Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide, Release 1.4
Managing User Accounts
Downloads: This chapterpdf (PDF - 379.0KB) The complete bookPDF (PDF - 2.98MB) | The complete bookePub (ePub - 520.0KB) | Feedback

Managing User Accounts

Managing User Accounts

This chapter includes the following sections:

Configuring Local Users

Before You Begin

You must log in as a user with admin privileges to configure or modify local user accounts.

Procedure
    Step 1   In the Navigation pane, click the Admin tab.
    Step 2   On the Admin tab, click User Management.
    Step 3   In the User Management pane, click the Local User tab.
    Step 4   To configure or modify a local user account, click a row.
    Step 5   In the User Details dialog box, update the following properties:
    Name Description

    ID column

    The unique identifier for the user.

    Enabled check box

    If checked, the user is enabled on the CIMC.

    Username column

    The username for the user.

    Role column

    The role assigned to the user. This can be one of the following:

    • read-only—A user with this role can view information but cannot make any changes.
    • user—A user with this role can perform the following tasks:
      • View all information
      • Manage the power control options such as power on, power cycle, and power off
      • Launch the KVM console and virtual media
      • Clear all logs
      • Toggle the locator LED
    • admin—A user with this role can perform all actions available through the GUI, CLI, and IPMI.
    Step 6   Enter password information.
    Step 7   Click Save Changes.

    Active Directory

    Active Directory is a technology that provides a variety of network services including LDAP-like directory services, Kerberos-based authentication, and DNS-based naming. The CIMC utilizes the Kerberos-based authentication service of Active Directory.

    When Active Directory is enabled in the CIMC, user authentication and role authorization is performed by Active Directory for user accounts not found in the local user database.

    By checking the Enable Encryption check box in the Active Directory Properties area, you can require the server to encrypt data sent to Active Directory.

    Configuring the Active Directory Server

    The CIMC can be configured to use Active Directory for user authentication and authorization. To use Active Directory, configure users with an attribute that holds the user role and locale information for the CIMC. You can use an existing LDAP attribute that is mapped to the CIMC user roles and locales or you can modify the Active Directory schema to add a new custom attribute, such as the CiscoAVPair attribute, which has an attribute ID of 1.3.6.1.4.1.9.287247.1. For more information about altering the Active Directory schema, see the article at http://technet.microsoft.com/en-us/library/bb727064.aspx.

    The following steps are to be performed on the Active Directory server.


    Note


    This example creates a custom attribute named CiscoAVPair, but you can also use an existing LDAP attribute that is mapped to the CIMC user roles and locales.


    Procedure
      Step 1   Ensure that the Active Directory schema snap-in is installed.
      Step 2   Using the Active Directory schema snap-in, add a new attribute with the following properties:

      Properties

      Value

      Common Name

      CiscoAVPair

      LDAP Display Name

      CiscoAVPair

      Unique X500 Object ID

      1.3.6.1.4.1.9.287247.1

      Description

      CiscoAVPair

      Syntax

      Case Sensitive String

      Step 3   Add the CiscoAVPair attribute to the user class using the Active Directory snap-in:
      1. Expand the Classes node in the left pane and type U to select the user class.
      2. Click the Attributes tab and click Add.
      3. Type C to select the CiscoAVPair attribute.
      4. Click OK.
      Step 4   Add the following user role values to the CiscoAVPair attribute, for the users that you want to have access to CIMC:

      Role

      CiscoAVPair Attribute Value

      admin

      shell:roles="admin"

      user

      shell:roles="user"

      read-only

      shell:roles="read-only"

      Note   

      For more information about adding values to attributes, see the article at http://technet.microsoft.com/en-us/library/bb727064.aspx.


      What to Do Next

      Use the CIMC to configure Active Directory.

      Configuring Active Directory in CIMC

      Before You Begin

      You must log in as a user with admin privileges to perform this task.

      Procedure
        Step 1   In the Navigation pane, click the Admin tab.
        Step 2   On the Admin tab, click User Management.
        Step 3   In the User Management pane, click the Active Directory tab.
        Step 4   In the Active Directory Properties area, update the following properties:
        Name Description

        Enabled check box

        If checked, user authentication and role authorization is performed by Active Directory for user accounts not found in the local user database.

        If you check this box, CIMC enables the rest of the fields in this section.

        Domain Controller fields

        You can specify up to three LDAP domain controllers that CIMC can use to access the LDAP database.

        CIMC tries to contact the database using the IP address in the order they are specified on this tab.

        Timeout field

        The number of seconds the CIMC waits until the LDAP search operation times out.

        If the search operation times out, CIMC tries to connect to the next domain controller or global catalog listed on this tab, if one is available.

        Enable Encryption check box

        If checked, the server encrypts all information it sends to Active Directory.

        Domain field

        The IPv4 domain that all users must be in.

        This field is required unless you specify at least one Global Catalog server address.

        Attributes field

        An LDAP attribute that contains the role and locale information for the user. This property is always a name-value pair. The system queries the user record for the value that matches this attribute name.

        The LDAP attribute must have the following attribute ID:

        CiscoAvPair

        Note   

        If you do not specify this property, user access is restricted to read-only.

        Global Catalog fields

        A Global Catalog allows CIMC to search for a user in the Active Directory regardless of the domain that user resides in.

        You can enter the IP address or fully qualified domain name (FQDN) for the Global Catalog in each of the three Global Catalog fields. CIMC tries to access the catalog using the IP addresses or FQDNs in the order they are specified on this tab.

        Step 5   (Optional)In the Active Directory Groups area, update the following properties:
        Name Description

        LDAP Group Authorization check box

        If checked, user authentication is also done on the group level for users that are not found in the local user database or who are not individually authorized to use CIMC in the Active Directory.

        If you check this box, CIMC enables the Configure Group button.

        Group Name column

        The name of the group in the Active Directory database that is authorized to access the server.

        Group Domain column

        The Active Directory domain the group must reside in.

        Role column

        The role assigned to all users in this Active Directory group. This can be one of the following:

        • read-only—A user with this role can view information but cannot make any changes.
        • user—A user with this role can perform the following tasks:
          • View all information
          • Manage the power control options such as power on, power cycle, and power off
          • Launch the KVM console and virtual media
          • Clear all logs
          • Toggle the locator LED
        • admin—A user with this role can perform all actions available through the GUI, CLI, and IPMI.
        Step 6   Click Save Changes.

        Viewing User Sessions

        Procedure
          Step 1   In the Navigation pane, click the Admin tab.
          Step 2   On the Admin tab, click User Management.
          Step 3   In the User Management pane, click the Sessions tab.
          Step 4   View the following information about current user sessions:
          Tip   

          Click a column header to sort the table rows, according to the entries in that column.

          Name Description

          Session ID column

          The unique identifier for the session.

          Username column

          The username for the user.

          IP Address column

          The IP address from which the user accessed the server.

          Type column

          The method by which the user accessed the server.

          Action column

          If your user account is assigned the admin user role, this column displays Terminate if you can force the associated user session to end. Otherwise it displays N/A.

          Note   

          You cannot terminate your current session from this tab.