Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products

Dell EMC iDRAC Service Module Security Configuration Guide

PDF

Authentication types and setup

  • The iDRAC Service Module (iSM) and iDRAC authenticate each other using dynamically generated self-signed certificates. The certificate exchanges over trusted channels such as Keyboard Controller Style (KCS) and USB NIC, which is a link-local network. The validity period of certificates is ten years. The Public Key Infrastructure (PKI) used is RSA 2048.
  • iSM supports creating an iDRAC session from the host operating system. The iDRAC session privilege can be configured by the administrator at the point of iSM installation. The administrator can either:
    • Disable
    • Allow a ReadOnly session
    • Allow a session with administrator privileges on iDRAC

When the iDRAC Launcher is invoked from the host operating system, the iDRAC UI dashboard is rendered using the default browser that is configured by the administrator. The privilege selected during the iSM installation process is enforced in this UI session.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\