Managing User Accounts



Similar documents
Managing User Accounts

Managing User Accounts

Configuring User Identification via Active Directory

Creating and Issuing the Workstation Authentication Certificate Template on the Certification Authority

LDAP Server Configuration Example

Setting the Management IP Address

Managing the System Event Log

Microsoft IAS Configuration for RADIUS Authorization

Managing Identities and Admin Access

IIS, FTP Server and Windows

System Administration and Log Management

Managing the System Event Log

Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN June 2009

Configuring the Palo Alto Firewall for use with Juniper Steel-Belted RADIUS.

Integrating LANGuardian with Active Directory

Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS)

Managing the System Event Log

LDAP Implementation AP561x KVM Switches. All content in this presentation is protected 2008 American Power Conversion Corporation

LDAP Server Configuration Example

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

Your Question. Net Report Answer

Protected Trust Directory Sync Guide

Upgrading User-ID. Tech Note PAN-OS , Palo Alto Networks, Inc.

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

End User Configuration

Active Directory integration with CloudByte ElastiStor

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Two-Factor Authentication

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Create, Link, or Edit a GPO with Active Directory Users and Computers

To enable an application to use external usernames and passwords, you need to first configure CA EEM to use external directories.

Kerberos authentication between multiple domains may fail on LiveCycle Rights Management ES 8.2.1

QUANTIFY INSTALLATION GUIDE

SharePoint AD Information Sync Installation Instruction

Configuring Microsoft Active Directory for Integration with NextPage NXT 3 Access Control

Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

Integrating with IBM Tivoli TSOM

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

Creating Home Directories for Windows and Macintosh Computers

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

Instructions: Configuring Outlook 2003 with Exchange 2010 on the FIUMail

Video Administration Backup and Restore Procedures

How To - Implement Single Sign On Authentication with Active Directory

Integrating idrac7 With Microsoft Active Directory

NAS 206 Using NAS with Windows Active Directory

How to Configure Microsoft System Operation Manager to Monitor Active Directory, Group Policy and Exchange Changes Using NetWrix Active Directory

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

Before you may use any database in Limnor, you need to create a database connection for it. Select Project menu, select Databases:

Active Directory Integration

Integrating CoroSoft Datacenter Automation Suite with F5 Networks BIG-IP

Management Utilities Configuration for UAC Environments

Monitoring Inventory. Inventory Management. This chapter includes the following sections:

Configuring Steel-Belted RADIUS Proxy to Send Group Attributes

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Sample Configuration: Cisco UCS, LDAP and Active Directory

Configure Cisco Unified Customer Voice Portal

Moving the TRITON Reporting Databases

Delegated Administration Quick Start

Unified Monitoring Portal Online Help Account Admin

econtrol 3.5 for Active Directory & Exchange Administrator Guide

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Configure Single Sign on Between Domino and WPS

CA Unified Infrastructure Management Server

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

WatchDox Administrator's Guide. Application Version 3.7.5

Using LDAP Authentication in a PowerCenter Domain

Deploying RSA ClearTrust with the FirePass controller

Installing Management Applications on VNX for File

Security Assertion Markup Language (SAML) Site Manager Setup

NSi Mobile Installation Guide. Version 6.2

Charter Business Phone. Online Control Panel Getting Started Guide. Document Version 1.0

RoomWizard Synchronization Software Manual Installation Instructions

Configuring Cisco Secure ACS v5.5 to use RADIUS for Orchestrator Authentication

How To Install Ctera Agent On A Pc Or Macbook With Acedo (Windows) On A Macbook Or Macintosh (Windows Xp) On An Ubuntu (Windows 7) On Pc Or Ipad

CLEO NED Active Directory Integration. Version 1.2.0

Integrating idrac 7 with Microsoft Active Directory

How To Backup In Cisco Uk Central And Cisco Cusd (Cisco) Cusm (Custodian) (Cusd) (Uk) (Usd).Com) (Ucs) (Cyse

Spectrum Technology Platform. Version 9.0. Administration Guide

Centrify Cloud Connector Deployment Guide

HP Device Manager 4.7

External Authentication with Windows 2012 R2 Server with Remote Desktop Web Gateway Authenticating Users Using SecurAccess Server by SecurEnvoy

Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

Basic Exchange Setup Guide

Use Enterprise SSO as the Credential Server for Protected Sites

Managing an Active Directory Infrastructure O BJECTIVES

SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION

Configure your firewall for administrative access via RADIUS authentication

Installing the Operating System or Hypervisor

ADFS Integration Guidelines

Managing users. Account sources. Chapter 1

setup information for most domains hosted with InfoRailway.

LifeSize Control Installation Guide

NT Authentication Configuration Guide

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide

Installing GFI MailArchiver

Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal

Transcription:

Managing User Accounts This chapter includes the following sections: Active Directory, page 1 Configuring Local Users, page 3 Viewing User Sessions, page 5 Active Directory Active Directory is a technology that provides a variety of network services including LDAP-like directory services, Kerberos-based authentication, and DNS-based naming. The CIMC utilizes the Kerberos-based authentication service of Active Directory. When Active Directory is enabled in the CIMC, user authentication and role authorization is performed by Active Directory for user accounts not found in the local user database. By checking the Enable Encryption check box in the Active Directory Properties area, you can require the server to encrypt data sent to Active Directory. Configuring Active Directory in CIMC Before You Begin You must log in as a user with admin privileges to configure active directory. In the Navigation pane, click the Admin tab. On the Admin tab, click User Management. In the User Management pane, click the Active Directory tab. In the Active Directory Properties area, update the following properties: OL-23489-03b 1

Configuring the Active Directory Server Managing User Accounts Name Enabled check box Server IP Address field Timeout field Enable Encryption check box Domain field Attributes field If checked, user authentication and role authorization is performed by Active Directory for user accounts not found in the local user database. The Active Directory server IP address. The number of seconds the CIMC waits until it assumes the connection to Active Directory cannot be established. If checked, the server encrypts all information it sends to Active Directory. The domain that all users must be in. An LDAP attribute that contains the role and locale information for the user. This property is always a name-value pair. The system queries the user record for the value that matches this attribute name. The LDAP attribute must have the following attribute ID: 1.3.6.1.4.1.9.287247.1 If you do not specify this property, user access is restricted to read-only. Step 5 Click Save Changes. Configuring the Active Directory Server The CIMC can be configured to use Active Directory for user authentication and authorization. To use Active Directory, configure users with an attribute that holds the user role and locale information for the CIMC. You can use an existing LDAP attribute that is mapped to the CIMC user roles and locales or you can modify the Active Directory schema to add a new custom attribute, such as the CiscoAVPair attribute, which has an attribute ID of 1.3.6.1.4.1.9.287247.1. For more information about altering the Active Directory schema, see the article at http://technet.microsoft.com/en-us/library/bb727064.aspx. The following steps are to be performed on the Active Directory server. This example creates a custom attribute named CiscoAVPair, but you can also use an existing LDAP attribute that is mapped to the CIMC user roles and locales. Ensure that the Active Directory schema snap-in is installed. Using the Active Directory schema snap-in, add a new attribute with the following properties: 2 OL-23489-03b

Managing User Accounts Configuring Local Users Properties Common Name LDAP Display Name Unique X500 Object ID Syntax Value CiscoAVPair CiscoAVPair 1.3.6.1.4.1.9.287247.1 CiscoAVPair Case Sensitive String Add the CiscoAVPair attribute to the user class using the Active Directory snap-in: a) Expand the Classes node in the left pane and type U to select the user class. b) Click the Attributes tab and click Add. c) Type C to select the CiscoAVPair attribute. d) Click OK. Add the following user role values to the CiscoAVPair attribute, for the users that you want to have access to CIMC: Role CiscoAVPair Attribute Value admin user read-only shell:roles="admin" shell:roles="user" shell:roles="read-only" For more information about adding values to attributes, see the article at http://technet.microsoft.com/ en-us/library/bb727064.aspx. What to Do Next Use the CIMC to configure Active Directory. Configuring Local Users Before You Begin You must log in as a user with admin privileges to configure or modify local user accounts. OL-23489-03b 3

Configuring Local Users Managing User Accounts Step 5 In the Navigation pane, click the Admin tab. On the Admin tab, click User Management. In the User Management pane, click the Local User tab. To configure or modify a local user account, click a row. In the User Details dialog box, update the following properties: Name ID column Enabled check box Username column Role column The unique identifier for the user. If checked, the user is enabled on the CIMC. The username for the user. The role assigned to the user. This can be: read-only This user can view information but cannot make any changes. user This user can: View all information Manage the power control options such as power on, power cycle, and power off Launch the KVM console and virtual media Clear all logs Toggle the locator LED admin This user can perform all actions available through the GUI, CLI, and IPMI. Step 6 Step 7 Enter password information. Click Save Changes. 4 OL-23489-03b

Managing User Accounts Viewing User Sessions Viewing User Sessions In the Navigation pane, click the Admin tab. On the Admin tab, click User Management. In the User Management pane, click the Sessions tab. View the following information about current user sessions: Tip Click a column header to sort the table rows, according to the entries in that column. Name Session ID column Username column IP Address column Type column Action column The unique identifier for the session. The username for the user. The IP address from which the user accessed the server. The method by which the user accessed the server. If your user account is assigned the admin user role, this column displays Terminate if you can force the associated user session to end. Otherwise it displays N/A. You cannot terminate your current session from this tab. OL-23489-03b 5

Viewing User Sessions Managing User Accounts 6 OL-23489-03b