To establish a relying party trust between vCenter Server and Microsoft Entra ID (formerly called Azure AD), it is required to configure identifying information and a shared secret between them.
Create an OpenID Connect application in Microsoft Entra ID. This application defines the redirect URLs used by vCenter Server during authorization code flows, along with the client identifier and shared secret that vCenter Server uses to communicate with Microsoft Entra ID.
To enable synchronization of Active Directory users and groups from Microsoft Entra ID to vCenter Server—allowing identity and access management for vCenter objects— you must create a SCIM 2.0 application in Microsoft Entra ID.
VMware vCenter Server 8.0 Update 2 and later
Refer to this KB article in conjunction with Configure vCenter Server Identity Provider Federation for Azure AD.
Log in to the Azure Admin console and follow the documentation to create an OpenID Connect application. When you create the OpenID Connect application in the Create a new app integration wizard:
Home > App Registration > New Registration.Supported account types as default or select per your requirement. Set Redirect URL as Web. You do not need to enter a redirect URL at this point, as you can fill this in later.Certificates and Secret > New Client Secret.Expiry drop-down menu.Add.Value.Overview from the left side menu and get the value from Application (client) ID.Overview of the Test App > Endpoints.OpenID Connect metadata document.App > Manage > Authentication and enable the slide for App collects plaintext password (Resource Owner Password Credential Flow).Grant Admin Consent for <the_tenant_name>.client_id, secret, openid-configuration URL, and AD domain details to configure Microsoft Entra ID as the identity provider inside vCenter Server.App Registrations screen for the OpenID Connect application you created, click Authentication.Add a platform and then select Web.Redirect URLs text box, paste the copied Redirect URI from vCenter Server.Save.Refer to the attachments section at the bottom of this KB for the Step-by-step procedure to configure Microsoft Entra Identity Federation with Provisioning Agent and Application Proxy on vCenter Server 8.0 U2.
Microsoft Entra ID > Manage > Enterprise Applications > New Application.Browse Entra Gallery, search for On-premises SCIM App 2.0.Create.Provisioning
Microsoft Entra ID > Manage > Enterprise Applications.SCIM 2.0 App.Provisioning > Manage.vCenter Server URL (publicly accessible vCenter Server URL).Generate button in the VC View IDP Page under User Provisioning.Provisioning Status to On.Test Connection.Once the connection is successful, details are visible under Mappings.
Provision Microsoft Entra ID Users.Item(Split([userPrincipalName], "@"),1)userPrincipalName into username and domain parts. In scenarios where the same user exists across multiple domains, this default mapping causes authentication issues.userPrincipalNameUse the previously copied items from the vCenter Server Identity Provider page. vCenter Server calls the SCIM 2.0 Base Url the "Tenant URL," and the OAuth Bearer Token the "Secret Token."
SCIM App > Users and Groups > Add user/group.Users and Groups.Start Provisioning.To authorize Microsoft Entra ID users to log into vCenter Server, return to Configure vCenter Server Identity Provider Federation for Entra ID Step 5 and complete setting up the Microsoft Entra ID identity provider by assigning group membership. Then, assign permissions (inventory-level and global) to the Microsoft Entra ID users.
Refer to the attachment for Step by Step procedure to configure Azure AD Federation on vCenter server.
Note