Dell PowerEdge VRTX Chassis Management Controller Version 1.0 for Dell PowerEd - Page 107

Extended Schema Active Directory Overview, Active Directory Schema Extensions

Page 107 highlights

NOTE: If certificate validation is enabled, specify the Domain Controller Server addresses and the Global Catalog FQDN. Make sure that DNS is correctly configured. Extended Schema Active Directory Overview Using the extended schema solution requires the Active Directory schema extension. Active Directory Schema Extensions The Active Directory data is a distributed database of attributes and classes. The Active Directory schema includes the rules that determine the type of data that can be added or included in the database. One example of a class that is stored in the database is the user class. Some example user class attributes are user's first name, last name, phone number, and so on. You can extend the Active Directory database by adding your own unique attributes and classes for specific requirements. Dell has extended the schema to include the necessary changes to support remote management authentication and authorization using Active Directory. Each attribute or class that is added to an existing Active Directory Schema must be defined with a unique ID. To maintain unique IDs across the industry, Microsoft maintains a database of Active Directory Object Identifiers (OIDs), so that when companies add extensions to the schema, they can be guaranteed to be unique and not to conflict with each other. To extend the schema in Microsoft's Active Directory, Dell received unique OIDs, unique name extensions, and uniquely linked attribute IDs for the attributes and classes that are added into the directory service. • Dell extension: dell • Dell base OID: 1.2.840.113556.1.8000.1280 • RAC LinkID range: 12070 to 12079 Overview of Schema Extensions Dell has extended the schema to include an Association, Device, and Privilege property. The Association property is used to link together the users or groups with a specific set of privileges to one or more RAC devices. This model provides an administrator maximum flexibility over the different combinations of users, RAC privileges, and RAC devices on the network without much complexity. When there are two CMCs on the network that you want to integrate with Active Directory for authentication and authorization, create at least one association object and one RAC device object for each CMC. You can create multiple association objects, and each association object can be linked to as many users, groups of users, or RAC device objects as required. The users and RAC device objects can be members of any domain in the enterprise. However, each association object can be linked (or, may link users, groups of users, or RAC device objects) to only one privilege object. This example allows an administrator to control each user's privileges on specific CMCs. The RAC device object is the link to RAC firmware for querying Active Directory for authentication and authorization. When a RAC is added to the network, the administrator must configure the RAC and its device object with its Active Directory name so that users can perform authentication and authorization with Active Directory. Additionally, the administrator must add the RAC to at least one association object for users to authenticate. NOTE: The RAC privilege object applies to CMC. You can create as many or as few association objects as required. However, you must create at least one Association Object, and you must have one RAC device object for each RAC (CMC) on the network that you want to integrate with Active Directory. The Association Object allows as many or as few users and/or groups as well as RAC Device Objects. However, the Association Object only includes one Privilege Object per Association Object. The Association Object connects the Users who have Privileges on RACs (CMCs). 107

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193

NOTE:
If certificate validation is enabled, specify the Domain Controller Server addresses and the Global
Catalog FQDN. Make sure that DNS is correctly configured.
Extended Schema Active Directory Overview
Using the extended schema solution requires the Active Directory schema extension.
Active Directory Schema Extensions
The Active Directory data is a distributed database of
attributes
and
classes
. The Active Directory schema includes the
rules that determine the type of data that can be added or included in the database. One example of a class that is
stored in the database is the user class. Some example user class attributes are user’s first name, last name, phone
number, and so on.
You can extend the Active Directory database by adding your own unique
attributes
and
classes
for specific
requirements. Dell has extended the schema to include the necessary changes to support remote management
authentication and authorization using Active Directory.
Each
attribute
or
class
that is added to an existing Active Directory Schema must be defined with a unique ID. To
maintain unique IDs across the industry, Microsoft maintains a database of Active Directory Object Identifiers (OIDs), so
that when companies add extensions to the schema, they can be guaranteed to be unique and not to conflict with each
other. To extend the schema in Microsoft's Active Directory, Dell received unique OIDs, unique name extensions, and
uniquely linked attribute IDs for the attributes and classes that are added into the directory service.
Dell extension:
dell
Dell base OID:
1.2.840.113556.1.8000.1280
RAC LinkID range:
12070
to
12079
Overview of Schema Extensions
Dell has extended the schema to include an
Association
,
Device
, and
Privilege
property. The
Association
property is
used to link together the users or groups with a specific set of privileges to one or more RAC devices. This model
provides an administrator maximum flexibility over the different combinations of users, RAC privileges, and RAC devices
on the network without much complexity.
When there are two CMCs on the network that you want to integrate with Active Directory for authentication and
authorization, create at least one association object and one RAC device object for each CMC. You can create multiple
association objects, and each association object can be linked to as many users, groups of users, or RAC device objects
as required. The users and RAC device objects can be members of any domain in the enterprise.
However, each association object can be linked (or, may link users, groups of users, or RAC device objects) to only one
privilege object. This example allows an administrator to control each user’s privileges on specific CMCs.
The RAC device object is the link to RAC firmware for querying Active Directory for authentication and authorization.
When a RAC is added to the network, the administrator must configure the RAC and its device object with its Active
Directory name so that users can perform authentication and authorization with Active Directory. Additionally, the
administrator must add the RAC to at least one association object for users to authenticate.
NOTE:
The RAC privilege object applies to CMC.
You can create as many or as few association objects as required. However, you must create at least one Association
Object, and you must have one RAC device object for each RAC (CMC) on the network that you want to integrate with
Active Directory.
The Association Object allows as many or as few users and/or groups as well as RAC Device Objects. However, the
Association Object only includes one Privilege Object per Association Object. The Association Object connects the
Users
who have
Privileges
on RACs (CMCs).
107