Users Guide
Role Groups Default Privilege Level Permissions Granted Bit Mask
Test Alerts, Execute Diagnostic
Commands
Role Group 2 None Log in to iDRAC, Congure
iDRAC, Execute Server Control
Commands, Access Virtual
Console, Access Virtual Media,
Test Alerts, Execute Diagnostic
Commands
0x000000f9
Role Group 3 None Log in to iDRAC 0x00000001
Role Group 4 None No assigned permissions 0x00000000
Role Group 5 None No assigned permissions 0x00000000
NOTE: The Bit Mask values are used only when setting Standard Schema with the RACADM.
Single domain versus multiple domain scenarios
If all the login users and role groups, including the nested groups, are in the same domain, then only the domain controllers’ addresses must
be congured on iDRAC. In this single domain scenario, any group type is supported.
If all the login users and role groups, or any of the nested groups, are from multiple domains, then Global Catalog server addresses must be
congured on iDRAC. In this multiple domain scenario, all the role groups and nested groups, if any, must be a Universal Group type.
Conguring Standard schema Active Directory
To congure iDRAC for an Active Directory login access:
1 On an Active Directory server (domain controller), open the Active Directory Users and Computers Snap-in.
2 Create a group or select an existing group. Add the Active Directory user as a member of the Active Directory group to access iDRAC.
3 Congure the group name, domain name, and the role privileges on iDRAC using the iDRAC web interface or RACADM.
Related link
Conguring Active Directory with Standard schema using iDRAC web interface
Conguring Active Directory with Standard schema using RACADM
Conguring Active Directory with Standard schema using iDRAC web
interface
NOTE
: For information about the various elds, see the
iDRAC Online
Help
.
1 In the iDRAC web interface, go to Overview > iDRAC Settings > User Authentication > Directory Services.
The Directory Service page is displayed.
2 Select the Microsoft Active Directory option and then click Apply.
The Active Directory Conguration and Management page is displayed.
3 Click Congure Active Directory.
The Active Directory Conguration and Management Step 1 of 4 page is displayed.
Conguring
user accounts and privileges 141