Users Guide

Upload a Trusted Certificate Authority (CA) certificate (CA-signed Active Directory certificate) to iDRAC.
Configure the DNS server.
Enable Active Directory login.
Enable Smart Card login.
To log in to iDRAC as an Active Directory user using smart card:
1. Log in to iDRAC using the link https://[IP address].
The iDRAC Login page is displayed prompting you to insert the Smart Card.
NOTE: If the default HTTPS port number (port 443) is changed, type: https://[IP address]:[port
number] where, [IP address] is the iDRAC IP address and [port number] is the HTTPS port number.
2. Insert the Smart Card and click Login.
The PIN pop-up is displayed.
3. Enter the PIN and click Submit.
You are logged in to iDRAC with your Active Directory credentials.
NOTE:
If the smart card user is present in Active Directory, an Active Directory password is not required.
Related links
Enabling or disabling smart card login
Configuring iDRAC smart card login for Active Directory users
Logging in to iDRAC using Single Sign-On
When Single Sign-On (SSO) is enabled, you can log in to iDRAC without entering your domain user authentication credentials, such
as user name and password.
Related links
Configuring iDRAC SSO login for Active Directory users
Logging in to iDRAC SSO using iDRAC web interface
Before logging in to iDRAC using Single Sign-On, make sure that:
You have logged in to your system using a valid Active Directory user account.
Single Sign-On option is enabled during Active Directory configuration.
To log in to iDRAC using web interface:
1. Log in to your management station using a valid Active Directory account.
2. In a web browser, type https://[FQDN address]
NOTE: If the default HTTPS port number (port 443) has been changed, type: https://[FQDN address]:
[port number] where, [FQDN address] is the iDRAC FQDN (iDRACdnsname.domain. name) and [port
number]
is the HTTPS port number.
NOTE: If you use IP address instead of FQDN, SSO fails.
iDRAC logs you in with appropriate Microsoft Active Directory privileges, using your credentials that were cached in the
operating system when you logged in using a valid Active Directory account.
Logging in to iDRAC SSO using CMC web interface
Using the SSO feature, you can launch iDRAC web interface from CMC web interface. A CMC user has the CMC user privileges
when launching iDRAC from CMC. If the user account is present in CMC and not in iDRAC, the user can still launch iDRAC from
CMC.
32