The Identity Appliance provides Single-Sign On (SSO) capability for vCloud Automation Center users. SSO is an authentication broker and security token exchange that interacts with the enterprise identity store (Active Directory or OpenLDAP) to authenticate users. A system administrator configures SSO settings to provide access to the vCloud Automation Center.

Migration Note:

If you plan to use the vCloud Automation Center migration tool, you must specify a Native Active Directory when you configure the appliance.

Native Active Directories have the following characteristics:

Use Kerberos to authenticate

Do not require a search base, making it easier to find the correct Active Directory store

Can be used only with the default tenant

You must also specify an identity store when you configure tenants, even if you specify Native Active Directory settings here. See Configure the Identity Stores for the Default Tenant.


Navigate to the Identity Appliance management console by using its fully qualified domain name,


Continue past the certificate warning.


Log in with the user name root and the password you specified when the appliance was deployed.


Click the SSO tab.

The red text is a prompt, not an error message.


Type the password to assign to the system administrator in the Admin Password and Repeat password text boxes.

The System Domain text field has the value vsphere.local, which is the local default domain for the Identity Appliance. The default tenant is created with this name and the system administrator is administrator@vsphere.local. Record the user name and password in a secure place for later use.


Click Apply.

It can take several minutes for the success message to appear. Do not interrupt the process.


When the success message appears, click the Host Settings tab.


Verify that the SSO Hostname does not include the SSO port, :7444.


(Optional) You can import a certificate or generate a self-signed certificate for the Identity Appliance. A self-signed certificate is also created for you when you deploy the Identity Appliance. Click SSL


Select the certificate type from the Choose Action menu. If you are using a PEM encoded certificate, for example for a distributed environment, select Import PEM encoded certificate.

Certificates that you import must be trusted and must also be applicable to all instances of vCloud Automation Center Appliance and any load balancer by using Subject Alternative Name (SAN) certificates.



Import a certificate


Copy the certificate values from BEGIN PRIVATE KEY to END PRIVATE KEY, including the header and footer, and paste them in the RSA Private Key text box.


Copy the certificate values from BEGIN CERTIFICATE to END CERTIFICATE, including the header and footer, and paste them in the Certificate Chain text box.


(Optional) If your certificate has one, copy the pass phrase that encrypts the private key of the certificate that you are importing, and paste it in the Pass Phrase text box.

Generate a self-signed certificate


Type a common name for the certificate in the Common Name text box. You can use the fully qualified domain name of the virtual appliance ( or a wild card, such as * If you use a load balancer, you need to specify the FQDN of the load balancer or a wildcard that matches the name of the load balancer. Do not accept a default value if one is shown, unless it matches the host name of the virtual appliance.


Type your organization name, such as your company name, in the Organization text box.


Type your organizational unit, such as your department name or location, in the Organizational Unit text box.


Type a two-letter ISO 3166 country code, such as US, in the Country text box.


Click Apply Settings.

After a few minutes the certificate details appear on the page.


Join the Identity Appliance to your Native Active Directory domain.

For migration, you must configure Native Active Directory. If you are not migrating, Native Active Directory is optional.


Click the Active Directory tab.


Type the domain name of the Active Directory in Domain Name.


Enter the credentials for the domain administrator in the Domain User and Password text boxes.


Click Join AD Domain.


Click the Admin tab.


Verify that the SSH settings are correct.

When SSH service enabled is selected, SSH is enabled for all but the root user. Select or uncheck Administrator SSH login enabled to enable or disable SSH login for the root user.

The SSO host is initialized. If Identity Appliance does not function correctly after configuration, redeploy and reconfigure the appliance. Do not make changes to the existing appliance.