Dell PS-M4110 User Manual page 125

Firmware version 4.3
Hide thumbs Also See for PS-M4110:
Table of Contents

Advertisement

5.
In the Extended Schema Settings section, enter the CMC device name and the domain name.
6.
If you have enabled certificate validation, you must upload the domain forest root certificate authority-signed
certificate to CMC. In the Manage Certificates section, type the file path of the certificate or browse to the
certificate file. Click Upload to upload the file to CMC.
NOTE: The File Path value displays the relative file path of the certificate you are uploading. You must
type the absolute file path, which includes the full path and the complete file name and file extension.
The SSL certificates for the domain controllers must be signed by the root certificate authority-signed certificate.
The root certificate authority-signed certificate must be available on the management station accessing CMC.
CAUTION: SSL certificate validation is required by default. Disabling this certificate is risky.
7.
If you have enabled Single Sign-On (SSO), in the Kerberos Keytab section, click Browse, specify the keytab file and
click Upload. When the upload is complete, a message is displayed indicating a successful or failed upload.
8.
Click Apply. The CMC Web server automatically restarts after you click Apply.
9.
Log in to the CMC Web interface.
10. Select Chassis in the system tree, click the Network tab, then click the Network subtab. The Network Configuration
page is displayed.
11. If Use DHCP for CMC Network Interface IP Address, is enabled, do one of the following:
Select Use DHCP to Obtain DNS Server Addressesto enable the DNS server addresses to be obtained
automatically by the DHCP server.
Manually configure a DNS server IP address by leaving the Use DHCP to Obtain DNS Server Addresses
check box unchecked and then typing your primary and alternate DNS server IP addresses in the fields
provided.
12. Click Apply Changes. The Active Directory settings for extended schema is configured.
Configuring Active Directory With Extended Schema Using RACADM
To configure the CMC Active Directory with Extended Schema using the RACADM:
1.
Open a serial/Telnet/SSH text console to CMC, log in, and type:
racadm config -g cfgActiveDirectory -o cfgADEnable 1
racadm config -g cfgActiveDirectory -o cfgADType 1
racadm config -g cfgActiveDirectory -o
cfgADRacDomain <fully qualified CMC domain name>
racadm config -g cfgActiveDirectory -o
cfgADRootDomain <fully qualified root domain name>
racadm config -g cfgActiveDirectory -o
cfgADRacName <CMC common name>
racadm sslcertupload -t 0x2 -f <ADS root CA
certificate> -r
racadm sslcertdownload -t 0x1 -f <CMC SSL certificate>
NOTE: You can use this command through remote RACADM only. For more information on remote RACADM,
RACADM Command Line Reference Guide for iDRAC7 and CMC .
see
Optional: If you want to specify an LDAP or Global Catalog server instead of using the servers returned by the DNS
server to search for a user name, type the following command to enable the Specify Server option:
racadm config -g cfgActiveDirectory -o
cfgADSpecifyServerEnable 1
NOTE: When you use the Specify Server option, the host name in the certificate authority-signed certificate is
not matched against the name of the specified server. This is particularly useful if you are a CMC
administrator, because it enables you to enter a host name as well as an IP address.
125

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Chassis management controller

Table of Contents