PowerEdge: How to Configure Active Directory in IDRAC9 using RACADM
Summary: The following document provides an example of how to Configure Active Directory in IDRAC9 using RACADM command.
Instructions
The following steps can be performed on an SSH session to the DRAC, using local RACADM or remote RACADM.
Pre-configuration Steps:
Check if AD has ever been configured. This is for reference only to get an idea of what they configured or may have missed.
Obtain Active Directory information to check what settings were placed for the domain controller and Global Catalog.
racadm get IDRAC.ActiveDirectory.DomainController1
racadm get IDRAC.ActiveDirectory.DomainController2
racadm get IDRAC.ActiveDirectory.GlobalCatalog1
racadm get IDRAC.ActiveDirectory.GlobalCatalog2
Obtain Group information and check if an Active Directory group has been configured.
racadm get IDRAC.ADGroup.1.Name
racadm get iDRAC.UserDomain.1
Configuration steps:
These steps overwrite any settings that were found above. The sample commands have an example domain controller Computer Name " dc1.sysman.Local" which is also the DNS/Global Catalog Server, using an example domain "Sysman.local." In most instances, the domain name is the same as the global catalog server as the DC server.
Configure Active Directory Domain Information.
- Enable AD
/admin1-> racadm set IDRAC.ActiveDirectory.Enable 1 [Key=IDRAC.Embedded.1#ActiveDirectory.1] Object value modified successfully - Specify DC;
/admin1-> racadm set IDRAC.ActiveDirectory.DomainController1 dc1.Sysman.local [Key=IDRAC.Embedded.1#ActiveDirectory.1] Object value modified successfully - Specify Global Catalog
/admin1-> racadm set IDRAC.ActiveDirectory.GlobalCatalog1 dc1.Sysman.local [Key=IDRAC.Embedded.1#ActiveDirectory.1] Object value modified successfully
Configure Standard Schema.
- Standard Schema Setting
#racadm set iDRAC.ActiveDirectory.Schema 2 [Key=iDRAC.Embedded.1#ActiveDirectory.1] Object value modified successfully
Configure Standard Schema Settings (group)
- Specify Group from AD
#racadm set IDRAC.ADGroup.1.Name "Domain Admins" [Key=IDRAC.Embedded.1#ADGroup.1] Object value modified successfully - Specify Domain of Group
#racadm set IDRAC.ADGroup.1.Domain Sysman.local [Key=IDRAC.Embedded.1#ADGroup.1] Object value modified successfully - Set Admin privilege level
#racadm set iDRAC.ADGroup.1.Privilege 0x1ff [Key=iDRAC.Embedded.1#ADGroup.1] Object value modified successfully - Set user Domain (Displays on main login page)
#set iDRAC.userdomain.1.name sysman.local [Key=iDRAC.Embedded.1#UserDomain.1] Object value modified successfully
Additional Setting: Cert Validation
If the environment requires an AD cert:
/admin-> racadm -config -g cfgActiveDirectory -o cfgADCertValidationEnable 1
Possible failure scenarios:
- IDRAC is on the same Network as domain controller
- Ensure that a DNS IP is present for the DRAC network settings (to find the domain controller)
- Register DRAC on DNS
- Run the test on DRAC Web User Interface under Directory Services
- The group Name for the user in the IDRAC AD configuration requires the same capitalization as the Group Name as listed in Active Directory on the domain controller server.
Optional:
Change the root account password so that users can leverage AD credentials.