In the Search Filter field, enter a valid LDAP search filter. Use the filter if the user attribute cannot uniquely identify the login user within the chosen Base DN. If not specified, the value defaults to objectClass=*, which searches for all objects in the tree. This additional search filter configured by the user applies only to userDN search and not the group membership search.

9Click Next. The Generic LDAP Configuration and Management Step 3a of 3 page is displayed. Use this page to configure the privilege groups used to authorize users. When generic LDAP is enabled, role group(s) are used to specify authorization policy for iDRAC6 users.

NOTE: In this release, unlike AD, you do not need to use special characters ("@", "\", and "/") to differentiate an LDAP user from a local user. You should only enter your user name to log in, and should not include the domain name.

10Under Role Groups, click a Role Group.

The Generic LDAP Configuration and Management Step 3b of 3 page is displayed. Use this page to configure each Role Group used to control authorization policy for users.

11In the Group DN field, enter the group distinguished name that identifies the role group in the generic LDAP Directory Service associated with iDRAC6.

12In the Role Group Privileges section, specify the privileges associated with the group by selecting the Role Group Privilege Level. For example, if you select Administrator, all of the privileges are selected for that level of permission.

13Click Apply to save role group settings.

The iDRAC6 Web server automatically returns you to the Generic LDAP Configuration and Management Step 3a of 3 page where your Role Group settings are displayed.

14Configure additional role groups if required.

15Click Finish to return to the Generic LDAP Configuration and Management summary page.

16Click Test Settings to check the generic LDAP settings.

Using the iDRAC6 Directory Service

181

Page 181
Image 181
Dell IDRAC6 manual 181