Dell PowerEdge R830 Integrated Remote Access Controller 8 Version 2.70.70.70 U - Page 127

Enabling SSL on domain controller, Installing SSL certificate for each domain controller

Page 127 highlights

Enabling SSL on domain controller When iDRAC authenticates users with an Active Directory domain controller, it starts an SSL session with the domain controller. At this time, the domain controller must publish a certificate signed by the Certificate Authority (CA)-the root certificate of which is also uploaded into iDRAC. For iDRAC to authenticate to any domain controller-whether it is the root or the child domain controller-that domain controller must have an SSL-enabled certificate signed by the domain's CA. If you are using Microsoft Enterprise Root CA to automatically assign all your domain controllers to an SSL certificate, you must: 1. Install the SSL certificate on each domain controller. 2. Export the Domain Controller Root CA Certificate to iDRAC. 3. Import iDRAC Firmware SSL Certificate. Related tasks Installing SSL certificate for each domain controller Exporting domain controller root CA certificate to iDRAC Importing iDRAC firmware SSL certificate Installing SSL certificate for each domain controller To install the SSL certificate for each controller: 1. Click Start > Administrative Tools > Domain Security Policy. 2. Expand the Public Key Policies folder, right-click Automatic Certificate Request Settings and click Automatic Certificate Request. The Automatic Certificate Request Setup Wizard is displayed. 3. Click Next and select Domain Controller. 4. Click Next and click Finish. The SSL certificate is installed. Exporting domain controller root CA certificate to iDRAC NOTE: If your system is running Windows 2000 or if you are using standalone CA, the following steps may vary. To export the domain controller root CA certificate to iDRAC: 1. Locate the domain controller that is running the Microsoft Enterprise CA service. 2. Click Start > Run. 3. Enter mmc and click OK. 4. In the Console 1 (MMC) window, click File (or Console on Windows 2000 systems) and select Add/Remove Snap-in. 5. In the Add/Remove Snap-In window, click Add. 6. In the Standalone Snap-In window, select Certificates and click Add. 7. Select Computer and click Next. 8. Select Local Computer, click Finish, and click OK. 9. In the Console 1 window, go to Certificates Personal Certificates folder. 10. Locate and right-click the root CA certificate, select All Tasks, and click Export.... 11. In the Certificate Export Wizard, click Next, and select No do not export the private key. 12. Click Next and select Base-64 encoded X.509 (.cer) as the format. 13. Click Next and save the certificate to a directory on your system. 14. Upload the certificate you saved in step 13 to iDRAC. Importing iDRAC firmware SSL certificate iDRAC SSL certificate is the identical certificate used for iDRAC Web server. All iDRAC controllers are shipped with a default self-signed certificate. If the Active Directory Server is set to authenticate the client during an SSL session initialization phase, you need to upload iDRAC Server certificate to the Active Directory Domain controller. This additional step is not required if the Active Directory does not perform a client authentication during an SSL session's initialization phase. NOTE: If your system is running Windows 2000, the following steps may vary. Configuring user accounts and privileges 127

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298

Enabling SSL on domain controller
When iDRAC authenticates users with an Active Directory domain controller, it starts an SSL session with the domain controller. At this
time, the domain controller must publish a certificate signed by the Certificate Authority (CA)—the root certificate of which is also
uploaded into iDRAC. For iDRAC to authenticate to
any
domain controller—whether it is the root or the child domain controller—that
domain controller must have an SSL-enabled certificate signed by the domain’s CA.
If you are using Microsoft Enterprise Root CA to
automatically
assign all your domain controllers to an SSL certificate, you must:
1.
Install the SSL certificate on each domain controller.
2.
Export the Domain Controller Root CA Certificate to iDRAC.
3.
Import iDRAC Firmware SSL Certificate.
Related tasks
Installing SSL certificate for each domain controller
Exporting domain controller root CA certificate to iDRAC
Importing iDRAC firmware SSL certificate
Installing SSL certificate for each domain controller
To install the SSL certificate for each controller:
1.
Click
Start
>
Administrative Tools
>
Domain Security Policy
.
2.
Expand the
Public Key Policies
folder, right-click
Automatic Certificate Request Settings
and click
Automatic Certificate
Request
.
The
Automatic Certificate Request Setup Wizard
is displayed.
3.
Click
Next
and select
Domain Controller
.
4.
Click
Next
and click
Finish
. The SSL certificate is installed.
Exporting domain controller root CA certificate to iDRAC
NOTE:
If your system is running Windows 2000 or if you are using standalone CA, the following steps may vary.
To export the domain controller root CA certificate to iDRAC:
1.
Locate the domain controller that is running the Microsoft Enterprise CA service.
2.
Click
Start
>
Run
.
3.
Enter
mmc
and click
OK
.
4.
In the
Console 1
(MMC) window, click
File (
or
Console
on Windows 2000 systems
)
and select
Add/Remove Snap-in
.
5.
In the
Add/Remove Snap-In
window, click
Add
.
6.
In the
Standalone Snap-In
window, select
Certificates
and click
Add
.
7.
Select
Computer
and click
Next
.
8.
Select
Local Computer
, click
Finish
, and click
OK
.
9.
In the
Console 1
window, go to
Certificates
Personal
Certificates
folder.
10.
Locate and right-click the root CA certificate, select
All Tasks
, and click
Export...
.
11.
In the
Certificate Export Wizard
, click
Next
, and select
No do not export the private key
.
12.
Click
Next
and select
Base-64 encoded X.509 (.cer)
as the format.
13.
Click
Next
and save the certificate to a directory on your system.
14.
Upload the certificate you saved in step 13 to iDRAC.
Importing iDRAC firmware SSL certificate
iDRAC SSL certificate is the identical certificate used for iDRAC Web server. All iDRAC controllers are shipped with a default self-signed
certificate.
If the Active Directory Server is set to authenticate the client during an SSL session initialization phase, you need to upload iDRAC Server
certificate to the Active Directory Domain controller. This additional step is not required if the Active Directory does not perform a client
authentication during an SSL session’s initialization phase.
NOTE:
If your system is running Windows 2000, the following steps may vary.
Configuring user accounts and privileges
127