6.0.3

Table Of Contents
For example:
sso-config.sh -set_rsa_userid_attr_map -t vsphere.local -idsName ssolabs.com -ldapAttr
userPrincipalName
7 To display the current seings, run the following command.
sso-config.sh -t tenantName -get_rsa_config
If user name and password authentication is disabled and SecurID token authentication is enabled, users
must log in with their user name and SecureID token. User name and password login is no longer possible.
Manage the Login Banner
Starting with vSphere 6.0 Update 2, you can include a Login Banner with your environment. You can
display some text, or you can require that the user click a check box, for example, to indicate that they accept
terms and conditions. You can enable and disable the login banner, and you can require that users click an
explicit consent check box.
Procedure
1 From a Web browser, connect to the Platform Services Controller by specifying the following URL:
https://psc_hostname_or_IP/psc
In an embedded deployment, the Platform Services Controller host name or IP address is the same as
the vCenter Server host name or IP address.
2 Specify the user name and password for administrator@vsphere.local or another member of the vCenter
Single Sign-On Administrators group.
If you specied a dierent domain during installation, log in as administrator@mydomain.
3 Under Single Sign-On, select  and click the Login Banner tab.
4 Click Edit and congure the login banner.
Option Description
Status
Click the Enabled check box to enable to login banner. You cannot change
the other elds unless you click this check box.
Explicit Consent
Click the Explicit Consent check box to require that the user click a check
box before logging in. You can also display a message without a check box.
Title
Title of the banner. By default, the Login Banner text is I agree to the.
You can add to that, for example Terms and Conditions.
Message
Message that the user sees when clicking on the banner. For example, the
text of the terms and conditions. The message is required if you use
explicit consent.
Using vCenter Single Sign-On as the Identity Provider for Another
Service Provider
You can use vCenter Single Sign-On as an identity provider with a service provider that supports the SAML
2.0 standard. If you do, the other service provider grants access to a user if that user can authenticate to
vCenter Single Sign-On.
For example, vRealize Automation 7.0 and later supports vCenter Single Sign-On as an identity provider.
When you log in to vRealize Automation, vCenter Single Sign-On performs the authentication is performed.
The SAML token that vCenter Single Sign-On generates is trusted by both vCenter Single Sign-On and
vRealize Automation.
Chapter 2 vSphere Authentication with vCenter Single Sign-On
VMware, Inc. 45