Setting up an external LDAP authentication server
Users can use an external LDAP authentication server instead of the local LXCI for VMware vCenter authentication server on the management node.
Before you begin
The initial setup of LXCI for VMware vCenter must be completed before setting up the external authentication server.
The following external authentication servers are supported:
Microsoft Active Directory. It must reside on an outboard Microsoft Windows server that is able to communicate with LXCI for VMware vCenter appliance.
LXCI for VMware vCenter performs a connectivity check every 10 minutes to maintain connectivity to configured external LDAP servers. Environments with many LDAP servers might experience high CPU usage during this connectivity check. To achieve the best performance, specify only known, reachable LDAP servers when configuring LDAP Client.
Ensure that the LDAP users that can login this XClarity Integrator web interface are the members of the LDAP group in the LDAP server.
Create the group and add the users to it in the LDAP server before configuring this LDAP Client:From the external authentication server, create a user account. For instructions, see the documentation of the LDAP server.
Create a group in the LDAP server. The LDAP group name can be the default name LXCI-SUPERVISOR or other user-defined names. The group must exist within the context of the root distinguished name defined in the LDAP client.
Add the user as a member of the group created previously.
Procedure
To configure LXCI for VMware vCenter to use an external authentication server, complete the following steps.
Results
LXCI for VMware vCenter validates the LDAP server connection. If the validation passes, user authentication occurs on the external authentication server when logging in to LXCI for VMware vCenter.
If the validation fails, the authentication mode is automatically changed back to the Allow logons from local users setting, and a message that explains the cause of the failure is displayed.