Domain users and groups

Domain users are users stored on an Active Directory (AD) domain server. Domain users can use any desktop client in the domain to access their desktops. When a domain user logs in to a desktop client, the system sends the user information to the AD domain server. The server compares the user information with the data stored in the active directory of the server to determine whether to allow the user to pass authentication. If the user passes authentication, it can access the resources authorized to it.

Application scenarios

Domain users are applicable to scenarios where domain control is required to implement single sign-on login. In the scenarios, accounts and cloud desktops must meet specific requirements. For example, deploy domain users in an organization or company.

Configuration workflow (office scenario)

  1. Add domain users and groups—Create or import domain users and groups, synchronize users from a third-party server, or import users from a third-party system, .

  2. Configure domain user authorization in a desktop pool—For more information about user or endpoint authorization, see "Deploy a VDI desktop pool," "Deploy an IDV desktop pool," and " Deploy a VOI/TCI desktop pool."

  3. Manage domain users and groups—Includes editing and deleting domain users and groups, adding domain users to the denylist, enabling or disabling third-party login, and setting the user expiration time.

Configuration workflow (education scenario)

In the current software version, ARM hosts do not support features exclusive to the education scenario.

  1. Add domain users and groups—Create or import domain users and groups, or synchronize users from a third-party server.

  2. Users log in to the desktop client—Student users log in to the student client and faculty users log in to the teacher client.

  3. Manage domain users and groups—Includes editing and deleting domain users and groups, adding domain users to the denylist, enabling or disabling third-party login, and setting the user expiration time.

Prerequisites

Complete authentication server settings. For more information, see "Configure LDAP authentication."