- Preface
- Overview
- Installing the Server Operating System or Hypervisor
- Managing the Server
- Managing Storage Using RAID
- Viewing Server Properties
- Viewing Server Sensors
- Managing Remote Presence
- Managing User Accounts
- Configuring Network-Related Settings
- Configuring Communication Services
- Managing Certificates
- Configuring Platform Event Filters
- Firmware Management
- Viewing Faults and Logs
- Server Utilities
- Diagnostic Tests
- Index
Managing User Accounts
This chapter includes the following sections:
Configuring Local Users
You must log in as a user with admin privileges to configure or modify local user accounts.
LDAP Servers (Active Directory)
CIMC supports directory services that organize information in a directory, and manage access to this information. CIMC supports Lightweight Directory Access Protocol (LDAP), which stores and maintains directory information in a network. In addition, CIMC supports Microsoft Active Directory (AD). Active Directory is a technology that provides a variety of network services including LDAP-like directory services, Kerberos-based authentication, and DNS-based naming. The CIMC utilizes the Kerberos-based authentication service of LDAP.
When LDAP is enabled in the CIMC, user authentication and role authorization is performed by the LDAP server for user accounts not found in the local user database. The LDAP user authentication format is username@domain.com.
By checking the Enable Encryption check box in the LDAP Settings area, you can require the server to encrypt data sent to the LDAP server.
Configuring the LDAP Server
The CIMC can be configured to use LDAP for user authentication and authorization. To use LDAP, configure users with an attribute that holds the user role and locale information for the CIMC. You can use an existing LDAP attribute that is mapped to the CIMC user roles and locales or you can modify the LDAP schema to add a new custom attribute, such as the CiscoAVPair attribute, which has an attribute ID of 1.3.6.1.4.1.9.287247.1.
For more information about altering the schema, see the article at http://technet.microsoft.com/en-us/library/bb727064.aspx.
![]() Note | This example creates a custom attribute named CiscoAVPair, but you can also use an existing LDAP attribute that is mapped to the CIMC user roles and locales. |
The following steps must be performed on the LDAP server.
| Step 1 | Ensure that the LDAP schema snap-in is installed. | ||||||||||||
| Step 2 | Using the schema snap-in, add a new attribute with the following
properties:
| ||||||||||||
| Step 3 | Add the CiscoAVPair attribute to the user class using the snap-in: | ||||||||||||
| Step 4 | Add the following user role values to the CiscoAVPair attribute,
for the users that you want to have access to CIMC:
|
What to Do Next
Use the CIMC to configure the LDAP server.
Configuring LDAP Settings and Group Authorization in CIMC
You must log in as a user with admin privileges to perform this task.
| Step 1 | In the Navigation pane, click the Admin tab. | ||||||||||||||||||||||
| Step 2 | On the Admin tab, click User Management. | ||||||||||||||||||||||
| Step 3 | In the
User
Management pane, click the
Active
Directory tab.
![]() | ||||||||||||||||||||||
| Step 4 | In the
LDAP
Settings area, update the following properties:
| ||||||||||||||||||||||
| Step 5 | In the
Configure LDAP Servers area, update the
following properties:
| ||||||||||||||||||||||
| Step 6 | In the
Binding Parameters area, update the following
properties:
| ||||||||||||||||||||||
| Step 7 | In the
Search Parameters area, update the following
fields:
| ||||||||||||||||||||||
| Step 8 | (Optional)In the
Group Authorization area, update the following
properties:
| ||||||||||||||||||||||
| Step 9 | Click Save Changes. | ||||||||||||||||||||||
Viewing User Sessions
| Step 1 | In the Navigation pane, click the Admin tab. | ||||||||||||||||
| Step 2 | On the Admin tab, click User Management. | ||||||||||||||||
| Step 3 | In the User Management pane, click the Sessions tab. | ||||||||||||||||
| Step 4 | View the following information about current user sessions:
|



Feedback