Skip to content

Commit 347240f

Browse files
authored
Add Microsoft Entra ID integration details
Added a section on integrating Microsoft Entra ID as an identity source for Azure VMware Solution vCenter, highlighting security benefits and required permissions.
1 parent 2500924 commit 347240f

1 file changed

Lines changed: 19 additions & 0 deletions

File tree

articles/azure-vmware/configure-identity-source-vcenter.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,25 @@ In this article, you learn how to:
4646
> [!NOTE]
4747
> For more information about LDAPS and certificate issuance, contact your security team or your identity management team.
4848
49+
## Microsoft Entra ID as an Identity Source
50+
51+
Integrating Microsoft Entra ID as your external identity provider for Azure VMware Solution vCenter transforms your administrative security and operational efficiency. While Azure VMware Solution traditionally relies on Windows Server Active Directory via LDAPS, native Entra ID federation (using OIDC in vSphere 8.0 U2+) offers a modernized approach. The primary advantage is centralized identity management, which breaks down authentication silos between your cloud and on-premises environments.
52+
53+
By relying on Entra ID, you can natively enforce advanced security policies—such as Multi-Factor Authentication (MFA) and Conditional Access—without deploying additional infrastructure. Because this is a federated model, vCenter never directly handles or stores user credentials; instead, it trusts Entra ID's validation. This protects credentials, ensures a seamless Single Sign-On (SSO) experience for your administrators, and provides centralized audit trails for better compliance.
54+
55+
Azure VMware Solution is a managed service, standard CloudAdmin accounts do not have the elevated native vCenter permissions required to manage external identity provider directly. To bridge this gap, you must use Run Commands—specifically packaged PowerShell cmdlets executed directly through the Azure portal.
56+
57+
| Category | Component/Feature | Description |
58+
| --- | --- | --- |
59+
| **Security Benefits** | MFA & Conditional Access | Enforces native Entra ID security policies to protect vCenter Access. |
60+
| | Credential Protection | Federated authentication ensures vCenter never sees raw credentials. |
61+
| **Run Commands** | Add-VCenterCloudAdminRoleVcIdentityProvidersManagePrivilege | Add required permission for external identity provider to Cloudadmin account. |
62+
| | Remove-AVSIdentityProviderEntraId | Deletes the configured Entra ID from vCenter Server. |
63+
| **Permissions** | VcIdentityProviders.Manage | vCenter privilege required to create, update, or delete external identiy providers. |
64+
65+
> [!NOTE]
66+
> Use Microsoft Entra ID or LDAPS authentication for external identity sources with vCenter. Azure VMware Solution supports both options.
67+
4968
## Export the certificate for LDAPS authentication (Optional)
5069

5170
First, verify that the certificate that's used for LDAPS is valid. If you don't have a certificate, complete the steps to [create a certificate for LDAPS](../active-directory-domain-services/tutorial-configure-ldaps.md#create-a-certificate-for-secure-ldap) before you continue.

0 commit comments

Comments
 (0)