Dell PowerEdge VRTX Chassis Management Controller Version 1.0 for Dell PowerEd - Page 117

Configuring Generic LDAP Directory Service Using CMC Web Interface, Authorization Of LDAP Users

Page 117 highlights

Authorization Of LDAP Users To authorize a user: 1. Search each configured group for the user's domain name within the member or uniqueMember attributes. An administrator can configure a user domain. 2. For every user group that the user belongs to, give the user appropriate user access rights and privileges. Configuring Generic LDAP Directory Service Using CMC Web Interface To configure the generic LDAP directory service: NOTE: You must have the Chassis Configuration Administrator privilege. 1. In the left pane, click Chassis Overview → User Authentication → Directory Services. 2. Select Generic LDAP. The settings to be configured for standard schema is displayed on the same page. 3. Specify the following: NOTE: For information about the various fields, see the Online Help. - Common Settings - Server to use with LDAP: * Static server - Specify the FQDN or IP address and the LDAP port number. * DNS server - Specify the DNS server to retrieve a list of LDAP servers by searching for their SRV record within the DNS. The following DNS query is performed for SRV records: _[Service Name]._tcp.[Search Domain] where is the root level domain to use within the query and is the service name to use within the query. For example: _ldap._tcp.dell.com where ldap is the service name and dell.com is the search domain. 4. Click Apply to save the settings. NOTE: You must apply the settings before continuing. If you do not apply the settings, the settings are lost when you navigate to the next page. 5. In the Group Settings section, click a Role Group. 6. On the Configure LDAP Role Group page, specify the group domain name and privileges for the role group. 7. Click Apply to save the role group settings, click Go Back To Configuration page, and then select Generic LDAP. 8. If you have selected Certificate Validation Enabled option, then in the Manage Certificates section, specify the CA certificate to validate the LDAP server certificate during SSL handshake and click Upload. The certificate is uploaded to CMC and the details are displayed. 9. Click Apply. The generic LDAP directory service is configured. 117

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193

Authorization Of LDAP Users
To authorize a user:
1.
Search each configured group for the user's domain name within the
member or uniqueMember
attributes.
An administrator can configure a user domain.
2.
For every user group that the user belongs to, give the user appropriate user access rights and privileges.
Configuring Generic LDAP Directory Service Using CMC Web Interface
To configure the generic LDAP directory service:
NOTE:
You must have the
Chassis Configuration Administrator
privilege.
1.
In the left pane, click
Chassis Overview
User Authentication
Directory Services
.
2.
Select
Generic LDAP
.
The settings to be configured for standard schema is displayed on the same page.
3.
Specify the following:
NOTE:
For information about the various fields, see the
Online Help
.
Common Settings
Server to use with LDAP:
*
Static server — Specify the FQDN or IP address and the LDAP port number.
*
DNS server — Specify the DNS server to retrieve a list of LDAP servers by searching for their SRV
record within the DNS.
The following DNS query is performed for SRV records:
_[Service Name]._tcp.[Search Domain]
where <
Search Domain
> is the root level domain to use within the query and <
Service
Name
> is the service name to use within the query.
For example:
_ldap._tcp.dell.com
where
ldap
is the service name and
dell.com
is the search domain.
4.
Click
Apply
to save the settings.
NOTE:
You must apply the settings before continuing. If you do not apply the settings, the settings are lost
when you navigate to the next page.
5.
In the
Group Settings
section, click a
Role Group
.
6.
On the
Configure LDAP Role Group
page, specify the group domain name and privileges for the role group.
7.
Click
Apply
to save the role group settings, click
Go Back To Configuration page
, and then select
Generic LDAP
.
8.
If you have selected
Certificate Validation Enabled
option, then in the
Manage Certificates
section, specify the CA
certificate to validate the LDAP server certificate during SSL handshake and click
Upload
. The certificate is
uploaded to CMC and the details are displayed.
9.
Click
Apply
.
The generic LDAP directory service is configured.
117