Dell PowerEdge R830 Integrated Remote Access Controller 8 Version 2.70.70.70 U - Page 142

Configuring generic LDAP directory service using RACADM, Testing LDAP directory service settings

Page 142 highlights

NOTE: If you are using Novell eDirectory and if you have used these characters-#(hash), "(double quotes), ;(semi colon), > (greater than), , (comma), or iDRAC Settings > User Authentication > Directory Services > Generic LDAP Directory Service. The Generic LDAP Configuration and Management page displays the current generic LDAP settings. 2. Click Test Settings. 3. Enter the user name and password of a directory user that is chosen to test the LDAP settings. The format depends on the Attribute of User Login is used and the user name entered must match the value of the chosen attribute. NOTE: When testing LDAP settings with Enable Certificate Validation checked, iDRAC requires that the LDAP server be identified by the FQDN and not an IP address. If the LDAP server is identified by an IP address, certificate validation fails because iDRAC is not able to communicate with the LDAP server. NOTE: When generic LDAP is enabled, iDRAC first tries to login the user as a directory user. If it fails, local user lookup is enabled. The test results and the test log are displayed. Testing LDAP directory service settings using RACADM To test the LDAP directory service settings, use the testfeature command. For more information, see the iDRAC RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals. 142 Configuring user accounts and privileges

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298

NOTE:
If you are using Novell eDirectory and if you have used these characters—#(hash), "(double quotes), ;(semi
colon), > (greater than), , (comma), or <(lesser than)—for the Group DN name, they must be escaped.
The role group settings are saved. The
Generic LDAP Configuration and Management Step 3a of 3
page displays the role group
settings.
9.
If you want to configure additional role groups, repeat steps 7 and 8.
10.
Click
Finish
. The generic LDAP directory service is configured.
Configuring generic LDAP directory service using
RACADM
To configure the LDAP directory service, use the objects in the
iDRAC.LDAP
and
iDRAC.LDAPRole
groups.
For more information, see the
iDRAC RACADM Command Line Interface Reference Guide
available at
dell.com/idracmanuals
.
Testing LDAP directory service settings
You can test the LDAP directory service settings to verify whether your configuration is correct, or to diagnose the problem with a failed
LDAP log in.
Testing LDAP directory service settings using iDRAC web interface
To test the LDAP directory service settings:
1.
In iDRAC Web Interface, go to
Overview
>
iDRAC Settings
>
User Authentication
>
Directory Services
>
Generic LDAP
Directory Service
.
The
Generic LDAP Configuration and Management
page displays the current generic LDAP settings.
2.
Click
Test Settings
.
3.
Enter the user name and password of a directory user that is chosen to test the LDAP settings. The format depends on the
Attribute
of User Login
is used and the user name entered must match the value of the chosen attribute.
NOTE:
When testing LDAP settings with Enable Certificate Validation checked, iDRAC requires that the LDAP server
be identified by the FQDN and not an IP address. If the LDAP server is identified by an IP address, certificate
validation fails because iDRAC is not able to communicate with the LDAP server.
NOTE:
When generic LDAP is enabled, iDRAC first tries to login the user as a directory user. If it fails, local user
lookup is enabled.
The test results and the test log are displayed.
Testing LDAP directory service settings using RACADM
To test the LDAP directory service settings, use the
testfeature
command. For more information, see the
iDRAC RACADM Command
Line Interface Reference Guide
available at
dell.com/idracmanuals
.
142
Configuring user accounts and privileges