Directory-enabled remote management
In this section |
|
Introduction to | |
Creating roles to follow organizational structure ...................................................................................... | |
How directory login restrictions are enforced........................................................................................... | |
Using bulk import tools.......................................................................................................................... |
Introduction to directory-enabled remote management
This section is for administrators who are familiar with directory services and the RILOE II product and want to use the HP schema directory integration option for RILOE II. You must be familiar with the “Directory services (on page 75)" section and comfortable with setting up and understanding the examples.
•Create
You must create one LOM device object to represent each device that will use the directory service to authenticate and authorize users. Refer to the "Directory services (on page 75)" section for additional information on creating LOM device objects for Active Directory ("Directory services for Active Directory" on page 83) and eDirectory ("Directory services for eDirectory" on page 92). In general, you can use the HP provided
•Configure the
Every LOM device that uses the directory service to authenticate and authorize users must be configured with the appropriate directory settings. Refer to "Configuring directory settings" for details on the specific directory settings. In general, you can configure each device with the appropriate directory server address, LOM object distinguished name, and any user contexts. The server address is either the IP address or DNS name of a local directory server or, for more redundancy, a
Creating roles to follow organizational structure
Often, the administrators within an organization are placed into a hierarchy in which subordinate administrators must assign rights independently of ranking administrators. In this case, it is useful to have one role that represents the rights assigned by
Using existing groups
Many organizations will have their users and administrators arranged into groups. In many cases, it is convenient to use the existing groups and associate the groups with one or more