoft.com/wiki/contents/articles/2980.ldap-over-ssl-ldaps-certificate.aspx) or a [Third-party/Public CA](/troubleshoot/windows-server/identity/enable-ldap-over-ssl-3rd-certification-authority).
38+
- You need to have a valid certificate. To create a certificate, follow the steps shown in [create a certificate for secure LDAP](https://learn.microsoft.com/azure/active-directory-domain-services/tutorial-configure-ldaps#create-a-certificate-for-secure-ldap). Make sure the certificate meets the requirements that are listed after the steps you used to create a certificate for secure LDAP.
4139
>[!NOTE]
4240
>Self-sign certificates are not recommended for production environments.
4341
- [Export the certificate for LDAPS authentication](#export-the-certificate-for-ldaps-authentication) and upload it to an Azure Storage account as blob storage. Then, you'll need to [grant access to Azure Storage resources using shared access signature (SAS)](../storage/common/storage-sas-overview.md).
4442

4543
- Ensure Azure VMware Solution has DNS resolution configured to your on-premises AD. Enable DNS Forwarder from Azure portal. See [Configure DNS forwarder for Azure VMware Solution](configure-dns-azure-vmware-solution.md) for further information.
4644

4745
>[!NOTE]
48-
>For further information about LDAPS and certificate issuance, consult with your security or identity management team.
46+
>For more information about LDAPS and certificate issuance, see with your security or identity management team.
4947
5048
## Export the certificate for LDAPS authentication
5149

52-
First, verify that the certificate used for LDAPS is valid.
50+
First, verify that the certificate used for LDAPS is valid. If you don't already have a certificate, follow the steps to [create a certificate for secure LDAP](https://learn.microsoft.com/azure/active-directory-domain-services/tutorial-configure-ldaps#create-a-certificate-for-secure-ldap) before you continue.
5351

5452
1. Sign in to a domain controller with administrator permissions where LDAPS is enabled.
5553

@@ -61,53 +59,52 @@ First, verify that the certificate used for LDAPS is valid.
6159
1. Expand the **Personal** folder under the **Certificates (Local Computer)** management console and select the **Certificates** folder to list the installed certificates.
6260

6361
:::image type="content" source="media/run-command/ldaps-certificate-personal-certficates.png" alt-text="Screenshot showing displaying the list of certificates." lightbox="media/run-command/ldaps-certificate-personal-certficates.png":::
64-
62+
6563
1. Double click the certificate for LDAPS purposes. The **Certificate** General properties will display. Ensure the certificate date **Valid from** and **to** is current and the certificate has a **private key** that corresponds to the certificate.
6664

67-
:::image type="content" source="media/run-command/ldaps-certificate-personal-general.png" alt-text="Screenshot showing the properties of the certificate." lightbox="media/run-command/ldaps-certificate-personal-general.png":::
68-
65+
:::image type="content" source="media/run-command/ldaps-certificate-personal-general.png" alt-text="Screenshot showing the properties of the certificate." lightbox="media/run-command/ldaps-certificate-personal-general.png":::
66+
6967
1. On the same window, select the **Certification Path** tab and verify that the **Certification path** is valid, which it should include the certificate chain of root CA and optionally intermediate certificates and the **Certificate Status** is OK.
7068

7169
:::image type="content" source="media/run-command/ldaps-certificate-cert-path.png" alt-text="Screenshot showing the certificate chain." lightbox="media/run-command/ldaps-certificate-cert-path.png":::
72-
70+
7371
1. Close the window.
7472

7573
Now proceed to export the certificate
7674

7775
1. Still on the Certificates console, right select the LDAPS certificate and select **All Tasks** > **Export**. The Certificate Export Wizard prompt is displayed, select the **Next** button.
7876

79-
1. In the **Export Private Key** section, select the 2nd option, **No, do not export the private key** and select the **Next** button.
80-
1. In the **Export File Format** section, select the 2nd option, **Base-64 encoded X.509(.CER)** and then select the **Next** button.
77+
1. In the **Export Private Key** section, select the second option, **No, do not export the private key** and select the **Next** button.
78+
1. In the **Export File Format** section, select the second option, **Base-64 encoded X.509(.CER)** and then select the **Next** button.
8179
1. In the **File to Export** section, select the **Browse...** button and select a folder location where to export the certificate, enter a name then select the **Save** button.
8280

8381
>[!NOTE]
8482
>If more than one domain controller is LDAPS enabled, repeat the export procedure in the additional domain controller(s) to also export the corresponding certificate(s). Be aware that you can only reference two LDAPS server in the `New-LDAPSIdentitySource` Run Command. If the certificate is a wildcard certificate, for example ***.avsdemo.net** you only need to export the certificate from one of the domain controllers.
8583
8684
## Upload the LDAPS certificate to blob storage and generate a SAS URL
8785

88-
- Upload the certificate file (.cer format) you just exported to an Azure Storage account as blob storage. Then [grant access to Azure Storage resources using shared access signature (SAS)](../storage/common/storage-sas-overview.md).
86+
- Upload the certificate file (.cer format) you just exported to an Azure Storage account as blob storage. Then [grant access to Azure Storage resources using shared access signature (SAS)](../storage/common/storage-sas-overview.md).
8987

9088
- If multiple certificates are required, upload each certificate individually and for each certificate, generate a SAS URL.
9189

9290
> [!IMPORTANT]
93-
> Make sure to copy each SAS URL string(s), because they will no longer be available once you leave the page.
91+
> Make sure to copy each SAS URL string(s), because they will no longer be available once you leave the page.
9492
9593
> [!TIP]
9694
> Another alternative method for consolidating certificates is saving the certificate chains in a single file as mentioned in [this VMware KB article](https://kb.vmware.com/s/article/2041378), and generate a single SAS URL for the file that contains all the certificates.
9795
9896
## Configure NSX-T DNS for resolution to your Active Directory Domain
9997

100-
A DNS Zone needs to be created and added to the DNS Service, follow the instructions in [Configure a DNS forwarder in the Azure portal](./configure-dns-azure-vmware-solution.md) to complete these two steps.
98+
A DNS Zone needs to be created and added to the DNS Service, follow the instructions in [Configure a DNS forwarder in the Azure portal](./configure-dns-azure-vmware-solution.md) to complete these two steps.
10199

102100
After completion, verify that your DNS Service has your DNS zone included.
103101
:::image type="content" source="media/run-command/ldaps-dns-zone-service-configured.png" alt-text="Screenshot showing the DNS Service that includes the required DNS zone." lightbox="media/run-command/ldaps-dns-zone-service-configured.png":::
104102

105103
Your Azure VMware Solution Private cloud should now be able to resolve your on-premises Active Directory domain name properly.
106104

107-
108105
## Add Active Directory over LDAP with SSL
109106

110-
In your Azure VMware Solution private cloud you'll run the `New-LDAPSIdentitySource` cmdlet to add an AD over LDAP with SSL as an external identity source to use with SSO into vCenter Server.
107+
In your Azure VMware Solution private cloud, you'll run the `New-LDAPSIdentitySource` cmdlet to add an AD over LDAP with SSL as an external identity source to use with SSO into vCenter Server.
111108

112109
1. Browse to your Azure VMware Solution private cloud and then select **Run command** > **Packages** > **New-LDAPSIdentitySource**.
113110

@@ -124,7 +121,7 @@ In your Azure VMware Solution private cloud you'll run the `New-LDAPSIdentitySou
124121
| **SecondaryURL** | Secondary fall-back URL if there's primary failure. For example, **ldaps://yourbackupldapserver.avslab.local:636**. |
125122
| **DomainAlias** | For Active Directory identity sources, the domain's NetBIOS name. Add the NetBIOS name of the AD domain as an alias of the identity source. Typically the **avsldap\** format. |
126123
| **DomainName** | The FQDN of the domain, for example **avslab.local**. |
127-
| **Name** | User-friendly name of the external identity source, for example, **avslab.local**. This is how it will be displayed in vCenter. |
124+
| **Name** | User-friendly name of the external identity source. For example, **avslab.local**, is how it will be displayed in vCenter. |
128125
| **Retain up to** | Retention period of the cmdlet output. The default value is 60 days. |
129126
| **Specify name for execution** | Alphanumeric name, for example, **addexternalIdentity**. |
130127
| **Timeout** | The period after which a cmdlet exits if taking too long to finish. |
@@ -134,14 +131,14 @@ In your Azure VMware Solution private cloud you'll run the `New-LDAPSIdentitySou
134131
## Add Active Directory over LDAP
135132

136133
>[!NOTE]
137-
>We don't recommend this method. Instead, use the [Add Active Directory over LDAP with SSL](#add-active-directory-over-ldap-with-ssl) method.
134+
>We recommend you use the [Add Active Directory over LDAP with SSL](#add-active-directory-over-ldap-with-ssl) method.
138135
139-
You'll run the `New-LDAPIdentitySource` cmdlet to add AD over LDAP as an external identity source to use with SSO into vCenter Server.
136+
You'll run the `New-LDAPIdentitySource` cmdlet to add AD over LDAP as an external identity source to use with SSO into vCenter Server.
140137

141138
1. Select **Run command** > **Packages** > **New-LDAPIdentitySource**.
142139

143140
1. Provide the required values or change the default values, and then select **Run**.
144-
141+
145142
| **Field** | **Value** |
146143
| --- | --- |
147144
| **Name** | User-friendly name of the external identity source, for example, **avslab.local**. This is how it will be displayed in vCenter. |
@@ -189,23 +186,23 @@ You'll run the `Get-ExternalIdentitySources` cmdlet to list all external identit
189186
1. Provide the required values or change the default values, and then select **Run**.
190187

191188
:::image type="content" source="media/run-command/run-command-get-external-identity-sources.png" alt-text="Screenshot showing how to list external identity source. ":::
192-
189+
193190
| **Field** | **Value** |
194191
| --- | --- |
195192
| **Retain up to** |Retention period of the cmdlet output. The default value is 60 days. |
196193
| **Specify name for execution** | Alphanumeric name, for example, **getExternalIdentity**. |
197194
| **Timeout** | The period after which a cmdlet exits if taking too long to finish. |
198195

199196
1. Check **Notifications** or the **Run Execution Status** pane to see the progress.
200-
197+
201198
:::image type="content" source="media/run-command/run-packages-execution-command-status.png" alt-text="Screenshot showing how to check the run commands notification or status." lightbox="media/run-command/run-packages-execution-command-status.png":::
202199

200+
## Assign more vCenter Server Roles to Active Directory Identities
203201

204-
## Assign additional vCenter Server Roles to Active Directory Identities
205-
After you've added an external identity over LDAP or LDAPS you can assign vCenter Server Roles to Active Directory security groups based on your organization's security controls.
202+
After you've added an external identity over LDAP or LDAPS, you can assign vCenter Server Roles to Active Directory security groups based on your organization's security controls.
206203

207204
1. After you sign in to vCenter Server with cloudadmin privileges, you can select an item from the inventory, select **ACTIONS** menu and select **Add Permission**.
208-
205+
209206
:::image type="content" source="media/run-command/ldaps-vcenter-permission-assignment-1.png" alt-text="Screenshot displaying hot to add permission assignment." lightbox="media/run-command/ldaps-vcenter-permission-assignment-1.png":::
210207

211208
1. In the Add Permission prompt:
@@ -214,14 +211,14 @@ After you've added an external identity over LDAP or LDAPS you can assign vCente
214211
1. *Role*. Select the desired role to assign.
215212
1. *Propagate to children*. Optionally select the checkbox if permissions should be propagated down to children resources.
216213
:::image type="content" source="media/run-command/ldaps-vcenter-permission-assignment-2.png" alt-text="Screenshot displaying assign the permission." lightbox="media/run-command/ldaps-vcenter-permission-assignment-3.png":::
217-
214+
218215
1. Switch to the **Permissions** tab and verify the permission assignment was added.
219216
:::image type="content" source="media/run-command/ldaps-vcenter-permission-assignment-3.png" alt-text="Screenshot displaying the add completion of permission assignment." lightbox="media/run-command/ldaps-vcenter-permission-assignment-3.png":::
220217
1. Users should now be able to sign in to vCenter Server using their Active Directory credentials.
221218

222219
## Remove AD group from the cloudadmin role
223220

224-
You'll run the `Remove-GroupFromCloudAdmins` cmdlet to remove a specified AD group from the cloudadmin role.
221+
You'll run the `Remove-GroupFromCloudAdmins` cmdlet to remove a specified AD group from the cloudadmin role.
225222

226223
1. Select **Run command** > **Packages** > **Remove-GroupFromCloudAdmins**.
227224

@@ -236,7 +233,6 @@ You'll run the `Remove-GroupFromCloudAdmins` cmdlet to remove a specified AD gro
236233

237234
1. Check **Notifications** or the **Run Execution Status** pane to see the progress.
238235

239-
240236
## Remove existing external identity sources
241237

242238
You'll run the `Remove-ExternalIdentitySources` cmdlet to remove all existing external identity sources in bulk.
@@ -253,16 +249,13 @@ You'll run the `Remove-ExternalIdentitySources` cmdlet to remove all existing ex
253249

254250
1. Check **Notifications** or the **Run Execution Status** pane to see the progress.
255251

256-
257252
## Next steps
258253

259254
Now that you've learned about how to configure LDAP and LDAPS, you can learn more about:
260255

261256
- [How to configure storage policy](configure-storage-policy.md) - Each VM deployed to a vSAN datastore is assigned at least one VM storage policy. You can assign a VM storage policy in an initial deployment of a VM or when you do other VM operations, such as cloning or migrating.
262-
263257
- [Azure VMware Solution identity concepts](concepts-identity.md) - Use vCenter Server to manage virtual machine (VM) workloads and NSX-T Manager to manage and extend the private cloud. Access and identity management use the cloudadmin role for vCenter Server and restricted administrator rights for NSX-T Manager.
264258
- [Configure external identity source for NSX-T](configure-external-identity-source-nsx-t.md)
265259
- [Azure VMware Solution identity concepts](concepts-identity.md)
266260
- [VMware product documentation](https://docs.vmware.com/en/VMware-NSX-T-Data-Center/3.1/administration/GUID-DB5A44F1-6E1D-4E5C-8B50-D6161FFA5BD2.html)
267261

268-

0 commit comments

Comments
 (0)