NSX-T Manager – Active Directory Integration (LDAP) and Role-Based Access Control (RBAC)

In this, We will integrate the NSX-T Manager with our Active Directory (AD) so We can use the Domain Account to log in instead of default admin. In an upcoming post, We will discuss how to integrate NSX-T with VMware Workspace One Access (Formerly known as VMware Identity Manager (vIDM) as well. Workspace One Access is VMware’s Identity Provider to the majority of their products.

System – Settings – User Management – LDAP

I’m using LDAP instead of Secure LDAP since I don’t have a Trusted CA SSL Certificate for my NSX-T Manager (Still using the Sel-Signed Certificate). If you have an SSL certificate installed from your Internal CA you can use the Secure LDAP (TCP 636) option.

Now we have integrated the NSX-T Manager with AD, I will add my domain user name to NSX-T Enterprise Admin Group. Before that let’s discuss built-in Roles in NSX-T Manager. NSX Intelligence recognizes the following built-in roles.

System – Users and Roles – Roles

For more information regarding NSX-T RBAC, Refer to the link from VMware

Role-Based Access Control in NSX Intelligence

To add the Users/Groups, Go to the User Management.

* Screenshots captured from VMware vCenter Console and NSX-T Manager Console on Feb 02, 2022.