Configuring the VMware Identity Manager Connector & the AirWatch Cloud Connector
This section is dedicated to deploying and configuring the VMware Identity Manager Connector
Part 1. Configuring the VMware Identity Manager Connector
1. You will be configuring VMware Identity Manager Connector on Windows in this lab. We have pre-installed VMware Identity Manager connector 2018.8.1.0 . Our objective is to associate this on-premise connector instance with our SaaS instance of VMware Identity Manager.
- Log on to your Control Center2 server in your Lab use your Mozilla Firefox browser. NB!
- Navigate to https://ws1-connector.euc-livefire.com:8443/cfg . The username will be admin and the password will be VMware1! select next at the bottom of the page.
- Now navigate to your unique
- VMware Identity Manager Tenant that your received in your e-mail login and navigate to Identity & Access Management > Setup > Connectors
- Click on Add Connector
- Connector ID: WS1-Connector select Generate Activation Code now copy this code
- Paste this code into your Connector configuration setup in the activate connector page under activation code click next and you will be done with the setup.
- You should get a setup is complete page inside the VMware Identity Manager Console.
2. We will now configure and synchronise Active Directory to the VMware Identity Manager server using the external connector.
First we will configure the Attributes. Note! Every organisation will need to research their requirements when deciding whether or not to set attributes to required. For specific applications where this needs to be considered, if the associated user object does not have the attribute, authentication might fail.
- Navigate to Identity & Access Management > Setup > User Attributes
Notice the attributes that are available and the option available to set these to Required. IMPORTANT NOTE: The attributes set to required cannot be changed after a directory sync has taken place.
- Set the attribute distinguishedName and userPrincipalName to Required
- Under Attributes to the right select the Green Plus ( + ) Add an additional attribute by writing it in called objectGUID which might be used for authentication for certain applications. Note only default attributes listed can be set to required.
- Select Save
3. Configure our AD-sync configuration with VMware Identity Manager.
- To the right of the screen select Manage, select Directories, select Add Directory
- Select Add Directory > Add Active Directory over LDAP/IWA
4. Configure our AD-sync configuration with VMware Identity Manager....continued
- In Add Directory Page, configure the following
- Directory Name: LivefireSync
- Ensure the Active Directory over LDAP radio button is selected
- The Sync Connector select the external connector ws1-connector.euc-livefire.com
- Directory Search Attribute: sAMAccountName
- Base DN: dc=EUC-Livefire,dc=com
- Bind DN: cn=administrator,ou=corp,dc=EUC-Livefire,dc=com
- Bind DN Password: VMware1!
- Select Test Connection
(If this fails and you have verified your syntax is correct. Select Setup > Connectors. Under worker select the built-in Connector Workspaceone.euc-livefire.com. Select AuthAdaptors. If under Adaptor Name is blank, reboot the WorkspaceOne.euc-livefire.com server.You can do this using remote desktop and loging in as administrator with password VMware1! ) Then retry your configuration
- Select Save & Next
5. Configure our AD-sync configuration with VMware Identity Manager....continued
- On the Select the Domains page, select Next. euc-livefire.com should be discovered.
- On the Map User Attribute page scroll down to objectGuid and select the drop down arrow select objectGUID.
Since this is the attribute we setup earlier in User Attributes we will also need to map it to an AD attribute.
- select Next
6. Configure our AD-sync configuration with VMware Identity Manager....continued
- On the Select the Groups you want to sync page, select the green plus (+) to the right of the page,
- Under Specify the group DNs type the following dc=euc-livefire,dc=com next to the distinguished name you added, select Find Groups then the Select All check box
- select Next.
7. Configure our AD-sync configuration with VMware Identity Manager....continued
- On the Select the Users you would like to sync page, under specify the user DNs type ou=corp,dc=EUC-Livefire,dc=com
- select Next, notice the objects to sync in the Review page.
- Select Sync Directory
8. Configuring the Built-in IDP in VMware Identity Manager
- Navigate to and select Identity & Access Management > Manage, select Identity Providers. Notice you now have an additional Identity Provider which is a Workspace IDP called WorkspaceIDP_1 which is associated with the LiveFire directory we just created above. This is an automatic process whereby when the built in connector is associated with Active Directory this Identity Provider gets created.
9. Configuring the Built-in IDP in VMware Identity Manager...continued
Let's associate the Built-In iDP with the AD and the external connector to ensure Password (Cloud Deployment) can be used as an authentication method.
- Select Built-In.
- In the Built-in IDP windows select the following:
- Select LivefireSync under Users
- All Ranges under Network
- Add the WS1-Connector.euc-livefire.com to the connector section
- Select Password (Cloud Deployment) checkbox
- Select Save at the bottom of the page.
10. Configuring the Built-in IDP in VMware Identity Manager...continued
We need to ensure that our default access policy has Password (Cloud Deployment) set as the authentication method.
- Navigate to Identity & Access Management > Manage > Policies Now Select EDIT (this will edit the default Access Policy Set)
- Select the Workspace One App Policy and select Password (Cloud Deployment) as the first authentication form. Select SAVE at the bottom of the page.
- Now Select the Web Browser and do the same by changing the primary authentication method to Password (Cloud Deployment) and select SAVE at the bottom of the page.
- Select NEXT on the Policy Page and SAVE on the final page of the wizard.