In this lab you will get to know how to configure an identity source, how to use the vSphere web client to Add the domain Admins Group to Administrators.
SO (Single Sign-On) can deal with the Identity management for administrators and applications that interact with the vSphere platform. vCenter Single Sign on is a component of the VMware Cloud Suite. S
You will get to know how to install vCenter Server in Lab 26 before doing this you should take a look at lab 26. Once the vCenter is installed you can log in to your vCenter Server by using the this link https://yourvcentercomputername.domain.name:9443/vsphere-client/
Provide the user name and the password which you gave while you were installing vCenter. Once you are logged in navigate to administration which is on the left in the navigation bar. Click on it and go to single sign-on
Errors you might face : if you don’t log in with firstname.lastname@example.org it wont show you the single sign on option.
when you logged in you will go to the vCenter web client home, in the left panel there is Administration click on it and it take you to administration panel where you can see single sign-on.
When you entered in to the users and groups Click on the administrator and click the small blue person with the + sign and add domain admins and your Esxi.
After that go to configuration and check if your vSphere web client shows your domain, to see that you should go to configuration which is in the navigation bar. if its not showing you can click on the green icon and the add identity source window will pop up. you have to tick on the Open LDAP radio button and fill the correct information to configure for an example you can check my image and get an idea. after that when you click on test connection and it will give you the result saying if it connected successfully or not. if not don’t get panic because it might have already configured while you were installing vCenter server.
when these steps are completed you are done with Lab 6.
Conclusion: when all the configuration are done properly you will be able to see the domain and the correct access to the users that we have given the permission.