Dell Command Secure BIOS Configuration Support with Dell Command Configure

Summary: This article provides details on Dell Command I Secure BIOS Configuration (DCSBC) and how to use it with Dell Command I Configure (DCC) to achieve certificate-based authentication for BIOS configuration. ...

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Instructions

Affected Products:

  • Dell Command | Secure BIOS Configuration
  • Dell Command | Configure

Table of Contents:

Introduction:

Manageability interfaces rely on open interfaces, or password-authenticated commands. Password authentication is vulnerable to brute-force or dictionary attack, hence less secure compared to key based authentication. A better authenticated manageability interface is needed to provide integrity and confidentiality protections of the data and commands. A more secure interface also allows other technologies to build on the protected interface, such as password management, platform configuration mirroring, Factory Tools, for example. DCSBC is an approach to move away from authenticating DACI commands with BIOS passwords. DCSBC provides a trusted communication by creating an interface that uses PKI authentication mechanisms, and encrypted channels to pass messages between the platform and a client. This approach also provides both integrity and confidentiality to protect customer data.

Back to Top

Dell Command | Secure BIOS Configuration Architecture in DCC

Dell Command | Secure BIOS Configuration Architecture in DCC

LEGEND: 
DCC — Dell Command Configure
CLI - DCC Client (Pipeline)
DHE — Ephemeral Diffie-Hellman
OTB - On the Box
SCE - Self Contained Executable
Console — MECM, Intune, WorkspaceONE

The solution is to create an interface that uses PKI authentication mechanisms, and encrypted channels to pass messages between the platform and a client.

Session-based command references to Diffie-HeIIman type key exchange.

Replay protection in part is accomplished by using a sequence of single-use random numbers (nonce) attached to the DCSBC messages.

The use of nonces allow the receiver of the message to ensure that the message is unique, thus not reused, and that the sequence of operation is maintained. This is especially true for session-based commands. Each transaction involves the Client generating a new nonce and sharing the nonce value with the receiver in the clear, and hashing the nonce value within the message, either as part of the signature, or a message authentication code.

As part of this, DCSBC with DCC follows a Server-Client model, where DCSBC server can be used to create Self-Contained Executables for different workflows. These Self-Contained Executables (SCEs) can then be deployed to IT managed endpoints using configuration tools like SCCM/Microsoft Intune.

There is no requirement for the user to install DCC on the clients/endpoints. Once the SCE is run on the endpoint, it places requests to the DCSBC server to get payloads for BIOS configurations and performs those operations on the endpoint BIOS.

Using this flow, zero trust (on client/endpoint) policy is achieved and the trust only exists between the BIOS and the DCSBC server.

Back to Top

Dell Command | Configure Implementation

In DCC, the SCE for DCSBC is created for the Provisioning Workflow and the BIOS Configuration Workflow. Workflow operations are classified based on the provisioning operations and BIOS configuration operations:

  • Provisioning Workflow - This allows the users to create Provisioning Certificate to authenticate secure connectivity with the client for provisioning. Adding, deleting, or clearing provisioning keys, and signing the SCE package, which is part of the workflow.
  • BIOS Configuration Workflow - This flow allows the users to create a Command Certificate to configure BIOS settings in the client using provisioning. Selecting BIOS configurations and signing the BIOS configuration SCE package, which is part of the workflow.

To achieve the above workflows, there are two types of key controls defined in DCC:

  • Provisioning Key — This key/certificate can be used to sign payloads for the Provisioning workflow where you want to Add(provision) new keys/ Delete existing keys/ Clear all provisioned keys.
  • Command Key — This key/certificate can be used to sign payloads for the BIOS Configuration Change flow.
Note:
  • At any given instances, only one provisioning key can be added or provisioned on the client machine
  • Seven Command Keys can be added/provisioned on a client machine at any given instance.
  • Deleting provisioning workflow is only applicable to the Command keys. To remove a provisioning key from the client, select the Clear Provisioning workflow option.

Back to Top

Installing and Setting up Dell Command Secure BIOS Configuration Server with DCC

For details on how to install and setup DCSBC with DCC reference to the DCC 5.0 Install Guide > Installing Dell Command | Configure 5.0 for Dell Command Secure BIOS Configuration (https://www.dell.com/support/home/product-support/product/command-configure/docs)

Back to Top

Configuring the Dell Command Secure BIOS Configuration Server with HTTPS

Configuring the Dell Command Secure BIOS Configuration Server with HTTPS For details on how to configure the DCSBC server with https reference to the DCC 5.0 Installation Guide > Configuring the Dell Command Secure BIOS Configuration Server using HTTPS here: (https://www.dell.com/support/home/product-support/product/command-configure/docs)

Back to Top

Creating Self-Contained Executables for DCSBC Workflows on the DCSBC Server using DCC UI

For details on how to create SCEs to perform provisioning for DCSBC Configuration certificates reference to the DCC User’s Guide > Perform Provisioning for Dell Command Secure BIOS Configuration Certificates here: (https://www.dell.com/support/home/product-support/product/command-configure/docs)

Back to Top

Configure BIOS Settings with Dell Command Secure BIOS Configuration:

For details on how to create SCEs to configure BIOS settings with DCSBC reference to the DCC User’s Guide > Export SCE for Certificate-Based BIOS Authentication here: (https://www.dell.com/support/home/product-support/product/command-configure/docs)

Back to Top

Prerequisites to Utilize HSM Signing Method for Dell Command Secure BIOS Configuration workflows

DCSBC with DCC allows you to use any HSM vendor to sign the DCSBC payloads. However, to use this method of signing payloads DCC requires a few prerequisites to be met which are listed below:

  • Dell Technologies recommends OpenSSL as the open source signing tool which can be used along with the HSM provider that you have setup in your environment, to allow DCC to use signatures generated from the HSM signing method.
  • Based on the HSM provider you are using, update the HSMSigning.bat file present at the following location C:\Program Files (x86)\DeII\Command Configure\X86 64\HSMSigning.bat

In this file, update the signature generation command on line 12 that is compatible for your HSM setup. By default, the command used is:

"%Openss1Path%\openss1.exe" dgst -sha256 -sign "%ObfuscatedKeyPath%\%PrivateKeyName%" -out "%outlocat%\blobsignature.txt" %1

The provided command here should ensure that the signature should be generated to the same path as mentioned in the default command including the filename to be set as blobsignature.txt.

Also, ensure to not modify the last option (for example, "%1") in this command as it allows the signature command to accept the payload file to be signed which DCC generates during runtime.

Back to Top

FAQs

  • I want to use DCC to perform BIOS configurations using BIOS Password Authentication. What should I do?
    • DCC can generate SCE packages for BIOS configurations using BIOS password-based authentication. The DCC UI maintains the control flow for creating SCE packages with BIOS password-based authentication.
  • I do not have an HSM service provider setup on my Dell Command Secure BIOS Configuration server. How can I resolve this?
    • Local signing method can be used to sign SCE packages for DCSBC.
      Note: This method uses locally generated private keys to sign SCE packages. To secure the private keys, DCC offers the capability to manage these keys using the Microsoft Certification store and hence there is no need to save the private key files on disk.
  • I want to install and set up my Dell Command I Configure with Dell Command Secure BIOS Configuration Server on a Virtual Machine. What should I do?
    • You can use a Virtual Machine to set up the DCC with the DCSBC server. On the DCC platform with the DCSBC server, you can create self-contained executables for both provisioning and BIOS configuration tasks. This setup ensures that you can manage and secure BIOS configurations, even on a virtual environment.

Affected Products

Dell Command | Configure
Article Properties
Article Number: 000227845
Article Type: How To
Last Modified: 15 Nov 2024
Version:  2
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.