1 Rookie
•
67 Posts
0
69
May 20th, 2025 09:57
iDRAC Scripted (RACADM / Redfish) Active Directory services configuration.
Has anyone scripted configuring iDRAC Active Directory services configuration?
PowerShell preferably, but will take any functioning example to get me started.
I have iDRAC 9 with firmware 7.0.x and I am really struggling to get my head around it.
Screenshots of the configuration steps I need to script:
1) Enable 'Microsoft Active Directory' in "iDRAC Settings | Users | Directory Services"
2) Enable 'Certificate Validation' and upload my CA Chain cert as Base64.
3) Configure 'Common Settings'
4) Configure 'Schema Selection'
5) Configure 'Standard Schema Settings and Role Groups'
I have already reviewed the RACADM and Redfish user guides and I am still stuck.
Any help or pointers will be appreciated.
Thanks
M
No Events found!
DELL-Chris H
Moderator
•
9.4K Posts
1
May 20th, 2025 14:19
Mc1903,
Normally we don't support initial configuration, but I can give it my best shot, but you may need to call in for help with it.
This is a step by step Powershell and racadm script outline;
# Define iDRAC credentials and IP
$idracIP = "192.168.1.100"
$username = "root"
$password = "yourpassword"
# Enable Active Directory
racadm -r $idracIP -u $username -p $password set idrac.ActiveDirectory.Enable 1
racadm -r $idracIP -u $username -p $password set idrac.ActiveDirectory.DomainController1 "dc1.yourdomain.com"
racadm -r $idracIP -u $username -p $password set idrac.ActiveDirectory.DomainController2 "dc2.yourdomain.com"
racadm -r $idracIP -u $username -p $password set idrac.ActiveDirectory.DomainName "yourdomain.com"
# Enable Certificate Validation
racadm -r $idracIP -u $username -p $password set idrac.ActiveDirectory.CertValidationEnable 1
# Upload CA Certificate
$certPath = "C:\path\to\your\ca_chain.pem"
racadm -r $idracIP -u $username -p $password sslcertupload -t 2 -f $certPath
# Configure Common Settings
racadm -r $idracIP -u $username -p $password set idrac.ActiveDirectory.UserDomain "yourdomain.com"
racadm -r $idracIP -u $username -p $password set idrac.ActiveDirectory.UserName "youradminuser"
racadm -r $idracIP -u $username -p $password set idrac.ActiveDirectory.UserPassword "youradminpassword"
# Schema Selection (Standard Schema)
racadm -r $idracIP -u $username -p $password set idrac.ActiveDirectory.Schema 0
# Configure Role Groups (example for Domain Admins)
racadm -r $idracIP -u $username -p $password set idrac.ActiveDirectory.RoleGroup1 "CN=Domain Admins,CN=Users,DC=yourdomain,DC=com"
racadm -r $idracIP -u $username -p $password set idrac.ActiveDirectory.RoleGroup1Privilege 4 # 4 = Administrator
After that then you would want to log into iDRAC using an AD user from the configured group, then use racadm get idrac.ActiveDirectory to verify settings.
Let me know if this helps.
mc1903
1 Rookie
•
67 Posts
0
May 20th, 2025 16:34
Thank you @DELL-Chris H very much appreciated. Just what I needed.
RACADM isn't very efficient; I had hoped I could send multiple settings per invocation. I.e. as json or similar. Thankfully I only have a few servers I need to remediate this time.
This is what worked for me in the end. I will wrap this in a ForEach to execute on multiple iDRAC's