vSphere authentication

vSphere uses Single Sign-On as its authentication broker and for exchanging security tokens. Authentication is separated from permissions. Single Sign-On authorizes users to authenticate once the user has been validated; however, this does not necessarily mean that the authenticated user has permissions within a vCenter Server. Permissions must be granted within the vCenter Server, separately from Single Sign-On. This section will cover Single Sign-On and its configuration. See the vSphere Permissions section for granting privileges to users.

vCenter Single Sign-On overview

Single Sign-On is a vSphere component that acts as an authentication broker and is an infrastructure for security token exchange. vCenter Single Sign-On is one of the components that the vSphere 6 Platform Services Controller (PSC) consists of.

Configuring Single Sign-On

Single Sign-On is a required component of the vSphere Platforms Controller (on which the vCenter Server is dependent). This section covers how to configure Single Sign-On identity sources and policies.

Identity sources

Identity sources are collections of user and group data and may be used to attach one or more domains to Single Sign-On. This user and group data is typically stored locally in the Single Sign-On machine's operating system, OpenLDAP, or Active Directory. Single Sign-On also contains an internal security domain, commonly called vsphere.local. This local security domain may also be used for authentication.

To configure a Single Sign-On identity source:

  1. Navigate to Administration and then select Configuration underneath Single Sign-On. Choose the Identity Sources tab.
  2. To add an identity source, select the add (+) button:

    Identity sources
  3. The Add identity source dialog box will appear. Select an Identity source type and enter the Identity source settings as required. There are several types of identity sources:
    • Active Directory (Integrated Windows Authentication): This is ideal for Active Directory 2003 or later. A single domain may be specified as an identity source, though this domain may be a forest root domain or have child domains.
    • Active Directory as an LDAP Server: This option is primarily for backwards compatibility for vSphere 5.1 Single Sign-On.
    • OpenLDAP: This supports for OpenLDAP 2.4 or later; there is support for multiple OpenLDAP identity sources.
    • Local OS: Only a single local operating system identity source may be configured. This option only exists with a simple Single Sign-On deployment, meaning that it is not available if multiple Single Sign-On instances (PSCs) are deployed:

    Identity sources

  4. Once the settings information has been entered, click on the Test Connection button to ensure that Single Sign-On can bind successfully to the identity source.
  5. A popup will appear, as shown in the following screenshot, to notify you whether the connection was successfully established or not.

    Identity sources
  6. Once successfully established, click on OK:

    Identity sources
  7. Once the connection has been established successfully, click on OK in the Add identity source dialog box.

Setting the default domain

The default domain specifies which domain is used for authentication when a user attempts to log in using Single Sign-On. After installing the Platform Services Controller, the default domain is set to the Single Sign-On security domain vsphere.local. A user signing in from any other domain would have to specify the domain at each login.

To change the default domain:

  1. Log into the vSphere Web Client as a Single Sign-On administrator.
  2. Navigate to Administration and then select Configuration under Single Sign-On. Choose the Identity Sources tab.
  3. Select the desired domain. Click on the default domain button (circled in the following screenshot):

    Setting the default domain
  4. A Warning dialog will appear:

    Setting the default domain
  5. Click on Yes to change the default domain for authentication.

Single Sign-On policies

There are several different Single Sign-On policies that may be configured to enforce various security rules in a vSphere environment. This section will cover password policies, lockout policies, and token policies.

Password policies

Password policies are a set of restrictions and rules on password expiration and password format for Single Sign-On users. Keep in mind that this policy only applies to built-in Single Sign-On security domain (vsphere.local) users. To modify the password policies:

  1. Log into the vSphere Web Client as a Single Sign-On administrator and navigate to Administration, and choose Configuration under Single Sign-On.
  2. Select the Policies tab and then click on the Password Policy button.
  3. Review the policies and click on Edit… to modify:

    Password policies
  4. The Edit Password Policies dialog box will appear. Modify the settings as needed.
    • Maximum lifetime: This setting specifies the maximum number of days before a password must be changed
    • Restrict reuse: This setting specifies whether a password can be reused
    • Maximum length: This setting specifies the maximum number of characters in a password
    • Minimum length: This setting specifies the minimum number of characters in a password
    • Character requirements: This setting specifies the minimum number of each character type required in a password
    • Identical adjacent characters: This specifies the maximum number of identical characters that are consecutively allowed

      Password policies

  5. Once the password policy has been set as desired, click on the OK button.

Lockout policy

The Single Sign-On lockout policy specifies the settings surrounding what happens when a vsphere.local user enters the wrong password multiple times. To modify the lockout policy:

  1. Log into the vSphere Web Client as a Single Sign-On administrator and navigate to Administration, and choose Configuration under Single Sign-On.
  2. Select the Policies tab and then click on the Lockout Policy button.
  3. Review the policies and click on the Edit… button if modifying the policies is desired:

    Lockout policy
  4. The Edit Lockout Policy dialog will appear, allowing modifications to the policy. The following policies may be changed:
    • Maximum number of failed login attempts: This specifies the maximum number of times that an account may fail to log in before it is locked.
    • Time interval between failures: This specifies the allowable time period in which a lockout may be triggered.
    • Unlock time: This specifies the length of time in which the lock remains. If set to 0, administration will be required to unlock the account:

      Lockout policy

  5. Once finished editing the policy, click on OK.

Token policy

The token policy for Single Sign-On specifies such token properties as clock tolerance and renewal count. Like the other Single Sign-On policies, this may be configured to meet different infrastructure requirements. To modify the token policies:

  1. Log into the vSphere Web Client as a Single Sign-On administrator and navigate to Administration, and choose Configuration under Single Sign-On.
  2. Select the Policies tab and then click on the Token Policy button.
  3. If modifying the policies is desired, click on the Edit button:

    Token policy
  4. This will bring up the Edit Token Policy dialog box. The following variables may be modified:
    • Clock tolerance: This setting specifies the allowable time difference between the client and the domain controller clock. If the time difference exceeds the configured value then Single Sign-On will declare the token invalid.
    • Maximum token renewal count: This setting specifies the maximum allowable times that a token may be renewed. A new security token will be required once the maximum number of renewal attempts is exceeded.
    • Maximum token delegation count: This setting specifies the maximum allowable times that a single holder-of-key may be delegated. Holder-of-key tokens may be delegated to vSphere services. A token request may specify a DelegateTo identity, specifying a service that will perform on behalf of the principle that provided the token.
    • Maximum bearer token lifetime: This setting specifies the maximum allowable lifetime of the bearer token before reissue is required. A bearer token provides authentication based on its possession. It is meant to be a single use, short-term operation.
    • Maximum holder-of-key token lifetime: This setting specifies the maximum allowable lifetime of the holder-of-key token before it is marked as invalid. A holder-of-key token provides security artifact-based authentication that is embedded in the token. These are used for delegation.

      Token policy

  5. Once finished modifying the values, click on OK.

Users and groups

Users and groups that are internal to the Single Sign-On security domain may be reviewed and additional users may be created on vsphere.local. While it is not possible to add users to other domains using the vSphere Web Client, you may add users to Single Sign-On groups.

Reviewing and creating Single Sign-On users

To view and create Single Sign-On users:

  1. Log into the vSphere Web Client as a Single Sign-On administrator.
  2. Navigate to Administration and then select Users and Groups underneath Single Sign-On.
  3. Choose the Users tab to view the users within the vsphere.local domain. To view users in different domains, select the drop-down box next to Domain. (Keep in mind that users may not be created in any domain other than vsphere.local.)
  4. A new user may be created in the Single Sign-On security domain by clicking on the plus sign (+).

    Reviewing and creating Single Sign-On users
  5. This will bring up the New User dialog box. Enter a User name, Password, and optionally First name, Last name, and Email address.

    Reviewing and creating Single Sign-On users
  6. Once finished, click on OK.

Single Sign-On user management

Single Sign-On users can be disabled, enabled, or unlocked if necessary.

To disable an account:

  1. Go to the Users tab in Single Sign-On configuration.
  2. Select the desired user account and then click on the Disable button (circled in the following screenshot):

    Single Sign-On user management
  3. The Disable user dialog will appear. Click on Yes to disable the account.

    Single Sign-On user management

To re-enable a user account:

  1. Go to the Users tab in Single Sign-On configuration.
  2. Select the desired user account and then click on the Enable button (circled in the following screenshot).

    Single Sign-On user management
  3. To re-enable the account, click on Yes.

    Single Sign-On user management

An account may also be unlocked by clicking on the lock button after selecting a user.

Managing group membership

Single Sign-On groups may have members that are users of other groups, and these may come from multiple identity sources. To add a user to a Single Sign-On group:

  1. Log into the vSphere Web Client as a Single Sign-On administrator account.
  2. Navigate to Administration and then choose Users and Groups under Single Sign-On.
  3. Select the Groups tab. Choose the group to which a user will be added.
  4. Click on the Add Members button under the Group Members area.

    Managing group membership
  5. The Add Principals dialog box will appear. Select the Domain and then select the user that should be a group member.

    Managing group membership
  6. Once the user has been selected, click on the Add button. Click on the Check names button.

    Managing group membership
  7. Click on OK once finished.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.59.96.247