You can set user passwords and BIOS passwords using a one-way hash
format in iDRAC available on the 13th generation Dell PowerEdge servers.
The user authentication mechanism is not affected (except for SNMPv3
and IPMI) and you can provide the password in plain text format.
With the new password hash feature, you can:
-
Generate your own SHA256 hashes to set iDRAC user passwords
and BIOS passwords. New attributes are created to represent the hash
representation of the password.
-
Export the Server Configuration Profiles file with the password
that has the hash values. To do this, use the ExportSystemConfiguration
method and include the password hash values that should be exported
to the IncludeInExport parameter.
The hash password can be generated with and without Salt using
SHA256. Whether the Salt string is used or null, it should always
be set along with the SHA256SystemPassword.
-
NOTE: If the iDRAC
user account’s password is set with the SHA256 password hash (SHA256Password)
only and not the other hashes (SHA1v3Key, MD5v3Key), authentication
through SNMPv3 is lost. Authentication through IPMI is always lost
when hash is used to set the user account’s password.
For more information on using hash password, see the
iDRAC Card and
BIOS and BootManagement profile documents available at
en.community.dell.com/techcenter/systems-management/w/wiki/1906.dcim-library-profile.aspx.