Dell PowerEdge R830 Integrated Remote Access Controller 8 Version 2.70.70.70 U - Page 124

Configuring local users, Configuring local users using iDRAC web interface

Page 124 highlights

NOTE: The characters allowed in user names and passwords for network shares are determined by the network-share type. iDRAC supports valid characters for network share credentials as defined by the share type, except , and , (comma). NOTE: To improve security, it is recommended to use complex passwords that have eight or more characters and include lowercase alphabets, uppercase alphabets, numbers, and special characters. It is also recommended to regularly change the passwords, if possible. Configuring local users You can configure up to 16 local users in iDRAC with specific access permissions. Before you create an iDRAC user, verify if any current users exist. You can set user names, passwords, and roles with the privileges for these users. The user names and passwords can be changed using any of the iDRAC secured interfaces (that is, web interface, RACADM or WSMAN). You can also enable or disable SNMPv3 authentication for each user. Configuring local users using iDRAC web interface To add and configure local iDRAC users: NOTE: You must have Configure Users permission to create an iDRAC user. 1. In the iDRAC Web interface, go to Overview > iDRAC Settings > User Authentication > Local Users. The Users page is displayed. 2. In the User ID column, click a user ID number. NOTE: User 1 is reserved for the IPMI anonymous user and you cannot change this configuration. The User Main Menu page is displayed. 3. Select Configure User and click Next. The User Configuration page is displayed. 4. Enable the user ID and specify the user name, password, and access privileges for the user. You can also enable SNMPv3 authentication for the user. For more information about the options, see the iDRAC Online Help. 5. Click Apply. The user is created with the required privileges. Configuring local users using RACADM NOTE: You must be logged in as user root to execute RACADM commands on a remote Linux system. You can configure single or multiple iDRAC users using RACADM. To configure multiple iDRAC users with identical configuration settings, follow these procedures: • Use the RACADM examples in this section as a guide to create a batch file of RACADM commands and then execute the batch file on each managed system. • Create the iDRAC configuration file and execute the racadm set command on each managed system using the same configuration file. If you are configuring a new iDRAC or if you have used the racadm racresetcfg command, the only current user is root with the password calvin. The racadm racresetcfg command resets the iDRAC to the default values. NOTE: Users can be enabled and disabled over time. As a result, a user may have a different index number on each iDRAC. To verify if a user exists, type the following command once for each index (1-16): racadm get iDRAC.Users..UserName Several parameters and object IDs are displayed with their current values. The key field is iDRAC.Users.UserName=. If a user name is displayed after =, that index number is taken. NOTE: You can also use racadm get -f and view or edit the myfile.cfg file, which includes all iDRAC configuration parameters. 124 Configuring user accounts and privileges

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298

NOTE:
The characters allowed in user names and passwords for network shares are determined by the network-share
type. iDRAC supports valid characters for network share credentials as defined by the share type, except <, >, and ,
(comma).
NOTE:
To improve security, it is recommended to use complex passwords that have eight or more characters and
include lowercase alphabets, uppercase alphabets, numbers, and special characters. It is also recommended to regularly
change the passwords, if possible.
Configuring local users
You can configure up to 16 local users in iDRAC with specific access permissions. Before you create an iDRAC user, verify if any current
users exist. You can set user names, passwords, and roles with the privileges for these users. The user names and passwords can be
changed using any of the iDRAC secured interfaces (that is, web interface, RACADM or WSMAN). You can also enable or disable
SNMPv3 authentication for each user.
Configuring local users using iDRAC web interface
To add and configure local iDRAC users:
NOTE:
You must have Configure Users permission to create an iDRAC user.
1.
In the iDRAC Web interface, go to
Overview
>
iDRAC Settings
>
User Authentication
>
Local Users
.
The
Users
page is displayed.
2.
In the
User ID
column, click a user ID number.
NOTE:
User 1 is reserved for the IPMI anonymous user and you cannot change this configuration.
The
User Main Menu
page is displayed.
3.
Select
Configure User
and click
Next
.
The
User Configuration
page is displayed.
4.
Enable the user ID and specify the user name, password, and access privileges for the user. You can also enable SNMPv3
authentication for the user. For more information about the options, see the
iDRAC Online Help
.
5.
Click
Apply
. The user is created with the required privileges.
Configuring local users using RACADM
NOTE:
You must be logged in as user root to execute RACADM commands on a remote Linux system.
You can configure single or multiple iDRAC users using RACADM.
To configure multiple iDRAC users with identical configuration settings, follow these procedures:
Use the RACADM examples in this section as a guide to create a batch file of RACADM commands and then execute the batch file on
each managed system.
Create the iDRAC configuration file and execute the
racadm set
command on each managed system using the same configuration
file.
If you are configuring a new iDRAC or if you have used the
racadm racresetcfg
command, the only current user is
root
with the
password
calvin
. The
racadm racresetcfg
command resets the iDRAC to the default values.
NOTE:
Users can be enabled and disabled over time. As a result, a user may have a different index number on each
iDRAC.
To verify if a user exists, type the following command once for each index (1–16):
racadm get iDRAC.Users.<index>.UserName
Several parameters and object IDs are displayed with their current values. The key field is
iDRAC.Users.UserName=
. If a user name is
displayed after =, that index number is taken.
NOTE:
You can also use
racadm get -f <
myfile.cfg
>
and view or edit the myfile.cfg file, which includes all iDRAC
configuration parameters.
124
Configuring user accounts and privileges