Users Guide
Using the DRAC 5 With Microsoft Active Directory 129
3
If DHCP is disabled on the DRAC 5 or you want to input your DNS IP
address, type following racadm commands:
racadm config -g cfgLanNetworking -o
cfgDNSServersFromDHCP 0
racadm config -g cfgLanNetworking -o cfgDNSServer1
<primary DNS IP address>
racadm config -g cfgLanNetworking -o cfgDNSServer2
<secondary DNS IP address>
Press Enter to complete the DRAC 5 Active Directory feature configuration.
Instead of DRAC 5 searching for Active Directory servers, you can specify the
servers DRAC 5 needs to connect to, to authenticate the user. See "Specify
Server for Active Directory Configuration" on page 131 for information on
RACADM commands to specify servers.
Accumulating Privileges Using Extended Schema
The Extended Schema Authentication mechanism supports Privilege
Accumulation from different privilege objects associated with the same user
through different Association Objects. In other words, Extended Schema
Authentication accumulates privileges to allow the user the super set of all
assigned privileges corresponding to the different privilege objects associated
with the same user.
Figure 6-5 provides an example of accumulating privileges using Extended
Schema.