Skip to content

Commit a268094

Browse files
authored
Merge pull request #222222 from yoninalmsft/active-directory-LDAP-example
Active Directory integration example
2 parents b6fb93d + c14cd56 commit a268094

File tree

4 files changed

+12
-5
lines changed

4 files changed

+12
-5
lines changed

articles/defender-for-iot/organizations/manage-users-on-premises-management-console.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -134,9 +134,9 @@ For more information, see [Active Directory support on sensors and on-premises m
134134

135135
|Field |Description |
136136
|---------|---------|
137-
|**Domain Controller FQDN** | The fully qualified domain name (FQDN), exactly as it appears on your LDAP server. For example, enter `host1.subdomain.domain.com`. |
137+
|**Domain Controller FQDN** | The fully qualified domain name (FQDN), exactly as it appears on your LDAP server. For example, enter `host1.subdomain.contoso.com`. <br><br> If you encounter an issue with the integration using the FQDN, check your DNS configuration. You can also enter the explicit IP of the LDAP server instead of the FQDN when setting up the integration. |
138138
|**Domain Controller Port** | The port on which your LDAP is configured. |
139-
|**Primary Domain** | The domain name, such as `subdomain.domain.com`, and then select the connection type for your LDAP configuration. <br><br>Supported connection types include: **LDAPS/NTLMv3** (recommended), **LDAP/NTLMv3**, or **LDAP/SASL-MD5** |
139+
|**Primary Domain** | The domain name, such as `subdomain.contoso.com`, and then select the connection type for your LDAP configuration. <br><br>Supported connection types include: **LDAPS/NTLMv3** (recommended), **LDAP/NTLMv3**, or **LDAP/SASL-MD5** |
140140
|**Active Directory Groups** | Select **+ Add** to add an Active Directory group to each permission level listed, as needed. <br><br>When you enter a group name, make sure that you enter the group name as it's defined in your Active Directory configuration on the LDAP server. Then, make sure to use these groups when creating new sensor users from Active Directory.<br><br> Supported permission levels include **Read-only**, **Security Analyst**, **Admin**, and **Trusted Domains**.<br><br> Add groups as **Trusted endpoints** in a separate row from the other Active Directory groups. To add a trusted domain, add the domain name and the connection type of a trusted domain. You can configure trusted endpoints only for users who were defined under users.|
141141

142142
Select **+ Add Server** to add another server and enter its values as needed, and **Save** when you're done.
@@ -149,13 +149,16 @@ For more information, see [Active Directory support on sensors and on-premises m
149149
> - LDAP and LDAPS can't be configured for the same domain. However, you can configure each in different domains and then use them at the same time.
150150
>
151151
152+
For example:
153+
154+
:::image type="content" source="media/manage-users-on-premises-management-console/active-directory-config-example.png" alt-text="Screenshot of Active Directory integration configuration on the on-premises management console.":::
155+
152156
1. Create access group rules for on-premises management console users.
153157

154158
If you configure Active Directory groups for on-premises management console users, you must also create an access group rule for each Active Directory group. Active Directory credentials won't work for on-premises management console users without a corresponding access group rule.
155159

156160
For more information, see [Define global access permission for on-premises users](#define-global-access-permission-for-on-premises-users).
157161

158-
159162
## Define global access permission for on-premises users
160163

161164
Large organizations often have a complex user permissions model based on global organizational structures. To manage your on-premises Defender for IoT users, we recommend that you use a global business topology that's based on business units, regions, and sites, and then define user access permissions around those entities.

articles/defender-for-iot/organizations/manage-users-sensor.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,7 @@ Your new user is added and is listed on the sensor **Users** page.
5151
To edit a user, select the **Edit** :::image type="icon" source="media/manage-users-on-premises-management-console/icon-edit.png" border="false"::: icon for the user you want to edit, and change any values as needed.
5252

5353
To delete a user, select the **Delete** button for the user you want to delete.
54+
5455
## Integrate OT sensor users with Active Directory
5556

5657
Configure an integration between your sensor and Active Directory to:
@@ -74,9 +75,9 @@ For more information, see [Active Directory support on sensors and on-premises m
7475

7576
|Name |Description |
7677
|---------|---------|
77-
|**Domain Controller FQDN** | The fully qualified domain name (FQDN), exactly as it appears on your LDAP server. For example, enter `host1.subdomain.domain.com`. |
78+
|**Domain Controller FQDN** | The fully qualified domain name (FQDN), exactly as it appears on your LDAP server. For example, enter `host1.subdomain.contoso.com`. <br><br> If you encounter an issue with the integration using the FQDN, check your DNS configuration. You can also enter the explicit IP of the LDAP server instead of the FQDN when setting up the integration. |
7879
|**Domain Controller Port** | The port where your LDAP is configured. |
79-
|**Primary Domain** | The domain name, such as `subdomain.domain.com`, and then select the connection type for your LDAP configuration. <br><br>Supported connection types include: **LDAPS/NTLMv3** (recommended), **LDAP/NTLMv3**, or **LDAP/SASL-MD5** |
80+
|**Primary Domain** | The domain name, such as `subdomain.contoso.com`, and then select the connection type for your LDAP configuration. <br><br>Supported connection types include: **LDAPS/NTLMv3** (recommended), **LDAP/NTLMv3**, or **LDAP/SASL-MD5** |
8081
|**Active Directory Groups** | Select **+ Add** to add an Active Directory group to each permission level listed, as needed. <br><br> When you enter a group name, make sure that you enter the group name exactly as it's defined in your Active Directory configuration on the LDAP server. You'll use these group names when [adding new sensor users](#add-new-ot-sensor-users) with Active Directory.<br><br> Supported permission levels include **Read-only**, **Security Analyst**, **Admin**, and **Trusted Domains**. |
8182

8283

@@ -92,6 +93,9 @@ For more information, see [Active Directory support on sensors and on-premises m
9293

9394
1. When you've added all your Active Directory servers, select **Save**.
9495

96+
For example:
97+
98+
:::image type="content" source="media/manage-users-sensor/active-directory-integration-example.png" alt-text="Screenshot of the active directory integration configuration on the sensor.":::
9599

96100
## Change a sensor user's password
97101

Loading
51.5 KB
Loading

0 commit comments

Comments
 (0)