Installation Manual

Directory Administrator Login—If Directory Administrator Distinguished Name and
Directory Administrator Password were specified, iLO uses these values to log in to the
directory server as an administrator. These boxes are optional.
User Authentication—iLO authenticates to the directory server with the specified user
name and password.
If the test is successful, the supplied user credentials are correct.
If the test fails, the user name and/or password is incorrect.
User Authorization—This test verifies that the specified user name is part of the specified
directory group, and is part of the directory search context specified during directory services
configuration.
Directory User Contexts—If Directory Administrator Distinguished Name was specified,
iLO tries to search the specified context.
If the test is successful, iLO found the context by using the administrator credentials to search
for the container in the directory.
Contexts that begin with "@" can be tested only by user login.
A failure indicates that the container could not be located.
LOM Object Exists—This test searches for the iLO object in the directory server by using
the LOM Object Distinguished Name configured on the SecurityDirectory page.
NOTE: You can enter a LOM Object Distinguished Name on the SecurityDirectory
page only when Use HPE Extended Schema is selected. This test is run even if LDAP
Directory Authentication is disabled.
If the test is successful, iLO found the object that represents itself.
iLO encryption settings
SSL
iLO provides enhanced security for remote management in distributed IT environments. SSL
encryption protects web browser data. Encryption of HTTP data provided by SSL ensures that
the data is secure as it is transmitted across the network.
Ciphers supported by iLO
256-bit AESGCM with RSA, ECDH, and a AEAD MAC (ECDHE-RSA-AES256-GCM-SHA384)
256-bit AES with RSA, ECDH, and a SHA384 MAC (ECDHE-RSA-AES256-SHA384)
256-bit AES with RSA, ECDH, and a SHA1 MAC (ECDHE-RSA-AES256-SHA)
256-bit AESGCM with RSA, DH, and a AEAD MAC (DHE-RSA-AES256-GCM-SHA384)
256-bit AES with RSA, DH, and a SHA256 MAC (DHE-RSA-AES256-SHA256)
256-bit AES with RSA, DH, and a SHA1 MAC (DHE-RSA-AES256-SHA)
256-bit AESGCM with RSA, and a AEAD MAC (AES256-GCM-SHA384)
256-bit AES with RSA, and a SHA256 MAC (AES256-SHA256)
256-bit AES with RSA, and a SHA1 MAC (AES256-SHA)
128-bit AESGCM with RSA, ECDH, and a AEAD MAC (ECDHE-RSA-AES128-GCM-SHA256)
128-bit AES with RSA, ECDH, and a SHA256 MAC (ECDHE-RSA-AES128-SHA256)
128-bit AES with RSA, ECDH, and a SHA1 MAC (ECDHE-RSA-AES128-SHA)
84 Configuring the iLO security features