Users Guide

Table Of Contents
10. Locate and right-click the root CA certificate, select All Tasks, and click Export....
11. In the Certificate Export Wizard, click Next, and select No do not export the private key.
12. Click Next and select Base-64 encoded X.509 (.cer) as the format.
13. Click Next and save the certificate to a directory on your system.
14. Upload the certificate you saved in step 13 to iDRAC.
Importing iDRAC firmware SSL certificate
iDRAC SSL certificate is the identical certificate used for iDRAC Web server. All iDRAC controllers are shipped with a default
self-signed certificate.
If the Active Directory Server is set to authenticate the client during an SSL session initialization phase, you need to upload
iDRAC Server certificate to the Active Directory Domain controller. This additional step is not required if the Active Directory
does not perform a client authentication during an SSL sessions initialization phase.
NOTE: If iDRAC firmware SSL certificate is CA-signed and the certificate of that CA is already in the domain controller's
Trusted Root Certificate Authority list, do not perform the steps in this section.
To import iDRAC firmware SSL certificate to all domain controller trusted certificate lists:
1. Download iDRAC SSL certificate using the following RACADM command:
racadm sslcertdownload -t 1 -f <RAC SSL certificate>
2. On the domain controller, open an MMC Console window and select Certificates > Trusted Root Certification
Authorities.
3. Right-click Certificates, select All Tasks and click Import.
4. Click Next and browse to the SSL certificate file.
5. Install iDRAC SSL Certificate in each domain controllers Trusted Root Certification Authority.
If you have installed your own certificate, make sure that the CA signing your certificate is in the Trusted Root
Certification Authority list. If the Authority is not in the list, you must install it on all your domain controllers.
6. Click Next and select whether you want Windows to automatically select the certificate store based on the type of
certificate, or browse to a store of your choice.
7. Click Finish and click OK. The iDRAC firmware SSL certificate is imported to all domain controller trusted certificate lists.
Supported Active Directory authentication mechanisms
You can use Active Directory to define iDRAC user access using two methods:
Standard schema solution, which uses Microsofts default Active Directory group objects only.
Extended schema solution, which has customized Active Directory objects. All the access control objects are maintained in
Active Directory. It provides maximum flexibility to configure user access on different iDRACs with varying privilege levels.
Standard schema Active Directory overview
As shown in the following figure, using standard schema for Active Directory integration requires configuration on both Active
Directory and iDRAC.
Configuring user accounts and privileges
147