This is the same URL as above, but appended with “/samlsso”: e.g. On the SAML-based Sign-on page, click “Edit” on the first stepįor the Identifier (Entity ID) click “Add identifier”Įnter the URL of your Unified Access Gateway preseeded by “ and appended by “/portal”: e.g. Next, go to “Single sign-on” in the left column and choose “SAML” When done, click “Select” at the bottom of the page.īack at the Assignment page, it warns you that only users directly in the group will have access, so nested groups are not supported! If everything is correct, click “Assign” at the bottom of the page. Search the users/groups you want to add in the search box and select each of those you want to add. Assign users and groups” or go to “Users and groups” in the left column Here you’ll have to give all users access who will log in using Azure AD authentication.Ĭlick on the overview on “1. Next, we need to assign users that have access to this application. Optionally change the name of this application and click “Create” at the bottom of the page.Īfter a few seconds, you should get a popup showing the application was added successfully In the “Browser Azure AD Gallery” type “Horizon” in the search box and select “VMware Horizon – Unified Access Gateway” from the results. If you don’t see “Enterprise applications” check under “All services”. Go to Enterprise applications and create a new application. Open your Microsoft 365 Admin center and go to the Azure Active Directory admin center: This consists of 3 steps: First, we need to create the SAML application on Azure, then we will configure the UAG to use that SAML application for authentication, and finally, we need to configure Horizon to accept that SAML authentication. In the next part, we will set up the SAML authentication. This is part of a series of post for setting up VMware Horizon authentication using AzureAD.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |