Users Guide

Role Groups Default Privilege Level Permissions Granted Bit Mask
Test Alerts, Execute Diagnostic
Commands
Role Group 2 None Log in to iDRAC, Congure
iDRAC, Execute Server Control
Commands, Access Virtual
Console, Access Virtual Media,
Test Alerts, Execute Diagnostic
Commands
0x000000f9
Role Group 3 None Log in to iDRAC 0x00000001
Role Group 4 None No assigned permissions 0x00000000
Role Group 5 None No assigned permissions 0x00000000
NOTE: The Bit Mask values are used only when setting Standard Schema with the RACADM.
Single domain versus multiple domain scenarios
If all the login users and role groups, including the nested groups, are in the same domain, then only the domain controllers’ addresses must
be congured on iDRAC. In this single domain scenario, any group type is supported.
If all the login users and role groups, or any of the nested groups, are from multiple domains, then Global Catalog server addresses must be
congured on iDRAC. In this multiple domain scenario, all the role groups and nested groups, if any, must be a Universal Group type.
Conguring Standard schema Active Directory
To congure iDRAC for an Active Directory login access:
1 On an Active Directory server (domain controller), open the Active Directory Users and Computers Snap-in.
2 Create a group or select an existing group. Add the Active Directory user as a member of the Active Directory group to access iDRAC.
3 Congure the group name, domain name, and the role privileges on iDRAC using the iDRAC web interface or RACADM.
Related link
Conguring Active Directory with Standard schema using iDRAC web interface
Conguring Active Directory with Standard schema using RACADM
Conguring Active Directory with Standard schema using iDRAC web
interface
NOTE
: For information about the various elds, see the
iDRAC Online
Help
.
1 In the iDRAC web interface, go to Overview > iDRAC Settings > User Authentication > Directory Services.
The Directory Service page is displayed.
2 Select the Microsoft Active Directory option and then click Apply.
The Active Directory Conguration and Management page is displayed.
3 Click Congure Active Directory.
The Active Directory Conguration and Management Step 1 of 4 page is displayed.
Conguring
user accounts and privileges 141