4. In the Proxy server section, select the Use a proxy server for your LAN (These settings will not apply to dial-up or VPNconnections) option, and then click Advanced.5. In the Exceptions section, add the addresses for CMCs and iDRACs on the management network to the semicolon-separatedlist. You can use DNS names and wildcards in your entries.Mozilla FirefoxTo edit the exception list in Mozilla Firefox version 19.0:1. Start Mozilla Firefox.2. Click Tools → Options (for systems running on Windows), or click Edit → Preferences (for systems running on Linux).3. Click Advanced, and then click the Network tab.4. Click Settings.5. Select Manual Proxy Configuration.6. In the No Proxy for field, type the addresses for CMCs and iDRACs on the management network to the comma-separated list.You can use DNS names and wildcards in your entries.Configuring browser for Smart Card loginInternet Explorer — Make sure that the Internet browser is configured to download Active-X plug-ins.Configuring CMC SSO login or Smart Card login for Active Directoryusers using RACADMIn addition to the steps performed while configuring Active Directory, run the following command to enable SSO:racadm config -g cfgActiveDirectory -o cfgADSSOEnable 1In addition to the steps performed while configuring Active Directory, use the following objects to enable smart card login:• cfgSmartCardLogonEnable• cfgSmartCardCRLEnableConfiguring CMC SSO Or Smart Card Login For Active DirectoryUsers Using Web InterfaceTo configure Active Directory SSO or smart card login for CMC:NOTE: For information about the options, see theCMC for Dell PowerEdge FX2/FX2s Online Help.1. While configuring Active Directory to setup a user account, perform the following additional steps:• Upload the keytab file.• To enable SSO, select the Enable Single Sign-On option.• To enable smart card login, select the Enable Smart-Card Login option.NOTE: If these two options are selected, all command line out-of-band interfaces, including secure shell (SSH),Telnet, Serial, and remote RACADM remain unchanged .2. Click Apply.The settings are saved.You can test the Active Directory using Kerberos authentication using the RACADM command:testfeature -f adkrb -u @where <user> is a valid Active Directory user account.107