6.0.3

Table Of Contents
Table 23. Login Privileges After Upgrade of Custom Install Environment
Source version Login access for Notes
vSphere 5.0 vCenter Single Sign-On recognizes local
operating system users for the machine where
the Platform Services Controller is installed, but
not for the machine where vCenter Server is
installed.
N Using local operating users for
administration is not recommended, especially in
federated environments.
administrator@vsphere.local can log in to
vCenter Single Sign-On and each vCenter Server
instance as an administrator user.
If your 5.0 installation supported
Active Directory users, those
users no longer have access after
the upgrade. You can add the
Active Directory domain as an
identity source.
vSphere 5.1 or vSphere 5.5 vCenter Single Sign-On recognizes local
operating system users for the machine where
the Platform Services Controller is installed, but
not for the machine where vCenter Server is
installed.
N Using local operating users for
administration is not recommended, especially in
federated environments.
administrator@vsphere.localcan log in to vCenter
Single Sign-On and each vCenter Server instance
as an administrator user.
For upgrades from vSphere 5.1
Admin@SystemDomain has the same privileges
as administrator@vsphere.local.
Starting with vSphere 5.5,
vCenter Single Sign-On supports
only one default identity source.
You can set the default identity
source.
Users in a non-default domain
can specify the domain when
they log in (DOMAIN\user or
user@DOMAIN).
Using vCenter Single Sign-On with vSphere
When a user logs in to a vSphere component or when a vCenter Server solution user accesses another
vCenter Server service, vCenter Single Sign-On performs authentication. Users must be authenticated with
vCenter Single Sign-On and have the necessary privileges for interacting with vSphere objects.
vCenter Single Sign-On authenticates both solution users and other users.
n
Solution users represent a set of services in your vSphere environment. During installation, VMCA
assigns a certicate to each solution user by default. The solution user uses that certicate to
authenticate to vCenter Single Sign-On. vCenter Single Sign-On gives the solution user a SAML token,
and the solution user can then interact with other services in the environment.
n
When other users log in to the environment, for example, from the vSphere Web Client, vCenter Single
Sign-On prompts for a user name and password. If vCenter Single Sign-On nds a user with those
credentials in the corresponding identity source, it assigns the user a SAML token. The user can now
access other services in the environment without being prompted to authenticate again.
Which objects the user can view, and what a user can do, is usually determined by vCenter Server
permission seings. vCenter Server administrators assign those permissions from the Manage >
Permissions interface in the vSphere Web Client, not through vCenter Single Sign-On. See Chapter 4,
“vSphere Permissions and User Management Tasks,” on page 135.
vCenter Single Sign-On and vCenter Server Users
Using the vSphere Web Client, users authenticate to vCenter Single Sign-On by entering their credentials on
the vSphere Web Client login page. After connecting to vCenter Server, authenticated users can view all
vCenter Server instances or other vSphere objects for which their role gives them privileges. No further
authentication is required. See Chapter 4, “vSphere Permissions and User Management Tasks,” on page 135.
Chapter 2 vSphere Authentication with vCenter Single Sign-On
VMware, Inc. 25