Reference Guide

Table Of Contents
Chapter 1: Overview...................................................................................................................... 5
Legal disclaimers..................................................................................................................................................................5
Reporting security vulnerabilities.....................................................................................................................................6
Chapter 2: Security quick reference.............................................................................................. 7
Deployment models............................................................................................................................................................. 7
Initial installation of iDRAC Service Module.............................................................................................................7
Security profiles................................................................................................................................................................... 7
Chapter 3: Product and subsystem security.................................................................................. 8
Security controls map.........................................................................................................................................................8
User interfaces and the minimum privileges........................................................................................................... 9
Authentication...................................................................................................................................................................... 9
Login security settings......................................................................................................................................................10
Login banner configuration........................................................................................................................................ 10
Failed login behavior.................................................................................................................................................... 10
Emergency user lockout............................................................................................................................................. 10
Authentication types and setup..................................................................................................................................... 10
Configuring local authentication sources............................................................................................................... 10
Configuring active directory...................................................................................................................................... 10
Certificate and key-based authentication...............................................................................................................11
Multi-factor Authentication........................................................................................................................................11
Other authentication sources.................................................................................................................................... 11
Unauthenticated interfaces........................................................................................................................................11
Selecting authentication sources.............................................................................................................................. 11
User and credential management................................................................................................................................... 11
Pre-loaded accounts................................................................................................................................................... 12
Default credentials....................................................................................................................................................... 12
Disabling accounts....................................................................................................................................................... 12
Managing credentials.................................................................................................................................................. 12
Securing credentials.................................................................................................................................................... 12
Password complexity...................................................................................................................................................12
Authentication to external systems...............................................................................................................................13
Configuring remote connections.............................................................................................................................. 13
Controlling access to remote systems....................................................................................................................13
Remote component authentication......................................................................................................................... 13
Authorization.......................................................................................................................................................................13
General authorization settings.................................................................................................................................. 13
Configuring authorization rules.................................................................................................................................13
Default authorizations................................................................................................................................................. 13
External authorization associations......................................................................................................................... 14
Entitlement export....................................................................................................................................................... 14
Actions not requiring authorization..........................................................................................................................14
RBAC privileges.................................................................................................................................................................. 14
Contents
Contents 3