You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-vmware/configure-identity-source-vcenter.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ In this article, you learn how to:
43
43
- Ensure Azure VMware Solution has DNS resolution configured to your on-premises AD. Enable DNS Forwarder from Azure portal. See [Configure DNS forwarder for Azure VMware Solution](configure-dns-azure-vmware-solution.md) for further information.
44
44
45
45
>[!NOTE]
46
-
>For further information about LDAPS and certificate issuance, consult with your security or identity management team.
46
+
>For more information about LDAPS and certificate issuance, see with your security or identity management team.
47
47
48
48
## Export the certificate for LDAPS authentication
49
49
@@ -74,8 +74,8 @@ Now proceed to export the certificate
74
74
75
75
1. Still on the Certificates console, right select the LDAPS certificate and select **All Tasks** > **Export**. The Certificate Export Wizard prompt is displayed, select the **Next** button.
76
76
77
-
1. In the **Export Private Key** section, select the 2nd option, **No, do not export the private key** and select the **Next** button.
78
-
1. In the **Export File Format** section, select the 2nd option, **Base-64 encoded X.509(.CER)** and then select the **Next** button.
77
+
1. In the **Export Private Key** section, select the second option, **No, do not export the private key** and select the **Next** button.
78
+
1. In the **Export File Format** section, select the second option, **Base-64 encoded X.509(.CER)** and then select the **Next** button.
79
79
1. In the **File to Export** section, select the **Browse...** button and select a folder location where to export the certificate, enter a name then select the **Save** button.
80
80
81
81
>[!NOTE]
@@ -104,7 +104,7 @@ Your Azure VMware Solution Private cloud should now be able to resolve your on-p
104
104
105
105
## Add Active Directory over LDAP with SSL
106
106
107
-
In your Azure VMware Solution private cloud you'll run the `New-LDAPSIdentitySource` cmdlet to add an AD over LDAP with SSL as an external identity source to use with SSO into vCenter Server.
107
+
In your Azure VMware Solution private cloud, you'll run the `New-LDAPSIdentitySource` cmdlet to add an AD over LDAP with SSL as an external identity source to use with SSO into vCenter Server.
108
108
109
109
1. Browse to your Azure VMware Solution private cloud and then select **Run command** > **Packages** > **New-LDAPSIdentitySource**.
110
110
@@ -121,7 +121,7 @@ In your Azure VMware Solution private cloud you'll run the `New-LDAPSIdentitySou
121
121
|**SecondaryURL**| Secondary fall-back URL if there's primary failure. For example, **ldaps://yourbackupldapserver.avslab.local:636**. |
122
122
|**DomainAlias**| For Active Directory identity sources, the domain's NetBIOS name. Add the NetBIOS name of the AD domain as an alias of the identity source. Typically the **avsldap\** format. |
123
123
|**DomainName**| The FQDN of the domain, for example **avslab.local**. |
124
-
|**Name**| User-friendly name of the external identity source, for example, **avslab.local**. This is how it will be displayed in vCenter. |
124
+
|**Name**| User-friendly name of the external identity source. For example, **avslab.local**, is how it will be displayed in vCenter. |
125
125
|**Retain up to**| Retention period of the cmdlet output. The default value is 60 days. |
126
126
|**Specify name for execution**| Alphanumeric name, for example, **addexternalIdentity**. |
127
127
|**Timeout**| The period after which a cmdlet exits if taking too long to finish. |
@@ -131,7 +131,7 @@ In your Azure VMware Solution private cloud you'll run the `New-LDAPSIdentitySou
131
131
## Add Active Directory over LDAP
132
132
133
133
>[!NOTE]
134
-
>We don't recommend this method. Instead, use the [Add Active Directory over LDAP with SSL](#add-active-directory-over-ldap-with-ssl) method.
134
+
>We recommend you use the [Add Active Directory over LDAP with SSL](#add-active-directory-over-ldap-with-ssl) method.
135
135
136
136
You'll run the `New-LDAPIdentitySource` cmdlet to add AD over LDAP as an external identity source to use with SSO into vCenter Server.
137
137
@@ -197,9 +197,9 @@ You'll run the `Get-ExternalIdentitySources` cmdlet to list all external identit
197
197
198
198
:::image type="content" source="media/run-command/run-packages-execution-command-status.png" alt-text="Screenshot showing how to check the run commands notification or status." lightbox="media/run-command/run-packages-execution-command-status.png":::
199
199
200
-
## Assign additional vCenter Server Roles to Active Directory Identities
200
+
## Assign more vCenter Server Roles to Active Directory Identities
201
201
202
-
After you've added an external identity over LDAP or LDAPS you can assign vCenter Server Roles to Active Directory security groups based on your organization's security controls.
202
+
After you've added an external identity over LDAP or LDAPS, you can assign vCenter Server Roles to Active Directory security groups based on your organization's security controls.
203
203
204
204
1. After you sign in to vCenter Server with cloudadmin privileges, you can select an item from the inventory, select **ACTIONS** menu and select **Add Permission**.
0 commit comments