Users Guide

To enable SNMP v3 authentication for a user, use SNMPv3AuthenticationType, SNMPv3Enable, SNMPv3PrivacyType objects.
For more information, see the RACADM Command Line Interface Guide available at dell.com/idracmanuals.
If you use the conguration XML le, use the AuthenticationProtocol, ProtocolEnable, and PrivacyProtocol attributes to enable
SNMPv3 authentication.
Adding iDRAC user using RACADM
1. Set the index and user name.
racadm set idrac.users.<index>.username <user_name>
Parameter Description
<index> Unique index of the user
<user_name> User name
2. Set the password.
racadm set idrac.users.<index>.password <password>
3. Set the user privileges.
For more information, see the iDRAC RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals.
4. Enable the user.
racadm set.idrac.users.<index>.enable 1
To verify, use the following command:
racadm get idrac.users.<index>
For more information, see the iDRAC RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals.
Enabling iDRAC user with permissions
To enable a user with specic administrative permissions (role-based authority):
1. Locate an available user index.
racadm get iDRAC.Users <index>
2. Type the following commands with the new user name and password.
racadm set iDRAC.Users.<index>.Privilege <user privilege bit mask value>
NOTE: The default privilege value is 0, which indicates the user has no privileges enabled. For a list of valid bit-mask
values for specic user privileges, see the
iDRAC RACADM Command Line Interface Reference Guide
available at
dell.com/idracmanuals.
Conguring Active Directory users
If your company uses the Microsoft Active Directory software, you can congure the software to provide access to iDRAC, allowing
you to add and control iDRAC user privileges to your existing users in your directory service. This is a licensed feature.
NOTE: Using Active Directory to recognize iDRAC users is supported on the Microsoft Windows 2000, Windows Server
2003, and Windows Server 2008 operating systems.
You can congure user authentication through Active Directory to log in to the iDRAC. You can also provide role-based authority,
which enables an administrator to congure specic privileges for each user.
The iDRAC role and privilege names have changed from earlier generation of servers. The role names are:
128