Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell Secured Component Verification Version 1.5,1.5.1,1.6,1.7,1.8, 1.9, 1.91.0, 1.92.0, and 1.93.0 Reference Guide for Servers and Chassis

PDF

Secured Component Verification

Secured Component Verification (SCV) is a supply chain assurance offering that enables you to verify that the PowerEdge server you have received matches what was manufactured in the factory. In order to validate components, a certificate containing the unique system component IDs is generated during the factory assembly process. This certificate is signed in the Dell factory and is stored in the system, later used by the SCV application. The SCV application validates the system inventory against the SCV certificate.
The application generates a validation report detailing the inventory matches and mismatches against the SCV certificate. It also verifies the certificate and Chain of Trust along with the Proof of Possession of the SCV Private key. Current implementation supports direct ship customers and does not include VAR or Part Replacement scenarios.
SCV Application performs the following functions:
  • Downloads the SCV Certificate that is stored in the system through Dell Technology APIs and verifies the SCV certificate and issuer.
  • Validates the SCV private key that is paired to the SCV public key in the SCV certificate.
  • Collects the current inventory of the system.
    NOTE:For the list of system components supported, see the section Components Supported.
  • Compares current system inventory against the inventory in the SCV certificate.
  • Any modification of the components that are captured in the certificate is identified as a "Mismatch".

Notes:

  • SCV application can be launched directly from the iDRAC UI version 7.10.30.00 and later, but it is recommended to validate your components using the application for an optimal security validation experience.
  • SCV validates the virtual network ports as well. In systems with NPAR/NPAReP cards, run the SCV Application before enabling them.
  • Ensure that the TPM is enabled before running the SCV application. SCV supports TPM version 2.0.
  • Ensure that you run the SCV application before mapping any storage devices to the system.
  • In modular systems, ensure that the FlexAddress is disabled before running the SCV application.
  • If internal and iDRAC USB ports are disabled, the SCV validation fails.
  • Ensure that any drive which is removed from the system registers in iDRAC or any other iDRAC interface before running the SCV validation or it reports incorrect data in the SCV output.
  • Even when the USB-NIC is enabled from iDRAC, you must enable the network interface manually within the operating system. It should not be disabled as it is required for inband communication.
  • In SCV 1.5 with 1.0 certificate, one of the TPM component(ECC) entry reports as 'Match' with expected details as 'Unknown', while the detected details display all the information. It is an expected behavior because 1.0 certificate does not include ECC information.
  • SCV does not support 1.0 certificates starting from version 1.93.0.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\