6.0.3

Table Of Contents
Table 26. Active Directory as an LDAP Server and OpenLDAP Settings (Continued)
Field Description
Base DN for groups The base Distinguished Name for groups.
Primary Server URL Primary domain controller LDAP server for the domain.
Use the format ldap://hostname:port or
ldaps://hostname:port. The port is typically 389 for ldap:
connections and 636 for ldaps: connections. For Active
Directory multi-domain controller deployments, the port is
typically 3268 for ldap: connections and 3269 for ldaps:
connections.
A certicate that establishes trust for the LDAPS endpoint
of the Active Directory server is required when you use
ldaps:// in the primary or secondary LDAP URL.
Secondary server URL Address of a secondary domain controller LDAP server
that is used for failover.
Choose certicate If you want to use LDAPS with your Active Directory
LDAP Server or OpenLDAP Server identity source, a
Choose certicate buon becomes available after you type
ldaps:// in the URL eld. A secondary URL is not
required.
Username ID of a user in the domain who has a minimum of read-
only access to Base DN for users and groups.
Password Password of the user who is specied by Username.
Edit a vCenter Single Sign-On Identity Source
vSphere users are dened in an identity source. You can edit the details of an identity source that is
associated with vCenter Single Sign-On.
Procedure
1 Log in to the vSphere Web Client as administrator@vsphere.local or as another user with vCenter Single
Sign-On administrator privileges.
Users with vCenter Single Sign-On administrator privileges are in the Administrators group in the
vsphere.local domain.
2 Browse to Administration > Single Sign-On > .
3 Click the Identity Sources tab.
4 Right-click the identity source in the table and select Edit Identity Source.
5 Edit the identity source seings. The available options depend on the type of identity source you
selected.
Option Description
Active Directory (Integrated
Windows Authentication)
Use this option for native Active Directory implementations. The machine
on which the vCenter Single Sign-Onservice is running must be in an
Active Directory domain if you want to use this option.
See Active Directory Identity Source Seings,” on page 32.
Active Directory as an LDAP Server
This option is available for backward compatibility. It requires that you
specify the domain controller and other information. See Active Directory
LDAP Server and OpenLDAP Server Identity Source Seings,” on page 33.
vSphere Security
34 VMware, Inc.