Configuring
Active Directory With Standard Schema Using RACADM
To configure
iDRAC Active Directory with Standard Schema using the RACADM:
At the racadm command prompt, run the following commands:
Using config command:
racadm config -g cfgActiveDirectory -o cfgADEnable 1
racadm config -g cfgActiveDirectory -o cfgADType 2
racadm config -g cfgStandardSchema -i <index> -o cfgSSADRoleGroupName <common name of the role group>
racadm config -g cfgStandardSchema -i <index> -o cfgSSADRoleGroupDomain <fully qualified domain name>
racadm config -g cfgStandardSchema -i <index> -o cfgSSADRoleGroupPrivilege <Bit Mask Value for specific RoleGroup permissions>
racadm config -g cfgActiveDirectory -o cfgADDomainController1 <fully qualified domain name or IP address of the domain controller>
racadm config -g cfgActiveDirectory -o cfgADDomainController2 <fully qualified domain name or IP address of the domain controller>
racadm config -g cfgActiveDirectory -o cfgADDomainController3 <fully qualified domain name or IP address of the domain controller>
racadm config -g cfgActiveDirectory -o cfgADGlobalCatalog1 <fully qualified domain name or IP address of the domain controller>
racadm config -g cfgActiveDirectory -o cfgADGlobalCatalog2 <fully qualified domain name or IP address of the domain controller>
racadm config -g cfgActiveDirectory -o cfgADGlobalCatalog3 <fully qualified domain name or IP address of the domain controller>
Using set command:
racadm set iDRAC.ActiveDirectory.Enable 1
racadm set iDRAC.ActiveDirectory.Schema 2
racadm set iDRAC.ADGroup.Name <common name of the role group>
racadm set iDRAC.ADGroup.Domain <fully qualified domain name>
racadm set iDRAC.ADGroup.Privilege <Bit Mask Value for specific RoleGroup permissions>
racadm set iDRAC.ActiveDirectory.DomainController1 <fully qualified domain name or IP address of the domain controller>
racadm set iDRAC.ActiveDirectory.DomainController2 <fully qualified domain name or IP address of the domain controller>
racadm set iDRAC.ActiveDirectory.DomainController3 <fully qualified domain name or IP address of the domain controller>
racadm set iDRAC.ActiveDirectory.GlobalCatalog1 <fully qualified domain name or IP address of the domain controller>
racadm set iDRAC.ActiveDirectory.GlobalCatalog2 <fully qualified domain name or IP address of the domain controller>
racadm set iDRAC.ActiveDirectory.GlobalCatalog3 <fully qualified domain name or IP address of the domain controller>
Enter the FQDN of the
domain controller, not the FQDN of the domain. For example, enter servername.dell.com instead of dell.com.
At least one of the three addresses is required to be configured.
iDRAC attempts to connect to each of the configured addresses one-by-one
until it makes a successful connection. With Standard Schema, these
are the addresses of the domain controllers where the user accounts
and the role groups are located.
The Global Catalog server is
only required for standard schema when the user accounts and role
groups are in different domains. In multiple domain case, only the
Universal Group can be used.
The FQDN or IP address that you
specify in this field should match the Subject or Subject Alternative
Name field of your domain controller certificate if you have certificate
validation enabled.
If you want to disable the certificate validation during SSL
handshake, enter the following RACADM command:
Using config command: racadm config
-g cfgActiveDirectory -o cfgADCertValidationEnable 0
Using set command: racadm set iDRAC.ActiveDirectory.CertValidationEnable
0
In this case, no Certificate Authority (CA) certificate
needs to be uploaded.
To enforce the certificate validation
during SSL handshake (optional):
Using config command: racadm config
-g cfgActiveDirectory -o cfgADCertValidationEnable 1
Using set command: racadm set iDRAC.ActiveDirectory.CertValidationEnable
1
In this case, you must upload the CA certificate using
the following RACADM command:
racadm sslcertupload
-t 0x2 -f <ADS root CA certificate>
NOTE If certificate validation
is enabled, specify the Domain Controller Server addresses and the
Global Catalog FQDN. Make sure that DNS is configured correctly under Overview > iDRAC Settings > Network.
Using the
following RACADM command may be optional.
If DHCP is enabled on iDRAC and you want to use the DNS
provided by the DHCP server, enter the following RACADM commands:
Using config command: racadm config
-g cfgLanNetworking -o cfgDNSServersFromDHCP 1
Using set command: racadm set iDRAC.IPv4.DNSFromDHCP
1
If DHCP is disabled on iDRAC or you want manually input
the DNS IP address, enter the following RACADM commands:
Using config command:
racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 0
racadm config -g cfgLanNetworking -o cfgDNSServer1 <primary DNS IP address>
racadm config -g cfgLanNetworking -o cfgDNSServer2 <secondary DNS IP address>
Using set command:
racadm set iDRAC.IPv4.DNSFromDHCP 0
racadm set iDRAC.IPv4.DNSFromDHCP.DNS1 <primary DNS IP address>
racadm set iDRAC.IPv4.DNSFromDHCP.DNS2 <secondary DNS IP address>
If you want to configure a list of user domains so that
you only need to enter the user name when logging in to the Web interface,
enter the following command:
Using config command: racadm config
-g cfgUserDomain -o cfgUserDomainName <fully qualified domain name
or IP Address of the domain controller> -i <index>
Using set command: racadm set iDRAC.UserDomain.<index>.Name
<fully qualified domain name or IP Address of the domain controller>
You can configure up to 40 user domains with index numbers
between 1 and 40.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\