[IMPORTANT] Please note that this site will be disabled on October 31. In it's place, the new JumpCloud Help Center is live! Check it out here!

Support Center

Configuring Dell iDRAC to use JumpCloud's LDAP-as-a-Service

See Using JumpCloud's LDAP-as-a-Service to obtain the JumpCloud specific settings required below.

This process was qualified on 12/01/2016 with iDRAC8 v2.40.40.40.

The following configuration information will allow for LDAP authentication with the Integrated Dell Remote Access Controller (iDRAC).  

LDAP Settings:

Generic LDAP Enabled: Yes
Use Distinguished Name to Search Group Membership​: Yes
LDAP Server Address: ldap.jumpcloud.com
LDAP Server Port: 636 or 389
Bind DN: uid=LDAP_BINDING_USER,ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com
Base DN to Search: ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com
Attribute of User Login: uid

To leverage LDAP Groups, see Creating LDAP Groups.  NOTE: Any member of this group should also be set as an LDAP binding user in their User Details. This is necessary because after the iDRAC performs the initial authentication, it attempts to use the unique uid of the authenticated user to search LDAP for group membership and authorization to resources.

To add group privilege, define a Group DN under one of the Role Groupsettings.

Group DN: cn=GROUP_NAME,ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com

Last Updated: Apr 07, 2017 12:06PM MDT

Related Articles
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
Invalid characters found