Skip to content
GitHubLinkedIn

Identity & server access

Use this page when you need to log into a server or reach an internal admin UI, or when you need to understand how SSO/MFA works across LEF systems.

For server details (OS, IPs, and what runs where), see Servers.

If you’re starting from a service URL/hostname, use Services and then open the relevant service page.

Microsoft Entra ID is LEF’s primary identity provider. When a system supports SSO, we prefer integrating it with Entra so access and MFA are centrally managed.

Entra is also the identity backbone for Microsoft 365 (see Microsoft 365).

  • SSO for internal services and SaaS tools (when supported).
  • MFA enforcement via Conditional Access (where applicable).
  • Access management via app assignments and groups.
  1. The user exists in Entra (synced or cloud-only).
  2. The user is assigned to an app (directly or via group).
  3. Conditional Access applies (MFA, device requirements, etc).

Requests and approvals should follow the Access control policy.

Some identities are synchronized from Active Directory (core.lef) into Entra using Entra Connect. This matters for Microsoft 365 sign-in and for SSO patterns that rely on synced identities.

See Entra Connect (AD sync) for scope, OU filters, and UPN suffix rules.

Password rules for the core.lef domain are maintained on the domain controller. See Domain controller (Active Directory).

SymptomCheck
“SSO option missing”Is the app integrated with Entra? Is the user assigned to it?
MFA loop / deniedConditional Access policy, user location, and sign-in logs.
Can’t sign in to Microsoft 365UPN suffix is not a verified domain (see Entra Connect page).
Access removed unexpectedlyGroup membership changes; follow access control policy.
  • Access portals (VPN, EVEO portal, Vault): see Access.
  • Service/admin URLs (DNS, S3, Kanban, Workflow, etc): see Services.

See the Servers overview for the canonical list of login targets and service accounts by host group.

If you see older documentation referencing short hostnames like tools.lef, proxy.lef, or tokio.lef, use the canonical *.core.lef hostnames in Servers.

Perimeter ingress and VPN access are provider-managed. See Firewall & public ingress.

  • Use SSH: ssh <user>@<login-target>
  • Prefer personal accounts; use privileged accounts only when required and approved.
  • Prefer DNS hostnames in configs; IPs are for troubleshooting.
  • Use Remote Desktop to rds.core.lef (VPN/LAN required).
  • Certificate binding guidance: see Remote Desktop SSL.
  • Not on VPN → internal DNS and services are unreachable.
  • Public hostname resolves to public IP from inside LAN → use split-horizon DNS (see DNS split horizon).
  • Wrong account or missing rights → follow the access control policy and request the right role/group.
  • Local/shared accounts outside Entra become “invisible” to access reviews; avoid them unless required.
  • Duplicating credentials across systems increases offboarding risk; prefer SSO.