Installing And Initializing Snap-Ins For Active Directory; Example: Creating And Configuring Directory Objects For Use With Ilo 2 In Active Directory - HP Integrity BL870c Operation Manual

Hp integrity ilo 2 operations guide, eleventh edition
Hide thumbs Also See for Integrity BL870c:
Table of Contents

Advertisement

The Active Directory schema folder may need to be expanded for the checkbox to be available.
4.
Create a certificate or install Certificate Services. This step is necessary because iLO 2 uses
SSL to communicate with Active Directory.
5.
To specify that a certificate be issued to the server running Active Directory, do the following:
a.
Launch MMC on the server and add the default domain policy snap-in (Group policy
and browse to default domain policy object).
b.
Click Computer Configuration>Windows Settings>Security Settings>Public Key
Policies.
c.
Right-click Automatic Certificate Requests Settings, and select New>Automatic
Certificate Request.
d.
Using the wizard, select the domain controller template and the certificate authority
you want to use.
6.
Download the Smart Component that contains the installers for the schema extender and
the snap-ins. You can download the Smart Component from the HP website at
www.hp.com/go/integrityiLO.
7.
Run the schema installer application to extend the schema, which extends the directory
schema with the proper HP objects.
The schema installer associates the Active Directory snap-ins with the new schema. The
snap-in installation setup utility is a Windows MSI setup script and runs anywhere MSI is
supported (Windows XP, Windows 2000, Windows 98). However, some parts of the schema
extension application require the .NET Framework, which you can download from the
Microsoft website at http://www.microsoft.com.

Installing and Initializing Snap-Ins for Active Directory

Follow these steps to install the snap-ins and configure the directory service:
1.
To install the snap-ins, run the snap-in installation application.
2.
Configure the directory service with the appropriate objects and relationships for iLO 2
management:
a.
Use the management snap-ins from HP to create iLO 2 policy, admin, and user role
objects.
b.
Use the management snap-ins from HP to build associations between the iLO 2 object,
the policy object, and the role object.
c.
Point the iLO 2 object to the admin and user role objects (admin and user roles
automatically point back to the iLO 2 object).
For more information about iLO 2 objects, see
At a minimum, create:
One role object that contains one or more users and one or more iLO 2 objects.
One iLO 2 object corresponding to each iLO 2 using the directory.
Example: Creating and Configuring Directory Objects for Use with iLO 2 in Active
Directory
The following example shows how to set up roles and HP devices in an enterprise directory with
the domain mpiso.com, which consists of two organizational units: Roles and MPs.
NOTE:
Roles, such as hpqTargets and so on, are for extended schema LDAP only. They are not
used in schema-free LDAP.
Assume that a company has an enterprise directory including the domain mpiso.com, arranged
as shown in
Figure
186
Installing and Configuring Directory Services
9-4.
"Directory Services Objects" (page
http://
189).

Advertisement

Table of Contents
loading

Table of Contents