Installation Manual
6 Configuring iLO access settings........................................................................61
iLO access settings.............................................................................................................................61
Configuring iLO service settings.........................................................................................................61
Service settings.............................................................................................................................61
Configuring iLO access options..........................................................................................................62
Access options..............................................................................................................................63
iLO login with an SSH client...............................................................................................................67
7 Configuring the iLO security features................................................................68
iLO security features...........................................................................................................................68
General security guidelines for iLO...............................................................................................68
iLO RBSU and iLO 4 Configuration Utility security........................................................................68
iLO security with the system maintenance switch.........................................................................69
TPM and TM..................................................................................................................................69
Viewing the TPM or TM status.................................................................................................70
TPM or TM status values.........................................................................................................70
User accounts and access............................................................................................................70
User privileges..........................................................................................................................70
Login security...........................................................................................................................70
Administering SSH keys.....................................................................................................................71
Authorizing a new SSH key by using the web interface................................................................71
Authorizing a new SSH key by using the CLI................................................................................72
Deleting SSH keys.........................................................................................................................73
Authorizing SSH keys from an HPE SIM server ...........................................................................73
SSH keys.......................................................................................................................................73
Administering SSL certificates............................................................................................................74
Viewing SSL certificate information...............................................................................................74
SSL certificate details...............................................................................................................75
Obtaining and importing an SSL certificate...................................................................................75
CSR input details......................................................................................................................77
Directory authentication and authorization.........................................................................................78
Prerequisites for configuring authentication and directory server settings....................................78
Configuring Kerberos authentication settings in iLO.....................................................................78
Kerberos settings.....................................................................................................................78
Configuring schema-free directory settings in iLO........................................................................79
Schema-free directory settings................................................................................................79
Configuring HPE Extended Schema directory settings in iLO.......................................................79
HPE Extended Schema directory settings...............................................................................80
Directory user contexts..................................................................................................................80
Local user accounts with Kerberos authentication and directory integration................................81
Running directory tests..................................................................................................................81
Directory test input values........................................................................................................82
Directory test status values......................................................................................................82
Directory test results.................................................................................................................82
iLO directory tests....................................................................................................................83
iLO encryption settings.......................................................................................................................84
SSL................................................................................................................................................84
Ciphers supported by iLO........................................................................................................84
SSH...............................................................................................................................................85
FIPS mode.....................................................................................................................................85
AES/3DES encryption...................................................................................................................86
Viewing encryption enforcement settings......................................................................................86
Encryption settings...................................................................................................................86
Modifying the AES/DES encryption setting...................................................................................87
Connecting to iLO by using AES or 3DES encryption...................................................................87
Contents 5