You can set user passwords and BIOS passwords using
a one-way hash format in iDRAC available on the 13th generation Dell
PowerEdge servers. The user authentication mechanism is not affected
(except for SNMPv3 and IPMI) and you can provide the password in plain
With the new password hash feature, you can:
Generate your own SHA256 hashes to set iDRAC user
passwords and BIOS passwords. New attributes are created to represent
the hash representation of the password.
Export the Server Configuration Profiles file with
the password that has the hash values. Use the ExportSystemConfiguration
method and include the password hash values that should be exported
to the IncludeInExport parameter.
The hash password can be generated with and without
Salt using SHA256. Whether the Salt string is used or null, it should
always be set along with the SHA256SystemPassword.
NOTE: If the iDRAC
user account’s password is set with the SHA256 password hash (SHA256Password)
only and not the other hashes (SHA1v3Key, MD5v3Key), authentication
through SNMPv3 is lost. Authentication through IPMI is always lost
when hash is used to set the user account’s password.