Users Guide
Table Of Contents
- Dell Remote Access Configuration Tool for Microsoft Windows Operating Systems Version 1.2 User's Guide
- Introducing Dell Remote Access Configuration Tool
- Installing and Uninstalling DRACT
- Discovering, Importing, and Verifying RACs
- Updating RAC Firmware
- Configuring RACs Using Microsoft Active Directory
- Troubleshooting and Frequently Asked Questions
5
Configuring RACs Using Microsoft Active
Directory
The Active Directory (AD) service maintains a common database of all information required for
controlling users on a network. If you are using the AD software, you can configure it to provide access
to the RACs, allowing you to add and control user privileges for the existing users in your directory
service.
AD centralizes all RAC user IDs and passwords using standard or extended schema. Standard schema
uses AD group objects only, and extended schema uses Dell-defined AD objects. When using AD to
configure RAC access, ensure that you select the standard or extended schema. For more information on
standard and extended schema, see the appropriate RAC user guide listed in Other Documents You May
Need.
Using DRACT, you can perform the following actions for selected RACs on your network:
• Configure standard or extended schema-based AD settings for selected RACs.
• Create RAC objects on AD server for extended schema-based AD.
NOTE: Before you connect the AD server to DRACT, make sure that your AD server is configured to
communicate with the RAC. For more information, see the appropriate RAC user guide listed in
Other Documents You May Need.
You can upload the digital certificate used during the initiation of the Secure Sockets Layer (SSL)
connections when communicating with an AD server; these communications use LDAP over SSL (LDAPS).
If certificate validation is enabled, it is necessary to upload the certificate of the Certificate Authority (CA)
that issued the AD server certificate during initiation of SSL connections. The CA certificate is used to
validate the authenticity of the certificate provided by the AD server during SSL initiation. The AD CA
Certificate is the certificate that signs all the domain controllers' SSL server certificates.
NOTE: Uploading a CA certificate is optional for iDRAC6, iDRAC7, iDRAC8, and CMC (PowerEdge
VRTX) but mandatory for DRAC5 and CMC (PowerEdge M1000e). The AD CA certificate that is being
uploaded must be the same certificate that is on the AD server. For iDRAC6, iDRAC7, iDRAC8, and
CMC (PowerEdge VRTX), if the certificate is not specified, the default SSL certificate is used.
Using DRACT, you can perform the following configurations for RACs that are configured to a standard
schema, extended schema, or for RACs that have AD schema disabled:
• Configure RACs using AD standard schema. For more information, see Configuring RACs Using AD
Standard Schema.
• Configure RACs using AD extended schema. For more information, see Creating RAC objects and
Configuring RACs Using AD Extended Schema.
• Disable AD standard or extended schema for RACs. For more information, see Disabling AD Standard
or Extended Schema for RACs.
14