LDAP (Lightweight Directory Access Protocol) server configuration and functionality is only for use with Identity Firewall. LDAP provides a central place for authentication, meaning that when you configure a connection to your LDAP server, the user records are stored in your external LDAP server.

Prerequisites

The domain account must have AD read permission for all objects in the domain tree.

When there is a cluster of NSX Managers, all nodes need to be able to reach the LDAP server.

Procedure

  1. From your browser, log in with admin privileges to an NSX Manager at https://<nsx-manager-ip-address>.
  2. Navigate to System > Identity Firewall AD > Active Directory.
  3. Select the LDAP Server tab.
  4. Click Add LDAP Server .
  5. Enter the Host name of the LDAP server.
  6. Select the active directory the LDAP server is connected to from the Connected to (Directory) drop-down menu.
  7. (Optional) Select the protocol: LDAP (unsecured) or LDAPS (secured).
  8. If LDAPS was selected, select the SHA-256 Thumbprint suggested by NSX Manager, or enter a SHA-256 Thumbprint.
  9. Enter the port number of the LDAP server.

    For local domain controllers, the default LDAP port 389 and LDAPS port 636 are used for the Active Directory sync, and should not be edited from the default values.

  10. Enter the username and password of an Active Directory account with a minimum of read-only access to the Active Directory domain.
  11. Click Save.
  12. To verify that you can connect to the LDAP server, click Test Connection.