跳至主要內容
  • 簡單快速地下訂單
  • 檢視訂單及追蹤商品運送狀態
  • 建立並存取您的產品清單
  • 使用「公司管理」來管理您的 Dell EMC 網站、產品和產品層級連絡人。

Dell Lifecycle Controller Remote Services v2.30.30.30 Quick Start Guide

Configuring advance security using hash password

You can set user passwords and BIOS passwords using a one-way hash format in iDRAC available on the 13th generation Dell PowerEdge servers. The user authentication mechanism is not affected (except for SNMPv3 and IPMI) and you can provide the password in plain text format.

With the new password hash feature, you can:
  • Generate your own SHA256 hashes to set iDRAC user passwords and BIOS passwords. New attributes are created to represent the hash representation of the password.

  • Export the Server Configuration Profiles file with the password that has the hash values. To do this, use the ExportSystemConfiguration method and include the password hash values that should be exported to the IncludeInExport parameter.

The hash password can be generated with and without Salt using SHA256. Whether the Salt string is used or null, it should always be set along with the SHA256SystemPassword.

  • NOTE: If the iDRAC user account’s password is set with the SHA256 password hash (SHA256Password) only and not the other hashes (SHA1v3Key, MD5v3Key), authentication through SNMPv3 is lost. Authentication through IPMI is always lost when hash is used to set the user account’s password.

For more information on using hash password, see the iDRAC Card and BIOS and BootManagement profile documents available at en.community.dell.com/techcenter/systems-management/w/wiki/1906.dcim-library-profile.aspx.


對此內容評分

準確
實用
易懂
這篇文章對您有用嗎?
0/3000 characters
  請給予評分 (1 到 5 顆星)。
  請給予評分 (1 到 5 顆星)。
  請給予評分 (1 到 5 顆星)。
  本文章是否有幫助?請選擇。
  評語中不得包含下列特殊字元:<>()\