White Papers

Active Directory Configuration
5
i. LDAP.1#Enable = Disabled
j. ActiveDirectory.1#CertValidationEnable = Enabled
k. ActiveDirectory.1#Enable = Enabled
l. UserDomain.1#Name = ci.local
m. ActiveDirectory.1#DomainController1 = SCCM.ci.local
n. ActiveDirectory.1#Schema = Standard Schema
o. ActiveDirectory.1#GlobalCatalog1 = SCCM.ci.local
p. ADGroup.1#Name = iDRACAdministrators
q. ADGroup.1#Domain = ci.local
r. ADGroup.1#Privilege = 511
The values are shown for-example only. Customer must change to the values, which is appropriate
to their system. For more information and the corresponding winrm commands, See Appendix E:
Sample WINRM Commands and Mapping to iDRAC GUI Display Names”.
1. Before running the configuration wirnm commands, make sure that LC is ready and delete all
pending jobs and pending values (refer to [4] section 33.2.3 and 33.2.4) as they may prevent
further configuration changes,
2. By running the SetAttributes() method on the DCIM_IDRACCardService class, set up the above
attributes. This can be done with one SetAttributes() command or multiple SetAttributes()
commands.
3. An iDRAC Card job needs to be created in order for the changes to be committed. This can be
done by using the CreateTargetedConfigJob() method on the DCIM_iDRACCardService class.
4. Start the system and wait for the job status to change to completion. After the job is 100%
completed, upload the Certification to iDARC by using the SetPublicCertificate() method on
the DCIM_LCService class to upload the certification created by customer when they set up
their certification service.
For all the winrm commands, see Appendix E: Sample WINRM Commands and Mapping to iDRAC
GUI Display Names”
5. Check the Setting
The following sample WSMAN command can be run to check the values that customer just set in
the above section. Before running this command, change the IP address to customer’s iDRAC IP
address, and then use the credential of iDRAC.
winrm enumerate "cimv2/root/dcim/DCIM_iDRACCardAttribute" -r:https://192.168.0.120/wsman -u:root -
p:calvin -SkipCNcheck -SkipCAcheck -encoding:utf-8 -a:basic -format:pretty
All the ADrelated attributes can be found in this output. Search for the AttributeName that the
customer is interested in. For example, CertValidationEnable, a sample output is given here.:
DCIM_iDRACCardEnumeration
AttributeDisplayName = Certificate Validation Enable