3.
Click
Sites
.
The
Local Intranet
dialog box is displayed.
4.
Click
Advanced
.
The
Local Intranet Advance Settings
dialog box is displayed.
5.
In the
Add this site to the zone
, type the name of CMC and the domain it belongs to and click
Add
.
NOTE: You can use a wildcard (*) to specify all devices or users in that domain.
Mozilla Firefox
1.
In Firefox, type about:config in the Address bar.
NOTE: If the browser displays the This might void your warranty warning, click I'll be careful. I promise.
2.
In the
Filter
box, type negotiate.
The browser displays a list of preference names limited to those containing the word negotiate.
3.
From the list, double-click
network.negotiate-auth.trusted-uris
.
4.
In the
Enter string value
dialog box, type the CMC's domain name and click
OK
.
Configuring Browser For Smart Card Login
Internet Explorer — Make sure that the Internet Browser is configured to download Active-X plug-ins.
Configuring CMC SSO Or Smart Card Login For Active Directory Users
You can use CMC web interface or RACADM to configure CMC SSO or smart card login.
Configuring CMC SSO Or Smart Card Login For Active Directory Users Using Web Interface
To configure Active Directory SSO or smart card login for CMC:
NOTE: For information about the options, see the
Online Help
.
1.
While configuring Active Directory to set up user account, perform the following additional steps:
•
Upload the keytab file.
•
To enable SSO, select the
Enable Single Sign-On
option.
•
To enable smart card login, select the
Enable Smart-Card Login
option.
NOTE: If these two options are selected, all command line out-of-band interfaces, including secure shell (SSH),
Telnet, Serial, and remote RACADM remain unchanged .
2.
Click
Apply
.
The settings are saved.
You can test the Active Directory using Kerberos authentication using the RACADM command:
testfeature -f adkrb -u <user>@<domain>
where
<
user
>
is a valid Active Directory user account.
A command success indicates that CMC is able to acquire Kerberos credentials and access the user's Active Directory account.
If the command is not successful, resolve the error and run the command again. For more information, see the
Chassis
Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide
on dell.com/support/manuals.
Uploading Keytab File
The Kerberos keytab file serves as the CMC's user name and password credentials to the Kerberos Data Center (KDC), which in
turns allows access to the Active Directory. Each CMC in the Kerberos realm must be registered with the Active Directory and must
have a unique keytab file.
132