|
address of the domain controller>racadm set iDRAC.ActiveDirectory.DomainController3 IPaddress of the domain controller>racadm set iDRAC.ActiveDirectory.GlobalCatalog1 address of the domain controller>racadm set iDRAC.ActiveDirectory.GlobalCatalog2 address of the domain controller>racadm set iDRAC.ActiveDirectory.GlobalCatalog3 address of the domain controller>• Enter the Fully Qualified Domain Name (FQDN) of the domain controller, not the FQDN of the domain. For example, enterservername.dell.com instead of dell.com.• For bit-mask values for specific Role Group permissions, see Default role group privileges.• You must provide at least one of the three domain controller addresses. iDRAC attempts to connect to each of theconfigured addresses one-by-one until it makes a successful connection. With Standard Schema, these are the addressesof the domain controllers where the user accounts and the role groups are located.• The Global Catalog server is only required for standard schema when the user accounts and role groups are in differentdomains. In multiple domain case, only the Universal Group can be used.• If certificate validation is enabled, the FQDN or IP address that you specify in this field must match the Subject or SubjectAlternative Name field of your domain controller certificate.• To disable the certificate validation during SSL handshake, use the following command:racadm set iDRAC.ActiveDirectory.CertValidationEnable 0In this case, no Certificate Authority (CA) certificate needs to be uploaded.• To enforce the certificate validation during SSL handshake (optional), use the following command:racadm set iDRAC.ActiveDirectory.CertValidationEnable 1In this case, you must upload the CA certificate using the following command:racadm sslcertupload -t 0x2 -f root CA certificate>NOTE: If certificate validation is enabled, specify the Domain Controller Server addresses and the GlobalCatalog FQDN. Ensure that DNS is configured correctly under Overview → iDRAC Settings → Network.Using the following RACADM command may be optional.racadm sslcertdownload -t 0x1 -f 2. If DHCP is enabled on iDRAC and you want to use the DNS provided by the DHCP server, enter the following command:racadm set iDRAC.IPv4.DNSFromDHCP 13. If DHCP is disabled on iDRAC or you want manually enter the DNS IP address, enter the following RACADM command:racadm set iDRAC.IPv4.DNSFromDHCP 0racadm set iDRAC.IPv4.DNSFromDHCP.DNS1 racadm set iDRAC.IPv4.DNSFromDHCP.DNS2 4. If you want to configure a list of user domains so that you only need to enter the user name when logging in to the webinterface, use the following command:racadm set iDRAC.UserDomain..Name the domain controller>You can configure up to 40 user domains with index numbers between 1 and 40.Extended schema Active Directory overviewUsing the extended schema solution requires the Active Directory schema extension.Best practices for extended schemaThe extended schema uses Dell association objects to join iDRAC and permission. This allows you to use iDRAC based on the overallpermissions granted. The default Access Control List (ACL) of Dell Association objects allows Self and Domain Administrators tomanage the permissions and scope of iDRAC objects.By default, the Dell Association objects do not inherit all permissions from the parent Active Directory objects. If you enableinheritance for the Dell Association object, the inherited permissions for that association object are granted to the selected usersand groups. This may result in unintended privileges being provided to the iDRAC.135
PreviousNext |