Users Guide

If DHCP is enabled on CMC and you want to use the DNS address obtained automatically by the
DHCP server, type the following command:
racadm config -g cfgLanNetworking -o
cfgDNSServersFromDHCP 1
If DHCP is disabled on CMC, or if DHCP is enabled but you want to specify your DNS IP address
manually, type following commands:
racadm config -g cfgLanNetworking -o
cfgDNSServersFromDHCP 0
racadm config -g cfgLanNetworking -o
cfgDNSServer1 <primary DNS IP address>
racadm config -g cfgLanNetworking -o
cfgDNSServer2 <secondary DNS IP address>
The Extended Schema feature configuration is complete.
Configuring Generic LDAP Users
CMC provides a generic solution to support Lightweight Directory Access Protocol (LDAP)-based
authentication. This feature does not require any schema extension on your directory services.
A CMC administrator can now integrate the LDAP server user logins with CMC. This integration requires
configuration on both LDAP server and CMC. On the LDAP server, a standard group object is used as a
role group. A user who has CMC access becomes a member of the role group. Privileges are still stored
on CMC for authorization similar to the working of the Standard Schema setup with Active Directory
support.
To enable the LDAP user to access a specific CMC card, the role group name and its domain name must
be configured on the specific CMC card. You can configure a maximum of five role groups in each CMC.
A user has the option to be added to multiple groups within the directory service. If a user is a member of
multiple groups, then the user obtains the privileges of all their groups.
For information about the privileges level of the role groups and the default role group settings, see Types
of Users.
The following figure illustrates configuration of CMC with Generic LDAP.
156