Users Guide
4. In the Proxy server section, select the Use a proxy server for your LAN (These settings will not apply to dial-up or VPN
connections) option, and then click Advanced.
5. In the Exceptions section, add the addresses for CMCs and iDRACs on the management network to the semicolon-separated
list. You can use DNS names and wildcards in your entries.
Mozilla Firefox
To edit the exception list in Mozilla Firefox version 19.0:
1. Start Mozilla Firefox.
2.
Click Tools → Options (for systems running on Windows), or click Edit → Preferences (for systems running on Linux).
3. Click Advanced, and then click the Network tab.
4. Click Settings.
5. Select Manual Proxy Conguration.
6. In the No Proxy for eld, type the addresses for CMCs and iDRACs on the management network to the comma-separated list.
You can use DNS names and wildcards in your entries.
Conguring browser for Smart Card login
Internet Explorer — Make sure that the Internet browser is congured to download Active-X plug-ins.
Conguring CMC SSO login or Smart Card login for Active Directory
users using RACADM
In addition to the steps performed while conguring Active Directory, run the following command to enable SSO:
racadm config -g cfgActiveDirectory -o cfgADSSOEnable 1
In addition to the steps performed while conguring Active Directory, use the following objects to enable smart card login:
• cfgSmartCardLogonEnable
• cfgSmartCardCRLEnable
Conguring CMC SSO Or Smart Card Login For Active Directory Users
Using Web Interface
To congure Active Directory SSO or smart card login for CMC:
NOTE: For information about the options, see the
CMC for Dell PowerEdge FX2/FX2s Online Help
.
1. While conguring Active Directory to setup a user account, perform the following additional steps:
• Upload the keytab le.
• To enable SSO, select the Enable Single Sign-On option.
• To enable smart card login, select the Enable Smart-Card Login option.
NOTE: If these two options are selected, all command line out-of-band interfaces, including secure shell (SSH),
Telnet, Serial, and remote RACADM remain unchanged .
2. Click Apply.
The settings are saved.
You can test the Active Directory using Kerberos authentication using the RACADM command:
testfeature -f adkrb -u <user>@<domain>
where <user> is a valid Active Directory user account.
107