Preparing the AMS directory
Last updated
Last updated
Managing more than 100 devices in the Access Manager directory is an Enterprise edition feature
When using the Lithnet Access Manager Agent (AMA) on devices that are not joined to an Active Directory (non-windows devices, Azure AD devices, and standalone Windows devices), the AMA stores passwords in the Access Manager Directory.
The agent will contact the AMS server at regular intervals, and ask if its password needs to be changed, if it does, it rotates its local password, encrypts it, and submits it to the AMS server, which then stores the password in its internal database.
The following guide outlines the steps required to enable the AMS directory service.
From the Host configuration
page, tick Enable the Access manager API
, and specify the host name clients will use to connect to the server. This must match the DNS name in the active TLS/SSL certificate, or clients will be unable to connect.
From the Directory configuration/Access Manager Directory
page, select mechanisms by which devices will register with the AMS server. You can use registration keys deployed at installation time to the devices, and Windows 10 and higher devices joined or registered with Azure AD, can use Azure AD authentication to register.
If you do not plan on using AAD device registration, then the setup process is complete.
If you enable Azure Active Directory device registration, you must register your Azure Active Directory tenant details, and grant permission for the service to read information from your AAD.
If you are using Azure AD authentication for AMS, you can reuse the app registration created for authentication. Skip to the Granting directory permissions
section below.
If you are not using Azure AD for authentication, or you'd like to create a separate application for the directory access, then follow these steps to create a new application in Azure AD.
Log into portal.azure.com with administrative credentials, select All services
and select Azure Active Directory
Select App registrations
and click New application registration
Enter Lithnet Access Manager
or another suitable application name, and select Accounts in this organizational directory only (Lithnet only - Single tenant)
as the supported account type
Leave the redirect URI
field blank
Click Register
Take note of the Application ID
value, this is our client ID
Save the settings
Take note of the Directory/Tenant ID from the main application page
From the Certificates and secrets
page, click new client secret
, give your secret a name, and then take note of the value provided.
Log into portal.azure.com with administrative credentials, select All services
and select Azure Active Directory
Select App registrations
and select your Application registration for Lithnet Access Manager.
From the API permissions
page, click Add permission
and grant the following API permissions
Device.Read.All
Group.Read.All
Organization.Read.All
User.Read
Ensure that you have selected Grant admin consent
for each item.
Open the Lithnet Access Manager Service Configuration Tool
Select the Directory configuration/Azure Active Directory
page
Press the Add...
button to add a new tenant configuration
Add the client ID, secret, and directory/tenant ID in the fields provided
Save the tenant configuration
You may need to wait a minute or two for the secret and delegation to become active
Access Manager is now configured to support Azure AD joined and registered devices.