Dell PowerEdge R830 Integrated Remote Access Controller 8 Version 2.70.70.70 U - Page 125

Adding iDRAC user using RACADM, Enabling iDRAC user with permissions

Page 125 highlights

To enable SNMP v3 authentication for a user, use SNMPv3AuthenticationType, SNMPv3Enable, SNMPv3PrivacyType objects. For more information, see the RACADM Command Line Interface Guide available at dell.com/idracmanuals. If you use the configuration XML file, use the AuthenticationProtocol, ProtocolEnable, and PrivacyProtocol attributes to enable SNMPv3 authentication. Adding iDRAC user using RACADM 1. Set the index and user name. racadm set idrac.users..username Parameter 2. Set the password. Description Unique index of the user User name racadm set idrac.users..password 3. Set the user privileges. For more information, see the iDRAC RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals. 4. Enable the user. racadm set.idrac.users..enable 1 To verify, use the following command: racadm get idrac.users. For more information, see the iDRAC RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals. Enabling iDRAC user with permissions To enable a user with specific administrative permissions (role-based authority): 1. Locate an available user index. racadm get iDRAC.Users 2. Type the following commands with the new user name and password. racadm set iDRAC.Users..Privilege NOTE: The default privilege value is 0, which indicates the user has no privileges enabled. For a list of valid bit-mask values for specific user privileges, see the iDRAC RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals. Configuring Active Directory users If your company uses the Microsoft Active Directory software, you can configure the software to provide access to iDRAC, allowing you to add and control iDRAC user privileges to your existing users in your directory service. This is a licensed feature. NOTE: Using Active Directory to recognize iDRAC users is supported on the Microsoft Windows 2000, Windows Server 2003, and Windows Server 2008 operating systems. You can configure user authentication through Active Directory to log in to the iDRAC. You can also provide role-based authority, which enables an administrator to configure specific privileges for each user. The iDRAC role and privilege names have changed from earlier generation of servers. The role names are: Configuring user accounts and privileges 125

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298

To enable SNMP v3 authentication for a user, use
SNMPv3AuthenticationType
,
SNMPv3Enable
,
SNMPv3PrivacyType
objects. For
more information, see the
RACADM Command Line Interface Guide
available at
dell.com/idracmanuals
.
If you use the configuration XML file, use the
AuthenticationProtocol
,
ProtocolEnable
, and
PrivacyProtocol
attributes to enable
SNMPv3 authentication.
Adding iDRAC user using RACADM
1.
Set the index and user name.
racadm set idrac.users.<index>.username <user_name>
Parameter
Description
<index>
Unique index of the user
<user_name>
User name
2.
Set the password.
racadm set idrac.users.<index>.password <password>
3.
Set the user privileges.
For more information, see the
iDRAC RACADM Command Line Interface Reference Guide
available at
dell.com/idracmanuals
.
4.
Enable the user.
racadm set.idrac.users.<index>.enable 1
To verify, use the following command:
racadm get idrac.users.<index>
For more information, see the
iDRAC RACADM Command Line Interface Reference Guide
available at
dell.com/idracmanuals
.
Enabling iDRAC user with permissions
To enable a user with specific administrative permissions (role-based authority):
1.
Locate an available user index.
racadm get iDRAC.Users <index>
2.
Type the following commands with the new user name and password.
racadm set iDRAC.Users.<index>.Privilege <user privilege bit mask value>
NOTE:
The default privilege value is 0, which indicates the user has no privileges enabled. For a list of valid bit-mask
values for specific user privileges, see the
iDRAC RACADM Command Line Interface Reference Guide
available at
dell.com/idracmanuals.
Configuring Active Directory users
If your company uses the Microsoft Active Directory software, you can configure the software to provide access to iDRAC, allowing you
to add and control iDRAC user privileges to your existing users in your directory service. This is a licensed feature.
NOTE:
Using Active Directory to recognize iDRAC users is supported on the Microsoft Windows 2000, Windows Server
2003, and Windows Server 2008 operating systems.
You can configure user authentication through Active Directory to log in to the iDRAC. You can also provide role-based authority, which
enables an administrator to configure specific privileges for each user.
The iDRAC role and privilege names have changed from earlier generation of servers. The role names are:
Configuring user accounts and privileges
125