Reference Guide
Table Of Contents
- Dell EMC OpenManage Enterprise 3.6 Security Configuration Guide
- Contents
- Figures
- Tables
- PREFACE
- Security quick reference
- Product and subsystem security
- Contacting Dell
1 OME security control map....................................................................................................................................... 9
2 Security settings.......................................................................................................................................................10
3 Application settings.................................................................................................................................................. 11
4 Configuration settings for timeouts/max concurrent sessions..................................................................... 11
5 User types................................................................................................................................................................... 11
6 Configuring active directory.................................................................................................................................. 12
7 OIDC authentication................................................................................................................................................ 13
8 Disable local user accounts.................................................................................................................................... 14
9 Admin password change from TUI....................................................................................................................... 15
10 Certificate management........................................................................................................................................ 20
11 Audit log......................................................................................................................................................................21
12 Export audit log.........................................................................................................................................................21
13 Debug log....................................................................................................................................................................21
Figures
4 Figures