iDRAC supports Public Key Authentication (PKA) over SSH. This is a licensed feature. When the PKA over SSH is set up and used correctly, you must enter the username while logging into iDRAC. This is useful for setting up automated scripts that perform various functions. The uploaded keys must be in RFC 4716 or OpenSSH format. Else, you must convert the keys into that format. In any scenario, a pair of private and public keys must be generated on the management station. The public key is uploaded to iDRAC local user, and private key is used by the SSH client to establish the trust relationship between the management station and iDRAC. Public Key Authentication is recommended as a security feature because it cryptographically verifies authentication and eliminates the need for password credentials. To achieve the highest level of security, it is recommended to generate an RSA key with a 4096-bit key size which is the maximum that is supported on iDRAC.
You can generate the public or private key pair using:
PuTTY Key Generator application for clients running Windows
ssh-keygen CLI for clients running Linux.
The public key can be uploaded using iDRAC Web interface or RACADM command-line interface.
CAUTION:This privilege is reserved for users who are members of the
Administrator user group on iDRAC. However, users in the
Custom user group can be assigned this privilege. A user with this privilege can modify any user’s configuration. This includes creation or deletion of any user, SSH Key management for users, and so on. For these reasons, assign this privilege carefully.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\