Preparing the AMS directory
Managing more than 100 devices in the Access Manager directory is an Enterprise edition feature
When using the Lithnet Access Manager Agent (AMA) on devices that are not joined to an Active Directory (non-windows devices, Azure AD devices, and standalone Windows devices), the AMA stores passwords in the Access Manager Directory.
The agent will contact the AMS server at regular intervals, and ask if its password needs to be changed, if it does, it rotates its local password, encrypts it, and submits it to the AMS server, which then stores the password in its internal database.
The following guide outlines the steps required to enable the AMS directory service.
Step 1: Enable API support
From the Host configuration page, tick Enable the Access manager API, and specify the host name clients will use to connect to the server. This must match the DNS name in the active TLS/SSL certificate, or clients will be unable to connect.

Step 2: Enable device registration modes
From the Directory configuration/Access Manager Directory page, select mechanisms by which devices will register with the AMS server. You can use registration keys deployed at installation time to the devices, and Windows 10 and higher devices joined or registered with Azure AD, can use Azure AD authentication to register.

If you do not plan on using AAD device registration, then the setup process is complete.
Step 3: Configure Azure Active Directory tenant details
If you enable Azure Active Directory device registration, you must register your Azure Active Directory tenant details, and grant permission for the service to read information from your AAD.
If you are using Azure AD authentication for AMS, you can reuse the app registration created for authentication. Skip to the Granting directory permissions section below.
If you are not using Azure AD for authentication, or you'd like to create a separate application for the directory access, then follow these steps to create a new application in Azure AD.
Configure a new application in Azure AD
Log into portal.azure.com with administrative credentials, select
All servicesand selectAzure Active DirectorySelect
App registrationsand clickNew application registrationEnter
Lithnet Access Manageror another suitable application name, and selectAccounts in this organizational directory only (Lithnet only - Single tenant)as the supported account typeLeave the
redirect URIfield blankClick
RegisterTake note of the
Application IDvalue, this is our client IDSave the settings
Take note of the Directory/Tenant ID from the main application page
From the
Certificates and secretspage, clicknew client secret, give your secret a name, and then take note of the value provided.
Granting directory permissions
Log into portal.azure.com with administrative credentials, select
All servicesand selectAzure Active DirectorySelect
App registrationsand select your Application registration for Lithnet Access Manager.From the
API permissionspage, clickAdd permissionand grant the following API permissionsDevice.Read.All
Group.Read.All
Organization.Read.All
User.Read
Ensure that you have selected
Grant admin consentfor each item.
Configure the service account details in Access Manager
Open the Lithnet Access Manager Service Configuration Tool
Select the
Directory configuration/Azure Active DirectorypagePress the
Add...button to add a new tenant configurationAdd the client ID, secret, and directory/tenant ID in the fields provided
Save the tenant configuration
Access Manager is now configured to support Azure AD joined and registered devices.
Last updated
Was this helpful?