Skip to content

Under Construction

simple block that hopefully will be constantly under construction in regards to new posts ;-)

Menu
  • Home
  • Blog
    • Homelab
    • VMware
      • vSphere
      • NSX
      • VCF
  • About me
  • Impressum
  • Datenschutzerklรคrung
Menu

VCF9 – The new Identity Provider

Posted on 19. March 202619. March 2026 by Oliver Lis

Within VCF9 we have a new way to leverage Identity & Access Management.

While in VCF 5.x and before the Identity Management Appliance was needed to orchestrate Logins to other facilities now we can also leverage the embeeded SSO from our vcenter.

Before you choose which identity broker is selected, you need to check the prerequisites and also see which identity broker deployment is more suitable

Prerequisites for Configuring VCF Single Sign-On Using the Embedded Deployment Mode

If you choose the embedded deployment mode for setting up

VCF Single Sign-On, ensure that the following prerequisites are met:

  • The management domain vCenter must be at version 9.0 or later and have a VMware Cloud Foundation license assigned.
  • The management domain vCenter must NOT be part of Enhanced Linked Mode (ELM).

Do not activate ELM in the participating vCenter instances after configuring

VCF Single Sign-On in embedded mode.

You can choose appliance as the mode of deployment if the above criteria are not met. However, the integration of vCenter with VCF Single Sign-On will not be possible at a later stage without first meeting the above criteria.

This flowchart shows how the vcenter embedded SSO Deployment integrates into your VCF Fleet:

Prerequisites for Configuring VCF Single Sign-On Using the Appliance Deployment Mode

If you choose to configure

VCF Single Sign-On in appliance mode, the

VMware Cloud Foundation platform must meet the following minimum requirements:

  • A 3-node cluster will be deployed.
  • Each node will have 8 vCPUs and 16GB RAM.
  • Each cluster requires a minimum of 700GB storage.

This flowchart shows how the VCF Identity Broker Appliances integrates into your VCF Fleet:

Now since we talked about the pre-requisites lets start deploying SSO! I will be deploying/configuring the embedded SSO with an Active-Directory behind it so that in the end i can allow my domain-admin users to login into each components (apart from the SDDC Manager as mentioned ๐Ÿ˜‰ ).

First, we need to go to the Fleet Management within VCF Operations and then select Identity & Access

There we will see a landingpage with a lot of hints regarding the enablement of SSO.

After we read all hints and made sure that our vcenters aren’t in enhanced linked mode we are greeted by the SSO Overwiews “getting started” page:

after selecting our VCF instance (VCF9 in my lab) we are able to choose how SSO is gonna be deployed / implemented:

From there on we select our VCF instance and go trough the 3 steps of the wizard and start with the selection of our deployment mode

Here we have the option to choose between both deployment models in this article we will simply leverage SSO over our managemend domains vcenter and therefore choose the embedded Identity broker:

in the next step we configure our identity broker and as you might notice apart from the Directory-Based Identity Provider we even can add Modern Identity Providers!

Those modern providers are the same that vcenter 9 will give you ๐Ÿ˜‰

So i’ve choosen AD/LDAP and then hit next and afterwards configure to be presented with the configuration options which will vary depending on what provider (modern or directory based) you choose!

On the left we see the Directory-Based identity provider wizard, on the left we see the modern Identity Provider wizard. Keep in mind if you select the “global Catalog” option you need to check the following KB as it has some caveats:

https://knowledge.broadcom.com/external/article/386869

As this is a lab-setup i will be lazy going with ldap to connect to my environment, surely in a productive environment you should already be using ldaps as your default ๐Ÿ˜‰ The port for ldaps or ldap will be added automatically!

Now simply review everything is alright and your Identity Provider configuration is done!

The last step now involves enabling which users are able to login!

At step 1 we review our Directory Information (again) and then we map the LDAP/AD Attributes to the vcf attributes:

After the attribute-mapping you choose your Group which inherits the users who are allowed to leverage the SSO.
I’ve created a new universal group (due to the usage of the global catalog) called VCF-SSO where i will include my members:

we can also provision users but having an Active Directory Group to control the membership is good enough ๐Ÿ˜‰

Now we review everything and we are finished with setting everything up ๐Ÿ™‚

In the last step we are able to either reset the setup:

Or finish it along with the warning!

Then we go to the component configuration, select our nsx and let VCF Operations configure our component:

To finish everything up we connect to our other components (in my case it is only NSX) and assign a role to our VCF-SSO User

If you don’t see the “ADD ROLE FOR VCF SSO USER/GROUP” Button, make sure that VCF SSO is registered with NSX, otherwise you might get that blue bar:

Thats it!

All in all it is really easy to integrate VCF SSO with the embedded Management vCenter! Obviously for productive environments you should leverage the Identity Broker simply because your vcenter might otherwise be your single point of failure in regards to SSO Capabilites!

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • LinkedIn
Author Card
William

Virtualization Consultant at ITQ


Primary focus relies on VCF and its components and trough the time some knowledge with Windows Servers, Networking/Gateways/Firewalls and Storage Systems, Backup aswell as different Hyperscalers has been gathered.


Certifications

Recent Posts

  • VCF9 – The new Identity Provider
  • vCenter 9 Deployment
  • Generate the Broadcom Download Token
  • Broadcom VMware Explore 2024 – Recap

About This Site

This may be a good place to introduce yourself and your site or include some credits.

Categories

  • Blog
  • Broadcom
  • ITQ
  • Uncategorized
  • VCF
  • VCF9
  • VMware
©2026 Under Construction | Built using WordPress and Responsive Blogily theme by Superb