Administrators need the following information to configure LDAP login on PowerVault ME5.
PowerVault ME5 controller firmware must be version ME5.1.1.0.5 or later. If the ME5 current controller firmware version is ME5.1.0.1.0, see KB article 207484, PowerVault ME5: Firmware update from ME5.1.0.1.0 to ME5.1.1.0.5 or above does not complete.
The LDAP server must be an Active Directory server running Windows 2016, 2019, or 2022. The server must allow basic authentication using an LDAP over SSL (LDAPS) interface Port 636; that is, a TLS v1.2 connection. To properly configure LDAP, consult your Microsoft operating system documentation.
Where using DNS, configure the PowerVault DNS settings to use the same DNS as used by the Microsoft active directory services to ensure correct hostname resolution. To configure DNS in the PowerVault manager, go to Settings > Network > DNS.
PowerVault Manager uses the UserPrincipalName (UPN) to log in to LDAP, this takes the format username@domain.com. Active directory administrators can check that this attribute is set. Windows server administrators can use the Get-ADUser module in PowerShell to view the user details and group membership.
It is recommended that:
A user should only be a member of one group that exists in the storage system. A user that is a member of more than one LDAP group in the storage system could have permission or configuration parameter inconsistencies.
The LDAP user is in no more than 100 LDAP groups.
For example, viewing the UserPrincipleName and distinguishedName for a user called Tom:
PS > Get-ADUser -Identity Tom DistinguishedName : CN=Tom,CN=Users,DC=Liverpool,DC=Anfield,DC=Net Enabled : True GivenName : Tom Name : Tom Smith ObjectClass : user ObjectGUID : 6a2bda7c-eb1f-41b3-897e-00048053084a SamAccountName : Tom SID : S-1-5-21-2317057084-3148409499-2425250475-1248 Surname : Smith UserPrincipalName : tom_smith@liverpool.anfield.net
For example, viewing the group membership for the user Tom:
PS > Get-ADUser Tom -Properties Memberof DistinguishedName : CN=Tom,CN=Users,DC=Liverpool,DC=Anfield,DC=Net Enabled : True GivenName : Tom MemberOf : {CN=Liverpool_ME5_Admins,OU=Groups,DC=Liverpool,DC=Anfield,DC=Net, CN=ESX Admins,OU=Groups,DC=Liverpool,DC=Anfield,DC=Net, CN=Administrators,CN=Builtin,DC=Liverpool,DC=Anfield,DC=Net} Name : Tom Smith ObjectClass : user ObjectGUID : 6a2bda7c-eb1f-41b3-897e-00048053084a SamAccountName : Tom SID : S-1-5-21-2317057084-3148409499-2425250475-1248 Surname : Smith UserPrincipalName : tom_smith@liverpool.anfield.net
From the example above:
Figure 1: PowerVault Manager - LDAP configuration
Figure 2: PowerVault Manager - User groups
Figure 3: PowerVault Authentication Manager - Log in
User login, logout, and actions through all interfaces for both local and LDAP users is recorded in an audit log that is accessible from Maintenance > Support > Audit Log Activity.
For more information, see the Dell PowerVault ME5 Series Administrator's Guide under the section System concepts > LDAP. The administrator's guide is on Dell.com/support under the Documentation tab for your ME5 product.
LDAP authentication is not available in previous PowerVault ME4 generation products.