By default, the DualShield installer creates a default system administrator user called "sa". This is an internal user account managed by the DualShield server itself. You can create more internal user accounts for your admin or helpdesk team members who will be allowed to access the Admin Console, or you can allow your AD users to access the Admin Console. 

To allow AD users to access the Admin Console, follow the steps below.

First, you need to add the AD domain into the realm called "Management Console"

To change domains in a realm, click the context menu of the realm

select "Domain"

select the domains to included or deselect the domains to be excluded in the realm

Finally, click Save to save the changes.

In the example below, the "Management Console" realm includes 2 domains, "" and "Management Console" 

"" is an AD domain, which means that users in this domain are allowed to access the Admin Console. 

Next, you need to assign an admin or helpdesk role to the users who will authorised to access the Admin Console.

To assign roles to a user, follow the steps below

First, find the user account in the user's directory

In the DualShield Admin Console, navigate to "Directory | Users

In the Domain list, select the domain that you want to work on, e.g.

If you click the "Search" button, it will list all users in the entire directory up to the query limit.

To narrow down your search, click the "Filter" button

Enter the user's login name, e.g. 2FA, then click the "Search" button (You can change the search filter or add more filters)

Click the context menu "..." of the user, e.g. Administrator

Select "Roles" from the context menu

Select the roles that you want to assign to the user, e.g. System Administrator

Click Save

In the example below, a user called "John Smith" in an AD called "deepnetmfa,.com" is being assigned the "System Administrator" role

This means that the AD user "John Smith" will become a System Administrator of the Admin Console. 

  • No labels