WilliamLam.com

  • About
    • About
    • Privacy
  • VMware Cloud Foundation
    • VMware Cloud Foundation 9
  • VKS
  • Homelab
    • Hardware Options
    • Hardware Reviews
    • Lab Deployment Scripts
    • Nested Virtualization
    • Homelab Podcasts
  • VMware Nostalgia
  • Apple
You are here: Home / VMware Cloud Foundation / Multiple VCF SSO Identity Providers for VMware Cloud Foundation (VCF) Fleet?

Multiple VCF SSO Identity Providers for VMware Cloud Foundation (VCF) Fleet?

10.09.2025 by William Lam // 1 Comment

Most organizations rely on a single Identity Provider (IdP) such as Symantec VIP AuthHub, Okta, Microsoft Entra ID, or PingFederate to provide common identity and access management. However, for some organizations, managing multiple IdPs is just the reality, often due to organizational structure or mergers and acquisitions (M&A).

The new VCF 9.0 Single Sign-On (SSO) has a flexible architecture that can benefit organizations with either a single IdP or multiple IdPs, while still providing the SSO capability. The component that is responsible for providing VCF SSO is called the VCF Identity Broker (vIDB) and it has two deployment models, one of which can aide in the multi-IdP requirement.

VCF SSO is configured on a per-VCF Instance and by leveraging the built-in Embedded vIDB from within the vCenter Server Appliance (VCSA), we can configure VCF SSO using the VCSA within the VCF Management Domain to enable the different IdPs within each VCF Instance as illustrated in the diagram below:


While this may not be a common scenario for most customers, the good news is this just works out of the box without requiring any additional resources to be deployed.

For those with a single IdP and would like VCF SSO across multiple VCF Instances, you can streamline the configuration by deploying a single External vIDB instance which can then be used by multiple VCF Instances as illustrated in the diagram below:


Whether you have organizational requirements that mandate multiple IdPs or you would like to streamline a single IdP deployment, VCF 9.0 can support either or both!

Lastly, for those interested in playing with VCF SSO in a lab environment, but do not have access to an Enterprise IdP, you can check out this blog post using a self-hosted IdP called Keycloak.

Categories // VMware Cloud Foundation Tags // VCF 9.0

Comments

  1. *protectedFrostByteVA says

    11/04/2025 at 6:05 pm

    In a multi instance fleet, can you point each instance to the same provider, adding a degree of resiliency in a multi region deployment? If you do, I’m assuming that you would have to configure your group import in each vIDB. Since it’s the same ops instance, would you still be able to do vCenter grouping? Then in a region failure, you are repointing Ops/Auto instead of restoring vIDB.

    Reply

Thanks for the comment!Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Search

Thank Author

Author

William is Distinguished Platform Engineering Architect in the VMware Cloud Foundation (VCF) Division at Broadcom. His primary focus is helping customers and partners build, run and operate a modern Private Cloud using the VMware Cloud Foundation (VCF) platform.

Connect

  • Bluesky
  • Email
  • GitHub
  • LinkedIn
  • Mastodon
  • Reddit
  • RSS
  • Twitter
  • Vimeo

Recent

  • Capturing Kasa Smart Plug Power Metrics using VCF Operations Management Pack Builder 11/07/2025
  • Retrieving the vSAN Cluster Shutdown VMs running Pre-Check Results using PowerCLI 11/05/2025
  • JFrog Artifactory as VCF Software Depot for VCF Installer & SDDC Manager 11/03/2025
  • Identifying VMware Cloud Foundation (VCF) managed service accounts in vCenter Server 10/30/2025
  • Configuring VCF Automation (VCFA) Organization Portal OIDC IdP using Terraform Provider for VCFA 10/28/2025

Advertisment

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.

To find out more, including how to control cookies, see here: Cookie Policy

Copyright WilliamLam.com © 2025

 

Loading Comments...