Dell PowerEdge R830 Integrated Remote Access Controller 8 Version 2.70.70.70 U - Page 130

Configuring Active Directory with Standard schema using RACADM

Page 130 highlights

4. Optionally, enable certificate validation and upload the CA-signed digital certificate used during initiation of SSL connections when communicating with the Active Directory (AD) server. For this, the Domain Controllers and Global Catalog FQDN must be specified. This is done in the next steps. And hence the DNS should be configured properly in the network settings. 5. Click Next. The Active Directory Configuration and Management Step 2 of 4 page is displayed. 6. Enable Active Directory and specify the location information about Active Directory servers and user accounts. Also, specify the time iDRAC must wait for responses from Active Directory during iDRAC login. NOTE: If certificate validation is enabled, specify the Domain Controller Server addresses and the Global Catalog FQDN. Make sure that DNS is configured correctly under Overview > iDRAC Settings > Network. 7. Click Next. The Active Directory Configuration and Management Step 3 of 4 page is displayed. 8. Select Standard Schema and click Next. The Active Directory Configuration and Management Step 4a of 4 page is displayed. 9. Enter the location of Active Directory global catalog server(s) and specify privilege groups used to authorize users. 10. Click a Role Group to configure the control authorization policy for users under the standard schema mode. The Active Directory Configuration and Management Step 4b of 4 page is displayed. 11. Specify the privileges and click Apply. The settings are applied and the Active Directory Configuration and Management Step 4a of 4 page is displayed. 12. Click Finish. The Active Directory settings for standard schema are configured. Configuring Active Directory with Standard schema using RACADM 1. Use the following commands: racadm set iDRAC.ActiveDirectory.Enable 1 racadm set iDRAC.ActiveDirectory.Schema 2 racadm set iDRAC.ADGroup.Name racadm set iDRAC.ADGroup.Domain racadm set iDRAC.ADGroup.Privilege racadm set iDRAC.ActiveDirectory.DomainController1 racadm set iDRAC.ActiveDirectory.DomainController2 racadm set iDRAC.ActiveDirectory.DomainController3 racadm set iDRAC.ActiveDirectory.GlobalCatalog1 racadm set iDRAC.ActiveDirectory.GlobalCatalog2 racadm set iDRAC.ActiveDirectory.GlobalCatalog3 • Enter the Fully Qualified Domain Name (FQDN) of the domain controller, not the FQDN of the domain. For example, enter servername.dell.com instead of dell.com. • For bit-mask values for specific Role Group permissions, see Table 21. Default role group privileges . • You must provide at least one of the three domain controller addresses. iDRAC attempts to connect to each of the configured addresses one-by-one until it makes a successful connection. With Standard Schema, these are the addresses of the domain controllers where the user accounts and the role groups are located. • The Global Catalog server is only required for standard schema when the user accounts and role groups are in different domains. In multiple domain case, only the Universal Group can be used. • If certificate validation is enabled, the FQDN or IP address that you specify in this field must match the Subject or Subject Alternative Name field of your domain controller certificate. • To disable the certificate validation during SSL handshake, use the following command: racadm set iDRAC.ActiveDirectory.CertValidationEnable 0 In this case, no Certificate Authority (CA) certificate needs to be uploaded. • To enforce the certificate validation during SSL handshake (optional), use the following command: racadm set iDRAC.ActiveDirectory.CertValidationEnable 1 130 Configuring user accounts and privileges

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298

4.
Optionally, enable certificate validation and upload the CA-signed digital certificate used during initiation of SSL connections when
communicating with the Active Directory (AD) server. For this, the Domain Controllers and Global Catalog FQDN must be specified.
This is done in the next steps. And hence the DNS should be configured properly in the network settings.
5.
Click
Next
.
The
Active Directory Configuration and Management Step 2 of 4
page is displayed.
6.
Enable Active Directory and specify the location information about Active Directory servers and user accounts. Also, specify the time
iDRAC must wait for responses from Active Directory during iDRAC login.
NOTE:
If certificate validation is enabled, specify the Domain Controller Server addresses and the Global Catalog
FQDN. Make sure that DNS is configured correctly under Overview > iDRAC Settings > Network.
7.
Click
Next
. The
Active Directory Configuration and Management Step 3 of 4
page is displayed.
8.
Select
Standard Schema
and click Next.
The
Active Directory Configuration and Management Step 4a of 4
page is displayed.
9.
Enter the location of Active Directory global catalog server(s) and specify privilege groups used to authorize users.
10.
Click a
Role Group
to configure the control authorization policy for users under the standard schema mode.
The
Active Directory Configuration and Management Step 4b of 4
page is displayed.
11.
Specify the privileges and click
Apply
.
The settings are applied and the
Active Directory Configuration and Management Step 4a of 4
page is displayed.
12.
Click
Finish
. The Active Directory settings for standard schema are configured.
Configuring Active Directory with Standard schema using RACADM
1.
Use the following commands:
racadm set iDRAC.ActiveDirectory.Enable 1
racadm set iDRAC.ActiveDirectory.Schema 2
racadm set iDRAC.ADGroup.Name <common name of the role group>
racadm set iDRAC.ADGroup.Domain <fully qualified domain name>
racadm set iDRAC.ADGroup.Privilege <Bit-mask value for specific RoleGroup permissions>
racadm set iDRAC.ActiveDirectory.DomainController1 <fully qualified domain name or IP
address of the domain controller>
racadm set iDRAC.ActiveDirectory.DomainController2 <fully qualified domain name or IP
address of the domain controller>
racadm set iDRAC.ActiveDirectory.DomainController3 <fully qualified domain name or IP
address of the domain controller>
racadm set iDRAC.ActiveDirectory.GlobalCatalog1 <fully qualified domain name or IP address
of the domain controller>
racadm set iDRAC.ActiveDirectory.GlobalCatalog2 <fully qualified domain name or IP address
of the domain controller>
racadm set iDRAC.ActiveDirectory.GlobalCatalog3 <fully qualified domain name or IP address
of the domain controller>
Enter the Fully Qualified Domain Name (FQDN) of the domain controller, not the FQDN of the domain. For example, enter
servername.dell.com
instead of
dell.com
.
For bit-mask values for specific Role Group permissions, see
Table 21. Default role group privileges
.
You must provide at least one of the three domain controller addresses. iDRAC attempts to connect to each of the configured
addresses one-by-one until it makes a successful connection. With Standard Schema, these are the addresses of the domain
controllers where the user accounts and the role groups are located.
The Global Catalog server is only required for standard schema when the user accounts and role groups are in different domains. In
multiple domain case, only the Universal Group can be used.
If certificate validation is enabled, the FQDN or IP address that you specify in this field must match the Subject or Subject
Alternative Name field of your domain controller certificate.
To disable the certificate validation during SSL handshake, use the following command:
racadm set iDRAC.ActiveDirectory.CertValidationEnable 0
In this case, no Certificate Authority (CA) certificate needs to be uploaded.
To enforce the certificate validation during SSL handshake (optional), use the following command:
racadm set iDRAC.ActiveDirectory.CertValidationEnable 1
130
Configuring user accounts and privileges