HP Integrity BL870c HP Integrity iLO 2 Operations Guide, Eleventh Edition - Page 186

Installing and Initializing Snap-Ins for Active Directory

Page 186 highlights

The Active Directory schema folder may need to be expanded for the checkbox to be available. 4. Create a certificate or install Certificate Services. This step is necessary because iLO 2 uses SSL to communicate with Active Directory. 5. To specify that a certificate be issued to the server running Active Directory, do the following: a. Launch MMC on the server and add the default domain policy snap-in (Group policy and browse to default domain policy object). b. Click Computer Configuration>Windows Settings>Security Settings>Public Key Policies. c. Right-click Automatic Certificate Requests Settings, and select New>Automatic Certificate Request. d. Using the wizard, select the domain controller template and the certificate authority you want to use. 6. Download the Smart Component that contains the installers for the schema extender and the snap-ins. You can download the Smart Component from the HP website at http:// www.hp.com/go/integrityiLO. 7. Run the schema installer application to extend the schema, which extends the directory schema with the proper HP objects. The schema installer associates the Active Directory snap-ins with the new schema. The snap-in installation setup utility is a Windows MSI setup script and runs anywhere MSI is supported (Windows XP, Windows 2000, Windows 98). However, some parts of the schema extension application require the .NET Framework, which you can download from the Microsoft website at http://www.microsoft.com. Installing and Initializing Snap-Ins for Active Directory Follow these steps to install the snap-ins and configure the directory service: 1. To install the snap-ins, run the snap-in installation application. 2. Configure the directory service with the appropriate objects and relationships for iLO 2 management: a. Use the management snap-ins from HP to create iLO 2 policy, admin, and user role objects. b. Use the management snap-ins from HP to build associations between the iLO 2 object, the policy object, and the role object. c. Point the iLO 2 object to the admin and user role objects (admin and user roles automatically point back to the iLO 2 object). For more information about iLO 2 objects, see "Directory Services Objects" (page 189). At a minimum, create: • One role object that contains one or more users and one or more iLO 2 objects. • One iLO 2 object corresponding to each iLO 2 using the directory. Example: Creating and Configuring Directory Objects for Use with iLO 2 in Active Directory The following example shows how to set up roles and HP devices in an enterprise directory with the domain mpiso.com, which consists of two organizational units: Roles and MPs. NOTE: Roles, such as hpqTargets and so on, are for extended schema LDAP only. They are not used in schema-free LDAP. Assume that a company has an enterprise directory including the domain mpiso.com, arranged as shown in Figure 9-4. 186 Installing and Configuring Directory Services

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229

The Active Directory schema folder may need to be expanded for the checkbox to be available.
4.
Create a certificate or install Certificate Services. This step is necessary because iLO 2 uses
SSL to communicate with Active Directory.
5.
To specify that a certificate be issued to the server running Active Directory, do the following:
a.
Launch MMC on the server and add the default domain policy snap-in (Group policy
and browse to default domain policy object).
b.
Click
Computer Configuration>Windows Settings>Security Settings>Public Key
Policies
.
c.
Right-click
Automatic Certificate Requests Settings
, and select
New>Automatic
Certificate Request
.
d.
Using the wizard, select the domain controller template and the certificate authority
you want to use.
6.
Download the Smart Component that contains the installers for the schema extender and
the snap-ins. You can download the Smart Component from the HP website at
http://
www
.hp.com/go/integrityiLO
.
7.
Run the schema installer application to extend the schema, which extends the directory
schema with the proper HP objects.
The schema installer associates the Active Directory snap-ins with the new schema. The
snap-in installation setup utility is a Windows MSI setup script and runs anywhere MSI is
supported (Windows XP, Windows 2000, Windows 98). However, some parts of the schema
extension application require the .NET Framework, which you can download from the
Microsoft website at
http://www
.microsoft.com
.
Installing and Initializing Snap-Ins for Active Directory
Follow these steps to install the snap-ins and configure the directory service:
1.
To install the snap-ins, run the snap-in installation application.
2.
Configure the directory service with the appropriate objects and relationships for iLO 2
management:
a.
Use the management snap-ins from HP to create iLO 2 policy, admin, and user role
objects.
b.
Use the management snap-ins from HP to build associations between the iLO 2 object,
the policy object, and the role object.
c.
Point the iLO 2 object to the admin and user role objects (admin and user roles
automatically point back to the iLO 2 object).
For more information about iLO 2 objects, see
“Directory Services Objects” (page 189)
.
At a minimum, create:
One role object that contains one or more users and one or more iLO 2 objects.
One iLO 2 object corresponding to each iLO 2 using the directory.
Example: Creating and Configuring Directory Objects for Use with iLO 2 in Active
Directory
The following example shows how to set up roles and HP devices in an enterprise directory with
the domain
mpiso.com
, which consists of two organizational units: Roles and MPs.
NOTE:
Roles, such as hpqTargets and so on, are for extended schema LDAP only. They are not
used in schema-free LDAP.
Assume that a company has an enterprise directory including the domain mpiso.com, arranged
as shown in
Figure 9-4
.
186
Installing and Configuring Directory Services