Users Guide

Table Of Contents
Secure default password
Changing the default login password
Enabling or disabling default password warning message
Password Strength Policy
IP Blocking
Enabling or disabling OS to iDRAC Pass-through using web interface
Enabling or disabling alerts using RACADM
Force Change of Password (FCP)
The 'Force Change of Password' feature prompts you to change the factory default password of the device. The feature can be
enabled as part of factory configuration.
The FCP screen appears after successful user authentication and cannot be skipped. Only after the user enters a password,
normal access and operation will be allowed. The state of this attribute will not be affected by a 'Reset Configuration to
Defaults' operation.
NOTE: To set or reset the FCP attribute, you must have Login privilege and User configuration privilege.
NOTE: When FCP is enabled, 'Default Password Warning' setting is disabled after changing the default user password.
NOTE: When root user logs in via Public Key Authentication (PKA), FCP is bypassed.
When FCP is enabled, following actions are not allowed:
Login to iDRAC through any UI except IPMIpover-LAN interface which uses CLI with default user credentials.
Login to iDRAC through OMM app via Quick Sync-2
Add a member iDRAC in Group Manager.
Logging into iDRAC using OpenID Connect
NOTE: This feature is only available in MX platforms.
To log in to iDRAC using the OpenID Connect:
1. In a supported web browser, type https://[iDRAC-IP-address] and press Enter.
The Login page is displayed.
2. Select OME Modular from the Log In with: menu.
The console login page is displayed.
3. Enter the console User name and Password.
4. Click Log in.
You are logged in to iDRAC with the console user privileges.
NOTE: When lockdown mode is enabled, OpenID Connect login option is not displayed in iDRAC login page.
Logging in to iDRAC as local user, Active Directory
user, or LDAP user
Before you log in to iDRAC using the web interface, ensure that you have configured a supported web browser and the user
account is created with the required privileges.
NOTE: The user name is not case-sensitive for an Active Directory user. The password is case-sensitive for all users.
NOTE: In addition to Active Directory, openLDAP, openDS, Novell eDir, and Fedora-based directory services are supported.
NOTE: LDAP authentication with OpenDS is supported. The DH key must be larger than 768 bits.
Logging in to iDRAC 35