Identity Integration
VCF 9 Identity Integration
VMware Cloud Foundation 9 introduces VCF Identity Broker (vIDB), replacing Workspace ONE Access as the central identity management component.
Identity Sources Supported
VCF 9 supports a wide range of identity providers:
- Active Directory/LDAP - Traditional directory services
- OpenLDAP - Open-source LDAP implementations
- Microsoft Entra ID (Azure AD) - Cloud identity provider
- Active Directory Federation Services (ADFS) - On-premises federation
- Okta - Cloud identity platform
- Ping Identity - Enterprise identity management
- Generic SAML 2.0 - Any SAML 2.0-compliant provider
- OIDC-compliant providers - Including Keycloak
VCF Identity Broker (VIDB)
VCF Identity Broker is the central identity intermediary between external identity providers and VCF components (vCenter, NSX, VCF Operations/Automation). It standardizes federation and authentication, reduces configuration complexity, and centralizes access controls.
Deployment Modes:
- Embedded Mode - Runs as a container inside the management domain vCenter Server. Recommended for smaller, single-instance VCF deployments. Requires no separate maintenance.
- Appliance Mode - Deployed as a 3-node cluster of standalone VIDB appliances for high availability. Recommended for large-scale infrastructures. A single external vIDB cluster can serve up to five VCF instances, unifying them into a single identity space.
Integration Steps
- Prepare identity source - Ensure AD/LDAP domain is functional with a service account having read permissions
- Configure DNS - Verify FQDN resolution between VCF components and domain controllers
- Access VCF Operations - Login and navigate to Fleet Management → Identity & Access
- Select deployment type - Choose embedded or appliance mode for vIDB
- Configure identity provider - Add connection details for AD/LDAP or configure SAML/OIDC provider
- Provision users/groups - Use JIT provisioning, SCIM, or AD/LDAP sync
- Set sync frequency - Configure AD/LDAP sync (default weekly, can be set to daily, hourly, or every 15 minutes)
SSO / Federation
VCF 9 provides unified SSO across all major management interfaces:
- VCF Operations console
- vSphere Client
- NSX Manager
- VCF Operations for Logs
- VCF Operations for Networks
- VCF Operations HCX
- VCF Automation
Architecture levels:
- Foundation (Fleet Level) - vIDB connects to corporate IdP for platform-wide SSO
- Provider Level - VCF Automation can use vIDB for full SSO or connect to its own IdP
- Organization Level - Tenants can connect separate IdPs
Note: SDDC Manager UI does not participate in VCF SSO. Continue using local admin accounts (administrator@vsphere.local) for SDDC Manager access.
Best Practices
- Pre-create AD groups (e.g., CloudAdmins, VCF-Operators) and assign roles in VCF Operations, vCenter, and NSX for centralized access management
- Use appliance mode for multi-instance or fleet deployments requiring high availability
- Enable LDAPS (LDAP with SSL) for secure directory communication
- Configure appropriate sync frequency based on user change frequency
- Implement MFA through supported identity providers (Okta, Entra ID, Ping)
- Document service account credentials used for LDAP bind operations
- Test SSO before production to ensure seamless authentication across components