You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-vmware/configure-identity-source-vcenter.md
+9-6Lines changed: 9 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,8 +17,8 @@ In this article, you learn how to:
17
17
18
18
> [!div class="checklist"]
19
19
>
20
-
> * Export the certificate for LDAPS authentication
21
-
> * Upload the LDAPS certificate to blob storage and generate a SAS URL
20
+
> *(Optional) Export the certificate for LDAPS authentication
21
+
> *(Optional) Upload the LDAPS certificate to blob storage and generate a SAS URL
22
22
> * Configure NSX-T DNS for resolution to your Active Directory Domain
23
23
> * Add Active Directory over (Secure) LDAPS (LDAP over SSL) or (unsecure) LDAP
24
24
> * Add existing AD group to cloudadmin group
@@ -27,6 +27,9 @@ In this article, you learn how to:
27
27
> * Remove AD group from the cloudadmin role
28
28
> * Remove existing external identity sources
29
29
30
+
>[!NOTE]
31
+
>[Export the certificate for LDAPS authentication](#optional-export-the-certificate-for-ldaps-authentication) and [Upload the LDAPS certificate to blob storage and generate a SAS URL](#optional-upload-the-ldaps-certificate-to-blob-storage-and-generate-a-sas-url) are optional steps as now the certificate(s) will be downloaded from the domain controller(s) automatically through the parameter(s) **PrimaryUrl** and/or **SecondaryUrl** if the parameter **SSLCertificatesSasUrl** is not provided. You can still provide **SSLCertificatesSasUrl** and follow the optional steps to manually export and upload the certificate(s).
32
+
30
33
## Prerequisites
31
34
32
35
- Connectivity from your Active Directory network to your Azure VMware Solution private cloud must be operational.
@@ -38,14 +41,14 @@ In this article, you learn how to:
38
41
- You need to have a valid certificate. To create a certificate, follow the steps shown in [create a certificate for secure LDAP](../active-directory-domain-services/tutorial-configure-ldaps.md#create-a-certificate-for-secure-ldap). Make sure the certificate meets the requirements that are listed after the steps you used to create a certificate for secure LDAP.
39
42
>[!NOTE]
40
43
>Self-sign certificates are not recommended for production environments.
41
-
-[Export the certificate for LDAPS authentication](#export-the-certificate-for-ldaps-authentication) and upload it to an Azure Storage account as blob storage. Then, you'll need to [grant access to Azure Storage resources using shared access signature (SAS)](../storage/common/storage-sas-overview.md).
44
+
-Optional: The certificate(s) will be downloaded from the domain controller(s) automatically through the parameter(s) **PrimaryUrl** and/or **SecondaryUrl** if the parameter **SSLCertificatesSasUrl** is not provided. If you prefer to manually export and upload the certificate(s), please [export the certificate for LDAPS authentication](#optional-export-the-certificate-for-ldaps-authentication) and upload it to an Azure Storage account as blob storage. Then, you'll need to [grant access to Azure Storage resources using shared access signature (SAS)](../storage/common/storage-sas-overview.md).
42
45
43
46
- Ensure Azure VMware Solution has DNS resolution configured to your on-premises AD. Enable DNS Forwarder from Azure portal. See [Configure DNS forwarder for Azure VMware Solution](configure-dns-azure-vmware-solution.md) for further information.
44
47
45
48
>[!NOTE]
46
49
>For more information about LDAPS and certificate issuance, see with your security or identity management team.
47
50
48
-
## Export the certificate for LDAPS authentication
51
+
## (Optional) Export the certificate for LDAPS authentication
49
52
50
53
First, verify that the certificate used for LDAPS is valid. If you don't already have a certificate, follow the steps to [create a certificate for secure LDAP](../active-directory-domain-services/tutorial-configure-ldaps.md#create-a-certificate-for-secure-ldap) before you continue.
51
54
@@ -81,7 +84,7 @@ Now proceed to export the certificate
81
84
>[!NOTE]
82
85
>If more than one domain controller is LDAPS enabled, repeat the export procedure in the additional domain controller(s) to also export the corresponding certificate(s). Be aware that you can only reference two LDAPS server in the `New-LDAPSIdentitySource` Run Command. If the certificate is a wildcard certificate, for example ***.avsdemo.net** you only need to export the certificate from one of the domain controllers.
83
86
84
-
## Upload the LDAPS certificate to blob storage and generate a SAS URL
87
+
## (Optional) Upload the LDAPS certificate to blob storage and generate a SAS URL
85
88
86
89
- Upload the certificate file (.cer format) you just exported to an Azure Storage account as blob storage. Then [grant access to Azure Storage resources using shared access signature (SAS)](../storage/common/storage-sas-overview.md).
87
90
@@ -113,7 +116,7 @@ In your Azure VMware Solution private cloud, you'll run the `New-LDAPSIdentitySo
113
116
|**Field**|**Value**|
114
117
| --- | --- |
115
118
|**GroupName**| The group in the external identity source that gives the cloudadmin access. For example, **avs-admins**. |
116
-
|**CertificateSAS**| Path to SAS strings with the certificates for authentication to the AD source. If you're using multiple certificates, separate each SAS string with a comma. For example, **pathtocert1,pathtocert2**. |
119
+
|**SSLCertificatesSasUrl**| Path to SAS strings with the certificates for authentication to the AD source. If you're using multiple certificates, separate each SAS string with a comma. For example, **pathtocert1,pathtocert2**. |
117
120
|**Credential**| The domain username and password used for authentication with the AD source (not cloudadmin). The user must be in the **[email protected]** format. |
118
121
|**BaseDNGroups**| Where to look for groups, for example, **CN=group1, DC=avsldap,DC=local**. Base DN is needed to use LDAP Authentication. |
119
122
|**BaseDNUsers**| Where to look for valid users, for example, **CN=users,DC=avsldap,DC=local**. Base DN is needed to use LDAP Authentication. |
0 commit comments