User's Manual

130 Using the iDRAC with Microsoft Active Directory
racadm config -g cfgLanNetworking -o cfgDNSServer2
<
secondary-DNS-IP-address
>
Configuring the iDRAC With Standard Schema Active Directory and
SM-CLP
NOTE: You cannot upload certificates using SM-CLP. Instead, use the iDRAC Web
interface or local RACADM commands.
Use the following commands to configure the iDRAC Active Directory
Feature with the standard schema using SM-CLP.
1
Log in to the iDRAC using telnet or SSH and enter the following SM-CLP
commands:
cd /system/sp1/oemdell_adservice1
set enablestate=1
set oemdell_schematype=2
set oemdell_adracdomain=<
RAC-FQDN
>
2
Enter the following commands for each of the five Active Directory role
groups:
set /system1/sp1/group
N
oemdell_groupname=<
role-
groupN-common-name
>
set /system1/sp1/group
N
oemdell_groupdomain=<
rac-
FQDN
>
set /system1/sp1/group
N
oemdell_groupprivilege=
<user-permission-bit-mask
>
where
N
is a number from 1 to 5.
3
Enter the following commands to set up the Active Directory SSL
certifications.
set /system1/sp1/oemdell_ssl1 oemdell_certtype=AD
load -source <ActiveDirectory-certificate-TFTP-
URI> /system1/sp1/oemdell_ssl1
set /system1/sp1/oemdell_ssl1 oemdell_certtype=SSL