Skip to content

Commit d0d0393

Browse files
authored
Merge pull request #106921 from Jiancao164/caojian/update-docs-configuring-identitysoure
Change the steps of handling certificates to optional
2 parents b7c8f75 + 2d472b8 commit d0d0393

File tree

1 file changed

+9
-6
lines changed

1 file changed

+9
-6
lines changed

articles/azure-vmware/configure-identity-source-vcenter.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,8 @@ In this article, you learn how to:
1717

1818
> [!div class="checklist"]
1919
>
20-
> * Export the certificate for LDAPS authentication
21-
> * Upload the LDAPS certificate to blob storage and generate a SAS URL
20+
> * (Optional) Export the certificate for LDAPS authentication
21+
> * (Optional) Upload the LDAPS certificate to blob storage and generate a SAS URL
2222
> * Configure NSX-T DNS for resolution to your Active Directory Domain
2323
> * Add Active Directory over (Secure) LDAPS (LDAP over SSL) or (unsecure) LDAP
2424
> * Add existing AD group to cloudadmin group
@@ -27,6 +27,9 @@ In this article, you learn how to:
2727
> * Remove AD group from the cloudadmin role
2828
> * Remove existing external identity sources
2929
30+
>[!NOTE]
31+
>[Export the certificate for LDAPS authentication](#optional-export-the-certificate-for-ldaps-authentication) and [Upload the LDAPS certificate to blob storage and generate a SAS URL](#optional-upload-the-ldaps-certificate-to-blob-storage-and-generate-a-sas-url) are optional steps as now the certificate(s) will be downloaded from the domain controller(s) automatically through the parameter(s) **PrimaryUrl** and/or **SecondaryUrl** if the parameter **SSLCertificatesSasUrl** is not provided. You can still provide **SSLCertificatesSasUrl** and follow the optional steps to manually export and upload the certificate(s).
32+
3033
## Prerequisites
3134

3235
- Connectivity from your Active Directory network to your Azure VMware Solution private cloud must be operational.
@@ -38,14 +41,14 @@ In this article, you learn how to:
3841
- You need to have a valid certificate. To create a certificate, follow the steps shown in [create a certificate for secure LDAP](../active-directory-domain-services/tutorial-configure-ldaps.md#create-a-certificate-for-secure-ldap). Make sure the certificate meets the requirements that are listed after the steps you used to create a certificate for secure LDAP.
3942
>[!NOTE]
4043
>Self-sign certificates are not recommended for production environments.
41-
- [Export the certificate for LDAPS authentication](#export-the-certificate-for-ldaps-authentication) and upload it to an Azure Storage account as blob storage. Then, you'll need to [grant access to Azure Storage resources using shared access signature (SAS)](../storage/common/storage-sas-overview.md).
44+
- Optional: The certificate(s) will be downloaded from the domain controller(s) automatically through the parameter(s) **PrimaryUrl** and/or **SecondaryUrl** if the parameter **SSLCertificatesSasUrl** is not provided. If you prefer to manually export and upload the certificate(s), please [export the certificate for LDAPS authentication](#optional-export-the-certificate-for-ldaps-authentication) and upload it to an Azure Storage account as blob storage. Then, you'll need to [grant access to Azure Storage resources using shared access signature (SAS)](../storage/common/storage-sas-overview.md).
4245

4346
- Ensure Azure VMware Solution has DNS resolution configured to your on-premises AD. Enable DNS Forwarder from Azure portal. See [Configure DNS forwarder for Azure VMware Solution](configure-dns-azure-vmware-solution.md) for further information.
4447

4548
>[!NOTE]
4649
>For more information about LDAPS and certificate issuance, see with your security or identity management team.
4750
48-
## Export the certificate for LDAPS authentication
51+
## (Optional) Export the certificate for LDAPS authentication
4952

5053
First, verify that the certificate used for LDAPS is valid. If you don't already have a certificate, follow the steps to [create a certificate for secure LDAP](../active-directory-domain-services/tutorial-configure-ldaps.md#create-a-certificate-for-secure-ldap) before you continue.
5154

@@ -81,7 +84,7 @@ Now proceed to export the certificate
8184
>[!NOTE]
8285
>If more than one domain controller is LDAPS enabled, repeat the export procedure in the additional domain controller(s) to also export the corresponding certificate(s). Be aware that you can only reference two LDAPS server in the `New-LDAPSIdentitySource` Run Command. If the certificate is a wildcard certificate, for example ***.avsdemo.net** you only need to export the certificate from one of the domain controllers.
8386
84-
## Upload the LDAPS certificate to blob storage and generate a SAS URL
87+
## (Optional) Upload the LDAPS certificate to blob storage and generate a SAS URL
8588

8689
- Upload the certificate file (.cer format) you just exported to an Azure Storage account as blob storage. Then [grant access to Azure Storage resources using shared access signature (SAS)](../storage/common/storage-sas-overview.md).
8790

@@ -113,7 +116,7 @@ In your Azure VMware Solution private cloud, you'll run the `New-LDAPSIdentitySo
113116
| **Field** | **Value** |
114117
| --- | --- |
115118
| **GroupName** | The group in the external identity source that gives the cloudadmin access. For example, **avs-admins**. |
116-
| **CertificateSAS** | Path to SAS strings with the certificates for authentication to the AD source. If you're using multiple certificates, separate each SAS string with a comma. For example, **pathtocert1,pathtocert2**. |
119+
| **SSLCertificatesSasUrl** | Path to SAS strings with the certificates for authentication to the AD source. If you're using multiple certificates, separate each SAS string with a comma. For example, **pathtocert1,pathtocert2**. |
117120
| **Credential** | The domain username and password used for authentication with the AD source (not cloudadmin). The user must be in the **[email protected]** format. |
118121
| **BaseDNGroups** | Where to look for groups, for example, **CN=group1, DC=avsldap,DC=local**. Base DN is needed to use LDAP Authentication. |
119122
| **BaseDNUsers** | Where to look for valid users, for example, **CN=users,DC=avsldap,DC=local**. Base DN is needed to use LDAP Authentication. |

0 commit comments

Comments
 (0)