Closed kgrvamsi closed 4 years ago
Hi @kgrvamsi
Accounts URI is based off DMTF standard which doesn't have OEM attribute settings but we are looking into adding these in future iDRAC release. For now you'll have to use Server Configuration Profile feature to configure these iDRAC user settings.
Example of the payload passing in for POST command:
payload = {"ShareParameters":{"Target":"ALL"},"ImportBuffer":"<SystemConfiguration><Component FQDD=\"iDRAC.Embedded.1\"><Attribute Name=\"Users.3#UserName\">user3</Attribute><Attribute Name=\"Users.3#Password\">P@ssw0rd</Attribute><Attribute Name=\"Users.3#Privilege\">511</Attribute><Attribute Name=\"Users.3#IpmiLanPrivilege\">Administrator</Attribute><Attribute Name=\"Users.3#IpmiSerialPrivilege\">Administrator</Attribute><Attribute Name=\"Users.3#Enable\">Enabled</Attribute><Attribute Name=\"Users.3#SolEnable\">Enabled</Attribute><Attribute Name=\"Users.3#ProtocolEnable\">Enabled</Attribute><Attribute Name=\"Users.3#AuthenticationProtocol\">MD5</Attribute><Attribute Name=\"Users.3#PrivacyProtocol\">DES</Attribute></Component></SystemConfiguration>"}
Example of executing script using this payload.
C:\Python38-32>ImportSystemConfigurationLocalREDFISH.py -ip 192.168.0.120 -u root -p calvin
JID_874043214646 successfully created for ImportSystemConfiguration method
WARNING, JobStatus not completed, current status: "Importing Server Configuration Profile.", percent complete: "20"
WARNING, JobStatus not completed, current status: "Importing Server Configuration Profile.", percent complete: "20"
PASS, job ID JID_874043214646 successfully marked completed
Detailed configuration changes and job results for "JID_874043214646"
@odata.type: #DellManager.v1_0_0.ServerConfigurationProfileResults DisplayValue: User Admin User Name ErrCode: 0 Name: Users.3#UserName NewValue: user3 Severity: OK
@odata.type: #DellManager.v1_0_0.ServerConfigurationProfileResults DisplayValue: User Admin Password ErrCode: 0 Name: Users.3#Password NewValue: ** OldValue: ** Severity: OK
@odata.type: #DellManager.v1_0_0.ServerConfigurationProfileResults DisplayValue: User Admin Privilege ErrCode: 0 Name: Users.3#Privilege NewValue: 511 OldValue: 0 Severity: OK
@odata.type: #DellManager.v1_0_0.ServerConfigurationProfileResults DisplayValue: User Admin IPMI LAN Privilege ErrCode: 0 Name: Users.3#IpmiLanPrivilege NewValue: Administrator OldValue: No Access Severity: OK
@odata.type: #DellManager.v1_0_0.ServerConfigurationProfileResults DisplayValue: User Admin IPMI Serial Privilege ErrCode: 0 Name: Users.3#IpmiSerialPrivilege NewValue: Administrator OldValue: No Access Severity: OK
@odata.type: #DellManager.v1_0_0.ServerConfigurationProfileResults DisplayValue: User Admin Enable ErrCode: 0 Name: Users.3#Enable NewValue: Enabled OldValue: Disabled Severity: OK
@odata.type: #DellManager.v1_0_0.ServerConfigurationProfileResults DisplayValue: User Admin SOL Enable ErrCode: 0 Name: Users.3#SolEnable NewValue: Enabled OldValue: Disabled Severity: OK
@odata.type: #DellManager.v1_0_0.ServerConfigurationProfileResults DisplayValue: SNMP V3 Protocol Enable ErrCode: 0 Name: Users.3#ProtocolEnable NewValue: Enabled OldValue: Disabled Severity: OK
@odata.type: #DellManager.v1_0_0.ServerConfigurationProfileResults DisplayValue: SNMP V3 Authentication Protocol ErrCode: 0 Name: Users.3#AuthenticationProtocol NewValue: MD5 OldValue: SHA Severity: OK
@odata.type: #DellManager.v1_0_0.ServerConfigurationProfileResults DisplayValue: SNMP V3 Privacy Protocol ErrCode: 0 Name: Users.3#PrivacyProtocol NewValue: DES OldValue: AES Severity: OK
Message: Successfully imported and applied Server Configuration Profile. MessageArgs: [] MessageArgs@odata.count: 0 MessageId: SYS053
You can also use PATCH on OEM URI "redfish/v1/Managers/iDRAC.Embedded.1/Attributes" to configure iDRAC user.
Example:
C:\Python38-32>SetIdracLcSystemAttributesREDFISH.py -ip 192.168.0.120 -u root -p calvin -s idrac -an Users.3.Enable,Users.3.UserName,Users.3.Password,Users.3.Privilege,Users.3.IpmiLanPrivilege,Users.3.IpmiSerialPrivilege,Users.3.ProtocolEnable,Users.3.SolEnable -av Enabled,user3,P@ssw0rd,511,Administrator,Administrator,Enabled,Enabled
WARNING, changing "IDRAC" attributes -
Attribute Name: Users.3.Enable, setting new value to: Enabled Attribute Name: Users.3.UserName, setting new value to: user3 Attribute Name: Users.3.Password, setting new value to: P@ssw0rd Attribute Name: Users.3.Privilege, setting new value to: 511 Attribute Name: Users.3.IpmiLanPrivilege, setting new value to: Administrator Attribute Name: Users.3.IpmiSerialPrivilege, setting new value to: Administrator Attribute Name: Users.3.ProtocolEnable, setting new value to: Enabled Attribute Name: Users.3.SolEnable, setting new value to: Enabled
PASS, Command passed to successfully set "IDRAC" attribute(s), status code 200 returned
PASS, attribute "Users.3.Enable,Users.3.UserName,Users.3.Password,Users.3.Privilege,Users.3.IpmiLanPrivilege,Users.3.IpmiSerialPrivilege,Users.3.ProtocolEnable,Users.3.SolEnable" successfully changed
Hi @texroemer thanks for responding and sorry for my delayed response and for the second approach is that aligned to any version of idrac or does it work for 3.21.26.21 as well?
Hi @kgrvamsi
For the second approach i mentioned, this is supported on any version of iDRAC 9. For iDRAC 7/8, this is not supported and will have to use the first approach for the workflow.
Thanks
Hi @texroemer how can i enable the other options when i create user with administrator role?
this is the call i'm using to create the user