Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 67

About Active Directory Groups, Add an Active Directory User to the Group

Page 67 highlights

About Active Directory Groups In addition to local and RADIUS administration, administrator account sessions can be authenticated using Active Directory. Individual Active Directory users, or entire Active Directory groups, can be given access to Group Manager using the same levels of access permission available for local user accounts. Using Active Directory authentication is useful in large SAN environments in which administrators require access to multiple groups. By configuring each PS Series group to use the Active Directory server, you do not need to maintain parallel sets of local accounts for each group. You can configure the group to authenticate accounts using multiple Active Directory servers; if the primary Active Directory server is unavailable due to a connection issue, outage, or disaster event, the extra servers will ensure continued Active Directory authentication of administrator accounts. You can also use Active Directory authentication as an alternative to RADIUS authentication. To use Active Directory authentication, you must first set the group's authentication type to Active Directory, and add one or more Active Directory servers. If you are using Active Directory for authentication, you cannot use RADIUS authentication for the group. You can, however, still create and use locally authenticated user accounts. Add Active Directory Groups To add all accounts in an Active Directory group to the list of administrator accounts: 1. Click Group → Group Configuration. 2. Click the Administration tab. 3. In the Accounts and Groups panel, click Add. The Create administration account dialog box opens. 4. Complete the wizard steps to specify the settings for the new account and click Finish. Add an Active Directory User to the Group Before an Active Directory (AD) user can use single sign-on (SSO) to automatically log in to the PS Series group, an administrator must grant that user permission. You perform the same procedure to grant access to AD groups. 1. Click Group → Group Configuration. 2. Click the Administration tab. 3. In the Accounts and Groups panel, click Add. The Create Administration Account wizard opens, showing step 1 - General Settings. 4. Select Active Directory user. To add an AD group, select Active Directory group. (When using single sign-on, the group name cannot contain more than 19 characters.) 5. In the General Settings section, specify the user name of the PS Series group for the AD user. Each user name must be unique. Click the Check name button to make sure the name that you specified is not already in use. 6. Complete the required fields in each remaining step of the wizard until you reach the Summary page. 7. Confirm that the settings are correct and click Finish to create the AD user. NOTE: If you log in to Windows using your Active Directory credentials, you will be logged in to the PS Series group automatically without re-authenticating. Change the Active Directory Group Name Before you change the name of a PS Series group that has already been configured for single sign-on, Dell recommends that you leave the current Active Directory (AD) domain, change the group name, and then join the AD domain again using the new name. NOTE: When using single sign-on, the group name cannot contain more than 19 characters. About Group-Level Security 67

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

About Active Directory Groups
In addition to local and RADIUS administration, administrator account sessions can be authenticated using Active Directory. Individual
Active Directory users, or entire Active Directory groups, can be given access to Group Manager using the same levels of access
permission available for local user accounts.
Using Active Directory authentication is useful in large SAN environments in which administrators require access to multiple groups.
By
configuring
each PS Series group to use the Active Directory server, you do not need to maintain parallel sets of local accounts
for each group.
You can
configure
the group to authenticate accounts using multiple Active Directory servers; if the primary Active Directory server
is unavailable due to a connection issue, outage, or disaster event, the extra servers will ensure continued Active Directory
authentication of administrator accounts.
You can also use Active Directory authentication as an alternative to RADIUS authentication.
To use Active Directory authentication, you must
first
set the group’s authentication type to Active Directory, and add one or more
Active Directory servers. If you are using Active Directory for authentication, you cannot use RADIUS authentication for the group.
You can, however, still create and use locally authenticated user accounts.
Add Active Directory Groups
To add all accounts in an Active Directory group to the list of administrator accounts:
1.
Click
Group
Group
Configuration
.
2.
Click the
Administration
tab.
3.
In the Accounts and Groups panel, click
Add
. The Create administration account dialog box opens.
4.
Complete the wizard steps to specify the settings for the new account and click
Finish
.
Add an Active Directory User to the Group
Before an Active Directory (AD) user can use single sign-on (SSO) to automatically log in to the PS Series group, an administrator
must grant that user permission. You perform the same procedure to grant access to AD groups.
1.
Click
Group
Group
Configuration
.
2.
Click the
Administration
tab.
3.
In the Accounts and Groups panel, click
Add
. The Create Administration Account wizard opens, showing step 1 – General
Settings.
4.
Select
Active Directory user
. To add an AD group, select
Active Directory group
. (When using single sign-on, the group name
cannot contain more than 19 characters.)
5.
In the General Settings section, specify the user name of the PS Series group for the AD user. Each user name must be unique.
Click the
Check name
button to make sure the name that you
specified
is not already in use.
6.
Complete the required
fields
in each remaining step of the wizard until you reach the Summary page.
7.
Confirm
that the settings are correct and click
Finish
to create the AD user.
NOTE: If you log in to Windows using your Active Directory credentials, you will be logged in to the PS Series group
automatically without re-authenticating.
Change the Active Directory Group Name
Before you change the name of a PS Series group that has already been
configured
for single sign-on, Dell recommends that you
leave the current Active Directory (AD) domain, change the group name, and then join the AD domain again using the new name.
NOTE: When using single sign-on, the group name cannot contain more than 19 characters.
About Group-Level Security
67