Users Guide

Table Of Contents
If the server is removed from the chassis, iDRAC IP address is changed, or there is a problem in iDRAC network connection, the
option to Launch iDRAC is grayed-out in the CMC web interface.
For more information, see the Chassis Management Controller User's Guide available at https://www.dell.com/cmcmanuals.
Accessing iDRAC using remote RACADM
You can use remote RACADM to access iDRAC using RACADM utility.
For more information, see the iDRAC RACADM CLI Guide available at https://www.dell.com/idracmanuals.
If the management station has not stored the iDRACs SSL certificate in its default certificate storage, a warning message is
displayed when you run the RACADM command. However, the command is executed successfully.
NOTE: The iDRAC certificate is the certificate iDRAC sends to the RACADM client to establish the secure session. This
certificate is either issued by a CA or self-signed. In either case, if the management station does not recognize the CA or
signing authority, a warning is displayed.
Validating CA certificate to use remote RACADM on Linux
Before running remote RACADM commands, validate the CA certificate that is used for secure communications.
To validate the certificate for using remote RACADM:
1. Convert the certificate in DER format to PEM format (using openssl command-line tool):
openssl x509 -inform pem -in [yourdownloadedderformatcert.crt] outform pem -out
[outcertfileinpemformat.pem] text
2. Find the location of the default CA certificate bundle on the management station. For example, for RHEL5 64 bit, it
is /etc/pki/tls/cert.pem.
3. Append the PEM formatted CA certificate to the management station CA certificate.
For example, use the cat command: cat testcacert.pem >> cert.pem
4. Generate and upload the server certificate to iDRAC.
Accessing iDRAC using local RACADM
For information to access iDRAC using local RACADM, see the iDRAC RACADM CLI Guide available at https://www.dell.com/
idracmanuals.
Accessing iDRAC using firmware RACADM
You can use SSH interface to access iDRAC and run firmware RACADM commands. For more information, see the iDRAC
RACADM CLI Guide available at https://www.dell.com/idracmanuals.
Simple 2-Factor Authentication (Simple 2FA)
iDRAC offers simple 2-factor authentication option to enhance the security to the local users for logging in. When you log in
from a source IP-address which is different from the last login, you will be prompted to enter the second factor authentication
details.
Simple two factor authentication has two steps of authentication:
iDRAC User name and password
Simple 6 digit code which is sent to the user via email. User needs to enter this 6 digit code when prompted at login.
NOTE:
To receive 6 digit code, it is mandatory to configure 'Custom Sender Address' and have valid SMTP configuration.
38 Logging in to iDRAC