Dell PowerEdge VRTX Chassis Management Controller Version 1.0 for Dell PowerEd - Page 115

Configuring Active Directory With Extended Schema Using RACADM

Page 115 highlights

4. Click Apply to save the settings. NOTE: You must apply the settings before continuing. If you do not apply the settings, the settings are lost when you navigate to the next page. 5. In the Extended Schema Settings section, type the CMC device name and the domain name. 6. If you have enabled certificate validation, you must upload the domain forest root certificate authority-signed certificate to CMC. In the Manage Certificates section, type the file path of the certificate or browse to the certificate file. Click Upload to upload the file to CMC. NOTE: The File Path value displays the relative file path of the certificate you are uploading. You must type the absolute file path, which includes the full path and the complete file name and file extension. The SSL certificates for the domain controllers must be signed by the root certificate authority-signed certificate. The root certificate authority-signed certificate must be available on the management station accessing CMC. CAUTION: SSL certificate validation is required by default. Disabling this certificate is not recommended. 7. If you have enabled Single Sign-On (SSO), in the Kerberos Keytab section, click Browse, specify the keytab file and click Upload. When the upload is complete, a message is displayed indicating a successful or failed upload. 8. Click Apply. The CMC web server automatically restarts after you click Apply. 9. Log in to the CMC Web interface. 10. Select Chassis in the system tree, click the Network tab, then click the Network subtab. The Network Configuration page is displayed. 11. If Use DHCP for CMC Network Interface IP Address, is enabled, do one of the following: - Select Use DHCP to Obtain DNS Server Addressesto enable the DNS server addresses to be obtained automatically by the DHCP server. - Manually configure a DNS server IP address by leaving the Use DHCP to Obtain DNS Server Addresses check box unchecked and then typing your primary and alternate DNS server IP addresses in the fields provided. 12. Click Apply Changes. The Active Directory settings for extended schema is configured. Configuring Active Directory With Extended Schema Using RACADM To configure a CMC Active Directory with Extended Schema by using the RACADM commands, oen a command prompt and enter the following commands at the command prompt: racadm config -g cfgActiveDirectory -o cfgADEnable 1 racadm config -g cfgActiveDirectory -o cfgADType 1 racadm config -g cfgActiveDirectory -o cfgADRacName racadm config -g cfgActiveDirectory -o cfgADRacDomain < fully qualified rac domain name > racadm config -g cfgActiveDirectory -o cfgADDomainController1 < fully qualified domain name or IP Address of the domain controller > racadm config -g cfgActiveDirectory -o cfgADDomainController2 < fully qualified domain name or IP Address of the domain controller > racadm config -g cfgActiveDirectory -o cfgADDomainController3 < fully qualified domain name or IP Address of the domain controller > NOTE: You must configure at least one of the three addresses. CMC attempts to connect to each of the configured addresses one-by-one until it makes a successful connection. With Extended Schema, these are the FQDN or IP addresses of the domain controllers where this CMC device is located. To disable the certificate validation during an handshake (optional): racadm config -g cfgActiveDirectory -o cfgADCertValidationEnable 0 115

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193

4.
Click
Apply
to save the settings.
NOTE:
You must apply the settings before continuing. If you do not apply the settings, the settings are lost
when you navigate to the next page.
5.
In the
Extended Schema Settings
section, type the CMC device name and the domain name.
6.
If you have enabled certificate validation, you must upload the domain forest root certificate authority-signed
certificate to CMC. In the
Manage Certificates
section, type the file path of the certificate or browse to the
certificate file. Click
Upload
to upload the file to CMC.
NOTE:
The
File Path
value displays the relative file path of the certificate you are uploading. You must
type the absolute file path, which includes the full path and the complete file name and file extension.
The SSL certificates for the domain controllers must be signed by the root certificate authority-signed certificate.
The root certificate authority-signed certificate must be available on the management station accessing CMC.
CAUTION: SSL certificate validation is required by default. Disabling this certificate is not recommended.
7.
If you have enabled Single Sign-On (SSO), in the Kerberos Keytab section, click
Browse
, specify the keytab file and
click
Upload
. When the upload is complete, a message is displayed indicating a successful or failed upload.
8.
Click
Apply
.
The CMC web server automatically restarts after you click
Apply
.
9.
Log in to the CMC Web interface.
10.
Select
Chassis
in the system tree, click the
Network
tab, then click the
Network
subtab. The
Network Configuration
page is displayed.
11.
If
Use DHCP
for CMC Network Interface IP Address, is enabled, do one of the following:
Select
Use DHCP to Obtain DNS Server Addresses
to enable the DNS server addresses to be obtained
automatically by the DHCP server.
Manually configure a DNS server IP address by leaving the
Use DHCP to Obtain DNS Server Addresses
check box unchecked and then typing your primary and alternate DNS server IP addresses in the fields
provided.
12.
Click
Apply Changes
.
The Active Directory settings for extended schema is configured.
Configuring Active Directory With Extended Schema Using RACADM
To configure a CMC Active Directory with Extended Schema by using the RACADM commands, oen a command prompt
and enter the following commands at the command prompt:
racadm config -g cfgActiveDirectory -o cfgADEnable 1
racadm config -g cfgActiveDirectory -o cfgADType 1
racadm config -g cfgActiveDirectory -o cfgADRacName <RAC common name>
racadm config -g cfgActiveDirectory -o cfgADRacDomain < fully qualified rac
domain name >
racadm config -g cfgActiveDirectory -o cfgADDomainController1 < fully qualified
domain name or IP Address of the domain controller >
racadm config -g cfgActiveDirectory -o cfgADDomainController2 < fully qualified
domain name or IP Address of the domain controller >
racadm config -g cfgActiveDirectory -o cfgADDomainController3 < fully qualified
domain name or IP Address of the domain controller >
NOTE:
You must configure at least one of the three addresses. CMC attempts to connect to each of the configured
addresses one-by-one until it makes a successful connection. With Extended Schema, these are the FQDN or IP
addresses of the domain controllers where this CMC device is located.
To disable the certificate validation during an handshake (optional):
racadm config -g cfgActiveDirectory -o cfgADCertValidationEnable 0
115