PowerEdge: Cómo configurar Active Directory en IDRAC9 mediante RACADM

Summary: En el siguiente documento, se proporciona un ejemplo de cómo configurar Active Directory en IDRAC9 mediante el comando RACADM.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Instructions

Los siguientes pasos se pueden realizar en una sesión SSH a DRAC mediante el uso de RACADM o remoto RACADM.


Pasos previos a la configuración:

Compruebe si alguna vez se configuró AD. Esto es solo como referencia para tener una idea de lo que configuraron o pueden haber pasado por alto. 

Obtenga información de Active Directory para comprobar qué ajustes se colocaron para la controladora de dominio y el catálogo global. 

racadm get IDRAC.ActiveDirectory.DomainController1
racadm get IDRAC.ActiveDirectory.DomainController2
racadm get IDRAC.ActiveDirectory.GlobalCatalog1
racadm get IDRAC.ActiveDirectory.GlobalCatalog2

Obtenga información del grupo y compruebe si se configuró un grupo de Active Directory.

racadm get IDRAC.ADGroup.1.Name
racadm get iDRAC.UserDomain.1
 

Pasos de configuración:

Estos pasos sobrescriben cualquier ajuste que se haya encontrado anteriormente. Los comandos de ejemplo tienen un nombre de computadora de la controladora de dominio de ejemplo "dc1.sysman.Local", que también es el servidor de catálogo global/DNS, utilizando un dominio de ejemplo "Sysman.local”. En la mayoría de los casos, el nombre de dominio es el mismo que el del servidor de catálogo global que el servidor de DC.   

Configurar la información del dominio de Active Directory.

  1. Habilitar AD
    /admin1-> racadm set IDRAC.ActiveDirectory.Enable 1
    [Key=IDRAC.Embedded.1#ActiveDirectory.1]
    Object value modified successfully
  2. Especifique DC;
    /admin1-> racadm set IDRAC.ActiveDirectory.DomainController1 dc1.Sysman.local
    [Key=IDRAC.Embedded.1#ActiveDirectory.1]
    Object value modified successfully
  3.  Especificar catálogo global
    /admin1-> racadm set IDRAC.ActiveDirectory.GlobalCatalog1 dc1.Sysman.local
    [Key=IDRAC.Embedded.1#ActiveDirectory.1]
    Object value modified successfully
     

Configurar el esquema estándar.

  1. Configuración de esquema estándar
    #racadm set iDRAC.ActiveDirectory.Schema 2 [Key=iDRAC.Embedded.1#ActiveDirectory.1] Object value modified successfully

Configurar los ajustes del esquema estándar (grupo)

  1. Especificar grupo desde AD
    #racadm set IDRAC.ADGroup.1.Name "Domain Admins"
    [Key=IDRAC.Embedded.1#ADGroup.1]
    Object value modified successfully
  2. Especificar el dominio del grupo
    #racadm set IDRAC.ADGroup.1.Domain Sysman.local
    [Key=IDRAC.Embedded.1#ADGroup.1]
    Object value modified successfully
  3. Establecer nivel de privilegio de administrador
    #racadm set iDRAC.ADGroup.1.Privilege 0x1ff
    [Key=iDRAC.Embedded.1#ADGroup.1]
    Object value modified successfully
     
     
  4. Establecer dominio de usuario (se muestra en la página de inicio de sesión principal)
    #set iDRAC.userdomain.1.name sysman.local
    [Key=iDRAC.Embedded.1#UserDomain.1]
    Object value modified successfully

Configuración adicional: Validación del certificado

Si el entorno requiere un certificado de AD:

/admin-> racadm -config -g cfgActiveDirectory -o cfgADCertValidationEnable 1

 

Posibles escenarios de falla:

  • IDRAC está en la misma red que la controladora de dominio
  • Asegúrese de que haya una IP de DNS presente para la configuración de red de DRAC (para encontrar la controladora de dominio)
  • Registrar DRAC en DNS
  • Ejecute la prueba en la interfaz de usuario web de DRAC en Servicios de directorio 
  • El nombre de grupo para el usuario en la configuración de AD de iDRAC requiere el mismo uso de mayúsculas que el nombre de grupo que aparece en Active Directory en el servidor de la controladora de dominio.

Opcional:
cambie la contraseña de la cuenta raíz para que los usuarios puedan aprovechar las credenciales de AD.

 

Affected Products

iDRAC9, iDRAC9 - 3.0x Series, iDRAC9 - 3.1x Series, iDRAC9 - 3.2x Series, iDRAC9 - 3.3x Series, iDRAC9 - 3.4x Series

Products

iDRAC9 - 4.xx Series, iDRAC9 - 5.xx Series, iDRAC9 - 6.xx Series, iDRAC9 - 7.xx Series, PowerEdge XR2, Poweredge C4140, PowerEdge C6400, PowerEdge C6420, PowerEdge C6520, PowerEdge C6525, PowerEdge C6600, PowerEdge C6615, PowerEdge C6620 , PowerEdge FC640, PowerEdge HS5610, PowerEdge HS5620, PowerEdge M640, PowerEdge M640 (for PE VRTX), PowerEdge MX5016s, PowerEdge MX7000, PowerEdge MX740C, PowerEdge MX750c, PowerEdge MX760c, PowerEdge MX840C, PowerEdge R240, PowerEdge R250, PowerEdge R260, PowerEdge R340, PowerEdge R350, PowerEdge R360, PowerEdge R440, PowerEdge R450, PowerEdge R540, PowerEdge R550, PowerEdge R640, PowerEdge R6415, PowerEdge R650, PowerEdge R650xs, PowerEdge R6515, PowerEdge R6525, PowerEdge R660, PowerEdge R660xs, PowerEdge R6615, PowerEdge R6625, PowerEdge R740, PowerEdge R740XD, PowerEdge R740XD2, PowerEdge R7415, PowerEdge R7425, PowerEdge R750, PowerEdge R750XA, PowerEdge R750xs, PowerEdge R7515, PowerEdge R7525, PowerEdge R760, PowerEdge R760XA, PowerEdge R760xd2, PowerEdge R760xs, PowerEdge R7615, PowerEdge R7625, PowerEdge R840, PowerEdge R860, PowerEdge R940, PowerEdge R940xa, PowerEdge R960, PowerEdge T140, PowerEdge T150, PowerEdge T160, PowerEdge T340, PowerEdge T350, PowerEdge T360, PowerEdge T40, PowerEdge T440, PowerEdge T550, PowerEdge T560, PowerEdge T640, PowerEdge XE2420, PowerEdge XE7100, PowerEdge XE7420, PowerEdge XE7440, PowerEdge XE8545, PowerEdge XE8640, PowerEdge XE9640, PowerEdge XE9680, PowerEdge XR11, PowerEdge XR12, PowerEdge XR4000r, PowerEdge XR4000w, PowerEdge XR4000z, PowerEdge XR4510c, PowerEdge XR4520c, PowerEdge XR5610, PowerEdge XR7620, PowerEdge XR8000r, PowerEdge XR8610t, PowerEdge XR8620t ...
Article Properties
Article Number: 000201671
Article Type: How To
Last Modified: 18 Feb 2025
Version:  3
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.