<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>vcenter 8 azure sso Archives - the Sysadmin Channel</title>
	<atom:link href="https://thesysadminchannel.com/tag/vcenter-8-azure-sso/feed/" rel="self" type="application/rss+xml" />
	<link>https://thesysadminchannel.com/tag/vcenter-8-azure-sso/</link>
	<description>Documenting My Life as a System Administrator</description>
	<lastBuildDate>Tue, 28 Nov 2023 00:46:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>
<site xmlns="com-wordpress:feed-additions:1">144174110</site>	<item>
		<title>VMware vCenter SSO Integration with Azure AD</title>
		<link>https://thesysadminchannel.com/vmware-vcenter-sso-integration-with-azure-ad/</link>
					<comments>https://thesysadminchannel.com/vmware-vcenter-sso-integration-with-azure-ad/#comments</comments>
		
		<dc:creator><![CDATA[Paul Contreras]]></dc:creator>
		<pubDate>Sun, 26 Nov 2023 00:45:38 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[VMware]]></category>
		<category><![CDATA[How to connect vCenter to Azure Active Directory]]></category>
		<category><![CDATA[vcenter 8 azure sso]]></category>
		<category><![CDATA[vcenter azure ad authentication]]></category>
		<category><![CDATA[vcenter azure sso]]></category>
		<category><![CDATA[vmware vcenter azure ad authentication]]></category>
		<guid isPermaLink="false">https://thesysadminchannel.com/?p=4922</guid>

					<description><![CDATA[<p>It&#8217;s finally here! VMware finally allows you to leverage Azure AD as a primary Identity Provider (IdP). Today we are going to cover the steps to setup VMware vCenter SSO Integration with Azure AD (Entra ID). Using Azure AD as&#8230; <a href="https://thesysadminchannel.com/vmware-vcenter-sso-integration-with-azure-ad/" class="more-link">Continue Reading <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://thesysadminchannel.com/vmware-vcenter-sso-integration-with-azure-ad/">VMware vCenter SSO Integration with Azure AD</a> appeared first on <a href="https://thesysadminchannel.com">the Sysadmin Channel</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It&#8217;s finally here!  VMware finally allows you to leverage Azure AD as a primary Identity Provider (IdP).  Today we are going to cover the steps to setup VMware vCenter SSO Integration with Azure AD (Entra ID).  Using Azure AD as an IdP allows you to now have vCenter in scope of conditional access policies as well as authentication methods native to Azure AD such as Windows Hello for Business or Fido2 security keys.  </p>
<p>&nbsp;<br />
<em>For the purposes of this article we will use the Azure AD Portal, not the Entra ID portal</em></p>
<div id="blockquote1">
<strong>IMPORTANT</strong>: When upgrading to vCenter 8 from a previous version, you&#8217;re no longer able to use an on-premises Active Directory Identity Source so be sure to TEST this in a lab before moving to production.
</div>
<div id="tableofcontents">
<h2>Table Of Contents</h2>
<ul>
<li><a href="#requirements">Requirements</a></li>
<li><a href="#oidcapp">Create the Azure AD OIDC App Registration</a></li>
<li><a href="#vcenteridp">vCenter Identity Source Configuration</a></li>
<li><a href="#appproxy">Setting up an Azure App Proxy</a></li>
<ul>
<li><a href="#vcentercertificate">Trusting vCenter Root Certificate on the Connector Service Machine</a></li>
</ul>
<li><a href="#identityservice">Create the VMware Identity Service App from the Gallery</a></li>
<ul>
<li><a href="#scimprovisioning">Setup SCIM Provisioning to Sync Users to vCenter</a></li>
</ul>
<li><a href="#vcenterpermissions">Integrating Permissions for VMware vCenter</a></li>
<li><a href="#conclusion">Conclusion</a></li>
</ul>
</div>
<p>&nbsp;</p>
<div id="requirements" style="scroll-margin-top: 10px;"></div>
<h2>Requirements</h2>
<p>In order to make this work there are a few requirements/prerequisites needed so you can successfully use Azure AD as the Identity Provider.  Let&#8217;s touch on those requirements now.</p>
<ul>
<li>VMware Administrator Role</li>
<li>VMware vCenter 8.0 U2 or later</li>
<li>VMware Identity Services from Azure Enterprise App Gallery</li>
<li>Azure Application Administrator or Global Administrator Role</li>
<li>Azure App Registration with OpenID Connect (OIDC) scope</li>
<li>Publicly accessible vCenter endpoint (We will use an Azure App Proxy for this)</li>
<li>A group or users to sync to vCenter</li>
</ul>
<p>&nbsp;</p>
<div id="oidcapp" style="scroll-margin-top: 10px;"></div>
<h2>Create the Azure AD OIDC App Registration</h2>
<p>As mentioned in the prerequisites, you will need to create an app registration in Azure AD so you can use this as the authentication endpoint. This app will need to have the <code>openid</code> API permission so let&#8217;s walk through setting that up now.<br />
&nbsp;</p>
<p>Within Azure AD:</p>
<ul>
<li>Navigate to App Registration → New Registration</li>
<ul>
<li>Direct Link: <a href="https://portal.azure.com/#view/Microsoft_AAD_RegisteredApps/CreateApplicationBlade/quickStartType~/null/isMSAApp~/false" rel="noopener" target="_blank">https://portal.azure.com/#view/Microsoft_AAD_RegisteredApps/CreateApplicationBlade/quickStartType~/null/isMSAApp~/false</a></li>
</ul>
<li>Name the app: <strong>vCenter 8 OIDC</strong></li>
<li>Leave the Organizational directory to <strong>Single Tenant</strong></li>
<li>Leave the Redirect URI blank for now</li>
<li>Click Register to create the app</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/Create-vCenter-8-OIDC-App-registration.png" target="_blank" rel="noopener"><img fetchpriority="high" decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/Create-vCenter-8-OIDC-App-registration.png" alt="Create vCenter 8 OIDC App registration" width="1008" height="692" class="aligncenter size-full wp-image-4937" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/Create-vCenter-8-OIDC-App-registration.png?v=1700264341 1008w, https://thesysadminchannel.com/wp-content/uploads/2023/11/Create-vCenter-8-OIDC-App-registration-768x527.png?v=1700264341 768w" sizes="(max-width: 1008px) 100vw, 1008px" /></a><br />
&nbsp;</p>
<p>Next we&#8217;ll want to add the API permissions so we can tie this Azure app to vCenter.<br />
Within the vCenter 8 OIDC App:</p>
<ul>
<li>Navigate to API Permissions</li>
<li>Select Add a permission</li>
<li>Choose Microsoft Graph → Delegated → enable the 4 listed below</li>
<li>Grant Consent for good measure</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/Create-vCenter-8-OIDC-App-registration-api-scopes.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/Create-vCenter-8-OIDC-App-registration-api-scopes.png" alt="Create vCenter 8 OIDC App registration api scopes" width="1230" height="672" class="aligncenter size-full wp-image-4938" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/Create-vCenter-8-OIDC-App-registration-api-scopes.png?v=1700265543 1230w, https://thesysadminchannel.com/wp-content/uploads/2023/11/Create-vCenter-8-OIDC-App-registration-api-scopes-1024x559.png?v=1700265543 1024w, https://thesysadminchannel.com/wp-content/uploads/2023/11/Create-vCenter-8-OIDC-App-registration-api-scopes-768x420.png?v=1700265543 768w" sizes="(max-width: 1230px) 100vw, 1230px" /></a></p>
<p><em>Leave this tab open for now, we will come back to it later.</em></p>
<p>&nbsp;</p>
<div id="vcenteridp" style="scroll-margin-top: 10px;"></div>
<h2>vCenter Identity Source Configuration</h2>
<p>We&#8217;re one step closer now that we have have the OIDC app created. Next we need to configure vCenter itself so we can change the Identity Provider from the local embedded provider to Azure AD.<br />
&nbsp;</p>
<p>Within the vCenter Server:</p>
<ul>
<li><strong>Login to vCenter 8</strong> using administrator@vsphere.local since we won&#8217;t have any other providers available</li>
<li>Navigate to <strong>Administration</strong> → <strong>single sign on</strong> → <strong>configuration</strong> → <strong>Identity Provider</strong> → <strong>Identity Sources</strong></li>
<li>Click <strong>Change Provider</strong> → <strong>Azure AD</strong></li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-Change-Identity-Provider.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-Change-Identity-Provider.png" alt="VMware Change Identity Provider" width="1338" height="634" class="aligncenter size-full wp-image-4949" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-Change-Identity-Provider.png?v=1700275438 1338w, https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-Change-Identity-Provider-1024x485.png?v=1700275438 1024w, https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-Change-Identity-Provider-768x364.png?v=1700275438 768w" sizes="(max-width: 1338px) 100vw, 1338px" /></a><br />
&nbsp;</p>
<ul>
<li>Next, click run prechecks</li>
<li>Check the box to confirm</li>
<li>Click Next</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-IdP-Prereq-checks.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-IdP-Prereq-checks.png" alt="VMware IdP Prereq checks" width="1149" height="580" class="aligncenter size-full wp-image-4950" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-IdP-Prereq-checks.png?v=1700275698 1149w, https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-IdP-Prereq-checks-1024x517.png?v=1700275698 1024w, https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-IdP-Prereq-checks-768x388.png?v=1700275698 768w" sizes="(max-width: 1149px) 100vw, 1149px" /></a><br />
&nbsp;</p>
<ul>
<li>Under Directory Name enter <strong>Azure AD</strong></li>
<li>Enter the domain(s) and click the &#8220;+&#8221; to add it</li>
<ul>
<li>If you have multiple UPN suffixes, add them domain names here.</li>
</ul>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-add-domain-config.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-add-domain-config.png" alt="VMware add domain config" width="1149" height="580" class="aligncenter size-full wp-image-4951" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-add-domain-config.png?v=1700276067 1149w, https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-add-domain-config-1024x517.png?v=1700276067 1024w, https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-add-domain-config-768x388.png?v=1700276067 768w" sizes="(max-width: 1149px) 100vw, 1149px" /></a><br />
&nbsp;</p>
<ul>
<li>Set the token lifetime</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-User-provision-lifetime-token.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-User-provision-lifetime-token.png" alt="VMware User provision lifetime token" width="1140" height="576" class="aligncenter size-full wp-image-4953" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-User-provision-lifetime-token.png?v=1700276375 1140w, https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-User-provision-lifetime-token-1024x517.png?v=1700276375 1024w, https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-User-provision-lifetime-token-768x388.png?v=1700276375 768w" sizes="(max-width: 1140px) 100vw, 1140px" /></a><br />
&nbsp;</p>
<p>Earlier I mentioned to keep the tabs open because we&#8217;re going to need them later. Now is that time where we are going to use need them. </p>
<ul>
<li>Copy the redirect URI from the vCenter wizard</li>
<li>Navigate back to the vCenter 8 OIDC app → Authentication tab</li>
<li>Add a platform → Select Web</li>
<li>Paste the Redirect URI into the redirect URI in the Azure app</li>
<li>Click configure</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-Web-URI-Redirect.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-Web-URI-Redirect.png" alt="VMware Web URI Redirect" width="1336" height="899" class="aligncenter size-full wp-image-4955" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-Web-URI-Redirect.png?v=1700277829 1336w, https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-Web-URI-Redirect-1024x689.png?v=1700277829 1024w, https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-Web-URI-Redirect-768x517.png?v=1700277829 768w" sizes="(max-width: 1336px) 100vw, 1336px" /></a><br />
&nbsp;</p>
<ul>
<li>Copy the AppId (ClientId) from the Azure OIDC app and paste it to the client identifier in vCenter</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-AppId.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-AppId.png" alt="VMware AppId" width="784" height="379" class="aligncenter size-full wp-image-4958" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-AppId.png?v=1700278777 784w, https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-AppId-768x371.png?v=1700278777 768w" sizes="(max-width: 784px) 100vw, 784px" /></a><br />
&nbsp;</p>
<ul>
<li>Create a secret and paste it in vCenter</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-Shared-Secret.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-Shared-Secret.png" alt="VMware Shared Secret" width="881" height="643" class="aligncenter size-full wp-image-4961" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-Shared-Secret.png?v=1700279440 881w, https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-Shared-Secret-768x561.png?v=1700279440 768w" sizes="(max-width: 881px) 100vw, 881px" /></a><br />
&nbsp;</p>
<ul>
<li>In the overview page of the OIDC App</li>
<li>Click on EndPoints</li>
<li>Copy the OpenID Connect metadata document URL and paste it in vCenter</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-OpenID-configuration-update.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-OpenID-configuration-update.png" alt="VMware OpenID configuration-update" width="1254" height="537" class="aligncenter size-full wp-image-4965" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-OpenID-configuration-update.png?v=1700280460 1254w, https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-OpenID-configuration-update-1024x439.png?v=1700280460 1024w, https://thesysadminchannel.com/wp-content/uploads/2023/11/VMware-OpenID-configuration-update-768x329.png?v=1700280460 768w" sizes="(max-width: 1254px) 100vw, 1254px" /></a></p>
<ul>
<li>Review the configuration and proceed</li>
</ul>
<p>&nbsp;</p>
<div id="appproxy" style="scroll-margin-top: 10px;"></div>
<h2>Setting up an Azure App Proxy</h2>
<p>One of the requirements to use Azure AD as the Identity source is to make sure we are able to publicly access vCenter from Azure.  I am NOT a fan of exposing your network and poking a hole in your firewall so we&#8217;ll use the next best thing. In order to satisfy this requirement, we will use an Azure app proxy which will publish an endpoint that sits behind Azure.<br />
&nbsp;</p>
<p>The idea is that we will use the app proxy&#8217;s public endpoint to route to the internal endpoint so Azure is able to talk to vCenter on-premises.  An app proxy requires you to install the connector service on an on-premises server that has line of sight to your vCenter server. I would suggest you have the app proxy agent installed on 2 machines so you can have some sort of redundancy when you need to do maintenance on the servers.<br />
&nbsp;</p>
<p>Let&#8217;s walk through the setup now.<br />
Within Azure AD, open a NEW tab:</p>
<ul>
<li>Navigate to Azure AD → Application Proxy</li>
<ul>
<li>Direct Link: <a href="https://portal.azure.com/#view/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/~/AppProxy" rel="noopener" target="_blank">https://portal.azure.com/#view/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/~/AppProxy</a></li>
</ul>
<li>Download and install the connector service</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/Download-Azure-app-proxy.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/Download-Azure-app-proxy.png" alt="Download Azure app proxy" width="979" height="249" class="aligncenter size-full wp-image-4977" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/Download-Azure-app-proxy.png?v=1701027374 979w, https://thesysadminchannel.com/wp-content/uploads/2023/11/Download-Azure-app-proxy-768x195.png?v=1701027374 768w" sizes="(max-width: 979px) 100vw, 979px" /></a></p>
<p>The install is pretty straight forward so get it installed on 2 machines and go back into the Azure portal.<br />
&nbsp;</p>
<p>Once the connector is installed, you should see the hostname and public IP show up in the Azure proxy section.  From here, click on <strong>configure an app</strong>.<br />
<a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/Azure-app-proxy-configure-an-app.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/Azure-app-proxy-configure-an-app.png" alt="Azure app proxy configure an app" width="1129" height="384" class="aligncenter size-full wp-image-4979" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/Azure-app-proxy-configure-an-app.png?v=1701027765 1129w, https://thesysadminchannel.com/wp-content/uploads/2023/11/Azure-app-proxy-configure-an-app-1024x348.png?v=1701027765 1024w, https://thesysadminchannel.com/wp-content/uploads/2023/11/Azure-app-proxy-configure-an-app-768x261.png?v=1701027765 768w" sizes="(max-width: 1129px) 100vw, 1129px" /></a><br />
&nbsp;</p>
<p>Next you should be taken to the app proxy configuration settings.</p>
<ul>
<li>Copy the <strong>vCenter Tenant URL</strong> and paste it into the <strong>app proxy Internal URL</strong> field</li>
<li>Ensure the dropdown is set to <strong>https://</strong></li>
<li>Enter in a name for your app proxy (vcenter8appproxy or something similar is fine)</li>
<li>Set the domain drop to which ever makes sense for you. Leaving the default is fine</li>
<li>Set the <strong>pre authentication method</strong> to <strong>passthrough</strong></li>
<li><strong>Set the connector group</strong> accordingly.  If you have multiple connector groups, make sure it is set on the App proxy blade AND the Enterprise app settings</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/Azure-app-proxy-configure-tenant-url.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/Azure-app-proxy-configure-tenant-url.png" alt="Azure app proxy configure tenant url" width="928" height="460" class="aligncenter size-full wp-image-4982" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/Azure-app-proxy-configure-tenant-url.png?v=1701029995 928w, https://thesysadminchannel.com/wp-content/uploads/2023/11/Azure-app-proxy-configure-tenant-url-768x381.png?v=1701029995 768w" sizes="(max-width: 928px) 100vw, 928px" /></a><br />
&nbsp;</p>
<div id="vcentercertificate" style="scroll-margin-top: 10px;"></div>
<h2>Trusting vCenter Root Certificate on the Connector Service Machine</h2>
<p>If you&#8217;re using a publicly trusted certificate for vCenter than you can skip this part.  However, if you&#8217;re using the default certificate that comes pre-loaded with vCenter you will need to do this.  An easy way to find out, is go to your vCenter URL and if you&#8217;re getting <strong>Your connection is not private</strong> then you&#8217;re not using a trusted cert.<br />
&nbsp;</p>
<p>Let&#8217;s go back to the machine(s) that you installed the service connector on because that&#8217;s where we will need to have the cert be trusted. These steps need to be done on EACH server that has the connector agent.</p>
<p>On a NEW tab:</p>
<ul>
<li>Navigate to https://&lt;your vcenter url&gt;/certs/download.zip</li>
<li>Right click and save as a zip file</li>
<li>Open the zip file → certs → win</li>
<li>Double click on the crt file to install it on the local machine</li>
<li>Install it under the <strong>local machine</strong> context</li>
<li>Place it under the <strong>Trusted Root Certification Authorities</strong></li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-trusted-root-cert-authority.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-trusted-root-cert-authority.png" alt="vCenter trusted root cert authority" width="918" height="520" class="aligncenter size-full wp-image-4986" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-trusted-root-cert-authority.png?v=1701031595 918w, https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-trusted-root-cert-authority-768x435.png?v=1701031595 768w" sizes="(max-width: 918px) 100vw, 918px" /></a><br />
&nbsp;</p>
<ul>
<li>You can verify this by opening mmc.exe on the service connector machine</li>
<li>Certificates → Local machine → Trusted root certification authorities</li>
<li>Seeing the CA cert there</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-trusted-root-cert-authority-verification.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-trusted-root-cert-authority-verification.png" alt="vCenter trusted root cert authority verification" width="1043" height="551" class="aligncenter size-full wp-image-4988" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-trusted-root-cert-authority-verification.png?v=1701032133 1043w, https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-trusted-root-cert-authority-verification-1024x541.png?v=1701032133 1024w, https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-trusted-root-cert-authority-verification-768x406.png?v=1701032133 768w" sizes="(max-width: 1043px) 100vw, 1043px" /></a><br />
&nbsp;</p>
<div id="identityservice" style="scroll-margin-top: 10px;"></div>
<h2>Create the VMware Identity Service App from the Gallery</h2>
<p>Next on the list, we&#8217;ll need to create the VMware Identity Service app from the Azure App gallery to allow us to use SCIM provisioning.</p>
<p>Within Azure AD on a NEW tab:</p>
<ul>
<li>Navigate to Enterprise Application → New Application</li>
<ul>
<li>Direct Link: <a href="https://portal.azure.com/#view/Microsoft_AAD_IAM/AppGalleryBladeV2" rel="noopener" target="_blank">https://portal.azure.com/#view/Microsoft_AAD_IAM/AppGalleryBladeV2</a></li>
</ul>
<li>Search for &#8220;VMware Identity&#8221; to install the <strong>VMware Identity Service</strong></li>
<li>Name it <strong>vCenter 8 SCIM Provisioning</strong></li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/Create-SCIM-Application.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/Create-SCIM-Application.png" alt="Create SCIM Application" width="1204" height="642" class="aligncenter size-full wp-image-4942" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/Create-SCIM-Application.png?v=1700270606 1204w, https://thesysadminchannel.com/wp-content/uploads/2023/11/Create-SCIM-Application-1024x546.png?v=1700270606 1024w, https://thesysadminchannel.com/wp-content/uploads/2023/11/Create-SCIM-Application-768x410.png?v=1700270606 768w" sizes="(max-width: 1204px) 100vw, 1204px" /></a></p>
<p>&nbsp;</p>
<div id="scimprovisioning" style="scroll-margin-top: 10px;"></div>
<h2>Setup Provisioning to Sync Users to vCenter</h2>
<p>Here is where the rubber meets the road and we can finally start syncing users from Azure AD to vCenter. </p>
<ul>
<li>Navigate to the Enterprise Application → vCenter 8 SCIM Provisioning → Provisioning</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-blade.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-blade.png" alt="vCenter 8 SCIM Provisioning blade" width="1011" height="519" class="aligncenter size-full wp-image-4992" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-blade.png?v=1701034026 1011w, https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-blade-768x394.png?v=1701034026 768w" sizes="(max-width: 1011px) 100vw, 1011px" /></a><br />
&nbsp;</p>
<ul>
<li>Click on Provisioning and set the mode to automatic</li>
<li>Copy the External URL from the Azure app proxy and paste it here under Tenant URL</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-External-URL.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-External-URL.png" alt="vCenter 8 SCIM Provisioning External URL" width="870" height="588" class="aligncenter size-full wp-image-4994" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-External-URL.png?v=1701035281 870w, https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-External-URL-768x519.png?v=1701035281 768w" sizes="(max-width: 870px) 100vw, 870px" /></a><br />
&nbsp;</p>
<ul>
<li><strong>Create a secret from vCenter 8</strong> configuration and paste it here under <strong>Secret Token</strong></li>
<li>Click <strong>Test Connection</strong>.  If everything is configured correctly, it should work.
<li>Save the configuration</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-Secret-Token.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-Secret-Token.png" alt="vCenter 8 SCIM Provisioning Secret Token" width="861" height="408" class="aligncenter size-full wp-image-4995" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-Secret-Token.png?v=1701035718 861w, https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-Secret-Token-768x364.png?v=1701035718 768w" sizes="(max-width: 861px) 100vw, 861px" /></a><br />
&nbsp;</p>
<p>Once the setting is saved, refresh the tab so the other settings can kick in.  Another option is to close out of the blade and go back into the provisioning section.</p>
<ul>
<li>From here within the provisioning blade → Users and groups</li>
<li>Set the users and/or groups you want to sync to vCenter</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-Add-users-and-groups.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-Add-users-and-groups.png" alt="vCenter 8 SCIM Provisioning Add users and groups" width="917" height="465" class="aligncenter size-full wp-image-4998" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-Add-users-and-groups.png?v=1701103172 917w, https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-Add-users-and-groups-768x389.png?v=1701103172 768w" sizes="(max-width: 917px) 100vw, 917px" /></a><br />
&nbsp;</p>
<p>Once we&#8217;re happy with the users and/or groups we want to add, we&#8217;ll need to start the provisioning cycle so the objects can sync to vCenter 8.</p>
<ul>
<li>Go to the overview page</li>
<li>Click on start provisioning to start the sync engine</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-start-provisioning.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-start-provisioning.png" alt="vCenter 8 SCIM Provisioning start provisioning" width="876" height="450" class="aligncenter size-full wp-image-4999" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-start-provisioning.png?v=1701103429 876w, https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-SCIM-Provisioning-start-provisioning-768x395.png?v=1701103429 768w" sizes="(max-width: 876px) 100vw, 876px" /></a><br />
&nbsp;</p>
<div id="vcenterpermissions" style="scroll-margin-top: 10px;"></div>
<h2>Integrating Permissions for VMware vCenter</h2>
<p>At this point you should now have your users and/or groups syncing to VMware vCenter 8.  The last step here is to actually add these users to the permissions that you want to grant. VMware has these steps pretty well documented so it&#8217;s a quick search away.  However,  we&#8217;ll do a quick overview to ensure we add our users to the admin role so we can manage vCenter and all its resources.<br />
&nbsp;</p>
<p>Within vCenter 8 UI:</p>
<ul>
<li>Navigate to <strong>Administration</strong> → <strong>single sign on</strong> → <strong>Users and Groups</strong> → <strong>Groups</strong> → <strong>Administrators</strong></li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-Users-and-group-administrator.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-Users-and-group-administrator.png" alt="vCenter 8 Users and group administrator" width="1023" height="569" class="aligncenter size-full wp-image-5006" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-Users-and-group-administrator.png?v=1701110226 1023w, https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-Users-and-group-administrator-768x427.png?v=1701110226 768w" sizes="(max-width: 1023px) 100vw, 1023px" /></a><br />
&nbsp;</p>
<ul>
<li>Click <strong>Edit</strong> to modify the members</li>
<li>Next to Add a member, click the drop down to <strong>add your domain</strong></li>
<li><strong>Search for the group</strong> that is synced from Azure AD provisioning</li>
<li>Click <strong>Save</strong> to save the keep the settings</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-Users-and-group-add-admin.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-Users-and-group-add-admin.png" alt="vCenter 8 Users and group add admin" width="860" height="584" class="aligncenter size-full wp-image-5008" srcset="https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-Users-and-group-add-admin.png?v=1701111186 860w, https://thesysadminchannel.com/wp-content/uploads/2023/11/vCenter-8-Users-and-group-add-admin-768x522.png?v=1701111186 768w" sizes="(max-width: 860px) 100vw, 860px" /></a><br />
&nbsp;</p>
<div id="conclusion" style="scroll-margin-top: 10px;"></div>
<h2>Conclusion</h2>
<p>So there you have it, a full step by step guide on how to setup VMware vCenter SSO Integration with Azure AD.  This method is especially helpful because this allows you to have vCenter in scope of conditional access policies and phishing resistance MFA methods such as Windows Hello for Business and Fido 2 security keys.</p>
<p>The post <a href="https://thesysadminchannel.com/vmware-vcenter-sso-integration-with-azure-ad/">VMware vCenter SSO Integration with Azure AD</a> appeared first on <a href="https://thesysadminchannel.com">the Sysadmin Channel</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://thesysadminchannel.com/vmware-vcenter-sso-integration-with-azure-ad/feed/</wfw:commentRss>
			<slash:comments>9</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4922</post-id>	</item>
	</channel>
</rss>
