HP Integrity iLO 2 Operations Guide

Table Of Contents
e. Click OK.
The Active Directory schema folder may need to be expanded for the checkbox to be available.
4. Create a certificate or install Certificate Services. This step is necessary because iLO 2 uses
SSL to communicate with Active Directory.
5. To specify that a certificate be issued to the server running Active Directory, do the following:
a. Launch MMC on the server and add the default domain policy snap-in (Group policy and
browse to default domain policy object).
b. Click Computer Configuration>Windows Settings>Security Settings>Public Key Policies.
c. Right-click Automatic Certificate Requests Settings, and select New>Automatic Certificate
Request.
d. Using the wizard, select the domain controller template and the certificate authority you
want to use.
6. Download the Smart Component that contains the installers for the schema extender and the
snap-ins. You can download the Smart Component from the HP website at http://www.hp.com/
go/integrityiLO.
7. Run the schema installer application to extend the schema, which extends the directory schema
with the proper HP objects.
The schema installer associates the Active Directory snap-ins with the new schema. The snap-in
installation setup utility is a Windows MSI setup script and runs anywhere MSI is supported
(Windows XP, Windows 2000, Windows 98). However, some parts of the schema extension
application require the .NET Framework, which you can download from the Microsoft website
at http://www.microsoft.com.
Installing and Initializing Snap-Ins for Active Directory
Follow these steps to install the snap-ins and configure the directory service:
1. To install the snap-ins, run the snap-in installation application.
2. Configure the directory service with the appropriate objects and relationships for iLO 2
management:
a. Use the management snap-ins from HP to create iLO 2 policy, admin, and user role
objects.
b. Use the management snap-ins from HP to build associations between the iLO 2 object,
the policy object, and the role object.
c. Point the iLO 2 object to the admin and user role objects (admin and user roles
automatically point back to the iLO 2 object).
For more information about iLO 2 objects, see “Directory Services Objects” (page 179).
At a minimum, create:
One role object that contains one or more users and one or more iLO 2 objects.
One iLO 2 object corresponding to each iLO 2 using the directory.
Example: Creating and Configuring Directory Objects for Use with iLO 2 in Active
Directory
The following example shows how to set up roles and HP devices in an enterprise directory with
the domain mpiso.com, which consists of two organizational units: Roles and MPs.
NOTE: Roles, such as hpqTargets and so on, are for extended schema LDAP only. They are not
used in schema-free LDAP.
Assume that a company has an enterprise directory including the domain mpiso.com, arranged
as shown in Figure 49.
176 Installing and Configuring Directory Services