Users Guide

Table Of Contents
2. If DHCP is enabled on iDRAC and you want to use the DNS provided by the DHCP server, enter the following RACADM
commands:
Using config command: racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 1
Using set command: racadm set iDRAC.IPv4.DNSFromDHCP 1
3. If DHCP is disabled on iDRAC or you want manually input the DNS IP address, enter the following RACADM commands:
Using config command:
racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 0
racadm config -g cfgLanNetworking -o cfgDNSServer1 <primary DNS IP address>
racadm config -g cfgLanNetworking -o cfgDNSServer2 <secondary DNS IP address>
Using set command:
racadm set iDRAC.IPv4.DNSFromDHCP 0
racadm set iDRAC.IPv4.DNSFromDHCP.DNS1 <primary DNS IP address>
racadm set iDRAC.IPv4.DNSFromDHCP.DNS2 <secondary DNS IP address>
4. If you want to configure a list of user domains so that you only need to enter the user name when logging in to the Web
interface, enter the following command:
Using config command: racadm config -g cfgUserDomain -o cfgUserDomainName <fully
qualified domain name or IP Address of the domain controller> -i <index>
Using set command: racadm set iDRAC.UserDomain.<index>.Name <fully qualified domain name
or IP Address of the domain controller>
You can configure up to 40 user domains with index numbers between 1 and 40.
Extended Schema Active Directory Overview
Using the extended schema solution requires the Active Directory schema extension.
Active Directory Schema Extensions
The Active Directory data is a distributed database of attributes and classes. The Active Directory schema includes the rules
that determine the type of data that can be added or included in the database. The user class is one example of a class that
is stored in the database. Some example user class attributes can include the users first name, last name, phone number,
and so on. You can extend the Active Directory database by adding your own unique attributes and classes for specific
requirements. Dell has extended the schema to include the necessary changes to support remote management authentication
and authorization using Active Directory.
Each attribute or class that is added to an existing Active Directory Schema must be defined with a unique ID. To maintain
unique IDs across the industry, Microsoft maintains a database of Active Directory Object Identifiers (OIDs) so that when
companies add extensions to the schema, they can be guaranteed to be unique and not to conflict with each other. To extend
the schema in Microsoft's Active Directory, Dell received unique OIDs, unique name extensions, and uniquely linked attribute IDs
for the attributes and classes that are added into the directory service:
Extension is: dell
Base OID is: 1.2.840.113556.1.8000.1280
RAC LinkID range is: 12070 to 12079
Overview of iDRAC Schema Extensions
Dell has extended the schema to include an Association, Device, and Privilege property. The Association property is used to
link together the users or groups with a specific set of privileges to one or more iDRAC devices. This model provides an
administrator maximum flexibility over the different combinations of users, iDRAC privileges, and iDRAC devices on the network
without much complexity.
For each physical iDRAC device on the network that you want to integrate with Active Directory for authentication and
authorization, create at least one association object and one iDRAC device object. You can create multiple association objects,
and each association object can be linked to as many users, groups of users, or iDRAC device objects as required. The users and
iDRAC user groups can be members of any domain in the enterprise.
124
Configuring User Accounts and Privileges