Users Guide

Table Of Contents
NOTE: If these two options are selected, all command line out-of-band interfaces, including secure shell (SSH),
Telnet, Serial, and remote RACADM remain unchanged .
2. Click Apply.
The settings are saved.
You can test the Active Directory using Kerberos authentication using the RACADM command:
testfeature -f adkrb -u <user>@<domain>
where <user> is a valid Active Directory user account.
A command success indicates that CMC is able to acquire Kerberos credentials and access the user's Active Directory
account. If the command is not successful, resolve the error and run the command again. For more information, see
the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide on dell.com/support/
manuals.
Uploading Keytab File
The Kerberos keytab file serves as the CMC's user name and password credentials to the Kerberos Data Center (KDC), which in
turns allows access to the Active Directory. Each CMC in the Kerberos realm must be registered with the Active Directory and
must have a unique keytab file.
You can upload a Kerberos Keytab generated on the associated Active Directory Server. You can generate the Kerberos Keytab
from the Active Directory Server by executing the ktpass.exe utility. This keytab establishes a trust relationship between the
Active Directory Server and CMC.
To upload the keytab file:
1. In the left pane, click Chassis Overview > User Authentication > Directory Services.
2. Select Microsoft Active Directory (Standard Schema).
3. In the Kerberos Keytab section, click Browse, select a keytab file, and click Upload.
When the upload is complete, a message is displayed indicating whether or not the keytab file is successfully uploaded.
Configuring CMC SSO Or Smart Card Login For Active Directory
Users Using RACADM
In addition to the steps performed while configuring Active Directory, run the following command to enable SSO:
racadm config -g cfgActiveDirectory -o cfgADSSOEnable 1
In addition to the steps performed while configuring Active Directory, use the following objects to enable smart card login:
cfgSmartCardLogonEnable
cfgSmartCardCRLEnable
138
Configuring CMC For Single Sign-On Or Smart Card Login