
Dell iDRAC Service Module Security Configuration Guide
Authentication types and setup
The following sections describe the types of authentication that iDRAC Service Module (iSM) supports.
- iSM and iDRAC authenticate each other using dynamically generated self-signed certificates. The certificate exchanges over trusted channels such as Keyboard Controller Style (KCS) and USB NIC, which is a link-local network. The validity period of certificates is ten years. The Public Key Infrastructure (PKI) used is RSA 2048.
- iSM supports creating an iDRAC session from the host operating system. During iSM installation, the administrator can configure the iDRAC session privilege. The administrator can either:
- Disable
- Allow a ReadOnly session.
- Allow a session with administrator privileges on iDRAC.
When the iDRAC Launcher is invoked from the host operating system, the iDRAC UI dashboard is rendered using the default browser. The administrator configures the default browser. The privilege that is selected during the iSM installation process is enforced in this UI session.
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\