Users Guide

Table Of Contents
Logging in to iDRAC as an Active Directory user using a smart card
Before you log in as an Active Directory user using smart card, ensure that you:
Upload a Trusted Certificate Authority (CA) certificate (CA-signed Active Directory certificate) to iDRAC.
Configure the DNS server.
Enable Active Directory login.
Enable smart card login.
To log in to iDRAC as an Active Directory user using smart card:
1. Log in to iDRAC using the link https://[IP address].
The iDRAC Login page is displayed prompting you to insert the smart card.
NOTE: If the default HTTPS port number (port 443) is changed, type: https://[IP address]:[port number]
where, [IP address] is the iDRAC IP address and [port number] is the HTTPS port number.
2.
Insert the smart card and click Login.
A prompt is displayed for the smart card's PIN.
3. Enter the PIN and click Submit.
You are logged in to iDRAC with your Active Directory credentials.
NOTE:
If the smart card user is present in Active Directory, an Active Directory password is not required.
Logging in to iDRAC using Single Sign-On
When Single Sign-On (SSO) is enabled, you can log in to iDRAC without entering your domain user authentication credentials,
such as user name and password.
NOTE: When AD user configures SSO while RSA is enabled, the RSA token is bypassed and user logs in directly.
Logging in to iDRAC SSO using iDRAC web interface
Before logging in to iDRAC using Single Sign-On, ensure that:
You have logged in to your system using a valid Active Directory user account.
Single Sign-On option is enabled during Active Directory configuration.
To log in to iDRAC using web interface:
1. Log in to your management station using a valid Active Directory account.
2. In a web browser, type https://[FQDN address].
NOTE:
If the default HTTPS port number (port 443) has been changed, type: https://[FQDN address]:[port
number] where [FQDN address] is the iDRAC FQDN (iDRACdnsname.domain. name) and [port number] is the
HTTPS port number.
NOTE: If you use IP address instead of FQDN, SSO fails.
iDRAC logs you in with appropriate Microsoft Active Directory privileges, using your credentials that were cached in the
operating system when you logged in using a valid Active Directory account.
Logging in to iDRAC SSO using CMC web interface
NOTE: This feature is not available on MX platforms.
Using the SSO feature, you can launch the iDRAC web interface from the CMC web interface. A CMC user has the CMC user
privileges when launching iDRAC from CMC. If the user account is present in CMC and not in iDRAC, the user can still launch
iDRAC from CMC.
If iDRAC network LAN is disabled (LAN Enabled = No), SSO is not available.
40
Logging in to iDRAC