You are here: Install and Configure VERDE > VERDE Management Console > Administration > Managing Directory Users and Groups

Managing Directory Users and Groups

Use directory services with VERDE dynamic virtual desktops by configuring VERDE to connect to any LDAP-compliant directory. There are two connectors provided:

  • Optimized connector for Active Directory. To join a virtual desktop to Active Directory, the host server must have DNS set to the address of the Domain Controller.
  • LDAP connector that works with other directories such as OpenLDAP, Novell eDirectory, and IBM Tivoli DS. Once the LDAP connection is configured in the VERDE Management Console, session settings are used to assign settings.

The Session Settings function on the VERDE Management Console has the ability to enable Windows Guest sessions, but Linux guest sessions will require a third-party application to authenticate with a directory service. This is because Linux virtual desktops require configuring the virtual desktop itself to join a domain. Additionally, this method may not provide single sign-on (SSO), because users must authenticate to VERDE and then authenticate to their respective virtual desktops once VERDE authorizes them.

To add a new LDAP compliant directory, complete the following steps:

  1. Open the LDAP Servers screen.
  2. Select "CREATE NEW."

  3. A new window will appear. In the field beside "Name," enter a name for this connection. Names are case sensitive and cannot be changed once added. A directory user is represented in VERDE in the form of <user>@<name> where <name> refers to the name listed here for this directory. This is the format that is used for VERDE Management Console login, Desktop Policy, and Session Settings.

    Directory groups are represented as <group>@<name>. In Desktop Policy, the group is specified as %<group>@<name>. The name must be unique so that users are correctly identified. Note that the UPN Suffix can be repeated across multiple LDAP specifications VERDE. This enables creation of different connectors and Desktop Policies for different OUs within the same directory.

  4. Use the "Validate LDAP Server" option (enabled by default) to confirm that the connection information is valid. Do not select this option if only a branch server is connected to the LDAP server.
  5. Select "LDAP" or "Active Directory."
  6. Enter the information listed in the LDAP Settings table to define a connection.

  7. Save the settings. You'll see the new LDAP server on the LDAP Servers screen. Users and groups can be assigned to the server through a Desktop Policy.