Installation Manual
3. Right-click Certificates, select All Tasks and click Import.
4. Click Next and browse to the SSL certificate file.
5. Install iDRAC7 SSL Certificate in each domain controller’s Trusted Root Certification Authority.
If you have installed your own certificate, make sure that the CA signing your certificate is in the Trusted Root
Certification Authority list. If the Authority is not in the list, you must install it on all your domain controllers.
6. Click Next and select whether you want Windows to automatically select the certificate store based on the type of
certificate, or browse to a store of your choice.
7. Click Finish and click OK. The iDRAC7 firmware SSL certificate is imported to all domain controller trusted
certificate lists.
Supported Active Directory Authentication Mechanisms
You can use Active Directory to define iDRAC7 user access using two methods:
•
Standard schema
solution, which uses Microsoft’s default Active Directory group objects only.
•
Extended schema
solution, which has customized Active Directory objects. All the access control objects are
maintained in Active Directory. It provides maximum flexibility to configure user access on different iDRAC7s with
varying privilege levels.
Related Links
Standard Schema Active Directory Overview
Extended Schema Active Directory Overview
Standard Schema Active Directory Overview
As shown in the following figure, using standard schema for Active Directory integration requires configuration on both
Active Directory and iDRAC7.
Figure 1. Configuration of iDRAC7 with Active Directory Standard Schema
In Active Directory, a standard group object is used as a role group. A user who has iDRAC7 access is a member of the
role group. To give this user access to a specific iDRAC7, the role group name and its domain name need to be
configured on the specific iDRAC7. The role and the privilege level is defined on each iDRAC7and not in the Active
Directory. You can configure up to five role groups in each iDRAC7. Table reference no shows the default role group
privileges.
129