Users Guide

3. Click Sites.
The Local Intranet dialog box is displayed.
4. Click Advanced .
The Local Intranet Advance Settings dialog box is displayed.
5. In the Add this site to the zone, type the name of CMC and the domain it belongs to and click Add.
NOTE: You can use a wildcard (*) to specify all devices or users in that domain.
Mozilla Firefox
1. In Firefox, type about:cong in the Address bar.
NOTE: If the browser displays the This might void your warranty warning, click I'll be careful. I promise.
2. In the Filter box, type negotiate.
The browser displays a list of preference names limited to those containing the word negotiate.
3. From the list, double-click network.negotiate-auth.trusted-uris.
4. In the Enter string value dialog box, type the CMC's domain name and click OK.
Conguring Browser For Smart Card Login
Internet Explorer — Make sure that the Internet Browser is congured to download Active-X plug-ins.
Conguring CMC SSO Or Smart Card Login For Active Directory Users
You can use CMC web interface or RACADM to congure CMC SSO or smart card login.
Conguring CMC SSO Or Smart Card Login For Active Directory Users Using Web Interface
To congure Active Directory SSO or smart card login for CMC:
NOTE: For information about the options, see the
Online Help
.
1. While conguring Active Directory to set up user account, perform the following additional steps:
Upload the keytab le.
To enable SSO, select the Enable Single Sign-On option.
To enable smart card login, select the Enable Smart-Card Login option.
NOTE: If these two options are selected, all command line out-of-band interfaces, including secure shell (SSH),
Telnet, Serial, and remote RACADM remain unchanged .
2. Click Apply.
The settings are saved.
You can test the Active Directory using Kerberos authentication using the RACADM command:
testfeature -f adkrb -u <user>@<domain>
where <user> is a valid Active Directory user account.
A command success indicates that CMC is able to acquire Kerberos credentials and access the user's Active Directory account.
If the command is not successful, resolve the error and run the command again. For more information, see the Chassis
Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide on dell.com/support/manuals.
Uploading Keytab File
The Kerberos keytab le serves as the CMC's user name and password credentials to the Kerberos Data Center (KDC), which in
turns allows access to the Active Directory. Each CMC in the Kerberos realm must be registered with the Active Directory and must
have a unique keytab le.
132