PSQN: iDRAC9 Set up Menu Error While Saving Simple User Password

Сводка: PowerEdge server end users may encounter a critical error within the Dell iDRAC9 Human Input Interface (HII) menu when saving a simple user password.

Данная статья применяется к Данная статья не применяется к Эта статья не привязана к какому-либо конкретному продукту. В этой статье указаны не все версии продуктов.

Симптомы

PowerEdge server end users may encounter a critical error within the Dell iDRAC9 Human Input Interface (HII) menu when saving a simple user password. The server F2 System Setup menu allows end users to perform at the box iDRAC9 configuration. Within the iDRAC Settings >> User Configuration menu, the UserID2 (root) account password can be modified. When attempting to input a simple password (for example: calvin), a critical error banner may be displayed while saving configuration changes.
 
System Setup Critical Error Example:

iDRAC9 HII Critical Error
 

Critical | Saving Changes
An error occurred. One or more settings may not be saved.
 
Technical Information:
An error occurs when the forms browser routes configuration to driver.
Return code from driver: 0x1A (Security Violation)
FormSet Title: iDRAC Settings
Storage Name: iDRAC_HII_IfrNVData
Form Title: User Configuration
Question Prompt: User Name
Block Name: &OFFSET=2411&WIDTH=0020

Причина

By default, the iDRAC9 enforces a password policy blocking simple passwords. When the iDRAC9 password strength policy is defined for any option other than 'No Protection', a simple password phrase cannot be saved through any iDRAC interface. The System Setup HII menu does not contain a clear message error banner to define this error occurrence.

Разрешение

The iDRAC9 System Setup menu does not provide an option to redefine the password protection policy to 'No Protection'. The user-defined password must meet the defined password policy for the iDRAC9. Inputting a password that meets the minimum password policy score does not lead to this critical error.  
 
Local RACADM commands can be leveraged from within the HOST Operating System of the server to determine the minimum password policy score requirements.
 
racadm>>racadm get idrac.security.minimumpasswordscore
[Key=idrac.Embedded.1#Security.1]
MinimumPasswordScore=Weak Protection
 
Also, local RACADM commands can be leveraged to modify the iDRAC9 minimum password policy score requirement, or modify the UserID2 password to meet current policy requirements.
 
  1. # Modify Minimum Password Score
 
racadm>>racadm set idrac.security.minimumpasswordscore 0
[Key=idrac.Embedded.1#Security.1]
Object value modified successfully
 
0 - No Protection
1 - Weak Protection
2 - Moderate Protection
3 - Strong Protection
 
  1. # Modify UserID2 Password
 
racadm>>racadm set idrac.users.2.password C@lv1n
[Key=idrac.Embedded.1#Users.2]
Object value modified successfully

Затронутые продукты

iDRAC9, iDRAC9 - 4.xx Series, iDRAC9 - 5.xx Series
Свойства статьи
Номер статьи: 000198025
Тип статьи: Solution
Последнее изменение: 10 Dec 2024
Версия:  3
Получите ответы на свои вопросы от других пользователей Dell
Услуги технической поддержки
Проверьте, распространяются ли на ваше устройство услуги технической поддержки.