Users Guide

Configuring E-Mail Alert Settings................................................................................................. 95
9 Configuring User Accounts and Privileges....................................................98
Types of Users.....................................................................................................................................98
Modifying Root User Administrator Account Settings.....................................................................102
Configuring Local Users................................................................................................................... 102
Configuring Local Users Using CMC Web Interface..................................................................102
Configure Local Users Using RACADM...................................................................................... 102
Configuring Active Directory Users..................................................................................................103
Supported Active Directory Authentication Mechanisms......................................................... 103
Standard Schema Active Directory Overview............................................................................ 104
Configuring Standard Schema Active Directory........................................................................ 105
Extended Schema Active Directory Overview........................................................................... 105
Configuring Extended Schema Active Directory....................................................................... 105
Configuring Generic LDAP Users..................................................................................................... 105
Configuring the Generic LDAP Directory to Access CMC........................................................ 105
Configuring Generic LDAP Directory Service Using CMC Web Interface................................ 105
Configuring Generic LDAP Directory Service Using RACADM..................................................106
10 Configuring CMC For Single Sign-On Or Smart Card Login..................108
System Requirements....................................................................................................................... 108
Client Systems.............................................................................................................................109
CMC.............................................................................................................................................109
Prerequisites For Single Sign-On Or Smart Card Login.................................................................. 109
Generating Kerberos Keytab File......................................................................................................109
Configuring CMC For Active Directory Schema.............................................................................. 110
Configuring Browser For SSO Login.................................................................................................110
Internet Explorer..........................................................................................................................110
Mozilla FireFox............................................................................................................................. 110
Configuring Browser For Smart Card Login.....................................................................................110
Configuring CMC SSO Login Or Smart Card Login For Active Directory Users Using RACADM... 111
Configuring CMC SSO Or Smart Card Login For Active Directory Users Using Web Interface..... 111
Uploading Keytab File........................................................................................................................ 111
Configuring CMC SSO Login Or Smart Card Login For Active Directory Users Using RACADM...112
11 Configuring CMC to Use Command Line Consoles................................. 113
CMC Command Line Console Features...........................................................................................113
CMC Command Line Interface Commands...............................................................................113
Using Telnet Console With CMC...................................................................................................... 114
Using SSH With CMC...................................................................................................................114
Supported SSH Cryptography Schemes..................................................................................... 114
Configure Public Key Authentication Over SSH......................................................................... 115