Add Active Directory over LDAP or OpenLDAP as an Identity Source for VMware Cloud Foundation
Users can log in to the
SDDC Manager
UI
only if they are in a domain that has been added as a vCenter Single Sign-On identity
source. vCenter Single Sign-On administrator users can add identity sources, or change the
settings for identity sources that they added. You can use identity sources to attach
one or more domains to vCenter Single Sign-On. A domain is a repository for users
and groups that the vCenter Single Sign-On server can use for user authentication
with
VMware Cloud Foundation
. By default,
vCenter Single Sign-On includes the system domain (for example,
vsphere.local
) as an identity source. You can add Active
Directory over LDAP or an OpenLDAP directory service as idenitity sources.- In the navigation pane, click.
- ClickIdentity Provider.
- ClickAddand selectAD over LDAPorOpenLDAP.TheConnect Identity Providerwizard opens.
- ClickNext.
- Enter the server settings and clickNext.Active Directory over LDAP and OpenLDAP Server SettingsOptionDescriptionIdentity Source NameName of the identity source.Base Distinguished Name for UsersBase Distinguished Name for users. Enter the DN from which to start user searches. For example,cn=Users,dc=myCorp,dc=com.Base Distinguished Name for GroupsThe Base Distinguished Name for groups. Enter the DN from which to start group searches. For example,cn=Groups,dc=myCorp,dc=com.Domain NameThe FQDN of the domain.Domain AliasFor Active Directory identity sources, the domain's NetBIOS name. Add the NetBIOS name of the Active Directory domain as an alias of the identity source if you are using SSPI authentications.For OpenLDAP identity sources, the domain name in capital letters is added if you do not specify an alias.User NameID of a user in the domain who has a minimum of read-only access to Base DN for users and groups. The ID can be in any of these formats:
- UPN (user@domain.com)
- NetBIOS (DOMAIN\user)
- DN (cn=user,cn=Users,dc=domain,dc=com)
PasswordPassword of the user who is specified byUsername.Primary Server URLPrimary domain controller LDAP server for the domain. You can use either the host name or the IP address.Use the formatldap://hostname_or_IPaddress:portorldaps://hostname_or_IPaddress:port. The port is typically 389 for LDAP connections and 636 for LDAPS connections. For Active Directory multi-domain controller deployments, the port is typically 3268 for LDAP and 3269 for LDAPS.A certificate that establishes trust for the LDAPS endpoint of the Active Directory server is required when you useldaps://in the primary or the secondary LDAP URL.Secondary Server URLAddress of a secondary domain controller LDAP server that is used for failover. You can use either the host name or the IP address.Certificates (for LDAPS)If you want to use LDAPS with your Active Directory LDAP Server or OpenLDAP Server identity source, clickBrowseto select a certificate. To export the root CA certificate from Active Directory, consult the Microsoft documentation. - Review the information and clickSubmit.
After you successfully add an
identity source, you can add users and groups from the domain. See Add a User or Group to VMware Cloud Foundation.