Users Guide

Table Of Contents
qualified domain name>
racadm config -g cfgStandardSchema -i <index> -o cfgSSADRoleGroupPrivilege <Bit
Mask Value for specific RoleGroup permissions>
racadm config -g cfgActiveDirectory -o cfgADDomainController1 <fully qualified
domain name or IP address of the domain controller>
racadm config -g cfgActiveDirectory -o cfgADDomainController2 <fully qualified
domain name or IP address of the domain controller>
racadm config -g cfgActiveDirectory -o cfgADDomainController3 <fully qualified
domain name or IP address of the domain controller>
racadm config -g cfgActiveDirectory -o cfgADGlobalCatalog1 <fully qualified domain
name or IP address of the domain controller>
racadm config -g cfgActiveDirectory -o cfgADGlobalCatalog2 <fully qualified domain
name or IP address of the domain controller>
racadm config -g cfgActiveDirectory -o cfgADGlobalCatalog3 <fully qualified domain
name or IP address of the domain controller>
Using set command:
racadm set iDRAC.ActiveDirectory.Enable 1
racadm set iDRAC.ActiveDirectory.Schema 2
racadm set iDRAC.ADGroup.Name <common name of the role group>
racadm set iDRAC.ADGroup.Domain <fully qualified domain name>
racadm set iDRAC.ADGroup.Privilege <Bit Mask Value for specific RoleGroup
permissions>
racadm set iDRAC.ActiveDirectory.DomainController1 <fully qualified domain name or
IP address of the domain controller>
racadm set iDRAC.ActiveDirectory.DomainController2 <fully qualified domain name or
IP address of the domain controller>
racadm set iDRAC.ActiveDirectory.DomainController3 <fully qualified domain name or
IP address of the domain controller>
racadm set iDRAC.ActiveDirectory.GlobalCatalog1 <fully qualified domain name or IP
address of the domain controller>
racadm set iDRAC.ActiveDirectory.GlobalCatalog2 <fully qualified domain name or IP
address of the domain controller>
racadm set iDRAC.ActiveDirectory.GlobalCatalog3 <fully qualified domain name or IP
address of the domain controller>
For Bit Mask values for specific Role Group permissions, see Default Role Group Privileges.
Enter the FQDN of the domain controller, not the FQDN of the domain. For example, enter servername.dell.com
instead of dell.com.
At least one of the three addresses is required to be configured. iDRAC attempts to connect to each of the configured
addresses one-by-one until it makes a successful connection. With Standard Schema, these are the addresses of the
domain controllers where the user accounts and the role groups are located.
The Global Catalog server is only required for standard schema when the user accounts and role groups are in different
domains. In multiple domain case, only the Universal Group can be used.
The FQDN or IP address that you specify in this field should match the Subject or Subject Alternative Name field of your
domain controller certificate if you have certificate validation enabled.
If you want to disable the certificate validation during SSL handshake, enter the following RACADM command:
Using config command: racadm config -g cfgActiveDirectory -o cfgADCertValidationEnable 0
Using set command: racadm set iDRAC.ActiveDirectory.CertValidationEnable 0
In this case, no Certificate Authority (CA) certificate needs to be uploaded.
To enforce the certificate validation during SSL handshake (optional):
Using config command: racadm config -g cfgActiveDirectory -o cfgADCertValidationEnable 1
Using set command: racadm set iDRAC.ActiveDirectory.CertValidationEnable 1
In this case, you must upload the CA certificate using the following RACADM command:
racadm sslcertupload -t 0x2 -f <ADS root CA certificate>
NOTE:
If certificate validation is enabled, specify the Domain Controller Server addresses and the Global Catalog FQDN.
Make sure that DNS is configured correctly under Overview > iDRAC Settings > Network.
Using the following RACADM command may be optional.
racadm sslcertdownload -t 0x1 -f <RAC SSL certificate>
Configuring User Accounts and Privileges
123