Support Center

Configuring Dell iDRAC to use JumpCloud's LDAP-as-a-Service

Prerequisites:
See Using JumpCloud's LDAP-as-a-Service to obtain the JumpCloud specific settings required below.

This process was qualified on 12/01/2016 with iDRAC8 v2.40.40.40.

The following configuration information will allow for LDAP authentication with the Integrated Dell Remote Access Controller (iDRAC).  
 

LDAP Settings:


Generic LDAP Enabled: Yes
Use Distinguished Name to Search Group Membership​: Yes
LDAP Server Address: ldap.jumpcloud.com
LDAP Server Port: 636 or 389
Bind DN: uid=LDAP_BINDING_USER,ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com
Bind Password: LDAP_BINDING_USER_PASSWORD
Base DN to Search: ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com
Attribute of User Login: uid

To leverage LDAP Groups, see Creating LDAP Groups.  NOTE: Any member of this group should also be set as an LDAP binding user in their User Details. This is necessary because after the iDRAC performs the initial authentication, it attempts to use the unique uid of the authenticated user to search LDAP for group membership and authorization to resources.



To add group privilege, define a Group DN under one of the Role Groupsettings.

Group DN: cn=GROUP_NAME,ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com
 

Last Updated: Apr 07, 2017 12:06PM MDT

Related Articles
desk-forwarding@jumpcloud.com
http://assets2.desk.com/
false
desk
Loading
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
about
false
Invalid characters found
/customer/en/portal/articles/autocomplete