The vRA plugin for Greenfield deployment will be supported for Soft tenants with the prerequisite vIDM is used as their IDP.
For Greenfield Soft Tenant, user must configure vIDM as the IDP in that soft tenant. The soft tenant should also be marked as default login org.
With VCFA 9.0 (Greenfield deployment), the vRA Plugin in VCF Operations Orchestrator is supported only for Soft tenants, and only when vIDM is configured as the Identity Provider (IDP). By default the plugin will not work for fresh VCFA 9.0 setups unless the vIDM is set as IDP and classic tenant is made as the default tenant.
Configure Tenant Manager to use VIDM as a backing IDP
1. Login as Provider with Username/ Password using POSTMAN
Note: Use x-vmware-vcloud-access-token returned in the above API response Header as tm_token for further calls
2. Create vIDM Backed Soft Tenant - can be skipped if you already have one
3. Get VIDM backed org
Note: Use vidm_backed_org_id and vidm_backed_org_urn as shown in below screenshot for further calls
4. Get vidm Backed Org Redirect URI
Note: Use orgRedirectUri returned as shown in below screenshot for further calls.
5. Trust VIDM Certificate in Tenant Manager
6. Get vIDM Token
Note: Use sessionToken as vidm_admin_token from the response returned from below API as shown and use it in further calls.
7. Create auth_code OAuth Client in VIDM to back vidmBackedOrg
Note: Use clientId as vidm_auth_code_grant_client_id and secret as vidm_auth_code_grant_client_secret from the response returned from below API as shown and use it in further calls.
8. Get vIDM Auth Key
Note: Use raw text returned as response in the body and replace any newline characters (\n) with a literal \\n to preserve formatting as vidm_auth_key for further calls.
9. Get vIDM Auth Key Id
Note: Use the value of kid field from the first object in the keys array returned in the response json as vidm_auth_kid for further calls.
10. Setup VIDM as backing IDP for vidm Backed Org Name
PUT https://VCFA-FQDN/api/admin/org/{{vidm_backed_org_id}}/settings/oauthHeaders:Accept: application/*+json;version=40.0Authorization: Bearer {{tm_token}}Content-Type: application/vnd.vmware.admin.organizationOAuthSettings+jsonBody:{"type":"application/vnd.vmware.admin.organizationOAuthSettings+json","issuerId":"https://{{vidm}}/SAAS/auth","enabled":true,"clientId":"{{vidm_auth_code_grant_client_id}}","clientSecret":"{{vidm_auth_code_grant_client_secret}}","userAuthorizationEndpoint":"https://{{vidm}}/SAAS/auth/oauth2/authorize","accessTokenEndpoint":"https://{{vidm}}/SAAS/auth/oauthtoken","scimEndpoint":"https://{{vidm}}/SAAS/jersey/manager/api/scim/Me","scope":["user","openid","profile","email"],"maxClockSkew":60,"jwksUri":"https://{{vidm}}/SAAS/API/1.0/REST/auth/token?attribute=publicKey&format=jwks","autoRefreshKey":null,"keyRefreshStrategy":null,"keyRefreshFrequencyInHours":null,"keyExpireDurationInHours":null,"wellKnownEndpoint":"https://{{vidm}}/SAAS/auth/.well-known/openid-configuration","lastKeyRefreshAttempt":null,"lastKeySuccessfulRefresh":null,"enableIdTokenClaims":false,"usePKCE":null,"sendClientCredentialsAsAuthorizationHeader":null,"customUiButtonLabel":null,"oAuthKeyConfigurations":{"oAuthKeyConfiguration":[{"keyId":"{{vidm_auth_kid}}","key":"{{vidm_auth_key}}","algorithm":"RSA"}]},"oidcAttributeMapping":{"subjectAttributeName":"sub","emailAttributeName":"email","fullNameAttributeName":"name","firstNameAttributeName":"given_name","lastNameAttributeName":"family_name"}}
11. Once the above steps are done, the Classic Tenant Org will have IDP as VIDM configured. Test it by going to the provider portal, and launch the Classic tenant Org created. Under Administer tab of the Tenant Portal, Click Identity Providers and you will see the OIDC with the details configured.
12. Get Org Admin Role ID
Note: Use the value of role id from the response json for further calls.
13. Import the vIDM User
Note: The User now you can see as imported in the Access Control tab. Test it by going to the provider portal, and launch the Classic tenant Org created. Under Infrastructure tab of the Tenant Portal, Click Access Control tab.
14. Create Default Login Org as the vIDM Classic Soft tenant
15. Re-deploy application services in the VCFA Setup via the below commands:
# Login to VCFA Setup through SSH1. export KUBECONFIG={your .kubeconfig file} # Eg: vmsp-#######.kubeconfig2. Run the below command to re-deploy the application services: kubectl delete hr -n prelude vmsp-prelude-deployer