메인 콘텐츠로 이동
  • 빠르고 간편하게 주문
  • 주문 보기 및 배송 상태 추적
  • 제품 목록을 생성 및 액세스
  • 회사 관리를 사용하여 Dell EMC 사이트, 제품 및 제품 수준 연락처를 관리하십시오.

Dell Lifecycle Controller Remote Services v2.30.30.30 Quick Start Guide

Configuring advance security using hash password

You can set user passwords and BIOS passwords using a one-way hash format in iDRAC available on the 13th generation Dell PowerEdge servers. The user authentication mechanism is not affected (except for SNMPv3 and IPMI) and you can provide the password in plain text format.

With the new password hash feature, you can:
  • Generate your own SHA256 hashes to set iDRAC user passwords and BIOS passwords. New attributes are created to represent the hash representation of the password.

  • Export the Server Configuration Profiles file with the password that has the hash values. To do this, use the ExportSystemConfiguration method and include the password hash values that should be exported to the IncludeInExport parameter.

The hash password can be generated with and without Salt using SHA256. Whether the Salt string is used or null, it should always be set along with the SHA256SystemPassword.

  • NOTE: If the iDRAC user account’s password is set with the SHA256 password hash (SHA256Password) only and not the other hashes (SHA1v3Key, MD5v3Key), authentication through SNMPv3 is lost. Authentication through IPMI is always lost when hash is used to set the user account’s password.

For more information on using hash password, see the iDRAC Card and BIOS and BootManagement profile documents available at en.community.dell.com/techcenter/systems-management/w/wiki/1906.dcim-library-profile.aspx.


본 콘텐츠를 평가해주십시오.

정확함
유용함
이해하기 쉬운
이 문서가 도움이 되셨나요?
0/3000 characters
  평점(별 1~5개)을 매겨주십시오.
  평점(별 1~5개)을 매겨주십시오.
  평점(별 1~5개)을 매겨주십시오.
  문서가 도움이 되었는지 여부를 선택하십시오.
  의견에는 <>()\와 같은 특수 문자를 사용할 수 없습니다.