Users Guide
NOTE: If you use IP address instead of FQDN, SSO fails.
iDRAC logs you in with appropriate Microsoft Active Directory privileges, using your credentials that were cached in the
operating system when you logged in using a valid Active Directory account.
Logging in to iDRAC SSO using CMC web interface
Using the SSO feature, you can launch iDRAC web interface from CMC web interface. A CMC user has the CMC user privileges
when launching iDRAC from CMC. If the user account is present in CMC and not in iDRAC, the user can still launch iDRAC from
CMC.
If iDRAC network LAN is disabled (LAN Enabled = No), SSO is not available.
If the server is removed from the chassis, iDRAC IP address is changed, or there is a problem in iDRAC network connection, the
option to Launch iDRAC is grayed-out in the CMC web interface.
For more information, see the Chassis Management Controller User’s Guide available at dell.com/support/manuals.
Accessing iDRAC using remote RACADM
You can use remote RACADM to access iDRAC using RACADM utility.
For more information, see the iDRAC RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals.
If the management station has not stored the iDRAC’s SSL certicate in its default certicate storage, a warning message is
displayed when you run the RACADM command. However, the command is executed successfully.
NOTE: The iDRAC certicate is the certicate iDRAC sends to the RACADM client to establish the secure session. This
certicate is either issued by a CA or self-signed. In either case, if the management station does not recognize the CA or
signing authority, a warning is displayed.
Related links
Validating CA certicate to use remote RACADM on Linux
Validating CA certicate to use remote RACADM on Linux
Before running remote RACADM commands, validate the CA certicate that is used for secure communications.
To validate the certicate for using remote RACADM:
1. Convert the certicate in DER format to PEM format (using openssl command-line tool):
openssl x509 -inform pem -in [yourdownloadedderformatcert.crt] –outform pem -out
[outcertfileinpemformat.pem] –text
2. Find the location of the default CA certicate bundle on the management station. For example, for RHEL5 64 bit, it
is /etc/pki/tls/cert.pem.
3. Append the PEM formatted CA certicate to the management station CA certicate.
For example, use the cat command: cat testcacert.pem >> cert.pem
4. Generate and upload the server certicate to iDRAC.
Accessing iDRAC using local RACADM
For information to access iDRAC using local RACADM, see the iDRAC RACADM Command Line Interface Reference Guide available
at dell.com/idracmanuals.
Accessing iDRAC using rmware RACADM
You can use SSH or Telnet interfaces to access iDRAC and run rmware RACADM commands. For more information, see the iDRAC
RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals.
34