Users Guide
You can configure user authentication through Active Directory to log in to the iDRAC. You can also provide role-based
authority, which enables an administrator to configure specific privileges for each user.
The iDRAC role and privilege names have changed from earlier generation of servers. The role names are:
Table 19. iDRAC roles
Current Generation Prior Generation Privileges
Administrator Administrator Login, Configure, Configure Users, Logs, System Control, Access Virtual
Console, Access Virtual Media, System Operations, Debug
Operator Power User Login, Configure, System Control, Access Virtual Console, Access
Virtual Media, System Operations, Debug
Read Only Guest User Login
None None None
Table 20. iDRAC user privileges
Current Generation Prior Generation Description
Login Login to iDRAC Enables the user to log in to iDRAC.
Configure Configure iDRAC Enables the user to configure iDRAC.
Configure Users Configure Users Enables the user to allow specific users to access the system.
Logs Clear Logs Enables the user to clear the System Event Log (SEL).
System Control Execute Server Control
Commands
Allows power cycling the host system.
Access Virtual
Console
Access Virtual Console
Redirection (for blade
servers)
Access Virtual Console (for
rack and tower servers)
Enables the user to run Virtual Console.
Access Virtual Media Access Virtual Media Enables the user to run and use Virtual Media.
System Operations Test Alerts Allows user initiated and generated events, and information is sent as
an asynchronous notification and logged.
Debug Execute Diagnostic
Commands
Enables the user to run diagnostic commands.
Related concepts
Prerequisites for using Active Directory authentication for iDRAC on page 130
Supported Active Directory authentication mechanisms on page 132
Prerequisites for using Active Directory authentication for iDRAC
To use the Active Directory authentication feature of iDRAC, make sure that you have:
● Deployed an Active Directory infrastructure. See the Microsoft website for more information.
● Integrated PKI into the Active Directory infrastructure. iDRAC uses the standard Public Key Infrastructure (PKI) mechanism
to authenticate securely into the Active Directory. See the Microsoft website for more information.
● Enabled the Secure Socket Layer (SSL) on all domain controllers that iDRAC connects to for authenticating to all the domain
controllers.
130
Configuring user accounts and privileges