In the VMware Identity Manager console, enter the information required to connect to your Active Directory and select users and groups to sync with the VMware Identity Manager directory.
The Active Directory connection options are Active Directory over LDAP or Active Directory over Integrated Windows Authentication. Active Directory over LDAP connection supports DNS Service Location lookup.
Prerequisites
- (SaaS) Connector installed and activated.
- Select which attributes are required and add additional attributes, on the User Attributes page. See Select Attributes to Sync with Directory.
- Make a list of the Active Directory users and groups to sync from Active Directory. Group names are synced to the directory immediately. Members of a group do not sync until the group is entitled to resources or added to a policy rule. Users who need to authenticate before group entitlements are configured should be added during the initial configuration.
Note: VMware Identity Manager connector version 19.03 and older versions do not support the / and $ characters in a group's name or distinguishedName attribute. This limitation applies to groups that you add to the group DN as well as to groups that are not directly added to the group DN but are synced as part of a parent group when nested group memberships are enabled.
Do not use the / or $ character in a group's name or distinguishedName attribute if you plan to sync the group to VMware Identity Manager and you are using connector version 19.03 or older versions.
- For Active Directory over LDAP, you need the Base DN, Bind DN, and Bind DN password.
The Bind DN user must have the following permissions in Active Directory to grant access to users and groups objects:
- Read
- Read All Properties
- Read Permissions
Note: Using a Bind DN user account with a non-expiring password is recommended. - For Active Directory over Integrated Windows Authentication, you need the user name and password of the Bind user who has permission to query users and groups for the required domains.
The Bind user must have the following permissions in Active Directory to grant access to users and groups objects:
- Read
- Read All Properties
- Read Permissions
Note: Using a Bind user account with a non-expiring password is recommended. - If the Active Directory requires access over SSL or STARTTLS, the Root CA certificates of the domain controllers for all the relevant Active Directory domains are required.
- For Active Directory over Integrated Windows Authentication, when you have multi-forest Active Directory configured and the Domain Local group contains members from domains in different forests, make sure that the Bind user is added to the Administrators group of the domain in which the Domain Local group resides. If this is not done, these members are missing from the Domain Local group.
- For Active Directory over Integrated Windows Authentication:
- For all domain controllers listed in SRV records and hidden RODCs, nslookup of hostname and IP address should work.
- All the domain controllers must be reachable in terms of network connectivity
Procedure
Results
The connection to Active Directory is established and users and group names are synced from the Active Directory to the VMware Identity Manager directory. The Bind user has an administrator role in VMware Identity Manager by default.
For more information about how groups are synced, see "Managing Users and Groups" in VMware Identity Manager Administration.
What to do next
- Set up authentication methods. After users and group names sync to the directory, if the connector is also used for authentication, you can set up additional authentication methods on the connector. If a third party is the authentication identity provider, configure that identity provider in the connector.
- Review the default access policy. The default access policy is configured to allow all appliances in all network ranges to access the Web portal, with a session time out set to eight hours or to access a client app with a session time out of 2160 hours (90 days). You can change the default access policy and when you add Web applications to the catalog, you can create new ones.
- (On premises) Apply custom branding to the VMware Identity Manager console, user portal pages and the sign-in screen, if necessary.