Dell PowerEdge R830 Integrated Remote Access Controller 8 Version 2.70.70.70 U - Page 284

Smart card login, Virtual console

Page 284 highlights

3. Make sure that the domain clients have the updated GPO. 4. At the command line, type gpupdate /force and delete the old key tab with klist purge command. 5. After the GPO is updated, create the new keytab. 6. Upload the keytab to iDRAC. You can now log in to iDRAC using SSO. Why does SSO login fail with Active Directory users on Windows 7 and Windows Server 2008 R2? You must enable the encryption types for Windows 7 and Windows Server 2008 R2. To enable the encryption types: 1. Log in as administrator or as a user with administrative privilege. 2. Go to Start and run gpedit.msc. The Local Group Policy Editor window is displayed. 3. Go to Local Computer Settings > Windows Settings > Security Settings > Local Policies > Security Options. 4. Right-click Network Security: Configure encryption types allowed for kerberos and select Properties. 5. Enable all the options. 6. Click OK. You can now log in to iDRAC using SSO. Perform the following additional settings for Extended Schema: 1. In the Local Group Policy Editor window, navigate to Local Computer Settings > Windows Settings > Security Settings > Local Policies > Security Options . 2. Right-click Network Security: Restrict NTLM: Outgoing NTLM traffic to remote server and select Properties. 3. Select Allow all, click OK, and close the Local Group Policy Editor window. 4. Go to Start and run cmd. The command prompt window is displayed. 5. Run the command gpupdate /force. The group policies are updated. Close the command prompt window. 6. Go to Start and run regedit. The Registry Editor window is displayed. 7. Navigate to HKEY_LOCAL_MACHINE > System > CurrentControlSet > Control > LSA . 8. In the right-pane, right-click and select New > DWORD (32-bit) Value. 9. Name the new key as SuppressExtendedProtection. 10. Right-click SuppressExtendedProtection and click Modify. 11. In the Value data field, type 1 and click OK. 12. Close the Registry Editor window. You can now log in to iDRAC using SSO. If you have enabled SSO for iDRAC and you are using Internet Explorer to log in to iDRAC, SSO fails and you are prompted to enter your user name and password. How to resolve this? Make sure that the iDRAC IP address is listed in the Tools > Internet Options > Security > Trusted sites. If it is not listed, SSO fails and you are prompted to enter your user name and password. Click Cancel and proceed. Smart card login It takes up to four minutes to log into iDRAC using Active Directory Smart Card login. The normal Active Directory Smart Card login normally takes less than 10 seconds, however it may take up to four minutes if you have specified the preferred DNS server and the alternate DNS server in the Network page, and the preferred DNS server has failed. DNS time-outs are expected when a DNS server is down. iDRAC logs you in using the alternate DNS server. ActiveX plug-in unable to detect the Smart Card reader. Make sure that the smart card is supported on the Microsoft Windows operating system. Windows supports a limited number of smart card Cryptographic Service Providers (CSPs). In general, check if the smart card CSPs are present on a particular client, insert the smart card in the reader at the Windows logon (CtrlAlt-Del) screen and check if Windows detects the smart card and displays the PIN dialog-box. Incorrect Smart Card PIN. Check if the smart card is locked due to too many attempts with an incorrect PIN. In such cases, contact the smart card issuer in the organization to get a new smart card. Virtual console Virtual Console session is active even if you have logged out of iDRAC web interface. Is this the expected behavior? Yes. Close the Virtual Console Viewer window to log out of the corresponding session. Can a new remote console video session be started when the local video on the server is turned off? 284 Frequently asked questions

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298

3.
Make sure that the domain clients have the updated GPO.
4.
At the command line, type
gpupdate /force
and delete the old key tab with
klist purge
command.
5.
After the GPO is updated, create the new keytab.
6.
Upload the keytab to iDRAC.
You can now log in to iDRAC using SSO.
Why does SSO login fail with Active Directory users on Windows 7 and Windows Server 2008 R2?
You must enable the encryption types for Windows 7 and Windows Server 2008 R2. To enable the encryption types:
1.
Log in as administrator or as a user with administrative privilege.
2.
Go to
Start
and run
gpedit.msc
. The
Local Group Policy Editor
window is displayed.
3.
Go to
Local Computer Settings
>
Windows Settings
>
Security Settings
>
Local Policies
>
Security Options
.
4.
Right-click
Network Security: Configure encryption types allowed for kerberos
and select
Properties
.
5.
Enable all the options.
6.
Click
OK
. You can now log in to iDRAC using SSO.
Perform the following additional settings for Extended Schema:
1.
In the
Local Group Policy Editor
window, navigate to
Local Computer Settings
>
Windows Settings
>
Security Settings
>
Local Policies
>
Security Options
.
2.
Right-click
Network Security: Restrict NTLM: Outgoing NTLM traffic to remote server
and select
Properties
.
3.
Select
Allow all
, click
OK
, and close the
Local Group Policy Editor
window.
4.
Go to
Start
and run cmd. The command prompt window is displayed.
5.
Run the command
gpupdate /force
. The group policies are updated. Close the command prompt window.
6.
Go to
Start
and run regedit. The
Registry Editor
window is displayed.
7.
Navigate to
HKEY_LOCAL_MACHINE
>
System
>
CurrentControlSet
>
Control
>
LSA
.
8.
In the right-pane, right-click and select
New
>
DWORD (32-bit) Value
.
9.
Name the new key as
SuppressExtendedProtection
.
10.
Right-click
SuppressExtendedProtection
and click
Modify
.
11.
In the
Value
data field, type
1
and click
OK
.
12.
Close the
Registry Editor
window. You can now log in to iDRAC using SSO.
If you have enabled SSO for iDRAC and you are using Internet Explorer to log in to iDRAC, SSO fails and you are prompted to
enter your user name and password. How to resolve this?
Make sure that the iDRAC IP address is listed in the
Tools
>
Internet Options
>
Security
>
Trusted sites
. If it is not listed, SSO fails
and you are prompted to enter your user name and password. Click
Cancel
and proceed.
Smart card login
It takes up to four minutes to log into iDRAC using Active Directory Smart Card login.
The normal Active Directory Smart Card login normally takes less than 10 seconds, however it may take up to four minutes if you have
specified the preferred DNS server and the alternate DNS server in the
Network
page, and the preferred DNS server has failed. DNS
time-outs are expected when a DNS server is down. iDRAC logs you in using the alternate DNS server.
ActiveX plug-in unable to detect the Smart Card reader.
Make sure that the smart card is supported on the Microsoft Windows operating system. Windows supports a limited number of smart
card Cryptographic Service Providers (CSPs).
In general, check if the smart card CSPs are present on a particular client, insert the smart card in the reader at the Windows logon (Ctrl-
Alt-Del) screen and check if Windows detects the smart card and displays the PIN dialog-box.
Incorrect Smart Card PIN.
Check if the smart card is locked due to too many attempts with an incorrect PIN. In such cases, contact the smart card issuer in the
organization to get a new smart card.
Virtual console
Virtual Console session is active even if you have logged out of iDRAC web interface. Is this the expected behavior?
Yes. Close the Virtual Console Viewer window to log out of the corresponding session.
Can a new remote console video session be started when the local video on the server is turned off?
284
Frequently asked questions