For example, Priv1 has these privileges: Login, Virtual Media, and Clear Logs

and Priv2 has these privileges: Login to iDRAC, Configure iDRAC, and Test

Alerts. As a result, User1 now has the privilege set: Login to iDRAC, Virtual Media, Clear Logs, Configure iDRAC, and Test Alerts, which is the combined privilege set of Priv1 and Priv2.

Extended Schema Authentication accumulates privileges to allow the user the maximum set of privileges possible considering the assigned privileges of the different privilege objects associated to the same user.

In this configuration, User1 has both Priv1 and Priv2 privileges on iDRAC2. User1 has Priv1 privileges on iDRAC1 only. User2 has Priv1 privileges on both iDRAC1 and iDRAC2. In addition, this figure shows that User1 can be in a different domain and can be associated by a nested group.

Configuring Extended Schema Active Directory to Access Your iDRAC6

Before using Active Directory to access your iDRAC6, configure the Active Directory software and the iDRAC6 by performing the following steps:

1Extend the Active Directory schema (see "Extending the Active Directory Schema" on page 153.)

2Extend the Active Directory Users and Computers Snap-in (see "Installing Dell Extension to Microsoft Active Directory Users and Computers Snap- In" on page 159.)

3Add iDRAC6 users and their privileges to Active Directory (see "Adding iDRAC Users and Privileges to Microsoft Active Directory" on page 160.)

4Configure the iDRAC6 Active Directory properties using either the iDRAC6 Web-based interface or the RACADM (see "Configuring Microsoft Active Directory With Extended Schema Using the iDRAC6 Web-Based Interface" on page 162 or "Configuring Microsoft Active Directory With Extended Schema Using RACADM" on page 164.)

152

Using the iDRAC6 Directory Service

Page 152
Image 152
Dell IDRAC6 manual 152