11.07.2015 Views

HP Integrated Lights-Out 2 User Guide

HP Integrated Lights-Out 2 User Guide

HP Integrated Lights-Out 2 User Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

How directory login restrictions are enforcedTwo sets of restrictions potentially limit a directory user's access to LOM devices. <strong>User</strong> access restrictionslimit a user's access to authenticate to the directory. Role access restrictions limit an authenticated user'sability to receive LOM privileges based on rights specified in one or more Roles.Restricting rolesRestrictions allow administrators to limit the scope of a role. A role only grants rights to those users thatsatisfy the role's restrictions. Using restricted roles results in users with dynamic rights that can changebased on the time of day or network address of the client.IMPORTANT: When directories are enabled, access to a particular iLO 2 is based on whether the userhas read access to a Role object that contains the corresponding iLO 2 object. This includes but is notlimited to the members listed in the role object. If the Role is set up to allow inheritable permissions topropagate from a parent, then members of the parent which have read access privileges will also haveaccess to iLO 2. To view the access control list, navigate to <strong>User</strong>s and Computers, open the propertiesscreen for the Role object and select the Security tab.For step-by-step instructions on how to create network and time restrictions on a role, refer to "ActiveDirectory Role Restrictions (on page 119)" or "eDirectory Role Restrictions (on page 126)" sections.Role time restrictionsAdministrators can place time restrictions on LOM roles. <strong>User</strong>s are granted the rights specified for theLOM devices listed in the role, only if they are members of the role and meet the time restrictions for thatrole.LOM devices use local host time to enforce time restrictions. If the LOM device clock is not set, the roletime restriction fails unless no time restrictions are specified on the role.Role-based time restrictions can only be satisfied if the time is set on the LOM device. The time is normallyset when the host is booted, and it is maintained by running the agents in the host operating system,which allows the LOM device to compensate for leap year and minimize clock drift with respect to thehost. Events, such as unexpected power loss or flashing LOM firmware, can cause the LOM device clockto not be set. Also, the host time must be correct for the LOM device to preserve time across firmwareflashes.Directory-enabled remote management 131

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!