Create an AD security group and add the list of users that needs access to NSX in the group
Navigate to System >Users & Roles >LDAP > Click on Add Identity Sources
Provide all these details
Name: Some random name
Domain Name: ash.local
Type: Active Directory over LDAP.
Base DN: Copy and paste the CN name of our group in AD
Hostname: IP Address or AD
Protocol: LDAP
Port: 389
Provide the administrator credentials of AD as well and click ADD
Once validated our LDAP connection will show as successful so thus we have added an identity source in NSX-T.
For associating users/groups from the AD we will go to the Users section and add the AD group. Under roles select Enterprise Admin
Our AD group vSphere_Admins now has enterprise admin privileges so any user added to this group now gets full permission to NSX-T UI.
Validate by logging on as user.