User guide

8
User Authentication and Authorization
Local Accounts
By default the iDRAC6 is configured with a local administrator account. This default user name is “root”
and the password is “calvin”. The default user allows users to access the iDRAC6 after it arrives in their
environment. Dell highly recommends that this user account is secured after arriving in the user
environment. The iDRAC6 supports up to 16 local users each of which can be enabled or disabled.
Alternatively, iDRAC6 can be secured by disabling all local user accounts and using only Microsoft
®
Active
Directory
®
users since Active Directory is considered to have stronger secure policy management. LDAP
is also supported for customers that want to use directory services instead of local username and
password accounts. This is advantageous because it provides a central location for managing authorized
user accounts instead of requiring maintenance of accounts on individual machines in large installations.
These are described in subsequent sections.
Local usernames and passwords can be changed using all of the iDRAC6 secured interfaces (i.e.
web interface, command line, and WSMAN interface). The iDRAC6 local user accounts have the
following restrictions. Anonymous users are not supported
NULL user name are not supported
NULL password are not supported
Maximum username length is 16 characters
Maximum password length is 20 characters
The iDRAC6 local user account information is stored on NVRAM and is encrypted via a proprietary
algorithm.
The iDRAC6 supports privilege-based access to iDRAC6. Every local user or Active Directory user has a
privilege set associated with it. The privileges available to users are highly configurable and are
documented in the user guide.
1. IPMI user privileges
a. Maximum LAN User Privilege Granted.
b. Maximum Serial Port User Privilege Granted
c. Enable Serial Over LAN Allows the user to use IPMI Serial Over LAN.
2. iDRAC6 user privileges
a. Login to iDRAC6
b. Configure iDRAC6
c. Configure Users
d. Clear Logs
e. Execute Server Control Commands
f. Access Console Redirection
g. Access Virtual Media
h. Test Alerts
i. Execute Diagnostic Commands