Solved

Signing certificates for DRAC5 and iLO2

Posted on 2008-10-30
2
956 Views
Last Modified: 2013-12-04
Hi People,

This is a topic I am not very familiar with, I have setup an internal Windows 2003 certificate server and I want to trust the DRAC5 and iLO2 cards in the servers. I really don't know the step by step instructions and I haven't found much information on how to do this.

So could someone point me to a paper or give me instruction on how to do this?!?

Many thanks
0
Comment
Question by:cvmcadmin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 55

Accepted Solution

by:
andyalder earned 125 total points
ID: 22850434
There is a stepthrough for the ilo at http://forums11.itrc.hp.com/service/forums/questionanswer.do?threadId=1040143 , there's also an AD integration whitepaper at h20000.www2.hp.com/bc/docs/support/SupportManual/c00190541/c00190541.pdf if you're using Windows.
0
 
LVL 26

Assisted Solution

by:lnkevin
lnkevin earned 125 total points
ID: 22850609
For HP,  login iLO --> Administration (tab) --> Security (on the left)--> SSL Certificate  (sub tab) --> Import

For Dell, click on this link and scroll drow a bit:
http://support.dell.com/support/edocs/software/smdrac3/drac5/OM53/en/ug/racugc4.htm#72912

K

0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question