- #TERADICI PCOIP MANAGEMENT CONSOLE MICROSOFT CA CERTIFICATE INSTALL#
- #TERADICI PCOIP MANAGEMENT CONSOLE MICROSOFT CA CERTIFICATE FULL#
- #TERADICI PCOIP MANAGEMENT CONSOLE MICROSOFT CA CERTIFICATE PASSWORD#
After assigning the users you can see the AD users in the Assignments tab.
#TERADICI PCOIP MANAGEMENT CONSOLE MICROSOFT CA CERTIFICATE FULL#
Once completed, the agent displays as active.Ĭlick on the Import tab and Import now with full import.Īfter the import, highlight the users and select Assign the users. Select the AD Server name and configure it using the default settings.
#TERADICI PCOIP MANAGEMENT CONSOLE MICROSOFT CA CERTIFICATE INSTALL#
Restart the server and create some users and groups in Active Directory Users and Computers.įrom the Domain Controller that was just created, login to Okta, navigate to Settings > Downloads and download the Okta AD Agent and install it.Ĭreate an Okta Service Account as recommended and enter the password.Įnter the Okta URL, once redirected to the Okta page, enter the Okta credentials and select Allow access.įrom the Okta dashboard, navigate to Directory > Directory Integrations.
#TERADICI PCOIP MANAGEMENT CONSOLE MICROSOFT CA CERTIFICATE PASSWORD#
Select Add a new forest and create a domain name and click Next.Ĭreate a password and select Next until the install button shows. Select the Active Directory Domains and Services as a server role from the Add Roles and Features Wizard and click Next then Install.Ĭlick the flag and select Promote this Server to a DC (Domain Control). Open Server Manager from the Windows Server search field. Use Okta to login using the username and password of an Active directory user. Use Okta to login with Smart card authentication using an Active directory user certificate. This reference is based on using Windows Server 2019 Standard with Okta IDP for Single Sign-on.Īfter completing these steps you will be able to: This article will provide you with basic details to configure a Domain Controller, add test users and integrate the users for smart card authentication using Okta as the IDP. Troubleshooting Endpoints in Recovery Mode SSH Security Considerations for PCoIP Management Console OSĭownload the Chain Certificate from the Certificate Authority Serverīrowser Configuration for use with Smartcards Using your Virtual Machine Console to Administer Licenses when Connected to the Internet Time Zone Definitions for PCoIP Management Console 1 or later releasesĮxpanding the PCoIP Management Console Disk Size PCoIP Management Console 1 Profile Properties Renamed or Not Migrated Updating Certificates after Endpoint Discoveryĭefault CentOS Configuration for PCoIP Management ConsoleĬhanging the Default Network ConfigurationĬonfiguring an Endpoint Manager Manually from an Endpoint Requesting Endpoint Certificates Using SCEP (Enterprise)Ĭonfiguring PCoIP Management Console Remote Management Upgrading Endpoints to Firmware 5.0 or LaterĬonfiguring DHCP for Endpoints that use Auto DiscoveryĬonfiguring DNS for Endpoints that use Autodiscoveryĭiscovering Endpoints Manually from PCoIP Management Console Setting up Active Directory AuthenticationĬhanging the Virtual Machine Default Root Password Running Different Management Console Versions in Parallel PCoIP Management Console 21.10 Administrators Guide