This is a short and sweet mini-guide to setting up the SonicWALL Directory Connector. This should be everything that you need to get it up and running, from there you can setup the more advanced functionality, such as Terminal Services Integration on your own.
- Download and the SonicWALL Directory Connector for either 32 bit or 64 bit systems from mysonicwall.com
- Install the product with its defaults, when prompted for credentials enter a domain admin’s credentials.
- When Prompted to enter SonicWALL Device information enter the Internal IP of your SonicWALL, and create a shared key to be used by the SSO Component and your Device.
- Finish the Installer and then launch it.
- Now log into your SonicWALL Device and Expand “Users” in the left pane and then click on “Settings”.
- Under the section “Single-sign-on method:” change the drop down box to “SSO Agent” and click on the “Configure” button.
- On the “Settings” tab click the “Add…” button to add your agent, modify the IP, Port, and Shared Key to that of your server/workstation running the software. Click Apply. NOTE: If the status light does not turn green, you may need to add a firewall rule on the server/workstation to allow inbound connections on that port. I’ve also had to add both of these .exes to the list of excluded applications to get this software to work through the windows firewall:
%ProgramFiles% (x86)\SonicWALL\DCON\CIAService.exe, %ProgramFiles% (x86)\SonicWALL\DCON\SoniCON.exe
- Under the “Users” tab make sure to add the Usernames of any Service accounts on the network that should be excluded from SSO reporting.
- Create a new Address Group on the sonicwall, and place into it all Devices that should be excluded from SSO Attempts, such as routers, switches, printers, wireless access points, basically anything that isn’t a windows PC. All of these devices will be governed by the “Default” Content Filtering Policy if CFS is in place.
Hopefully you found this helpful and it saved you some time.