Dell PowerEdge VRTX Chassis Management Controller Version 1.0 for Dell PowerEd - Page 122

Uploading Keytab File

Page 122 highlights

NOTE: For information about the options, see the Online Help. 1. While configuring Active Directory to setup a user account, perform the following additional steps: - Upload the keytab file. - To enable SSO, select the Enable Single Sign-On option. - To enable smart card login, select the Enable Smart-Card Login option. NOTE: If these two options are selected, all command line out-of-band interfaces, including secure shell (SSH), Telnet, Serial, and remote RACADM remain unchanged . 2. Click Apply. The settings are saved. You can test the Active Directory using Kerberos authentication using the RACADM command: testfeature -f adkrb -u @ where is a valid Active Directory user account. A command success indicates that CMC is able to acquire Kerberos credentials and access the user's Active Directory account. If the command is not successful, resolve the error and run the command again. For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide on dell.com/support/manuals. Uploading Keytab File The Kerberos keytab file serves as the CMC's user name and password credentials to the Kerberos Data Center (KDC), which in turns allows access to the Active Directory. Each CMC in the Kerberos realm must be registered with the Active Directory and must have a unique keytab file. You can upload a Kerberos Keytab generated on the associated Active Directory Server. You can generate the Kerberos Keytab from the Active Directory Server by executing the ktpass.exe utility. This keytab establishes a trust relationship between the Active Directory Server and CMC. To upload the keytab file: 1. In the left pane, click Chassis Overview → User Authentication → Directory Services. 2. Select Microsoft Active Directory (Standard Schema). 3. In the Kerberos Keytab section, click Browse, select a keytab file, and click Upload. When the upload is complete, a message is displayed indicating whether the keytab file is successfully uploaded or not. Configuring CMC SSO Login Or Smart Card Login For Active Directory Users Using RACADM In addition to the steps performed while configuring Active Directory, run the following command to enable SSO: racadm -g cfgActiveDirectory -o cfgADSSOEnable 1 In addition to the steps performed while configuring Active Directory, use the following objects to enable smart card login: • cfgSmartCardLogonEnable • cfgSmartCardCRLEnable 122

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193

NOTE:
For information about the options, see the
Online Help
.
1.
While configuring Active Directory to setup a user account, perform the following additional steps:
Upload the keytab file.
To enable SSO, select the
Enable Single Sign-On
option.
To enable smart card login, select the
Enable Smart-Card Login
option.
NOTE:
If these two options are selected, all command line out-of-band interfaces, including secure
shell (SSH), Telnet, Serial, and remote RACADM remain unchanged .
2.
Click
Apply
.
The settings are saved.
You can test the Active Directory using Kerberos authentication using the RACADM command:
testfeature -f adkrb -u <user>@<domain>
where
<
user
>
is a valid Active Directory user account.
A command success indicates that CMC is able to acquire Kerberos credentials and access the user's Active
Directory account. If the command is not successful, resolve the error and run the command again. For more
information, see the
Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference
Guide
on dell.com/support/manuals.
Uploading Keytab File
The Kerberos keytab file serves as the CMC's user name and password credentials to the Kerberos Data Center (KDC),
which in turns allows access to the Active Directory. Each CMC in the Kerberos realm must be registered with the
Active Directory and must have a unique keytab file.
You can upload a Kerberos Keytab generated on the associated Active Directory Server. You can generate the Kerberos
Keytab from the Active Directory Server by executing the
ktpass.exe
utility. This keytab establishes a trust relationship
between the Active Directory Server and CMC.
To upload the keytab file:
1.
In the left pane, click
Chassis Overview
User Authentication
Directory Services
.
2.
Select
Microsoft Active Directory (Standard Schema)
.
3.
In the
Kerberos Keytab
section, click
Browse
, select a keytab file, and click
Upload
.
When the upload is complete, a message is displayed indicating whether the keytab file is successfully uploaded or
not.
Configuring CMC SSO Login Or Smart Card Login For Active Directory Users Using
RACADM
In addition to the steps performed while configuring Active Directory, run the following command to enable SSO:
racadm -g cfgActiveDirectory -o cfgADSSOEnable 1
In addition to the steps performed while configuring Active Directory, use the following objects to enable smart card
login:
cfgSmartCardLogonEnable
cfgSmartCardCRLEnable
122