Posts

Showing posts from 2019

Week 3 - VMware Digital Workspace Newsletter

Image
   Weekly highlight:    VMware Workspace ONE ITSM Connector  is now a ServiceNow certified app:   The Workspace ONE ITSM Connector supports common Workspace ONE UEM commands, such as change passcode, device lock, device and enterprise wipe, log requests, messages, soft reset, device sync, and more. Integration with Workspace ONE Assist enables help desks to quickly launch remote support sessions and view or control employee devices, directly from ServiceNow.   https://store.servicenow.com/sn_appstore_store.do#!/store/application/b110a7a11b12b41092ce8514604bcb28/1.0.2?referer=%2Fstore%2Fsearch%3Flistingtype%3Dallintegrations%25253Bancillary_app%25253Bcertified_apps%25253Bcontent%25253Bindustry_solution%25253Boem%25253Butility%25253Btemplate%26q%3DVMware&sl=sh   Release Notes Initial release  Integration with Workspace ONE UEM via REST api Guided setup for HTTP connection Configurable device managment actions  Role based access for actions Seamless integration with standard Incident

Workspace ONE | Use ADFS as an Identity Provider in Workspace ONE Access with JIT

Image
Let's say you have your LDAP directory connected to your VMware Identity Manager (vIDM) environment. This will provide access to your resources for your employees. After a user logs in to the Workspace ONE console with their AD credentials, it will show the resources they are assigned to: But what if your company collaborate with other companies that want to access that same resources. You obviously don't want to connect all those LDAP directories and sync the users and groups to your vIDM environment. For this we can use something that's called a Third Party Identity Provider or 3rd party IDP. vIDM supports all sorts of IDP's, like for example ADFS, Okta or Ping identity. In this blog i will take you through the steps to setup and configure your vIDM to connect to an external ADFS environment: ADFS Configuration First ADFS need to be configured properly, to set this up the following requirements are needed: - Signed SSL Certificate - Windows Server - Active Directory