vcf identity sso active-directory ldap

Post-Deployment: Identity & SSO

Active Directory integration, LDAP identity source, group mappings, and role assignments across vCenter, NSX, and VCF Operations.

Pre-requisite: Windows Active Directory must be fully deployed. See Windows AD Deployment.


Active Directory Integration

  • Domain: pgnet.local
  • Action: Log in to SDDC Manager and/or vCenter Server.
  • Identity Provider: Configure LDAPS connection to your AD Domain Controller (10.200.1.240 forwards these requests).
  • Groups: Map your VCF Admin group from pgnet.local to the Cloud Admin role.

SSO Configuration for VCF Operations

Adds AD users and groups as authenticated users across the VCF Operations suite. Create an embedded identity broker SSO domain:

  1. Select VCF domain — pgvcf1

    image-20260401113555910

  2. Choose deployment mode Start

    image-20260401113708957

  3. Select Identity Broker (Embedded)

    image-20260401113737084

  4. Select Configure Identity Provider

    image-20260401113830788

  5. Select Directory-Based Identity Provider — AD/LDAP

    image-20260401113909804

  6. Configure LDAP (see table below)

    image-20260401114840406

  7. Configure Group Mappings (see table below)

    image-20260401115102551

    image-20260401115132980

LDAP Configuration

FieldValueNotes
Identity Source TypeActive Directory over LDAP
Identity source namepgnet-local
Primary Domain Controllerwinsrv1.pgnet.local
Primary Domain Controller Port636
Base DN for usersDC=pgnet,DC=localEntire domain scope
Base DN for groupsDC=pgnet,DC=localEntire domain scope
Domain namepgnet.local
Domain aliaspgnet
Usernamesvc-ldap@pgnet.localBind account created by Salt
PasswordVMware123!VMware123!Default service account password
Connect toSpecific domain controllers
Primary server URLldaps://winsrv1.pgnet.localRequires CA cert trust - will set port
CertificatesUpload Root CA CertificateExport from NAS/SMB share (rootca.cer)

Group Mapping

VCF Identity Broker AttributeActive Directory Attribute
userName *sAMAccountName
firstNamegivenName
lastNamesn
distinguishedNamedistinguishedName
employeeID(Not Mapped)
emailmail
userPrincipalNameuserPrincipalName

User Groups in Active Directory

NamePath
VCF-AuditorsCN=VCF-Auditors,OU=Groups,OU=it,DC=pgnet,DC=local
VCF-Certificate-AdminsCN=VCF-Certificate-Admins,OU=Groups,OU=it,DC=pgnet,DC=local
VCF-Cloud-AdminsCN=VCF-Cloud-Admins,OU=Groups,OU=it,DC=pgnet,DC=local
VCF-NSX-AdminsCN=VCF-NSX-Admins,OU=Groups,OU=it,DC=pgnet,DC=local
VCF-OperationsCN=VCF-Operations,OU=Groups,OU=it,DC=pgnet,DC=local
VCF-vSphere-AdminsCN=VCF-vSphere-Admins,OU=Groups,OU=it,DC=pgnet,DC=local

Users in Active Directory

NamePath
Domain AdministratorCN=Domain Administrator,OU=Users,OU=it,DC=pgnet,DC=local
DevOps AdminCN=DevOps Admin,OU=Users,OU=it,DC=pgnet,DC=local
Infrastructure AdminCN=Infrastructure Admin,OU=Users,OU=it,DC=pgnet,DC=local
Peter HauckCN=Peter Hauck,OU=Users,OU=it,DC=pgnet,DC=local

Add SSO to VCF Components

  1. Under the VCF Instance add the NSX server to SSO.

    image-20260401115327569

  2. Under VCF Management select operations appliance → Enable Single Sign-On → select vc.pgnet.io identity broker.

    image-20260401115409586


Role Assignments via AD Groups

VCF Operations

  1. Login to local account — ops.pgnet.io

  2. Administration → Control Panel → Access Control → User Groups

    image-20260401115521380

  3. ... → Import from Source → Search VCF → Select VCF-Cloud-Admins@pgnet.local → Finish

    image-20260401115705517

  4. Edit the new group → assign AdministratorAll Objects → Save

    image-20260401115739077

Workload Domain vCenter

  1. Login to vc.pgnet.io using local account

  2. Administration → Users and Groups → Groups

  3. Select Administrators → domain pgnet.local → search and add VCF-Cloud-Admins

    image-20260401115859365

NSX Manager

  1. Login to nsx.pgnet.io using local account

  2. System → User Management → ADD ROLE FOR VCF SSO USER/GROUP

  3. Add VCF-Cloud-Admins → assign role Enterprise Admin

    image-20260401120126205