메인 콘텐츠로 이동
  • 빠르고 간편하게 주문
  • 주문 보기 및 배송 상태 추적
  • 제품 목록을 생성 및 액세스
  • 회사 관리를 사용하여 Dell EMC 사이트, 제품 및 제품 수준 연락처를 관리하십시오.

Integrated Dell Remote Access Controller 9 Version 3.15.15.15 User's Guide

Generating hash password without SNMPv3 and IPMI authentication

Hash password can be generated without SNMPv3 and IPMI authentication with or without salt. Both require SHA256.

To generate hash password with salt:

  1. For the iDRAC user accounts, you must salt the password using SHA256.

    When you salt the password, a 16-bytes binary string is appended. The Salt is required to be 16 bytes long, if provided. Once appended, it becomes a 32 character string. The format is "password"+"salt", for example:

    Password = SOMEPASSWORD

    Salt = ALITTLEBITOFSALT—16 characters are appended

  2. Open a Linux command prompt, and run the following command:
    Generate Hash-> echo-n SOMEPASSWORDALITTLEBITOFSALT|sha256sum  -><HASH>
    Generate Hex Representation of Salt -> echo -n ALITTLEBITOFSALT | xxd –p   -> <HEX-SALT>
    set iDRAC.Users.4.SHA256Password <HASH>
    set iDRAC.Users.4.SHA256PasswordSalt <HEX-SALT>
  3. Provide hash value and salt in the imported server configuration profile, the RACADM commands, Redfish, or WSMan.
    NOTE:If you wish to clear a previously salted password, then ensure that the password-salt is explicitly set to an empty string i.e.
    set iDRAC.Users.4.SHA256Password ca74e5fe75654735d3b8d04a7bdf5dcdd06f1c6c2a215171a24e5a9dcb28e7a2
    set iDRAC.Users.4.SHA256PasswordSalt 
  4. After setting the password, the normal plain text password authentication works except that SNMP v3 and IPMI authentication fails for the iDRAC user accounts that had passwords updated with hash.

본 콘텐츠를 평가해주십시오.

정확함
유용함
이해하기 쉬운
이 문서가 도움이 되셨나요?
0/3000 characters
  평점(별 1~5개)을 매겨주십시오.
  평점(별 1~5개)을 매겨주십시오.
  평점(별 1~5개)을 매겨주십시오.
  문서가 도움이 되었는지 여부를 선택하십시오.
  의견에는 <>()\와 같은 특수 문자를 사용할 수 없습니다.