Milestone 3 vCenter SSO - InaFricke/SEC-480 GitHub Wiki

Milestone 3 - vCenter Cont. (Updates & SSO)

SSO Integration

  1. Navigate to https://10.0.17.3:5480

login: root PW: RR32!

  1. No updates necessary

  2. Select time

Looks correct, I had issues in the previous lab with

  1. Open a terminal

ssh [email protected]

  1. (DIDNT WORK)
w32tm /config /manualpeerlist:"pool.ntp.org" /syncfromflags:manual /reliable:YES /update
net stop w32time
net start w32time
w32tm /resync
  1. Through the GUI on Windows

Open Server Manager > Click Tools → Services > Find Windows Time service > Right-click → Stop

Then go to Control Panel → Date and Time > Click Internet Time tab > Click Change settings Enter server: pool.ntp.org

Restart the windows time service

It would not connect to pool.ntp.org so I am moving on.

Setting up Vcenter

  1. Visit https://vcenteer.ina.local

login: [email protected]

PW: RR32!

  1. Select Administration > Under Single Sign-On, click Configuration
  1. click AD warning
  1. [email protected]
  1. Reset the box

  2. Add identity source

  1. Set as default, repeat
  1. It will not let ina-adm in so I am creating a new user to troublshoot.

[email protected] RoxiRules32

add to the domain admins group

  1. Permissions were not right, so I had to log in as administrator and go in and manually add fricke-adm

Final thoughts

  1. I could not get the ntp pool to work but they are only off by a minute and I think 5 minutes is when it starts to matter.

  2. my ina-adm would not work so I had to make a new one, now I know it was not added in groups (I think)

Video Requirements

Deliverable Checklist:

  1. Show you're logged in as a domain administrator

Display the vCenter interface

Point out in the top-right corner that you're logged in as [email protected] (or [email protected])

  1. Show the AD connection and identity provider

Administration → Single Sign On → Configuration → Identity Provider tab

Show that ina.local is listed as an Active Directory identity source Show it's set as default (if applicable)

  1. Show Domain Admins in Global Permissions

Administration → Access Control → Global Permissions Show that ina.local\Domain Admins has Administrator role