Sample Configuration: Cisco UCS, LDAP and Active Directory



Similar documents
Cisco UCS Director Payment Gateway Integration Guide, Release 4.1

Cisco Unified Communications Self Care Portal User Guide, Release 10.5(1)

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

FireSIGHT User Agent Configuration Guide

Cisco Collaboration with Microsoft Interoperability

TelePresence Migrating TelePresence Management Suite (TMS) to a New Server

Ports Reference Guide for Cisco Virtualization Experience Media Engine for SUSE Linux Release 9.0

Enabling Single Sign- On for Common Identity using F5

Cisco Jabber for Windows 10.5 Advanced Features Guide

Cisco TelePresence VCR Converter 1.0(1.8)

QoS: CBQoS Management Policy-to- Interface Mapping Support Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000)

Cisco Prime Central Managing Certificates

Disaster Recovery Configuration Guide for CiscoWorks Network Compliance Manager 1.8

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1

Troubleshooting Procedures for Cisco TelePresence Video Communication Server

CA Unified Infrastructure Management Server

Cisco TelePresence Management Suite Provisioning

Cisco TelePresence VCR MSE 8220

Cisco Expressway IP Port Usage for Firewall Traversal. Cisco Expressway X8.1 D December 2013

Cisco Unified Workforce Optimization

Cisco Unified Communications Manager SIP Line Messaging Guide (Standard)

Cisco Registered Envelope Recipient Guide

Accessibility Guidelines for Cisco Unified Contact Center Management Portal

Cisco Process Orchestrator Installation Guide

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

Contents Notice to Users

User Guide for the Cisco Unity Connection Phone Interface (Release 8.x)

4.0. Offline Folder Wizard. User Guide

CA Nimsoft Service Desk

Cisco WebEx Meetings Server System Requirements

Active Directory Change Notifier Quick Start Guide

Cisco TelePresence MCU Accessing Conferences

To enable an application to use external usernames and passwords, you need to first configure CA EEM to use external directories.

Cisco TelePresence Video Communication Server (Cisco VCS) IP Port Usage for Firewall Traversal. Cisco VCS X8.5 December 2014

Cisco Video Surveillance Operations Manager Mobile App User Guide

Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names

Web Remote Access. User Guide

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

HP Device Manager 4.7

EMC ViPR Controller Add-in for Microsoft System Center Virtual Machine Manager

Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Cisco IOS Flexible NetFlow Command Reference

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.3

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Cisco Unified Workforce Optimization

Using LDAP Authentication in a PowerCenter Domain

Cisco WebEx Meetings Server Administration Guide

CA Spectrum and CA Service Desk

Security Assertion Markup Language (SAML) Site Manager Setup

Active Directory integration with CloudByte ElastiStor

Cisco TelePresence Management Suite 15.0

Integrating CAD with Thin Client and Virtual Desktop Environments

Adeptia Suite LDAP Integration Guide

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Upgrading User-ID. Tech Note PAN-OS , Palo Alto Networks, Inc.

Installation Guide for Cisco Unified ICM/Contact Center Enterprise and Hosted Release 9.0(1)

Content Filtering Client Policy & Reporting Administrator s Guide

PriveonLabs Research. Cisco Security Agent Protection Series:

Using LDAP with Sentry Firmware and Sentry Power Manager (SPM)

Replacing MCU Software with TelePresence Server Software on Cisco TelePresence MCU 5300 Series. Last Updated: February 2016

Integrated Citrix Servers

Application Note. Gemalto s SA Server and OpenLDAP

Configuring User Identification via Active Directory

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Using Microsoft Active Directory Server and IAS Authentication

CA NetQoS Performance Center

User Management Guide

Symantec Managed PKI. Integration Guide for ActiveSync

HP Device Manager 4.6

Version 9. Active Directory Integration in Progeny 9

CISCO TELEPRESENCE MANAGEMENT SUITE EXTENSION

CA ARCserve Backup for Windows

NSi Mobile Installation Guide. Version 6.2

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Using Microsoft Active Directory (AD) with HA3969U in Windows Server

Active Directory 2008 Implementation. Version 6.410

FTP Server Configuration

CA VPN Client. User Guide for Windows

CommVault Simpana Archive 8.0 Integration Guide

BlackShield ID. QUICKStart Guide. Integrating Active Directory Lightweight Services

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Defender 5.7. Remote Access User Guide

CA Technologies SiteMinder

Discovery Guide. Secret Server. Table of Contents

LepideAuditor Suite for File Server. Installation and Configuration Guide

Interworks. Interworks Cloud Platform Installation Guide

Cisco TelePresence MCU 5300 Series

Managing Identities and Admin Access

Cisco UCS C-Series Servers Linux Installation Guide

HOTPin Integration Guide: DirectAccess

Cisco IronPort Security Plug-in 7.3 Administrator Guide

CA Nimsoft Monitor. Probe Guide for IIS Server Monitoring. iis v1.5 series

Disaster Recovery System Administration Guide for Cisco Unified Communications Manager, Release 9.0(1)

Dell Statistica Document Management System (SDMS) Installation Instructions

How to configure MAC authentication on a ProCurve switch

Deploying Business Objects Crystal Reports Server on IBM InfoSphere Balanced Warehouse C-Class Solution for Windows

F-Secure Messaging Security Gateway. Deployment Guide

Transcription:

First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-24834-04

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http:// www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) 2011-2014 Cisco Systems, Inc. All rights reserved.

CONTENTS CHAPTER 1 Overview 1 LDAP and Multiple Authentication Server Configuration Using Active Directory 1 Prerequisites 2 CHAPTER 2 Configuring the Active Directory Server 3 Creating an Organizational Unit and Adding Groups 3 Creating a Non-Admin Bind User Account 4 Creating Users and Adding Them to the CiscoUCS OU 5 Collecting Information for the UCS LDAP Configuration 5 CHAPTER 3 Configuring Cisco UCS 7 Creating a Local Authentication Domain 7 Creating an LDAP Provider 8 Configuring the LDAP Group Rule 9 Creating an LDAP Provider Group 9 Creating an LDAP Group Map 10 Creating an LDAP Authentication Domain 10 CHAPTER 4 Testing Your Configuration 13 Testing Your Configuration Using the UCS Manager CLI 13 Testing Your Configuration Using the UCS Manager GUI 14 APPENDIX A FAQs 15 OL-24834-04 iii

Contents iv OL-24834-04

CHAPTER 1 Overview This chapter includes the following sections: LDAP and Multiple Authentication Server Configuration Using Active Directory, page 1 Prerequisites, page 2 LDAP and Multiple Authentication Server Configuration Using Active Directory Cisco UCS can be configured to authenticate user logins remotely using LDAP and various remote authentication providers, such as Active Directory (AD). This sample configuration is intended to show you the complete process from start to finish of implementing Cisco UCS LDAP and multiple server authentication using an AD server. It also includes steps for testing your implementation in the Cisco UCS Manager GUI and Cisco UCS Manager CLI. Specifically, this configuration includes the following tasks in the AD server: Creating an Organizational Unit and Adding Groups, on page 3 Creating a Non-Admin Bind User Account, on page 4 Creating Users and Adding Them to the CiscoUCS OU, on page 5 Collecting Information for the UCS LDAP Configuration, on page 5 The following tasks are completed in Cisco UCS Manager: Creating a Local Authentication Domain, on page 7 Creating an LDAP Provider, on page 8 Configuring the LDAP Group Rule, on page 9 Creating an LDAP Provider Group, on page 9 Creating an LDAP Group Map, on page 10 Creating an LDAP Authentication Domain, on page 10 OL-24834-04 1

Prerequisites Overview Prerequisites To complete this sample configuration, you must have the following: Cisco UCS system Cisco UCS Manager Release 2.x Microsoft Active Directory server 2003 or later Administrative privileges for the Active Directory server ADSI Edit 2 OL-24834-04

CHAPTER 2 Configuring the Active Directory Server This chapter includes the following sections: Creating an Organizational Unit and Adding Groups, page 3 Creating a Non-Admin Bind User Account, page 4 Creating Users and Adding Them to the CiscoUCS OU, page 5 Collecting Information for the UCS LDAP Configuration, page 5 Creating an Organizational Unit and Adding Groups Organizational units (OUs) in the AD server contain AD groups that map to user roles in Cisco UCS. For every role maintained in AD, you must have the same role configured in Cisco UCS. Note Maintaining matching role names in both AD and Cisco UCS is a requirement for integration. Step 4 Open Active Directory Users and Computers. Right-click the AD instance, sampledesign.com, and select New > Organizational Unit. For Name, type CiscoUCS. Create a new group called ucsaaa and assign it to the newly created CiscoUCS OU: a) Right-click the new CiscoUCS OU and select New > Group. b) In the New Object - Group dialog box, type ucsaaa in the Group name field. c) In the Group scope area, click the Global radio button. d) In the Group type area, click the Security radio button and click OK. Step 5 Repeat Step 4 for each of the following roles: ucsaaa ucsadmin OL-24834-04 3

Creating a Non-Admin Bind User Account Configuring the Active Directory Server ucsnetwork ucsoperation ucsecurity ucstorage What to Do Next Create a non-admin bind user and add it to the CiscoUCS OU. Creating a Non-Admin Bind User Account Cisco UCS uses the non-admin bind user account to regularly check which groups the user is included in within the AD server. Note To prevent unnecessary authentication errors, we recommend that this account be set up with a non-expiring password. If you already have a non-admin user account in the AD server that can be used by Cisco UCS to authenticate users, then it is not necessary to create a new non-admin bind user account. You can skip this task and move on to creating sample users and adding them to the Cisco UCS OU. Step 4 Step 5 Right-click the CiscoUCS OU and select New > User. For First name, type ucs. Leave the Initials field blank. For Last name, type binduser. For User logon name, type ucsbind, select the UPN suffix in the drop-down list, and click Next. A user account called ucsbind appears in the CiscoUCS OU. What to Do Next Create sample users and add them to the CiscoUCS OU. 4 OL-24834-04

Configuring the Active Directory Server Creating Users and Adding Them to the CiscoUCS OU Creating Users and Adding Them to the CiscoUCS OU Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 0 Right-click CiscoUCS and select New > User. For First name, type sample. For Last name. type admin. For Full name, type sampleadmin. For User logon name, type sampleadmin, select the UPN suffix from the drop-down list, and click Next. In the work pane, right-click the sampleadmin user and click Properties. Click the MemberOf tab, and click Add. In the Enter the object names to select field of the Select Groups dialog box, type ucsadmin and click OK. Click OK again to close the Sample Admin Properties dialog box. (Optional) Repeat Steps 1 through 9 to create the following users: sampleaaa samplenetwork sampleoperation samplesecurity samplestorage What to Do Next Collect information needed for the Cisco UCS LDAP configuration. Collecting Information for the UCS LDAP Configuration To configure LDAP and multiple simultaneous authorizations in Cisco UCS Manager, you need to access several values from the AD server. This example uses ADSI Edit, a free third-party utility, to find the required values. Before You Begin Install and configure ADSI Edit. Open ADSI Edit and navigate to DC=sampledesign,DC=com. This is the BaseDN folder. OL-24834-04 5

Collecting Information for the UCS LDAP Configuration Configuring the Active Directory Server To find the BaseDN values required by Cisco UCS Manager to configure LDAP authentication, complete the following steps: a) Right-click the DC=sampledesign,DC=com instance and choose Properties. b) On the Attribute Editor tab, select distinguishedname. c) In the String Attribute Editor dialog box, select and copy the string in the Value field. The BaseDN value follows the DC=sampledesign,DC=com format. d) Paste the BaseDN value string into a text file for later use. To find the DN for each role that you have added to the CiscoUCS OU in AD, complete the following steps: a) Expand the CiscoUCS OU, right-click the CN=ucsadmin role, and choose Properties. b) On the Attribute Editor tab, select distinguishedname. c) In the String Attribute Editor dialog box, select and copy the string in the Value field. It should follow the CN=ucsadmin,OU=CiscoUCS,DC=sampledesign,DC=com format. d) Paste the DN value string into a text file for later use. e) Repeat these steps for each AD group in the CiscoUCS OU. Step 4 To find the BindDN for the non-admin bind user account, complete the following steps: a) Navigate to the user account named ucsbind. b) Right-click the ucsbind user account in the CiscoUCS OU and choose Properties. c) On the Attribute Editor tab, select distinguishedname. d) In the String Attribute Editor dialog box, select and copy the string in the Value field. The BindDN should follow the CN=ucsbind,OU=CiscoUCS,DC=sampledesign,DC=com format. e) Paste the BindDN value string into a text file for later use. Step 5 On the Attribute Editor tab, verify that the samaccountname attribute exists. What to Do Next Configure Cisco UCS using these values. 6 OL-24834-04

CHAPTER 3 Configuring Cisco UCS This chapter includes the following sections: Creating a Local Authentication Domain, page 7 Creating an LDAP Provider, page 8 Configuring the LDAP Group Rule, page 9 Creating an LDAP Provider Group, page 9 Creating an LDAP Group Map, page 10 Creating an LDAP Authentication Domain, page 10 Creating a Local Authentication Domain This sample configuration recommends that you create a local authentication domain before you configure LDAP settings in Cisco UCS Manager. Logging in as a local admin user guarantees that you will have the access rights required to complete the steps in this procedure, and could prevent you from having to spend time correcting an invalid configuration. Before You Begin Log into Cisco UCS Manager GUI as an admin user. In the Navigation pane, click the Admin tab. Step 4 Step 5 Step 6 On the Admin tab, expand All > User Management > Authentication. Right-click Authentication Domains and select Create a Domain. For the Name field, type local. For the Realm, click the local radio button. Click OK. OL-24834-04 7

Creating an LDAP Provider Configuring Cisco UCS What to Do Next Configure LDAP properties in Cisco UCS Manager. Creating an LDAP Provider This sample configuration does not include steps to configure LDAP with SSL. Step 4 Step 5 In the Navigation pane, click the Admin tab. On the Admin tab, expand All > User Management > LDAP. In the Work pane, click the General tab. In the Actions area, click Create LDAP Provider. In the Create LDAP Provider page of the wizard, do the following: a) In the Hostname field, type the IP address or the hostname of the AD server. b) In the Order field, accept the lowest-available default. c) In the BindDN field, copy and paste the BindDN from your AD configuration. For this sample configuration, the BindDN value is CN=ucsbind,OU=CiscoUsers,DC=sampledesign,DC=com. d) In the BaseDN field, copy and paste the BaseDN from your AD configuration. For this sample configuration, the BaseDN value is DC=sampledesign,DC=com. e) Leave the Enable SSL check box unchecked. f) In the Port field, accept the 389 default. g) In the Filter field, copy and paste the filter attribute from your AD configuration. Cisco UCS uses the filter value to determine if the user name provided on the logon screen by Cisco UCS Manager is in AD. For this sample configuration, the filter value is samaccountname=$userid, where $userid is the user name you enter in the Cisco UCS Manager logon screen. h) Leave the Attribute field blank. i) In the Password field, type the password for the ucsbind account configured in AD. If you ever need to go back into the Create LDAP Provider wizard to reset the password, do not be alarmed if the password field is blank. The "Set: yes" message that appears next to the password field indicates that a password has been set. j) In the Confirm Password field, retype the password for the ucsbind account configured in AD. k) In the Timeout field, accept the 30 default. l) In the Vendor field, select the radio button for MS-AD for Microsoft Active Directory. Step 6 Click Next. What to Do Next Configure the LDAP Group Rule. 8 OL-24834-04

Configuring Cisco UCS Configuring the LDAP Group Rule Configuring the LDAP Group Rule On the LDAP Group Rule page of the wizard, complete the following fields: a) For the Group Authentication field, click the enable radio button. Enabling group authentication indicates to UCSM that it should use the target attribute (in this example, memberof) to see if the user you are trying to authenticate is in a group like ucsaaa. b) For the Group Recursion field, click the recursive radio button. Setting group recursion to recursive allows the system to continue digging down, level by level, until it finds a qualifying user. Setting the group recursion to non-recursive limits UCS to a search of the first-level, even if the search does not locate a qualified user. c) In the Target Attribute field, accept the memberof default. Click Finish. Note In a real-world scenario you would most likely have multiple LDAP providers. For multiple LDAP providers, you would repeat the steps to configure the LDAP Group Rule for each LDAP provider, changing the order as warranted for your configuration. However, in this sample configuration there is only one LDAP provider, so this is not necessary. The IP address for the AD server displays in the Navigation pane under LDAP > LDAP Providers. What to Do Next Create an LDAP Provider Group. Creating an LDAP Provider Group In the Navigation pane, right-click LDAP Provider Groups and select Create LDAP Provider Group. In the Create LDAP Provider Group dialog box, do the following: a) In the Name field, enter a unique name for the group such as LDAP Providers. b) In the LDAP Providers table, choose the IP address for your AD server. c) Click the >> button to add the AD server to your Included Providers table. Click OK. Your provider group appears in the LDAP Provider Groups folder. What to Do Next Configure LDAP Group Maps. OL-24834-04 9

Creating an LDAP Group Map Configuring Cisco UCS Creating an LDAP Group Map Step 4 In the Navigation pane, click the Admin tab. On the Admin tab, expand All > User Management > LDAP. In thework pane, click Create LDAP Group Map. In the Create LDAP Group Map dialog box, complete the following: a) In the LDAP Group DN field, copy and paste the value you saved from the AD server configuration section for your LDAP group. The LDAP Group DN value requested in this step maps to the distinguished name for each of the groups you created in AD under UCS Groups. For this reason, the Group DN value entered in Cisco UCS Manager must match exactly with the Group DN value in the AD server. In this sample configuration, this value is CN=ucsadmin,OU=CiscoUCS,DC=sampledesign,DC=com. b) In the Roles table, click the admin check box and click OK. Clicking the check box for a role indicates that you want to assign admin privileges to all users who are included in the group map. Step 5 Create new LDAP group maps (using the information you recorded earlier from AD) for each of the remaining roles in the AD server that you want to test. What to Do Next Create your LDAP authentication domain. Creating an LDAP Authentication Domain On the Admin tab, expand All > User Management > Authentication. Right-click Authentication Domains and select Create a Domain. In the Create a Domain dialog box, complete the following: a) In the Name field, type a name for your domain such as LDAP. b) In the Realm area, click the ldap radio button. c) From the Provider Group drop-down list, select the LDAP provider group previously created and click OK. The authentication domain appears under Authentication Domains. 10 OL-24834-04

Configuring Cisco UCS Creating an LDAP Authentication Domain What to Do Next Test your LDAP configuration using the Cisco UCS Manager GUI. OL-24834-04 11

Creating an LDAP Authentication Domain Configuring Cisco UCS 12 OL-24834-04

CHAPTER 4 Testing Your Configuration This chapter includes the following sections: Testing Your Configuration Using the UCS Manager CLI, page 13 Testing Your Configuration Using the UCS Manager GUI, page 14 Testing Your Configuration Using the UCS Manager CLI Command or Action Purpose Log into the Cisco UCS Manager CLI. UCS-A# connect nxos UCS-A (nxos)# test aaa server ldap ip-address Tests the LDAP configuration for any user that you have configured. username password Enters NXOS mode. The following example tests the LDAP configuration: UCS-A# connect nxos UCS-A (nxos) # test aaa server ldap 10.29.96.77 sampleaaa password user has been authenticated Attributes downloaded from remote server: User Groups: CN=ucsadmin,OU=CiscoUCS,DC=sampledesign,DC=com Roles: admin OL-24834-04 13

Testing Your Configuration Using the UCS Manager GUI Testing Your Configuration Testing Your Configuration Using the UCS Manager GUI Step 4 Step 5 Launch the Cisco UCS Manager GUI. In the User Name field, type sampleaaa. In the Password field, type your sampleaaa AD password. From the Domain drop-down list, select your LDAP provider and click OK. Navigate to All > User Management > User Services > Remotely Authenticated Users and confirm that your authentication domain and AD username are listed. This value takes the format AuthenticationDomain\ADUserName. 14 OL-24834-04

APPENDIX A FAQs Q. When recursive search is enabled, how many levels deep will recursion go? A. First, all groups which the user is directly a member of will be retrieved. Then, for each of these groups, their ancestor groups are traversed. The recursion continues until the top- level group is reached. Q. Will the AD integration and Cisco UCS Manager support two-factor authentication using AD certificates? A. No. Cisco UCS Manager only supports password-based authentication. Q. What are the known limitations of Cisco UCS Manager and AD integration? (For example, limits on AD traversal results, max groups searched, max AD objects, etc.) A. Currently there are no known limitations to the size of an AD instance for plain user authentication, although the filter value limits the search results to one or two. Cisco UCS Manager Release 1.3(x) and earlier allowed random filters, resulting in a large number of search results. In release 2.x, a validation is in place that prevents this. If a user belongs to large number of first-level groups, the retrieval of those groups is limited by the memory available for the UCS Manager LDAP client. UCS Manager processes only those groups that have been configured with roles and/or locales and discards all other groups. The maximum number of groups that the user can be member of is 32. This is consistent with the number of group-to-role mappings allowed in UCS Manager. Q. What is the maximum AD structure that has been tested and qualified? A. We have determined that user authentication is not dependent on AD size. We have tested the AD integration with users belonging to more than 120 groups, with each group name having 100 characters. Q. Does Cisco UCS Manager support AD nested groups? A. Yes. In Cisco UCS Manager Release 2.x, Active Directory nested groups are supported for LDAP group to UCSM role mappings. OL-24834-04 15

16 OL-24834-04 FAQs