Skip to content

Commit eac50f2

Browse files
committed
refresh updates
1 parent a9b85aa commit eac50f2

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

articles/azure-vmware/configure-external-identity-source-nsx-t.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ You can set up NSX to use an external Lightweight Directory Access Protocol (LDA
2222

2323
- A working connection from your Windows Server Active Directory network to your Azure VMware Solution private cloud.
2424
- A network path from your Windows Server Active Directory server to the management network of the instance of Azure VMware Solution in which NSX is deployed.
25-
- A Windows Server Active Directory domain controller that has a valid certificate. The certificate is issued by a [Windows Server Active Directory Certificate Services Certificate Authority (CA)](https://social.technet.microsoft.com/wiki/contents/articles/2980.ldap-over-ssl-ldaps-certificate.aspx) or by a [third-party CA](/troubleshoot/windows-server/identity/enable-ldap-over-ssl-3rd-certification-authority).
25+
- A Windows Server Active Directory domain controller that has a valid certificate. The certificate gets issued by a [Windows Server Active Directory Certificate Services Certificate Authority (CA)](https://social.technet.microsoft.com/wiki/contents/articles/2980.ldap-over-ssl-ldaps-certificate.aspx) or by a [third-party CA](/troubleshoot/windows-server/identity/enable-ldap-over-ssl-3rd-certification-authority).
2626

2727
We recommend that you use two domain controllers that are located in the same Azure region as the Azure VMware Solution software-defined datacenter.
2828

@@ -90,7 +90,7 @@ After you add an external identity, you can assign NSX roles to Windows Server A
9090

9191
1. Select the external identity provider that you selected in step 3 in the preceding section. For example, **NSX External Identity Provider**.
9292

93-
1. Enter the first few characters of the user's name, the user's sign-in ID, or a group name to search the LDAP directory. Select a user or group from the list of results.
93+
1. Search the LDAP directory by entering the first few characters of the user's name, the user's sign-in ID, or a group name. Select a user or group from the list of results.
9494

9595
1. Select a role. In this example, assign the FTAdmin user the CloudAdmin role.
9696

0 commit comments

Comments
 (0)