You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-vmware/configure-external-identity-src-nsx-t.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Configure external identity source for NSX-T
3
-
description: Learn how to use the Azure VMware Solution to configure external identity source for NSX-T.
3
+
description: Learn how to use the Azure VMware Solution to configure an external identity source for NSX-T.
4
4
ms.topic: how-to
5
5
ms.service: azure-vmware
6
6
ms.date: 09/20/2022
@@ -32,7 +32,7 @@ In this article, you'll learn how to configure an external identity source for N
32
32
33
33
1. Enter a name for the identity source. For example, avslab.local.
34
34
35
-
1. Enter a domain name. The name must correspond to the domain name of your Active Directory server, if using Active Directory. For example, avslab.local.
35
+
1. Enter a domain name. The name must correspond to the domain name of your Active Directory server, if using Active Directory. For example, `avslab.local`.
36
36
37
37
1. Select the type as Active Directory over LDAP, if using Active Directory.
38
38
@@ -53,31 +53,31 @@ In this article, you'll learn how to configure an external identity source for N
53
53
|Bind Identity | The format is `user@domainName`, or you can specify the distinguished name. For Active Directory, you can use either the userPrincipalName (user@domainName) or the distinguished name. For OpenLDAP, you must supply a distinguished name. This text box is required unless your LDAP server supports anonymous bind, then it's optional. Consult your LDAP server administrator if you aren't sure.|
54
54
|Password |Enter a password for the LDAP server. This text box is required unless your LDAP server supports anonymous bind, then it's optional. Consult your LDAP server administrator.|
55
55
1. Select **Add**.
56
-
:::image type="content" source="./media/nsxt/set-ldap-server.png" alt-text="Screenshot showing how to set an LDAP server." border="true":::
56
+
:::image type="content" source="./media/nsxt/set-ldap-server.png" alt-text="Screenshot showing how to set an LDAP server." border="true" lightbox="../media/nsxt/set-ldap-server.png":::
57
57
58
58
59
-
:::image type="content" source="./media/nsxt/accept-ldap-cert.png" alt-text="Screenshot showing how to save the certificate for an LDAP server." border="true":::
59
+
:::image type="content" source="./media/nsxt/accept-ldap-cert.png" alt-text="Screenshot showing how to save the certificate for an LDAP server." border="true" lightbox="./media/nsxt/accept-ldap-cert.png":::
60
60
61
61
1. Select **Save** to complete the changes.
62
-
:::image type="content" source="./media/nsxt/user-roles-ldap-server.png" alt-text="Screenshot showing user roles on an LDAP server." border="true":::
62
+
:::image type="content" source="./media/nsxt/user-roles-ldap-server.png" alt-text="Screenshot showing user roles on an LDAP server." border="true" lightbox="./media/nsxt/user-roles-ldap-server.png":::
63
63
64
64
## Assign other NSX-T roles to Active Directory identities
65
65
66
66
After adding an external identity, you can assign NSX-T Roles to Active Directory security groups based on your organization's security controls.
67
67
68
68
1. Sign in to NSX-T and navigate to **System** > **Users and Roles**.
69
-
:::image type="content" source="./media/nsxt/nsx-user-roles.png" alt-text="Screenshot showing how to add users to an LDAP server." border="true":::
69
+
:::image type="content" source="./media/nsxt/nsx-user-roles.png" alt-text="Screenshot showing how to add users to an LDAP server." border="true" lightbox="./media/nsxt/nsx-user-roles.png":::
70
70
71
71
1. Select **Add** > **Role Assignment for LDAP**.
72
72
73
73
1. Select a domain.
74
74
1. Enter the first few characters of the user's name, sign in ID, or a group name to search the LDAP directory, then select a user or group from the list that appears.
75
75
1. Select a role.
76
76
1. Select **Save**.
77
-
:::image type="content" source="./media/nsxt/user-roles-ldap-review.png" alt-text="Screenshot showing how to review different roles on the LDAP server." border="true":::
77
+
:::image type="content" source="./media/nsxt/user-roles-ldap-review.png" alt-text="Screenshot showing how to review different roles on the LDAP server." border="true" lightbox="./media/nsxt/user-roles-ldap-review.png":::
78
78
79
79
1. Verify the permission assignment is displayed under **Users and Roles**.
80
-
:::image type="content" source="./media/nsxt/user-roles-ldap-verify.png" alt-text="Screenshot showing how to verify user roles on an LDAP server." border="true":::
80
+
:::image type="content" source="./media/nsxt/user-roles-ldap-verify.png" alt-text="Screenshot showing how to verify user roles on an LDAP server." border="true" lightbox="./media/nsxt/user-roles-ldap-verify.png":::
81
81
82
82
1. Users should now be able to sign in to NSX-T using their Active Directory credentials.
0 commit comments