<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security abnormality with domain administrators in Server Management - Remote Server Management</title>
    <link>https://community.hpe.com/t5/server-management-remote-server/security-abnormality-with-domain-administrators/m-p/4234140#M3776</link>
    <description>So, by your answer, I believe there is no way to counter that behavior.&lt;BR /&gt;&lt;BR /&gt;Thanks again for your help acartes.</description>
    <pubDate>Tue, 15 Jul 2008 16:10:16 GMT</pubDate>
    <dc:creator>Guillaume Michaud</dc:creator>
    <dc:date>2008-07-15T16:10:16Z</dc:date>
    <item>
      <title>Security abnormality with domain administrators</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/security-abnormality-with-domain-administrators/m-p/4234136#M3772</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;We discovered in our testing environnement that domain administrators do not need to be in any hp roles to have full access to remote lights-out management.  Is there a way to counter this phenomenon ?&lt;BR /&gt;&lt;BR /&gt;We have certain persons in our production environnement that need to have domain administrators rights for certain reasons, but we do not want them to have access to the remote lights-out management.&lt;BR /&gt;&lt;BR /&gt;Thanks in advance.</description>
      <pubDate>Tue, 15 Jul 2008 12:14:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/security-abnormality-with-domain-administrators/m-p/4234136#M3772</guid>
      <dc:creator>Guillaume Michaud</dc:creator>
      <dc:date>2008-07-15T12:14:45Z</dc:date>
    </item>
    <item>
      <title>Re: Security abnormality with domain administrators</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/security-abnormality-with-domain-administrators/m-p/4234137#M3773</link>
      <description>When configuring the Directory ,make sure you select HP schema directory integration.&lt;BR /&gt;For more information Page 130:&lt;BR /&gt;&lt;A href="http://bizsupport.austin.hp.com/bc/docs/support/SupportManual/c00553302/c00553302.pdf" target="_blank"&gt;http://bizsupport.austin.hp.com/bc/docs/support/SupportManual/c00553302/c00553302.pdf&lt;/A&gt;</description>
      <pubDate>Tue, 15 Jul 2008 13:34:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/security-abnormality-with-domain-administrators/m-p/4234137#M3773</guid>
      <dc:creator>Raghuarch</dc:creator>
      <dc:date>2008-07-15T13:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: Security abnormality with domain administrators</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/security-abnormality-with-domain-administrators/m-p/4234138#M3774</link>
      <description>OK.&lt;BR /&gt;&lt;BR /&gt;We're using HP extended schema.  We created various hp roles with different rights to test the different security issues we encountered with the active directory integration.  Everything works fine.  If a user isn't in the right hp role, he doesn't have the rights to do the things he want while logged on the remote lights-out card.&lt;BR /&gt;&lt;BR /&gt;The abnormality we discovered is that even though a user with domain administrative rights isn't in any of our hp roles, he still has full power over any of the remote lights-out card that is integrated in the active directory.&lt;BR /&gt;&lt;BR /&gt;Thanks</description>
      <pubDate>Tue, 15 Jul 2008 14:33:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/security-abnormality-with-domain-administrators/m-p/4234138#M3774</guid>
      <dc:creator>Guillaume Michaud</dc:creator>
      <dc:date>2008-07-15T14:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: Security abnormality with domain administrators</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/security-abnormality-with-domain-administrators/m-p/4234139#M3775</link>
      <description>iLO adds rights to users based on their ability to read the roles.  If a user is a member of a role, they can read that role and gain the rights.&lt;BR /&gt;&lt;BR /&gt;The Directory Administrators and role creators have implicit ability to read the role.</description>
      <pubDate>Tue, 15 Jul 2008 15:31:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/security-abnormality-with-domain-administrators/m-p/4234139#M3775</guid>
      <dc:creator>acartes</dc:creator>
      <dc:date>2008-07-15T15:31:28Z</dc:date>
    </item>
    <item>
      <title>Re: Security abnormality with domain administrators</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/security-abnormality-with-domain-administrators/m-p/4234140#M3776</link>
      <description>So, by your answer, I believe there is no way to counter that behavior.&lt;BR /&gt;&lt;BR /&gt;Thanks again for your help acartes.</description>
      <pubDate>Tue, 15 Jul 2008 16:10:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/security-abnormality-with-domain-administrators/m-p/4234140#M3776</guid>
      <dc:creator>Guillaume Michaud</dc:creator>
      <dc:date>2008-07-15T16:10:16Z</dc:date>
    </item>
  </channel>
</rss>

