Requirement
Certificate will be needed to validate LDAP server securely
Environment
- iDRAC settings (especially network related) has already been configured
- Internal CA already configured
- Internal CA certificate has already been installed on end-point machines
- Latest iDRAC version is installed
- DNS is working as per intended
- Domain Controller is enabled with LDAP
- Domain service account is configured and we already have the DN (e.g. CN=svciDRAC,OU=Users,OU=Infra,DC=example,DC=com)
Root certificate
- Need to export root DC certificate
- Open Manage Computer Certificate from CA
- From the folder Personal > Certificates, export your certificate
- Choose Base-64 .cer format and follow the prompt
Configuration
- Go to iDRAC web interface
- Navigate to iDRAC Settings > User Authentication > Directory Services
- Enable Generic LDAP Directory Services
- Edit the configuration
- We can upload the root cert when requested. This is to get encryption working between iDRAC and DC
- On common settings page,
- Enable Generic LDAP
- Use Distinguished Name to Search Group membership
- Put your FQDN for LDAP server in LDAP server address
- Port = 636
- BindDN = DN for the domain service account
- Update Bind Password
- Key in password for service account in Bind Password
- Base DN to search can be wide or narrow (e.g. DC=example,DC=com for root DN)
- Attribute of User Login for AD is sAMAccountName (case sensitive)
- Attribute of Group Membership = member
- On Group Settings, we can include the group DN and assign privileges
The user account must be in this group to get privileges assigned to user.
(e.g. CN=ServerAdmins,OU=SG-IT,OU=Employees,DC=example,DC=com)