Active Directory is a technology that provides a variety of network services including LDAP-like directory services, Kerberos-based authentication, and DNS-based naming. The CIMC utilizes the Kerberos-based authentication service of Active Directory.
When Active Directory is enabled in the CIMC, user authentication and role authorization is performed by Active Directory for user accounts not found in the local user database.
By checking the Enable Encryption check box in the Active Directory Properties area, you can require the server to encrypt data sent to Active Directory.
You must log in as a user with admin privileges to configure active directory.
In the Navigation pane, click the Admin tab.
On the Admin tab, click User Management.
In the User Management pane, click the Active Directory tab.
In the Active Directory Properties area, update the following properties:
Enabled check box
If checked, user authentication and role authorization is performed by Active Directory for user accounts not found in the local user database.
Server IP Address field
The Active Directory server IP address.
The number of seconds the CIMC waits until it assumes the connection to Active Directory cannot be established.
Enable Encryption check box
If checked, the server encrypts all information it sends to Active Directory.
The domain that all users must be in.
An LDAP attribute that contains the role and locale information for the user. This property is always a name-value pair. The system queries the user record for the value that matches this attribute name.
The LDAP attribute must have the following attribute ID:
If you do not specify this property, user access is restricted to read-only.
Click Save Changes.
Configuring the Active Directory Server
The CIMC can be configured to use Active Directory for user authentication and authorization. To use Active Directory, configure users with an attribute that holds the user role and locale information for the CIMC. You can use an existing LDAP attribute that is mapped to the CIMC user roles and locales or you can modify the Active Directory schema to add a new custom attribute, such as the CiscoAVPair attribute, which has an attribute ID of 184.108.40.206.220.127.116.117247.1. For more information about altering the Active Directory schema, see the article at http://technet.microsoft.com/en-us/library/bb727064.aspx.
The following steps are to be performed on the Active Directory server.
This example creates a custom attribute named CiscoAVPair, but you can also use an existing LDAP attribute that is mapped to the CIMC user roles and locales.
Ensure that the Active Directory schema snap-in is installed.
Using the Active Directory schema snap-in, add a new attribute with the following properties:
LDAP Display Name
Unique X500 Object ID
Case Sensitive String
Add the CiscoAVPair attribute to the user class using the Active Directory snap-in:
Expand the Classes node in the left pane and type U to select the user class.
Click the Attributes tab and click Add.
Type C to select the CiscoAVPair attribute.
Add the following user role values to the CiscoAVPair attribute, for the users that you want to have access to CIMC: