HP 4x1Ex32 HP IP Console Viewer User Guide - Page 207

Configuring LDAP parameters

Page 207 highlights

2. Click Add. The Enter Key dialog box appears. 3. Enter 387S9-M3228-JRM85-D2RZQ-NK8JR. 4. Click OK. -orClick Cancel to exit without saving changes. Configuring LDAP parameters There are differences between the LDAP-based access controls used by console switches and Kerberosbased access control that Windows® uses by default when users log in to workstations and servers. Some of the user account properties in Active Directory apply only to Kerberos, while some apply to both Kerberos and the LDAP-based access controls used by console switches. For example, configurable user restrictions, like the "Log On To," "Logon Hours," and "Managed By" features, in Active Directory do not apply to console switches and their attached servers. Other features, like user account expiration, user account lockout, and the capability to disable a user account, do apply to console switches and attached serves (subject to configuration of associated parameters in Active Directory). Because of the complexity of Active Directory, it is always useful to run test cases to confirm it is correctly configured to enforce the desired security policy. It is important to remember that LDAP cannot access the ACL data used by Windows® to make its access control decisions. HP recommends following the configuration guidance provided by this user guide. Configurations outside that guidance are not supported. If individual user accounts are stored on an LDAP-enabled Directory server, such as Active Directory, you can use the Directory service to authenticate users. The settings made in the Authentication subcategory enable you to configure your authentication configuration parameters. The HP IP Console Viewer sends the user name, password, and other information to the console switch, which then determines whether the HP IP Console Viewer user has permission to view or change configuration parameters for the console switch in the HP IP Console Viewer main window. CAUTION: Unless otherwise specified, use the LDAP default values unless Active Directory has been reconfigured. Modifying the default values might cause LDAP server communication errors. There are three tabs for configuring LDAP parameters. Using directory services integration 207

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339

Using directory services integration
207
2.
Click
Add.
The Enter Key dialog box appears.
3.
Enter
387S9-M3228-JRM85-D2RZQ-NK8JR.
4.
Click
OK.
-or-
Click
Cancel
to exit without saving changes.
Configuring LDAP parameters
There are differences between the LDAP-based access controls used by console switches and Kerberos-
based access control that Windows® uses by default when users log in to workstations and servers. Some
of the user account properties in Active Directory apply only to Kerberos, while some apply to both
Kerberos and the LDAP-based access controls used by console switches. For example, configurable user
restrictions, like the "Log On To," "Logon Hours," and "Managed By" features, in Active Directory do not
apply to console switches and their attached servers. Other features, like user account expiration, user
account lockout, and the capability to disable a user account, do apply to console switches and attached
serves (subject to configuration of associated parameters in Active Directory). Because of the complexity
of Active Directory, it is always useful to run test cases to confirm it is correctly configured to enforce the
desired security policy. It is important to remember that LDAP cannot access the ACL data used by
Windows® to make its access control decisions. HP recommends following the configuration guidance
provided by this user guide. Configurations outside that guidance are not supported.
If individual user accounts are stored on an LDAP-enabled Directory server, such as Active Directory, you
can use the Directory service to authenticate users.
The settings made in the Authentication subcategory enable you to configure your authentication
configuration parameters. The HP IP Console Viewer sends the user name, password, and other
information to the console switch, which then determines whether the HP IP Console Viewer user has
permission to view or change configuration parameters for the console switch in the HP IP Console Viewer
main window.
CAUTION:
Unless otherwise specified, use the LDAP default values unless Active Directory
has been reconfigured. Modifying the default values might cause LDAP server communication
errors.
There are three tabs for configuring LDAP parameters.