You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-vmware/configure-external-identity-source-nsx-t.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ You can set up NSX to use an external Lightweight Directory Access Protocol (LDA
50
50
51
51
:::image type="content" source="media/nsxt/configure-nsx-t-pic-2.png" alt-text="Screenshot that shows the User Management Add Identity Source page in NSX Manager." lightbox="media/nsxt/configure-nsx-t-pic-2.png":::
52
52
53
-
1.Next, under **LDAP Servers**, select **Set** as shown in the preceding screenshot.
53
+
1.Under **LDAP Servers**, select **Set**, as shown in the previous screenshot.
54
54
55
55
1. On **Set LDAP Server**, select **Add LDAP Server**, and then enter or select values for the following items:
56
56
@@ -76,7 +76,7 @@ You can set up NSX to use an external Lightweight Directory Access Protocol (LDA
76
76
1. To add a second domain controller or another external identity provider, return to step 1.
77
77
78
78
> [!NOTE]
79
-
> A recommended practice is to have two domain controllers to act as LDAP servers. You can also put the LDAP servers behind a load balancer.
79
+
> The recommended practice is to have two domain controllers to act as LDAP servers. You can also put the LDAP servers behind a load balancer.
80
80
81
81
## Assign roles to Windows Server Active Directory identities
82
82
@@ -90,7 +90,7 @@ After you add an external identity, you can assign NSX roles to Windows Server A
90
90
91
91
1. Select the external identity provider that you selected in step 3 in the preceding section. For example, **NSX External Identity Provider**.
92
92
93
-
1. Enter the first few characters of the user's name, the user's sign-in ID, or a group name to search the LDAP directory. Then select a user or group from the list of results.
93
+
1. Enter the first few characters of the user's name, the user's sign-in ID, or a group name to search the LDAP directory. Select a user or group from the list of results.
94
94
95
95
1. Select a role. In this example, assign the FTAdmin user the CloudAdmin role.
0 commit comments