Skip to content

Commit 9e42c75

Browse files
committed
added lightbox to images
1 parent 2ae6185 commit 9e42c75

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/azure-vmware/configure-external-identity-src-nsx-t.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Configure external identity source for NSX-T
3-
description: Learn how to use the Azure VMware Solution to configure external identity source for NSX-T.
3+
description: Learn how to use the Azure VMware Solution to configure an external identity source for NSX-T.
44
ms.topic: how-to
55
ms.service: azure-vmware
66
ms.date: 09/20/2022
@@ -32,7 +32,7 @@ In this article, you'll learn how to configure an external identity source for N
3232

3333
1. Enter a name for the identity source. For example, avslab.local.
3434

35-
1. Enter a domain name. The name must correspond to the domain name of your Active Directory server, if using Active Directory. For example, avslab.local.
35+
1. Enter a domain name. The name must correspond to the domain name of your Active Directory server, if using Active Directory. For example, `avslab.local`.
3636

3737
1. Select the type as Active Directory over LDAP, if using Active Directory.
3838

@@ -53,31 +53,31 @@ In this article, you'll learn how to configure an external identity source for N
5353
|Bind Identity | The format is `user@domainName`, or you can specify the distinguished name. For Active Directory, you can use either the userPrincipalName (user@domainName) or the distinguished name. For OpenLDAP, you must supply a distinguished name. This text box is required unless your LDAP server supports anonymous bind, then it's optional. Consult your LDAP server administrator if you aren't sure.|
5454
|Password |Enter a password for the LDAP server. This text box is required unless your LDAP server supports anonymous bind, then it's optional. Consult your LDAP server administrator.|
5555
1. Select **Add**. 
56-
:::image type="content" source="./media/nsxt/set-ldap-server.png" alt-text="Screenshot showing how to set an LDAP server." border="true":::
56+
:::image type="content" source="./media/nsxt/set-ldap-server.png" alt-text="Screenshot showing how to set an LDAP server." border="true" lightbox="../media/nsxt/set-ldap-server.png":::
5757

5858

59-
:::image type="content" source="./media/nsxt/accept-ldap-cert.png" alt-text="Screenshot showing how to save the certificate for an LDAP server." border="true":::
59+
:::image type="content" source="./media/nsxt/accept-ldap-cert.png" alt-text="Screenshot showing how to save the certificate for an LDAP server." border="true" lightbox="./media/nsxt/accept-ldap-cert.png":::
6060

6161
1. Select **Save** to complete the changes.
62-
:::image type="content" source="./media/nsxt/user-roles-ldap-server.png" alt-text="Screenshot showing user roles on an LDAP server." border="true":::
62+
:::image type="content" source="./media/nsxt/user-roles-ldap-server.png" alt-text="Screenshot showing user roles on an LDAP server." border="true" lightbox="./media/nsxt/user-roles-ldap-server.png":::
6363

6464
## Assign other NSX-T roles to Active Directory identities
6565

6666
After adding an external identity, you can assign NSX-T Roles to Active Directory security groups based on your organization's security controls.
6767

6868
1. Sign in to NSX-T and navigate to **System** > **Users and Roles**.
69-
:::image type="content" source="./media/nsxt/nsx-user-roles.png" alt-text="Screenshot showing how to add users to an LDAP server." border="true":::
69+
:::image type="content" source="./media/nsxt/nsx-user-roles.png" alt-text="Screenshot showing how to add users to an LDAP server." border="true" lightbox="./media/nsxt/nsx-user-roles.png":::
7070

7171
1. Select **Add** > **Role Assignment for LDAP**. 
7272

7373
1. Select a domain.
7474
1. Enter the first few characters of the user's name, sign in ID, or a group name to search the LDAP directory, then select a user or group from the list that appears.
7575
1. Select a role.
7676
1. Select **Save**.
77-
:::image type="content" source="./media/nsxt/user-roles-ldap-review.png" alt-text="Screenshot showing how to review different roles on the LDAP server." border="true":::
77+
:::image type="content" source="./media/nsxt/user-roles-ldap-review.png" alt-text="Screenshot showing how to review different roles on the LDAP server." border="true" lightbox="./media/nsxt/user-roles-ldap-review.png":::
7878

7979
1. Verify the permission assignment is displayed under **Users and Roles**.
80-
:::image type="content" source="./media/nsxt/user-roles-ldap-verify.png" alt-text="Screenshot showing how to verify user roles on an LDAP server." border="true":::
80+
:::image type="content" source="./media/nsxt/user-roles-ldap-verify.png" alt-text="Screenshot showing how to verify user roles on an LDAP server." border="true" lightbox="./media/nsxt/user-roles-ldap-verify.png":::
8181

8282
1. Users should now be able to sign in to NSX-T using their Active Directory credentials.
8383

0 commit comments

Comments
 (0)