Categories
Horizon NSX-T

SAML Authentication with Workspace ONE Access: Part 3 Load Balancer Configuration

This is the 3rd part to my series on setting up SAML Authentication using Workspace ONE Access. During this article, we will configure the NSX-T Load Balancer for our Workspace ONE Access cluster. If you need to catch up, here are links to the prior articles in this series: Part 1: Preparation Part 1.5: Database […]

Categories
Horizon NSX-T

SAML Authentication with Workspace ONE Access: Part 2 Primary Node Deployment and Config

SAML Authentication with Workspace ONE Access Series Part 1: Preparation Part 1.5: Database Changes Part 2: Primary Node Deployment and Config Part 3: Load Balancer Configuration Part 4: SSL Configuration Part 5: Deploy Additional Nodes So, I was originally going to go over setting up the Load Balancer in NSX-T, but I’m having issues getting […]

Categories
Horizon Kubernetes NSX-T

SAML Authentication with Workspace ONE Access: Part 1.5 Database Changes

So there I was…again… Part 1: Preparation Part 1.5: Database Changes Part 2: Primary Node Deployment and Config Part 3: Load Balancer Configuration Part 4: SSL Configuration Part 5: Deploy Additional Nodes You’re probably wondering why this post exists. Well, it’s because after all the kerfuffle (is that even a word???) with my #NSX-T networking, […]

Categories
Networking NSX-T

NSX-T & Ubiquity Networking (Actually) Working…

So, there I was… How many bad stories started out with those very words? After my last setup article, I was having some very quirky behavior with my network infrastructure. Things like, deploying Workload Management on my virtual vSphere cluster wouldn’t successfully deploy. I could ping everything fine and all of the tunnels in NSX-T […]

Categories
Horizon NSX-T

SAML Authentication with Workspace ONE Access: Part 1 Preparation

Introduction and Architecture This will be a multi-part series where I setup SAML Authentication using a VMware Workspace ONE Access 20.10 server setup. Part 1: Preparation Part 1.5: Database Changes Part 2: Primary Node Deployment and Config Part 3: Load Balancer Configuration Part 4: SSL Configuration Part 5: Deploy Additional Nodes According to the VMware […]

Categories
Security VMware

PowerShell Script to Apply DISA STIG to a VMware Virtual Machine

Most organizations have security compliance requirements for their servers. My past organization was no different. We had to meet Security Technical Implementation Guide (STIG) standards published by the Defense Information Systems Agency (DISA). They have hundreds of configuration guides for various Operating Systems and Applications. These guides are a great starting point if you are […]

Categories
Hardware Networking

Adding a QNAP QNA-T310G1S to a NUC ESXi Host

So this is something that has caused me about a week of frustration all to get fixed in about 5 minutes of re-reading the same posts over and over again. The Googles were short on answers here, and to be honest, I still don’t understand why this works the way it does. If you have […]

Categories
Hardware Networking NSX-T

Networking with Ubiquity and NSX-T 3.1

Introduction I figure this is as good a place as any to talk about the challenges and many changes I had to undergo to get my networking setup in a way that helps me try out the tech. This is going to be a long one, as I want to help share my reasoning for […]

Categories
Networking NSX-T VMware vSphere / vCenter

HomeLab Setup

Hello! So I’m a little late for this posting, but I had to clear up a few things with my employer before I got too deep into this blog. With that out of the way, I’m hoping to try and get at least 1 post per week up, if not more, depending on progress I […]

Categories
Security

How to Verify Authenticity of Your Software Downloads

Happy New Year! I hope you are all enjoying the start to, hopefully, a wonderful year. I thought I’d start my first real “content” piece with something that isn’t really about virtualization, but incredibly important for anyone: How do you ensure that software or file you downloaded is authentic and not Malware/Ransomware? There have been […]