Users Guide
If the Active Directory Server is set to authenticate the client during an SSL session initialization phase, you need to upload iDRAC
Server certicate to the Active Directory Domain controller. This additional step is not required if the Active Directory does not
perform a client authentication during an SSL session’s initialization phase.
NOTE: If your system is running Windows 2000, the following steps may vary.
NOTE: If iDRAC rmware SSL certicate is CA-signed and the certicate of that CA is already in the domain controller's
Trusted Root Certicate Authority list, do not perform the steps in this section.
To import iDRAC rmware SSL certicate to all domain controller trusted certicate lists:
1. Download iDRAC SSL certicate using the following RACADM command:
racadm sslcertdownload -t 0x1 -f <RAC SSL certificate>
2. On the domain controller, open an MMC Console window and select Certicates → Trusted Root Certication Authorities.
3. Right-click Certicates, select All Tasks and click Import.
4. Click Next and browse to the SSL certicate le.
5. Install iDRAC SSL Certicate in each domain controller’s Trusted Root Certication Authority.
If you have installed your own certicate, make sure that the CA signing your certicate is in the Trusted Root Certication
Authority list. If the Authority is not in the list, you must install it on all your domain controllers.
6. Click Next and select whether you want Windows to automatically select the certicate store based on the type of certicate,
or browse to a store of your choice.
7. Click Finish and click OK. The iDRAC rmware SSL certicate is imported to all domain controller trusted certicate lists.
Supported Active Directory authentication mechanisms
You can use Active Directory to dene iDRAC user access using two methods:
• Standard schema solution, which uses Microsoft’s default Active Directory group objects only.
• Extended schema solution, which has customized Active Directory objects. All the access control objects are maintained in
Active Directory. It provides maximum exibility to congure user access on dierent iDRACs with varying privilege levels.
Related links
Standard schema Active Directory overview
Extended schema Active Directory overview
Standard schema Active Directory overview
As shown in the following gure, using standard schema for Active Directory integration requires conguration on both Active
Directory and iDRAC.
131