Dell PowerEdge 2321DS User Manual - Page 213

Active Directory Object Overview for Standard Schema

Page 213 highlights

Configure Yes - Permission must Yes - Permission must be No port settings be configured for each configured for each appliance by including appliance by including the the appliance in the appliance in the appropriate appropriate Group Group object in the object in the Directory. Directory. Target Device Access Yes - Permission must be configured for each appliance by including the appliance in the appropriate Group object in the Directory. Yes - Permission must be configured for each appliance by including the appliance in the appropriate Group object in the Directory. Yes, if configured by Administrator Permission must be configured for each target device by including the TD in the appropriate Group object in the Directory. An AD user account must be configured to receive appliance administrator permission before that account will be allowed to modify any of the fields in the Authentication Panel. In particular, only an appliance administrator is allowed to modify the Authentication Settings. Active Directory Object Overview for Standard Schema For each of the physical Remote Console Switches on the network that you want to integrate with Active Directory for Authentication and Authorization, you must create at least one Computer Object to represent it. You will also need to create a computer object for each SIP attached to the RCS that will be controlled using the "KVM User" privilege level. Computer objects representing SIPs are not required for the Administrator level groups. Users in the KVM User Group will only have access to SIPs that are also in the KVM User Group. Users with Administrator privileges will have access to all SIPs by default. To set up the Group Objects for a Remote Console Switch: 1 If you have not already, create the Organizational Unit that will contain the Group Objects related to your switch installation. LDAP Feature for the Remote Console Switch 196

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280

LDAP Feature for the Remote Console Switch
196
An AD user account must be configured to receive appliance administrator
permission before that account will be allowed to modify any of the fields in
the Authentication Panel. In particular, only an appliance administrator is
allowed to modify the Authentication Settings.
Active Directory Object Overview for Standard Schema
For each of the physical Remote Console Switches on the network that you
want to integrate with Active Directory for Authentication and
Authorization, you must create at least one Computer Object to represent it.
You will also need to create a computer object for each SIP attached to the
RCS that will be controlled using the “KVM User” privilege level. Computer
objects representing SIPs are not required for the Administrator level groups.
Users in the KVM User Group will only have access to SIPs that are also in the
KVM User Group. Users with Administrator privileges will have access to all
SIPs by default.
To set up the Group Objects for a Remote Console Switch:
1
If you have not already, create the Organizational Unit that will contain
the Group Objects related to your switch installation.
Configure
port settings
Yes – Permission must
be configured for each
appliance by including
the appliance in the
appropriate Group
object in the Directory.
Yes – Permission must be
configured for each
appliance by including the
appliance in the appropriate
Group object in the
Directory.
No
Target
Device
Access
Yes – Permission must
be configured for each
appliance by including
the appliance in the
appropriate Group
object in the Directory.
Yes – Permission must be
configured for each
appliance by including the
appliance in the appropriate
Group object in the
Directory.
Yes, if
configured by
Administrator
Permission
must be
configured for
each target
device by
including the
TD in the
appropriate
Group object
in the
Directory.