6
Active Directory Installation Prerequisites...........................................................................
153
Directory Services Preparation for Active Directory............................................................
154
Snap-In Installation and Initialization for Active Directory .................................................
156
Example: Creating and Configuring Directory Objects for Use with iLO in Active Directory157
Directory Services Objects ...................................................................................................
162
Active Directory Lights-Out Management ......................................................................................
170
Directory Services for eDirectory ....................................................................................................
171
Snap-in Installation and Initialization for eDirectory ...........................................................
Example: Creating and Configuring Directory Objects for Use with LOM Devices in
eDirectory .............................................................................................................................
Directory Services Objects for eDirectory............................................................................
176
Role Restrictions...................................................................................................................
178
eDirectory Role Restrictions.................................................................................................
179
Lights-Out Management.......................................................................................................
182
Configuring Directory Settings ........................................................................................................
184
Directory Tests.................................................................................................................................
186
User Login Using Directory Services ..............................................................................................
187
189
Introduction to Certificate Services..................................................................................................
Installing Certificate Services ..........................................................................................................
Verifying Directory Services ...........................................................................................................
190
Configuring Automatic Certificate Request.....................................................................................
193
Introduction to Directory-Enabled Remote Management ................................................................
Using Bulk Import Tools .................................................................................................................
194
Using Existing Groups .....................................................................................................................
195
Using Multiple Roles .......................................................................................................................
196
Creating Roles to Follow Organizational Structure .........................................................................
198
Restricting Roles..............................................................................................................................
Role Time Restrictions .........................................................................................................
IP Address Range Restrictions .............................................................................................
199
IP Address and Subnet Mask Restrictions ............................................................................
DNS-Based Restrictions .......................................................................................................
Role Address Restrictions.....................................................................................................
200
How Directory Login Restrictions are Enforced..............................................................................
How User Time Restrictions are Enforced ......................................................................................
201
User Address Restrictions................................................................................................................
Creating Multiple Restrictions and Roles ........................................................................................
202
205
Introduction to Lights-Out Migration Utilities.................................................................................
Compatibility ...................................................................................................................................
206