VMware Cloud Foundation 9.0 introduced the new VCF Identity Broker component to provide the totally revamped VCF Single Sign-On capability which provides single sign-on across VCF Operations, vCenter, NSX Manager, VCF Operations for logs, VCF Operations for networks, VCF Operations HCX and VCF Automation. VMware Cloud Foundation 9.0 added support for Ping Identity and Generic SAML 2.0 providers in addition to Okta, Microsoft Entra ID, Microsoft Active Directory, Microsoft ADFS and OpenLDAP.

When it comes to Role Based Access Control (RBAC) we’ve typically used Microsoft Active Directory within our lab setups to provide group, service account and user access across the VMware Cloud Foundation platform. The biggest downside of this being the need to deploy at least one Windows Server virtual machine, this isn’t a significant issue generally but it does require a Windows Server license. For this reason we recently took a look at OpenLDAP as an alternative.

In this post we discuss the high-level steps for getting VCF Identity Broker up and running as well as provide some more details steps as they pertain to using OpenLDAP as the Identity Provider of choice.

High-level Steps for Configuring VCF Identity Broker and VCF Single Sign-On

The following high-level steps should be followed to successfully deploy and configure VCF Identity Broker, for the most part the official Broadcom Technical Documentation is pretty good so I’m not going to document all of these procedures instead use the links provided to take you directly to the relevant part of the VMware Cloud Foundation 9.0 documentation.

  1. Deploy VCF Identity Broker appliance
  2. Select a VCF Instance for which you want to configure VCF Single Sign-On
  3. Choose the deployment mode you wish to use
  4. Select and configure the identity provider (Documented as part of this post)
  5. Configure VCF Single Sign-On for NSX and vCenter
  6. Modify the Identity Provider Sync Settings (Documented as part of this post)
  7. Configure VCF Single Sign-On for VCF Operations and VCF Automation
  8. (Optional) Configure VCF Single Sign-On for other VCF Components
  9. Assign required roles and permissions for users or groups

The following two sections provide more detailed step-by-step guidance around the OpenLDAP configuration specifically based on my own lab.

Configuring OpenLDAP as an Identity Provider

Whilst the official Broadcom Technical Documentation for Configure OpenLDAP as an Identity Provider could be followed, I wanted to highlight some specifics of the procedure so I’ve duplicated the steps here.


NOTE

First key point to call out here is to make sure you apply the following prerequisite to your OpenLDAP configuration otherwise you will have issues.

Ensure that the memberOf overlay is activated in the OpenLDAP server. For information about activating memberOf overlay, see OpenLDAP Overlays.


  1. Log in to the VCF Operations interface at https://<vcf_operations_fqdn&gt; as a user assigned Administrator role.

  2. In the main navigation select Fleet Management > Identity & Access.

  3. From the Identity & Access navigation, select SSO Overview.

  4. From the Enable Single Sign-On page, click the Start button against the Configure Identity Provider option.

  5. From the Choose Identity Provider section, select OpenLDAP from the list and click Next.

  6. From the Configure the Identity Provider section, click Configure.

  7. On the Directory Details screen, enter the following details and click Next.

Setting Value
Directory name mycloudyworld
Primary domain controller ldap://10.167.173.100
Directory search attribute Custom Attribute
Custom directory search attribute for Users uid
Custom directory search attribute for Groups cn
Base DN dc=mycloudyworld,dc=io
Bind user name cn=svc-vcf-ldap,dc=mycloudyworld,dc=io
Bind user password VMw@re1!VMw@re1!
  1. On the LDAP Configuration screen, accept the default values and click Next.

  2. On the Review screen, review the details you have added for the configuration and click Finish.

  3. On the Configure User and Group Provisioning screen, click Configure.

  4. On the Directory Review Information screen, click Next.

  5. On the Attributes Mappings screen, enter the following details and click Next.

Setting Value
userName uid
firstName givenName
lastName sn
distinguishedName dn
employeeID (leave blank)
email mail
userPrincipalName userPrincipalName
  1. On the Group Provisioning screen, enter a base group DN dc=mycloudyworld,dc=io and click Select Base Group DN.

  2. Select all the groups that you want to be visible in the VCF Identity Broker and click Next.

  3. On the User Provisioning screen, do not select any users and click Next.

  4. On the Review screen, review the configuration and click Finish.

  5. Click Done.

  6. Now perform Configure VCF Single Sign-On for NSX and vCenter.

Modify the Identity Provider Sync Settings

  1. Log in to the VCF Operations interface at https://<vcf_operations_fqdn&gt; as a user assigned Administrator role.

  2. In the main navigation select Fleet Management > Identity & Access.

  3. From the Identity & Access navigation, select VCF Instances > Instance with Identity Source.

  4. Under Directory Information, select the radio button for mycloudyworld and click Edit.

  5. In the mycloudyworld navigation, select Sync Settings.

  6. On the Sync Settings screen, click Edit.

  7. Change the Sync Frequency to Every 15 Minutes and click Save.

Conclusion

Use this post as a reference to help configure VCF Identity Broker with OpenLDAP as the Identity Provider.

2 responses to “VMware Cloud Foundation 9.0: Setting Up VCF Single Sign-On with OpenLDAP”

  1. SHARAN Avatar
    SHARAN

    Are you able to import the group into VCF-A? if yes, please share the group attributes you used?

    Like

    1. garyjblake Avatar

      Do you mean importing the group into VCF-A Provider Access Control or as a Tenant?

      For the Provider:

      1. Navigate to Administration > Access Control
      2. Select the Groups tab.
      3. Click Import Groups.
      4. Select Source as VCF SSO.
      5. Enter group name in the following format @. (Example gg-auto-admins@mycloudyworld.io)
      6. Using the Assign Role dropdown select the roles you want to assign and click Save.

      Like

Leave a reply to SHARAN Cancel reply