HP Xw460c HP Integrated Lights-Out 2 User Guide for Firmware 1.75 and 1.77 - Page 53

Confirm Password-Verifies your LOM Object Password. If you alter the LOM Object Password

Page 53 highlights

• Directory Server Address-Enables you to specify the network DNS name or IP address of the directory server. You can specify multiple servers, separated by a comma (,) or space ( ). If Use Directory Default Schema is selected, enter a DNS name in the Directory Server Address field to allow authentication with user ID. For example: directory.hp.com 192.168.1.250, 192.168.1.251 • Directory Server LDAP Port-Specifies the port number for the secure LDAP service on the server. The default value for this port is 636. However, you can specify a different value if your directory service is configured to use a different port. • iLO 2 Directory Properties-Identifies the LOM object in the directory tree. This information is used to determine user access rights. You can configure iLO 2 with the password to the LOM object at this time however, this information is not used until directory configuration support is provided. • LOM Object Distinguished Name-Specifies where this LOM instance is listed in the directory tree. For example: cn=iLO 2 Mail Server,ou=Management Devices,o=hp User search contexts are not applied to the LOM Object Distinguished Name when accessing the directory server. • LOM Object Password-Specifies the password to the iLO 2 object that iLO 2 uses to verify the directory for updates (LOM Object Distinguished Name). • Confirm Password-Verifies your LOM Object Password. If you alter the LOM Object Password, reenter the new password in this field. • User Login Search Contexts enables you to specify common directory subcontexts so that users do not need to enter their full distinguished name at login. You can identify all objects listed in a directory using their unique distinguished names. However, distinguished names can be long and users might not know their distinguished names, or have accounts in different directory contexts. iLO 2 attempts to contact the directory service by distinguishing name, and then applies the search contexts in order until successful. Directory User Contexts specify user name contexts that are applied to the login name. Example 1: Instead of logging in as cn=user,ou=engineering,o=hp a search context of ou=engineering,o=hp allows login as user Example 2: If a system is managed by Information Management, Services, and Training, search contexts like: Directory User Context 1:ou=IM,o=hp Directory User Context 2:ou=Services,o=hp Directory User Context 3:ou=Training,o=hp Allow users in any of these organizations to log in using just their common names. If a user exists in both the IM organizational unit and the Training organizational unit, login is first attempted as cn=user,ou=IM,o=hp. Example 3 (Active Directory only): Microsoft Active Directory allows an alternate user credential format. Search contexts in this format cannot be tested except by successful login attempt. A user may login as: [email protected] in which case a search context of @domain.hp.com allows the user to login as user Configuring iLO 2 53

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235

Configuring iLO 2 53
Directory Server Address—Enables you to specify the network DNS name or IP address of the
directory server. You can specify multiple servers, separated by a comma (,) or space ( ). If Use
Directory Default Schema is selected, enter a DNS name in the Directory Server Address field to
allow authentication with user ID. For example:
directory.hp.com
192.168.1.250, 192.168.1.251
Directory Server LDAP Port—Specifies the port number for the secure LDAP service on the server. The
default value for this port is 636. However, you can specify a different value if your directory service
is configured to use a different port.
iLO 2 Directory Properties—Identifies the LOM object in the directory tree. This information is used to
determine user access rights. You can configure iLO 2 with the password to the LOM object at this
time however, this information is not used until directory configuration support is provided.
LOM Object Distinguished Name—Specifies where this LOM instance is listed in the directory tree.
For example: cn=iLO 2 Mail Server,ou=Management Devices,o=hp
User search contexts are not applied to the LOM Object Distinguished Name when accessing the
directory server.
LOM Object Password—Specifies the password to the iLO 2 object that iLO 2 uses to verify the
directory for updates (LOM Object Distinguished Name).
Confirm Password—Verifies your LOM Object Password. If you alter the LOM Object Password,
reenter the new password in this field.
User Login Search Contexts enables you to specify common directory subcontexts so that users do
not need to enter their full distinguished name at login.
You can identify all objects listed in a directory using their unique distinguished names. However,
distinguished names can be long and users might not know their distinguished names, or have
accounts in different directory contexts. iLO 2 attempts to contact the directory service by
distinguishing name, and then applies the search contexts in order until successful.
Directory User Contexts specify user name contexts that are applied to the login name.
Example 1:
Instead of logging in as cn=user,ou=engineering,o=hp a search context of
ou=engineering,o=hp
allows login as
user
Example 2:
If a system is managed by Information Management, Services, and Training, search contexts like:
Directory User Context 1:ou=IM,o=hp
Directory User Context 2:ou=Services,o=hp
Directory User Context 3:ou=Training,o=hp
Allow users in any of these organizations to log in using just their common names. If a user exists in
both the IM organizational unit and the Training organizational unit, login is first attempted as
cn=user,ou=IM,o=hp.
Example 3 (Active Directory only):
Microsoft Active Directory allows an alternate user credential format. Search contexts in this format
cannot be tested except by successful login attempt. A user may login as:
in which case a search context of
@domain.hp.com
allows the user to login as
user