Users Guide

A null string of double quote characters ("") instructs CMC to remove the user conguration at the specied index and reset the user
conguration to the original factory defaults.
Enabling CMC User With Permissions
To enable a user with specic administrative permissions (role-based authority):
1 Locate an available user index using the command syntax:
racadm getconfig -g cfgUserAdmin -i <index>
2 Type the following commands with the new user name and password.
racadm config -g cfgUserAdmin -o
cfgUserAdminPrivilege -i <index> <user privilege bitmask value>
NOTE: For a list of valid bit mask values for specic user privileges, see the
Chassis Management Controller for Dell
PowerEdge M1000e RACADM Command Line Reference Guide
available at dell.com/support/manuals. The default privilege
value is 0, which indicates the user has no privileges enabled.
Conguring Active Directory Users
If your company uses the Microsoft Active Directory software, you can congure the software to provide access to CMC, allowing you to
add and control CMC user privileges to your existing users in your directory service. This is a licensed feature.
NOTE: Using Active Directory to recognize CMC users is supported on the Microsoft Windows 2000 and Windows Server 2003
operating systems. Active Directory over IPv6 and IPv4 is supported on Windows 2008.
You can congure user authentication through Active Directory to log in to the CMC. You can also provide role-based authority, which
enables an administrator to congure specic privileges for each user.
Supported Active Directory Authentication Mechanisms
You can use Active Directory to dene CMC user access using two methods:
Standard schema solution that uses Microsoft’s default Active Directory group objects only.
Extended schema solution that has customized Active Directory objects provided by Dell. All the access control objects are maintained
in Active Directory. It provides maximum exibility to congure user access on dierent CMCs with varying privilege levels.
Related links
Standard Schema Active Directory Overview
Extended Schema Active Directory Overview
Standard Schema Active Directory Overview
As shown in the following gure, using standard schema for Active Directory integration requires conguration on both Active Directory and
CMC.
142
Conguring User Accounts and Privileges