docmain.css" /> Step 2. Configure Management and Security Server for Windows Single Sign-On. - Host Access Management and Security Server Evaluation Guide

Step 2. Configure Management and Security Server for Windows Single Sign-On.

Of the many authentication types that Management and Security Server supports, in this evaluation you will use Windows Active Directory for authentication (to the Administrative Server) and LDAP for authorization. By using Single Sign-On and your existing identity management system, the user experience will not be disrupted.

When users authenticate to Management and Security Server’s Administrative Server with their Windows domain logon, they will have access to the sessions that the administrator makes available to them.

NOTE:If you do not have access to LDAP or Active Directory, you can leave Authentication set to “None”; however the business objective for this evaluation will not be met.

As the administrator:

  1. In the Administrative WebStation, open Access Control Setup. Note the current setting of “None” for Authentication and Authorization. Click Configure

  2. Select Single sign-on through Windows authentication, and click Next.

    NOTE:By using single sign-on, the user experience is not disrupted because the user is already familiar with their Windows domain logon.

  3. Select (or verify the selection of) Active Directory (NTLM v1 and v2). Enter your system information, See Help for assistance.

  4. Use the default, Only on HTTPS connection. Click Next.

  5. On the Choose Authorization Method page, select Use LDAP to restrict access to sessions. Click Next.

  6. Enter your LDAP Server information, with Windows Active Directory as the Server type. Click Next.

  7. On the confirmation page, click Save Settings.