How can we help?
-
zWAN
-
-
-
-
-
-
- Articles coming soon
-
-
-
- Articles coming soon
-
- Articles coming soon
-
-
-
-
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
-
-
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
-
-
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
-
- Articles coming soon
-
- IPsec Tunnel not Establishing
- SSL-VPN Tunnel not Establishing
- Mobile Network Issues
- Management Tunnel does not Establish
- DNS not Resolving from Local Network Appliance
- DNS Resolution Issues in Tunnel Configuration
- DHCP Server not Leasing IP to LAN PC
- Debugging EC Events - Unknown Status Issue
- Trusted-MAC Geofencing Issues
- DNS Issues from DC LAN PC
- Troubleshooting LAN Connectivity to Internet via WAN, Remote Branch LAN, or Local Branch LAN
- NetBalancer gateways displaying Faulty/Inactive
- Packet Drop Issues
-
-
zTC
-
StorTrends
-
zAccess
-
zGuardian
You are here:
Print
zID Configuration
0 out Of 5 Stars
5 Stars | 0% | |
4 Stars | 0% | |
3 Stars | 0% | |
2 Stars | 0% | |
1 Stars | 0% |
zID Configuration
Summary
zID is the integrated Identity and Access Management solution (based on Keycloak) for zMAN, providing user authentication, authorization, and federation capabilities including AD/LDAP sync and OAuth2/OpenID Connect support :contentReference[oaicite:0]{index=0}.
Key Features
- User & Role Management: create tenants, realms, users, and map roles to user groups.
- Federation: synchronize with Active Directory or LDAP servers for centralized credential management.
- Single Sign-On (SSO): support for OAuth2 and OpenID Connect for zMAN UI and REST API access.
- Multi-Factor Authentication: built-in support for TOTP, SMS, and hardware tokens.
Configuration Steps
- Access the zID admin console at
https://<zMan-IP>/auth/admin
. - Login with the initial admin credentials set during installation.
- To configure federation:
- Navigate to your realm → **User Federation** → choose **ldap** or **Active Directory** provider.
- Enter connection URL, bind DN, and bind credentials; test connection and sync settings.
- To set up SSO for the zMAN UI:
- Under **Clients**, find or create the **zman-tenant** client.
- Configure Redirect URIs (e.g.,
https://<zMan-IP>/zman-tenant/*
), set Access Type to **confidential**, and define client roles.
- Define user roles under **Roles** (e.g., TenantAdmin, Operator) and map them to groups under **Groups** → **Client Roles**.
- Test by logging into the zMAN UI with a federated or local zID account.
Troubleshooting
- If users cannot login, verify the client’s Redirect URI and Web Origins match your zMAN UI URL.
- For federation sync errors, ensure network access to the LDAP/AD server and correct bind DN/credentials.
- Check zID logs under its container’s
/opt/keycloak/standalone/log
for detailed error messages.
Best Practices
- Rotate admin and service account credentials regularly.
- Enable HTTPS/TLS for all zID endpoints to protect credentials in transit.
- Use separate realms for production and test environments.
Was this article helpful?
0 out Of 5 Stars
5 Stars | 0% | |
4 Stars | 0% | |
3 Stars | 0% | |
2 Stars | 0% | |
1 Stars | 0% |
5
Table of Contents