Users Guide

NOTE: You can also use racadm get -f <myfile.cfg> and view or edit the myfile.cfg file, which includes all iDRAC
configuration parameters.
To enable SNMP v3 authentication for a user, use SNMPv3AuthenticationType, SNMPv3Enable, SNMPv3PrivacyType objects.
For more information, see the RACADM Command Line Interface Guide available at dell.com/idracmanuals.
If you use the configuration XML file, use the AuthenticationProtocol, ProtocolEnable, and PrivacyProtocol attributes to enable
SNMPv3 authentication.
Adding iDRAC user using RACADM
1. Set the index and user name.
racadm set idrac.users.<index>.username <user_name>
Parameter Description
<index> Unique index of the user
<user_name> User name
2. Set the password.
racadm set idrac.users.<index>.password <password>
3. Set the user privileges.
For more information, see the iDRAC RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals.
4. Enable the user.
racadm set.idrac.users.<index>.enable 1
To verify, use the following command:
racadm get idrac.users.<index>
For more information, see the iDRAC RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals.
Enabling iDRAC user with permissions
To enable a user with specific administrative permissions (role-based authority):
1. Locate an available user index.
racadm get iDRAC.Users <index>
2. Type the following commands with the new user name and password.
racadm set iDRAC.Users.<index>.Privilege <user privilege bit mask value>
NOTE: The default privilege value is 0, which indicates the user has no privileges enabled. For a list of valid bit-mask
values for specific user privileges, see the
iDRAC RACADM Command Line Interface Reference Guide
available at
dell.com/idracmanuals.
Configuring Active Directory users
If your company uses the Microsoft Active Directory software, you can configure the software to provide access to iDRAC, allowing
you to add and control iDRAC user privileges to your existing users in your directory service. This is a licensed feature.
NOTE: Using Active Directory to recognize iDRAC users is supported on the Microsoft Windows 2000, Windows Server
2003, and Windows Server 2008 operating systems.
You can configure user authentication through Active Directory to log in to the iDRAC. You can also provide role-based authority,
which enables an administrator to configure specific privileges for each user.
The iDRAC role and privilege names have changed from earlier generation of servers. The role names are:
122