7.4

Table Of Contents
6 Select the external connector or connectors that you configured for smart card authentication.
Note If the deployment is located behind a load balancer, enter the load balancer URL.
7 Select the network for access to this identity provider.
8 Click Add.
Configure Certificate Authentication and Configure Default Access Policy
Rules
You must configure your external connection for use with your vRealize Automation Active Directory and
domain.
Prerequisites
Log in to vRealize Automation as a tenant administrator.
Procedure
1 Select Administration > Directories Management > Connectors.
2 Select the Desired connector in the Worker column.
The selected worker is shown in the Worker Name text box on the Connector Detail tab and
connector type information appears in the Connector Type text box.
3 Ensure that the connector is linked to the desired Active Directory by specifying that Directory in the
Associated Directory text box.
4 Enter the appropriate domain name in the Associated Domains text box.
5 Select the AuthAdapters tab and enable CertificateAuthAdapter.
6 Configure certificate authentication as appropriate for your deployment.
See Configure Certificate Authentication for Directories Management.
7 Select Administration > Directories Management > Policies.
8 Click Edit Default Policy.
9 Add Certificate to the policy rules and make it the first authentication method.
Certificate must be the first authentication method listed in the policy rule, otherwise certificate
authentication fails.
Create a Multi Domain or Multi Forest Active Directory Link
As a system administrator, you need to configure a multi domain or multi forest Active Directory link.
The procedure for configuring a multi domain or multi forest Active Directory link is essentially the same.
For a multi forest link, bi-directional trust is required between all applicable domains.
Configuring vRealize Automation
VMware, Inc. 161