Users Guide
Role Group Default Privilege Level Permissions Granted Bit Mask
• User Conguration Administrator
• Clear Logs Administrator
• Chassis Control Administrator (Power Commands)
• Server Administrator
• Test Alert User
• Debug Command Administrator
• Fabric A Administrator
2 None
• CMC Login User
• Clear Logs Administrator
• Chassis Control Administrator (Power Commands)
• Server Administrator
• Test Alert User
• Fabric A Administrator
0x00000ed9
3 None CMC Login User 0x00000001
4 None No assigned permissions 0x00000000
5 None No assigned permissions 0x00000000
NOTE: The Bit Mask values are used only when setting Standard Schema with the RACADM.
NOTE: For more information about user privileges, see Types of Users.
Conguring standard schema Active Directory
To congure CMC for an Active Directory login access:
1. On an Active Directory server (domain controller), open Active Directory Users and Computers Snap-in.
2. Using the CMC Web interface or RACADM:
a. Create a group or select an existing group.
b. Congure the role privileges.
3. Add the Active Directory user as a member of the Active Directory group to access CMC.
Extended schema Active Directory overview
Using the extended schema solution requires the Active Directory schema extension.
Conguring extended schema Active Directory
To congure Active Directory to access CMC:
1. Extend the Active Directory schema.
2. Extend the Active Directory Users and Computers Snap-in.
3. Add CMC users and their privileges to Active Directory.
4. Enable SSL on each of your domain controllers.
5. Congure CMC Active Directory properties using CMC web interface or RACADM.
Conguring generic LDAP users
CMC provides a generic solution to support Lightweight Directory Access Protocol (LDAP)-based authentication. This feature does
not require any schema extension on your directory services.
102