automation-suite
2024.10
true
- Overview
- Requirements
- Pre-installation
- Preparing the installation
- Installing and configuring the service mesh
- Downloading the installation packages
- Configuring the OCI-compliant registry
- Granting installation permissions
- Installing and configuring the GitOps tool
- Deploying Redis through OperatorHub
- Applying miscellaneous configurations
- Running uipathctl
- Installation
- Post-installation
- Migration and upgrade
- Upgrading Automation Suite
- Migrating standalone products to Automation Suite
- Step 1: Restoring the standalone product database
- Step 2: Updating the schema of the restored product database
- Step 3: Moving the Identity organization data from standalone to Automation Suite
- Step 4: Backing up the platform database in Automation Suite
- Step 5: Merging organizations in Automation Suite
- Step 6: Updating the migrated product connection strings
- Step 7: Migrating standalone Orchestrator
- Step 8: Migrating standalone Insights
- Step 9: Deleting the default tenant
- Step 2: Updating AD integration and authentication
- Step 3: Validating the Insights migration
- Performing a single tenant migration
- Migrating between Automation Suite clusters
- Cluster administration
- Product-specific configuration
- Troubleshooting
Step 2: Updating AD integration and authentication

Automation Suite on OpenShift installation guide
Last updated May 5, 2025
Step 2: Updating AD integration and authentication
To configure AD integration, refer to Configuring SSO: Active Directory.
If AD integration and authentication were enabled in the standalone deployment, take the following steps in the Automation Suite cluster:
- Make sure the domain controllers are discoverable by the Automation Suite cluster. If not, use the Kube DNS configuration;
- Configure integrated Windows authentication and Kerberos authentication using keytab file;
- Configure LDAP integration via the Portal under the host admin;
- Configure Windows authentication via the Portal under the host admin;
-
Configure LDAPS for secure connection to LDAP.
Note: The account used for the LDAP integration configuration should only have read access to all trusted domains in the current and trusted forests.