Users Guide

cfgDNSServer1 <primary DNS IP address>
racadm config -g cfgLanNetworking -o
cfgDNSServer2 <secondary DNS IP address>
The Extended Schema feature configuration is complete.
Configuring Generic LDAP Users
CMC provides a generic solution to support Lightweight Directory Access Protocol (LDAP)-based
authentication. This feature does not require any schema extension on your directory services.
A CMC administrator can now integrate the LDAP server user logins with CMC. This integration requires
configuration on both LDAP server and CMC. On the LDAP server, a standard group object is used as a
role group. A user who has CMC access becomes a member of the role group. Privileges are still stored
on CMC for authorization similar to the working of the Standard Schema setup with Active Directory
support.
To enable the LDAP user to access a specific CMC card, the role group name and its domain name must
be configured on the specific CMC card. You can configure a maximum of five role groups in each CMC.
A user has the option to be added to multiple groups within the directory service. If a user is a member of
multiple groups, then the user obtains the privileges of all their groups.
For information about the privileges level of the role groups and the default role group settings, see Types
of Users.
The following figure illustrates configuration of CMC with Generic LDAP.
Figure 2. Configuration of CMC with Generic LDAP
Configuring the Generic LDAP Directory to Access CMC
The CMC's Generic LDAP implementation uses two phases in granting access to a user—user
authentication and then user authorization.
169