Users Guide

Role Group Default Privilege Level Permissions Granted Bit Mask
User Conguration Administrator
Clear Logs Administrator
Chassis Control Administrator (Power Commands)
Server Administrator
Test Alert User
Debug Command Administrator
Fabric A Administrator
2 None
CMC Login User
Clear Logs Administrator
Chassis Control Administrator (Power Commands)
Server Administrator
Test Alert User
Fabric A Administrator
0x00000ed9
3 None CMC Login User 0x00000001
4 None No assigned permissions 0x00000000
5 None No assigned permissions 0x00000000
NOTE: The Bit Mask values are used only when setting Standard Schema with the RACADM.
NOTE: For more information about user privileges, see Types of Users.
Conguring standard schema Active Directory
To congure CMC for an Active Directory login access:
1. On an Active Directory server (domain controller), open Active Directory Users and Computers Snap-in.
2. Using the CMC Web interface or RACADM:
a. Create a group or select an existing group.
b. Congure the role privileges.
3. Add the Active Directory user as a member of the Active Directory group to access CMC.
Extended schema Active Directory overview
Using the extended schema solution requires the Active Directory schema extension.
Conguring extended schema Active Directory
To congure Active Directory to access CMC:
1. Extend the Active Directory schema.
2. Extend the Active Directory Users and Computers Snap-in.
3. Add CMC users and their privileges to Active Directory.
4. Enable SSL on each of your domain controllers.
5. Congure CMC Active Directory properties using CMC web interface or RACADM.
Conguring generic LDAP users
CMC provides a generic solution to support Lightweight Directory Access Protocol (LDAP)-based authentication. This feature does
not require any schema extension on your directory services.
102