You can enable and disable smart card authentication, customize the login banner, and set up the revocation policy from the vSphere Client.

If smart card authentication is enabled and other authentication methods are disabled, users are then required to log in using smart card authentication.

If user name and password authentication are disabled, and if problems occur with smart card authentication, users cannot log in. In that case, a root or administrator user can turn on user name and password authentication from the vCenter Server command line. The following command enables user name and password authentication.
sso-config.sh -set_authn_policy -pwdAuthn true -t tenant_name

Prerequisites

  • Verify that an enterprise Public Key Infrastructure (PKI) is set up in your environment, and that certificates meet the following requirements:
    • A User Principal Name (UPN) must correspond to an Active Directory account in the Subject Alternative Name (SAN) extension.
    • The certificate must specify Client Authentication in the Application Policy or Extended Key Usage field or the browser does not show the certificate.

  • Add an Active Directory identity source to vCenter Single Sign-On.
  • Assign the vCenter Server Administrator role to one or more users in the Active Directory identity source. Those users can then perform management tasks because they can authenticate and they have vCenter Server administrator privileges.
  • Ensure that you have set up the reverse proxy and restarted the physical or virtual machine.

Procedure

  1. Obtain the certificates and copy them to a folder that the sso-config utility can see.
    1. Log in to the vCenter Server console, either directly or by using SSH.
    2. Enable the shell, as follows.
      shell
      chsh -s "/bin/bash" root
      csh -s "bin/appliance/sh" root
    3. Use WinSCP or a similar utility to copy the certificates to the /usr/lib/vmware-sso/vmware-sts/conf directory on the vCenter Server.
    4. Optionally disable the appliance shell, as follows.
      chsh -s "/bin/appliancesh" root
  2. Log in with the vSphere Client to the vCenter Server.
  3. Specify the user name and password for [email protected] or another member of the vCenter Single Sign-On Administrators group.
    If you specified a different domain during installation, log in as administrator@ mydomain.
  4. Navigate to the Configuration UI.
    1. From the Home menu, select Administration.
    2. Under Single Sign On, click Configuration.
  5. Under the Identity Provider tab, click Smart Card Authentication, then click Edit.
  6. Select or deselect authentication methods, and click Save.
    You can choose smart card authentication by itself, or both smart card authentication and password and Windows session authentication.
    You cannot enable or disable RSA SecurID authentication from this Web interface. However, if RSA SecurID has been enabled from the command line, the status appears in the Web interface.
    The Trusted CA certificates appears.
  7. Under the Trusted CA certificates tab:
    1. Click Add, and click Browse.
    2. Select a trusted CA certificate, and click Add.
  8. To add additional trusted CA certificates, repeat step 7.

What to do next

Your environment might require enhanced OCSP configuration.
  • If your OCSP response is issued by a different CA than the signing CA of the smart card, provide the OCSP signing CA certificate.
  • You can configure one or more local OCSP responders for each vCenter Server site in a multi-site deployment. You can configure these alternative OCSP responders using the CLI. See Use the Command Line to Manage Smart Card Authentication.