- Preface
- Overview
- Installing the Server OS
- Managing the Server
- Viewing Server Properties
- Viewing Server Sensors
- Managing Remote Presence
- Managing User Accounts
- Configuring Network-Related Settings
- Managing Network Adapters
- Configuring Communication Services
- Managing Certificates
- Configuring Platform Event Filters
- CIMC Firmware Management
- Viewing Logs
- Server Utilities
- Index
Managing User Accounts
This chapter includes the following sections:
- Active Directory
- Configuring Local Users
- Viewing User Sessions
- Configuring Active Directory in CIMC
- Configuring the Active Directory Server
Active Directory
Active Directory is a technology that provides a variety of network services including LDAP-like directory services, Kerberos-based authentication, and DNS-based naming. The CIMC utilizes the Kerberos-based authentication service of Active Directory.
When Active Directory is enabled in the CIMC, all user authentication and role authorization is performed by Active Directory, and the CIMC ignores the local database. If the CIMC cannot connect to Active Directory, it reverts to the local database.
By checking the Enable Encryption check box in the Active Directory Properties area, you can require the server to encrypt data sent to Active Directory.
Configuring Active Directory in CIMC
You must log in as a user with admin privileges to configure active directory.
Configuring the Active Directory Server
The CIMC can be configured to use Active Directory for user authentication and authorization. To use Active Directory, configure users with an attribute that holds the user role and locale information for the CIMC. You can use an existing LDAP attribute that is mapped to the CIMC user roles and locales or you can modify the Active Directory schema to add a new custom attribute, such as the CiscoAVPair attribute, which has an attribute ID of 1.3.6.1.4.1.9.287247.1. For more information about altering the Active Directory schema, see the article at http://technet.microsoft.com/en-us/library/bb727064.aspx.
The following steps are to be performed on the Active Directory server.
![]() Note |
This example creates a custom attribute named CiscoAVPair, but you can also use an existing LDAP attribute that is mapped to the CIMC user roles and locales. |
| Step 1 | Ensure that the Active Directory schema snap-in is installed. | ||||||||||||
| Step 2 |
Using the Active Directory schema snap-in, add a new attribute with the following properties:
|
||||||||||||
| Step 3 | Add the CiscoAVPair attribute to the user class using the Active Directory snap-in: | ||||||||||||
| Step 4 |
Add the following user role values to the CiscoAVPair attribute, for the users that you want to have access to CIMC:
|
What to Do Next
Use the CIMC to configure Active Directory.
Configuring Local Users
You must log in as a user with admin privileges to configure local users.
| Step 1 | In the Navigation pane, click the Admin tab. | ||||||||||
| Step 2 | On the Admin tab, click User Management. | ||||||||||
| Step 3 | In the User Management pane, click the Local User tab. | ||||||||||
| Step 4 | To configure a local user, click a row. | ||||||||||
| Step 5 |
In the User Details dialog box, update the following properties:
|
||||||||||
| Step 6 | Enter password information. | ||||||||||
| Step 7 | Click Save Changes. |
Viewing User Sessions
| Step 1 | In the Navigation pane, click the Admin tab. | ||||||||||||||||
| Step 2 | On the Admin tab, click User Management. | ||||||||||||||||
| Step 3 | In the User Management pane, click the Sessions tab. | ||||||||||||||||
| Step 4 |
View the following information about current user sessions:
|

Feedback