Disabling CMC UserWhen using RACADM, users must be disabled manually on an individual-basis. Users cannot be deleted using aconfiguration file.To delete a CMC user, the command syntax is:racadm config -g cfgUserAdmin -o cfgUserAdminUserName-i ""racadm config -g cfgUserAdmin -i 2 -ocfgUserAdminPrivilege 0x0A null string of double quotation marks ("") instructs CMC to remove the user configuration at the specified index, andthen reset the user configuration to the factory default values.Enabling CMC User With PermissionsTo enable a user with specific administrative permissions (role-based authority):1. Locate an available user index using the command syntax:racadm getconfig -g cfgUserAdmin -i 2. Type the following commands with the new user name and password.racadm config -g cfgUserAdmin -ocfgUserAdminPrivilege -i privilege bitmask value>NOTE: For a list of valid bit mask values for specific user privileges, see theChassis Management Controllerfor PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/manuals. Thedefault privilege value is 0, which indicates the user does not has any privileges enabled.Configuring Active Directory UsersIf your company uses the Microsoft Active Directory software, you can configure the software to provide access toCMC, allowing you to add and control CMC user privileges to your existing users in your directory service. This is alicensed feature.NOTE: On the following Operating Systems, you can recognize the users of CMC users by using Active Directory.• Microsoft Windows 2000• Microsoft Windows Server 2003• Microsoft Windows Server 2008You can configure user authentication through Active Directory to log in to the CMC. You can also provide role-basedauthority, which enables an administrator to configure specific privileges for each user.Supported Active Directory Authentication MechanismsYou can use Active Directory to define CMC user access using two methods:•Standard schema solution that uses Microsoft’s default Active Directory group objects only.•Extended schema solution that has customized Active Directory objects provided by Dell. All the access controlobjects are maintained in Active Directory. It provides maximum flexibility to configure user access on differentCMCs with varying privilege levels.103