Users Guide

Supported Active Directory authentication mechanisms
You can use Active Directory to dene iDRAC user access using two methods:
Standard schema solution, which uses Microsoft’s default Active Directory group objects only.
Extended schema solution, which has customized Active Directory objects. All the access control objects are maintained in Active
Directory. It provides maximum exibility to congure user access on dierent iDRACs with varying privilege levels.
Related link
Standard schema Active Directory overview
Extended schema Active Directory overview
Standard schema Active Directory overview
As shown in the following gure, using standard schema for Active Directory integration requires conguration on both Active Directory and
iDRAC.
Figure 1. Conguration of iDRAC with active directory standard schema
In Active Directory, a standard group object is used as a role group. A user who has iDRAC access is a member of the role group. To give
this user access to a specic iDRAC, the role group name and its domain name need to be congured on the specic iDRAC. The role and
the privilege level are dened on each iDRAC and not in the Active Directory. You can congure up to ve role groups in each iDRAC. Table
reference no shows the default role group privileges.
Table 22. Default role group privileges
Role Groups Default Privilege Level Permissions Granted Bit Mask
Role Group 1 None Log in to iDRAC, Congure
iDRAC, Congure Users, Clear
Logs, Execute Server Control
Commands, Access Virtual
Console, Access Virtual Media,
0x000001
140 Conguring user accounts and privileges