Users Guide

Table Of Contents
Using iDRAC6 Directory Service 155
Configuring Generic LDAP Directory Service Using iDRAC6 Web-Based
Interface
1
Open a supported Web browser window.
2
Log in to iDRAC6 Web-based interface.
3
Expand the
System
tree and click
Remote Access
iDRAC6
Network/Security
tab
Directory Service
Generic LDAP Directory
Service
.
4
The
Generic LDAP Configuration and Management
page displays the
current iDRAC6 generic LDAP settings. Scroll to the bottom of the
Generic LDAP Configuration and Management
page, and click
Configure Generic LDAP
.
NOTE: In this release, only Standard Schema Active Directory (SSAD)
without extensions is supported.
The
Step 1 of 3 Generic LDAP Configuration and Management
page is
displayed. Use this page to configure the digital certificate used during
initiation of SSL connections when communicating with a generic LDAP
server. These communications use LDAP over SSL (LDAPS). If you enable
certificate validation, upload the certificate of the Certificate Authority
(CA) that issued the certificate used by the LDAP server during initiation
of SSL connections. The CA's certificate is used to validate the
authenticity of the certificate provided by the LDAP server during SSL
initiation.
NOTE: In this release, non-SSL port based LDAP bind is not supported. Only
LDAP over SSL is supported.
5
Under
Certificate Settings
, check
Enable Certificate Validation
to enable
certificate validation. If enabled, iDRAC6 uses the CA certificate to
validate the LDAP server certificate during Secure Socket Layer (SSL)
handshake; if disabled, iDRAC6 skips the certificate validation step of the
SSL handshake. You can disable certificate validation during testing or if
your system administrator chooses to trust the domain controllers in the
security boundary without validating their SSL certificates.