Users Guide

Table Of Contents
NOTE: The firmware versions of USC, Diagnostics, OS Drive, RAID devices, and NIC devices of servers are not available
if:
The server belongs to the 10th generation of PowerEdge servers. These servers do not support Lifecycle Controller.
The server belongs to the 11th generation of PowerEdge servers, but the iDRAC firmware does not support Lifecycle
Controller.
The CMC firmware version of a member chassis is earlier to version 4.45. In this case, the components of all the
servers in this chassis are not displayed, even if the servers support Lifecycle Controller.
Obtaining Certificates
The following table lists the types of certificates based on the login type.
Table 17. Types of Login and Certificate
Login Type Certificate Type How to Obtain
Single Sign-on using
Active Directory
Trusted CA certificate Generate a CSR and get it signed from a Certificate Authority.
Smart Card login as
Active Directory user
User certificate
Trusted CA certificate
User Certificate Export the smart card user certificate as Base64-
encoded file using the card management software provided by the
smart card vendor.
Trusted CA certificate This certificate is issued by a CA.
Active Directory user
login
Trusted CA certificate This certificate is issued by a CA.
Local User login SSL Certificate Generate a CSR and get it signed from a trusted CA.
NOTE: CMC ships with a default self-signed SSL server certificate.
The CMC Web server and Virtual Console use this certificate.
Related concepts
Secure Sockets Layer Server Certificates on page 86
Secure Sockets Layer Server Certificates
CMC includes a Web server that is configured to use the industry-standard Secure Sockets Layer (SSL) security protocol
to transfer encrypted data over the Internet. Built upon public-key and private-key encryption technology, SSL is a widely
accepted technique for providing authenticated and encrypted communication between clients and servers to prevent
eavesdropping across a network.
SSL allows an SSL-enabled system to perform the following tasks:
Authenticate itself to an SSL-enabled client.
Allow the client to authenticate itself to the server.
Allow both systems to establish an encrypted connection.
This encryption process provides a high level of data protection. CMC employs the 128-bit SSL encryption standard, the most
secure form of encryption generally available for Internet browsers in North America.
The CMC Web server includes a Dell self-signed SSL digital certificate (Server ID). To ensure high security over the Internet,
replace the Web server SSL certificate by submitting a request to CMC to generate a new Certificate Signing Request (CSR).
At boot time, a new self-signed certificate is generated if:
A custom certificate is not present
A self-signed certificate is not present
The self-signed certificate is corrupt
The self-signed certificate is expired (within 30 day window)
The self-signed certificate displays the common name as <cmcname.domain-name> where cmcname is the CMC host name and
domain-name is the domain name. If domain name is not available it displays only the Partially Qualified Domain Name (PQDN),
which is the CMC host name.
86
Configuring CMC