Skip to content

Commit a520a1d

Browse files
committed
Update configure-identity-source-vcenter.md
1 parent b2f04b8 commit a520a1d

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/azure-vmware/configure-identity-source-vcenter.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ In this article, you learn how to:
4343
- Ensure Azure VMware Solution has DNS resolution configured to your on-premises AD. Enable DNS Forwarder from Azure portal. See [Configure DNS forwarder for Azure VMware Solution](configure-dns-azure-vmware-solution.md) for further information.
4444

4545
>[!NOTE]
46-
>For further information about LDAPS and certificate issuance, consult with your security or identity management team.
46+
>For more information about LDAPS and certificate issuance, see with your security or identity management team.
4747
4848
## Export the certificate for LDAPS authentication
4949

@@ -74,8 +74,8 @@ Now proceed to export the certificate
7474

7575
1. Still on the Certificates console, right select the LDAPS certificate and select **All Tasks** > **Export**. The Certificate Export Wizard prompt is displayed, select the **Next** button.
7676

77-
1. In the **Export Private Key** section, select the 2nd option, **No, do not export the private key** and select the **Next** button.
78-
1. In the **Export File Format** section, select the 2nd option, **Base-64 encoded X.509(.CER)** and then select the **Next** button.
77+
1. In the **Export Private Key** section, select the second option, **No, do not export the private key** and select the **Next** button.
78+
1. In the **Export File Format** section, select the second option, **Base-64 encoded X.509(.CER)** and then select the **Next** button.
7979
1. In the **File to Export** section, select the **Browse...** button and select a folder location where to export the certificate, enter a name then select the **Save** button.
8080

8181
>[!NOTE]
@@ -104,7 +104,7 @@ Your Azure VMware Solution Private cloud should now be able to resolve your on-p
104104

105105
## Add Active Directory over LDAP with SSL
106106

107-
In your Azure VMware Solution private cloud you'll run the `New-LDAPSIdentitySource` cmdlet to add an AD over LDAP with SSL as an external identity source to use with SSO into vCenter Server.
107+
In your Azure VMware Solution private cloud, you'll run the `New-LDAPSIdentitySource` cmdlet to add an AD over LDAP with SSL as an external identity source to use with SSO into vCenter Server.
108108

109109
1. Browse to your Azure VMware Solution private cloud and then select **Run command** > **Packages** > **New-LDAPSIdentitySource**.
110110

@@ -121,7 +121,7 @@ In your Azure VMware Solution private cloud you'll run the `New-LDAPSIdentitySou
121121
| **SecondaryURL** | Secondary fall-back URL if there's primary failure. For example, **ldaps://yourbackupldapserver.avslab.local:636**. |
122122
| **DomainAlias** | For Active Directory identity sources, the domain's NetBIOS name. Add the NetBIOS name of the AD domain as an alias of the identity source. Typically the **avsldap\** format. |
123123
| **DomainName** | The FQDN of the domain, for example **avslab.local**. |
124-
| **Name** | User-friendly name of the external identity source, for example, **avslab.local**. This is how it will be displayed in vCenter. |
124+
| **Name** | User-friendly name of the external identity source. For example, **avslab.local**, is how it will be displayed in vCenter. |
125125
| **Retain up to** | Retention period of the cmdlet output. The default value is 60 days. |
126126
| **Specify name for execution** | Alphanumeric name, for example, **addexternalIdentity**. |
127127
| **Timeout** | The period after which a cmdlet exits if taking too long to finish. |
@@ -131,7 +131,7 @@ In your Azure VMware Solution private cloud you'll run the `New-LDAPSIdentitySou
131131
## Add Active Directory over LDAP
132132

133133
>[!NOTE]
134-
>We don't recommend this method. Instead, use the [Add Active Directory over LDAP with SSL](#add-active-directory-over-ldap-with-ssl) method.
134+
>We recommend you use the [Add Active Directory over LDAP with SSL](#add-active-directory-over-ldap-with-ssl) method.
135135
136136
You'll run the `New-LDAPIdentitySource` cmdlet to add AD over LDAP as an external identity source to use with SSO into vCenter Server.
137137

@@ -197,9 +197,9 @@ You'll run the `Get-ExternalIdentitySources` cmdlet to list all external identit
197197

198198
:::image type="content" source="media/run-command/run-packages-execution-command-status.png" alt-text="Screenshot showing how to check the run commands notification or status." lightbox="media/run-command/run-packages-execution-command-status.png":::
199199

200-
## Assign additional vCenter Server Roles to Active Directory Identities
200+
## Assign more vCenter Server Roles to Active Directory Identities
201201

202-
After you've added an external identity over LDAP or LDAPS you can assign vCenter Server Roles to Active Directory security groups based on your organization's security controls.
202+
After you've added an external identity over LDAP or LDAPS, you can assign vCenter Server Roles to Active Directory security groups based on your organization's security controls.
203203

204204
1. After you sign in to vCenter Server with cloudadmin privileges, you can select an item from the inventory, select **ACTIONS** menu and select **Add Permission**.
205205

0 commit comments

Comments
 (0)