Using IIJ Virtual Desktop Service/Citrix Cloud for Azure Virtual Desktop

This section describes examples of how to use IIJ Virtual Desktop Service/Citrix Cloud for Azure Virtual Desktop.


To use IIJ Virtual Desktop Service/Citrix Cloud for Azure Virtual Desktop, there is a need to synchronize the following Active Directory user attributes with the IIJ ID.

  • mail
  • objectGUID
  • objectSid
  • userPrincipalName

In this sample configuration, the above Active Directory user attributes are assigned to the entitlements attribute to synchronize with this service. In addition, a value such as "cid_mail" is assigned to type of entitlements for easier handling on IIJ ID Console.

[ Reference ]

The following configuration files are provided as reference examples. Configure actual settings in accordance with your environment.

config.yml sample
log:
  loglevel:                      info

ad:
  ldap:
    server:
      addresses:
                                 - 127.0.0.1
      user:                      'CN=administrator,CN=Users,DC=example,DC=jp'
    base_dn:                     'DC=example,DC=jp'
    filter:
      user:                      'memberOf:1.2.840.113556.1.4.1941:=CN=IID_IDaaS user group,OU=IID_Groups,DC=example,DC=jp'
      group:                     'memberOf:1.2.840.113556.1.4.1941:=CN=IID_IDaaS user group,OU=IID_Groups,DC=example,DC=jp'
iid:
  scim:
    http:
      proxy:
        use:                     true
        address:                 proxy.example.jp
        port:                    8080
        user:                    iij-taro
    attribute:
      user:
        default:
          emails:
            - primary:           true
          entitlements:
            - primary:           false
              type:              cip_email
            - primary:           false
              type:              cip_oid
            - primary:           false
              type:              cip_sid
            - primary:           false
              type:              cip_upn
        ad_bind:
          externalId:            userPrincipalName
          userName:              userPrincipalName
          active:
                                 - userAccountControl
                                 - accountExpires
          emails:
            - value:             mail
          entitlements:
            - value:             mail
            - value:             objectGUID
            - value:             objectSid
            - value:             userPrincipalName
      group:
        ad_bind:
          externalId:            objectGUID
          displayName:           name
          email:                 mail
secret.yml sample
ad:
  ldap:
    server:
      password:   ldap_password
iid:
  scim:
    token:        scim_token
    http:
      proxy:
        password: proxy_password