Category filter
Microsoft Active Directory Integration with Hexnode
Active directory domain services hold all directory information and take care of all the interactions between the user and domain. Any unauthorized user access to a device or a server can be verified using Microsoft Active Directory Integration. With Hexnode, you can manage multiple Active Directory domains from a single console.
Once you integrate Microsoft Active Directory with Hexnode, you will be able to see the users, user groups and subdomains of the linked domain. To integrate your Active Directory with Hexnode, you must first configure the Hexnode Cloud Broker (AD Agent) in your server.
Microsoft Active Directory can be integrated with Hexnode by:
- Configuring the Hexnode Cloud Broker (AD Agent).
- Configuring the SSL certificate when LDAPS is enabled in the Active Directory
- Command Line Interface (CLI) method
- Configure the SSL Certificate through Server Manager
- Configuring the Active Directory Settings
- Server Configuration
- Schedule Sync for Microsoft Active Directory
Hexnode Cloud Broker (AD Agent) Configuration
To configure a Hexnode Cloud Broker service on your server, click on Admin > Active Directory. This opens up the Agent Settings page when you first configure an Active Directory.
- Click on the Download link to download and install the Hexnode Cloud Broker (AD Agent) on your server.
- Click on the second Download link to download configuration file.
- Launch the Hexnode Cloud Broker Setup Wizard. Click on Next to continue or Cancel to exit setup.
- Select the destination folder where Hexnode Cloud Broker will be installed. By default, the setup wizard will install the Hexnode Cloud Broker in the folder C:\Hexnode Cloud Broker
- Select the configuration file (hexnode_cloud_broker.config) downloaded in step 2. Click on Next.
- Once you have uploaded the configuration file successfully, setup will prompt for confirmation to install Hexnode Cloud Broker on your computer. Click on Install.
- Click on Finish to exit setup.
- On the Hexnode UEM console, click on “Check agent status” to verify if the agent is online. Then, select Configure AD to set up your Active Directory Settings.
- Enter the required details under Server Configuration of your Active Directory Settings.
- Once you complete the initial AD Agent setup, an Agent Settings section appears under the Admin tab. This section displays all the agents currently connected to your server.
- Use the gear icon next to an agent to refresh or remove it.
- To add additional agents, click the plus (+) icon and repeat the same installation steps used for setting up the initial AD Agent.
This section makes it easy to view, delete, sync, and add multiple AD agents across your network.
Configuring the SSL certificate when LDAPS is enabled in the Active Directory
LDAPS (Lightweight Directory Access Protocol Safe) is a protocol used to securely connect and access a directory over a network. It ensures a secure connection between the client and the directory server. When LDAPS is enabled in the Active Directory, the admin must upload an SSL certificate to the Hexnode portal. The SSL certificate encrypts the transmitted data and also authenticates the LDAP server. SSL certificates can be obtained by executing a few commands or by configuring the certificates manually through Server Manager. The following are the instructions for each approach.
Command Line Interface (CLI) method
In organizations managing multiple servers, obtaining and configuring the SSL certificates individually is a tedious and inefficient process. Administrators can simplify this by using the following CLI commands to retrieve and encode SSL certificates directly across devices. These commands can be executed on Command Prompt or on the Terminal of the AD Server. The retrieved certificate is stored in the directory where the commands are executed.
|
1 2 |
certutil -ca.cert $CERTIFICATE_NAME.cer certutil -encode $CERTIFICATE_NAME.cer $CERTIFICATE_NAME.cer |
Configure the SSL Certificate through Server Manager
SSL certificates can be manually configured and uploaded to each server. This method can be used in organizations managing a limited number of servers. These SSL certificates can be configured through Server Manager as follows.
- Access Server Manager > Tools > Certification Authority.
- Navigate to Issued Certificates and click on the certificate listed.
- Navigate to Certification path. Click on the parent certificate and click on View certificate.
- Navigate to Details and click on Copy to File.
- The Certificate Export Wizard opens and click on Next.
- Select the file format as Base-64 encoded X.509 (.CER). Click on Next.
- Choose the file path. Click on Next. Click on Finish.
- This certificate can be uploaded as the SSL certificate in Server Configuration under Active Directory by browsing it from the selected file path.
Active Directory Settings
Active Directory Settings include configuring the server and scheduling sync. These settings can be accessed under Admin > Active Directory.
Server Configuration
The following settings can be configured for your newly added domain:
- Domain Name – Enter the Active Directory Domain Name, which can be the same as the organization’s public domain name, sub-domain or any alternate names that may end in .local.
- Domain Controller – Enter the Domain Controller Name.
- Port – In case LDAPS is enabled, use Port 636(This port is set as default for LDAPS communication). In the case of LDAP, use the default Port 389. Conversely, you can use the port configured by the admin.
- Domain\Username – Enter the Domain Name and Username in the format NetBiosName\SAMAccountName.
- Password – Enter the password.
- Use SSL ( if LDAPS is enabled) – Enable the ‘Use SSL’ option and upload the SSL certificate here.
- Select Agent – Select the AD Agent name from the drop-down list. Click on Add New Agent to add a new agent.
- Selected OUs – By default, all the OUs in the domain will be selected. You can click on Change to select the specific OU you want.
- Allow Self Enroll – If enabled, users can self-enroll their devices using their Active Directory credentials.
Schedule Sync for Microsoft Active Directory
The Active Directory domain sync frequency, with Hexnode UEM, can be configured. You can schedule daily or weekly sync, select the days of the week and choose the time of the day the sync must occur.
On clicking Save, your Active Directory will be synced with Hexnode UEM databases.
To integrate a new Active Directory domain with Hexnode UEM, navigate to Admin > Active Directory, click on the empty slot with the + sign and configure the Server Configuration settings.
Data fetched from AD
Once the integration is successful, the admin can see the users and user groups under the Manage tab.
In addition, the Directory Services sub-tab under the Manage tab will have the linked domains listed. This sub-tab displays the recent actions performed on the domain. The admin can also perform actions on the domain here.
Check AD Server Status
Navigate to Enroll > All Enrollments > Enterprise > Active Directory. The configured AD domains will be listed here. The gear icon under each domain presents three options:
- Sync Now: Sync domain with Hexnode UEM.
- Disable Self Enroll.
- Delete Domain.
The same options can be accessed from the list of configured domains under Admin > Active Directory.
Delete AD domain
Hexnode UEM lets users remove their Active Directory domain from the portal with ease.
- Navigate to Admin > Active Directory. Under the configured domains, click on the gear icon of the AD domain to delete.
- During the deletion process, the administrator is provided with two options.
- Disenroll device(s)
- Assign to a new user
- Disenroll device(s) option removes the Active Directory domain from the portal and disenrolls all devices enrolled under the domain.
- Pre-approved devices will also be deleted from the portal.
- The admin is then required to specify the number of users that will be deleted under the domain and click on the Remove button to complete the process.
- Assign to a new user option lets the admin assign all devices under the domain to a new user. All existing restrictions/configurations and apps associated with the old user will be removed from the respective device(s).
- After specifying the number of users that will be deleted, click on the Remove button, which will open a dialogue box to assign device(s) to a new user.
- Select the domain and choose the user to assign the devices.
- Toggle the Delete Old User’s Location History checkbox to delete the location history of old users. Click on the Assign button to complete the process.



















