NOTE:
If you do not have a trusted certificate, you cannot access iLO. Attempts to browse to the iLO web
interface will generate an error.
Directory User Certificate Name Mapping
•
For Directory Username
—Allows you to select the portion of the user certificate to use as your
directory user name:
◦
Use Certificate SAN UPN
—Uses the first subject alternative name (SAN) field of type
userPrincipalName (UPN), which contains the user and domain names in an email address format
as the user name. For example,
upn:testuser@domain.com
produces
testuser@domain.com
.
◦
Use Certificate Subject CN
—Uses only the CN or CommonName portion of the subject as the
user name. For example, in the following DN:
cn=test user, ou=users,dc=domain,dc=com
the common name is
test user
.
◦
Use Full Certificate Subject DN
—Uses the complete distinguished name as the user name when
searching for the user in the directory service. For example, a distinguished name appears as
follows:
cn=test user, ou=users,dc=domain,dc=com
.
◦
Use Certificate SAN RFC822 Name
—Uses the first SAN field of type rfc822Name, which contains
an email address as the username. For example,
rfc822Name:testuser@domain.com
produces
testuser@domain.com
as the username.
Managing trusted certificates for CAC Smartcard Authentication
Importing a trusted CA certificate
Prerequisites
• Configure iLO Settings privilege
• An iLO license that supports this feature is installed.
Procedure
1.
Click
Security
in the navigation tree, and then click the
CAC/Smartcard
tab.
2.
Paste a trusted CA certificate in the
Direct Import
section.
The certificate must be in PEM encoded Base64 format.
3.
Click
Apply
.
If the operation does not appear to have worked, scroll to the top of the page to see if any error
messages displayed.
Managing trusted certificates for CAC Smartcard Authentication
243