To provide role-based access for each NSX Management cluster, you configure Active Directory as an identity provider, assign NSX roles to Active Directory security groups, and reconfigure the integration between NSX and vSphere.
Prerequisites
-
Verify all necessary security groups in Active Directory are created and configured for each NSX role you assign access to.
Configure an LDAP Identity Source in NSX Manager for Identity and Access Management for VMware Cloud Foundation
To provide Active Directory authentication services to NSX Manager, you configure an Active Directory over LDAP identity provider so that you can assign access to users and groups.
For an environment with NSX Federation, you must use the components' user interfaces to configure an LDAP identity source in the NSX Global Manager instances. The PowerShell module does not support configuring the authentication service for an NSX Global Manager instance.
Procedure
- Log in to NSX Manager at https://<nsx_manager_fqdn>/login.jsp?local=true as admin.
- On the main navigation bar, click System.
In the left pane, click Authentication providers tab.
and click theClick the LDAP tab and click Add identity source.
In the Add identity source dialog box, configure the following settings, configure the remaining settings according to your VMware Cloud Foundation Planning and Preparation Workbook, and click Save.
Setting
Value
Type
Active Directory over LDAP
Under LDAP servers, click Set.
In the Set LDAP server dialog box, click Add LDAP server.
Configure the following settings, configure the remaining settings according to your VMware Cloud Foundation Planning and Preparation Workbook.
Setting
Value
LDAP Protocol
LDAPS
Port
636
In the Certificate text box, paste the contents of the Root CA certificate file and click Add.
Click Apply.
Click Save.
Repeat the procedure for each NSX Local Manager in each workload domain.
Repeat the procedure for the NSX Global Managers of the management domain and each workload domain.
Assign NSX Manager Roles to Active Directory Groups for Identity and Access Management for VMware Cloud Foundation
To manage administrative access to NSX after configuring NSX Manager with Active Directory as an idenity source, you assign the NSX roles to Active Directory security groups.
You assign access to Active Directory security groups for the following roles in NSX Manager:
-
Enterprise Admin
-
Network Admin
-
Auditor
For an environment with NSX Federation, you must use the component's user interface to assign NSX roles for NSX Global Manager in Active Directory. The PowerShell module does not support configuring the authentication services for an NSX Global Manager instance.
Procedure
- Log in to NSX Local Manager for the management domain at https://<management_domain_nsx_local_manager_fqdn>/login.jsp?local=true as admin.
- On the main navigation bar, click System.
-
In the left pane, click Users management.
-
Click the Users role assignment tab.
-
From the Add Role for Providers drop-down menu, select LDAP, select the group and the role you want to assign, and click Save.
-
Repeat Step 5 for each role you want to assign.
-
Repeat the procedure for all NSX Local Managers in each workload domain.
-
Repeat the procedure for the NSX Global Manager of the management domain and each workload domain.
Configure Service Account Privileges for NSX for Identity and Access Management for VMware Cloud Foundation
The principle of least privilege is a critical aspect of access management and should be part of a comprehensive defense-in-depth security strategy. Use as custom role in vSphere with the minimal required privileges for NSX to manage a vCenter Server configured as an NSX compute manager instance. Apply the custom role, group membership, and limit the scope for the NSX SERVICE accounts created in the vCenter Single Sign-On built-in identity provider.
Define a Custom Role in vSphere for the NSX Service Accounts for Identity and Access Management for VMware Cloud Foundation
To limit the privileges and scope for the NSX integration with vSphere, you create a custom role in vSphere with the required privileges.
Procedure
- Log in to the management domain vCenter Server at https://<management_vcenter_server_fqdn>/ui as [email protected].
-
From the vSphere Client menu, select Administration.
-
In the Access control section, click Roles.
-
From the Roles provider drop-down menu, select vsphere.local.
-
Create a role for NSX in vSphere.
-
Click New.
-
In the Role name text box, enter NSX to vSphere Integration.
-
Configure the privileges, and click Create.
Category
Privilege
Extension
All Extension Privileges
Global
Cancel task
Licenses
Host
Network
Assign network
Permissions
Modify permission
Modify role
Reassign role permissions
Resource
Assign vApp to resource pool
Assign virtual machine to resource pool
Scheduled task
All Scheduled task Privileges
Service account management
Administer
Sessions
Message
Validate session
View and stop sessions
Tasks
All Tasks Privileges
vApp
All vApp Privileges
Virtual machine
All Change Configuration
All Edit Inventory
All Guest Operations
All Provisioning
VMware vSphere Lifecycle Manager
-
In the Role name text box, enter a name for the NSX to vSphere integration role, and click Finish.
-
Add NSX Service Accounts to the vCenter Single Sign-On License Administrators Group for Identity and Access Management for VMware Cloud Foundation
The service accounts, created by SDDC Manager, in the vCenter Single Sign-On built-in identity provider for each management and VI workload domain, must be members of the LicenseService.Administrators group. You add the NSX service accounts to the group to provide the minimum required privileges and scope.
Procedure
- Log in to the management domain vCenter Server at https://<management_vcenter_server_fqdn>/ui as [email protected].
- From the vSphere Client Menu, select Administration.
-
In the Single Sign On section, click Users and groups.
-
Click the Groups tab.
-
Select the LicenseService.Administrators group and click Edit.
-
In the Edit group dialog box, add the service accounts for NSX Manager.
-
From the Add members drop-down menu, select vsphere.local.
-
To search for the service accounts created by SDDC Manager, in the Search text box, enter svc-.
The format of the service account name is svc-<nsx-manager-name>-<vcenter-server-name>.
-
Add the service accounts for NSX Manager for each management and VI workload domain to the LicenseService.Administrators group and click Save.
-
-
Repeat the procedure for each VI workload domain you add to the SDDC.
Reconfigure the vSphere Role and Permissions Scope for NSX Service Accounts for Identity and Access Management for VMware Cloud Foundation
To limit the privileges and scope for the NSX integration with vSphere, update the global permissions to use the custom role in vSphere and restrict access to vCenter Server instances not applicable to the service account scope.
Procedure
- Log in to the management domain vCenter Server at https://<management_vcenter_server_fqdn>/ui as [email protected].
- From the vSphere Client Menu, select Administration.
-
Edit the global permissions for the NSX Manager service accounts created by SDDC Manager.
-
In the Access control section, click Global permissions.
-
Select the first VSPHERE.LOCAL\ NSX Manager service account.
-
Click the Edit button.
-
In the Change role dialog box, configure the settings and click OK.
Setting
Value
Domain
vsphere.local
User / group
svc-<nsx-manager-name>-<vcenter-server-name>
Role
NSX to vSphere Integration
Propagate to children
Selected
-
Repeat this step for each VSPHERE.LOCAL\ NSX Manager service account.
-
-
Limit the scope of the global permissions for the NSX Manager service accounts created by SDDC Manager.
-
From the vSphere Client menu, select Global Inventory Lists.
-
Navigate to
. -
Select the first vCenter Server instance.
-
Click the Permissions tab.
-
Select the VSPHERE.LOCAL\ NSX Manager service account that is not applicable for the vCenter Server instance.
-
Click the Edit permissions icon.
-
In the Edit permissions dialog box, configure the settings and click OK.
Setting
Value
Domain
vsphere.local
User / group
svc-<nsx-manager-name>-<vcenter-server-name>
Role
No Access
Propagate to children
Selected
-
Repeat this step for each VSPHERE.LOCAL\ NSX Manager service account that is not applicable for the vCenter Server instance.
-
Repeat this step for each vCenter Server instance.
-