Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Integrated Dell Remote Access Controller 9 User's Guide

iLKM Functionalities

iDRAC Local Key Management (iLKM) is a security solution much like the Secure Enterprise Key Management (SEKM.) This solution is ideal for users who do not have plans to use SEKM but would like to secure devices using iDRAC. However, customers can migrate to SEKM at a later point in time.

When using iLKM, iDRAC acts as key manager and generates authentication keys that are used to secure storage devices. To use iLKM as key management system, navigate to iDRAC Settings > Services > iDRAC Key Management > Key Management Settings and select iLKM from the drop down menu.

NOTE:iLKM requires combination of SEKM license and iDRAC Enterprise, or SEKM license and iDRAC Datacenter Licence.

You need to provide Passphrase and a Key ID to enable iLKM. Both Passphrase and Key ID lengths should be maximum 255 characters.

NOTE:
  • iLKM can be viewed and configured through iDRAC GUI, RACADM, and Redfish interfaces.
  • It is possible to enable/disable security on supported NVMe SED when iDRAC is in iLKM security mode.
  • It is not possible to enable, disable, or rekey iLKM in System Lockdown mode.
  • iLKM currently only supports direct attached NVMe SED that support TCG Opal 2.0 protocol and above. For servers with PERC controllers, you need to enable LKM on PERC using the existing PERC LKM feature.
  • iLKM provides a rekey option, where you need to provide the passphrase and key ID for authentication.

Auto Secure drives

  • Option to request iDRAC to auto secure non-PERC attached NVMe SED and SAS SED behind a security enabled SAS HBA. Drives are auto secured on a host reboot or on a drive hot plug.
  • Option does not auto enable security on controllers such as PERC and SAS HBA.
  • Option is enabled by default - can be disabled by the user using racadm command.
  • Disable Auto secure option before re-purposing a drive by using the cryptographic erase option (or PSID revert option) if the drive is no longer required to be secured by iDRAC.
NOTE:PSID based revert can be performed only on the locked or Foreign drives. PSID based revert can not be performed on the drives which are connected to PERC controller.
NOTE: Do not run power cycle on the host system immediately after enabling the Autosecure option. This may interrupt security enablement on the drives and might put the drives in undefined security state.

iLKM to SEKM Transition

You must provide iLKM passphrase to authenticate the transition along with the SEKM configuration details. If the authentication is successful, SEKM is enabled on iDRAC and the previous iLKM key ID is deleted. You need to perform the following steps for iLKM to SEKM transition:

  1. Certificate Setup
  2. Configure SEKM settings
  3. Execute the iLKM to SEKM transition.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\