Installation Manual
message is displayed during each delay; this behavior continues until a valid login occurs.
This feature helps to prevent dictionary attacks against the browser login port.
• iLO 4 version 2.20 and later—iLO can be configured to impose a delay after a configured
number of failed login attempts. Each subsequent failed attempt increases the delay by the
configured number of seconds. A message is displayed during each delay; this behavior
continues until a valid login occurs. This feature helps to prevent dictionary attacks against
the browser login port. You can configure the login delay settings on the
Administration→Access Settings page.
• iLO saves a detailed log entry for failed login attempts. You can configure the Authentication
Failure Logging frequency on the Administration→Access Settings page.
More information
iLO access settings
Administering SSH keys
The Secure Shell Key page displays the hash of the SSH public key associated with each user.
Each user can have only one key assigned. Use this page to view, add, or delete SSH keys.
Authorizing a new SSH key by using the web interface
Prerequisites
Administer User Accounts privilege
Authorizing a new key with the iLO web interface
1. Generate a 2,048-bit DSA or RSA key by using ssh-keygen, puttygen.exe, or another
SSH key utility.
2. Create the key.pub file.
3. Navigate to the Administration→Security page.
4. Click the Secure Shell Key tab.
5. Select the check box to the left of the user to which you want to add an SSH key.
6. Click Authorize New Key.
7. Copy and paste the public key into the Public Key Import Data box.
Administering SSH keys 71