Security Mgmt
Function Description
On the Security Configuration page, you can perform the following operations:
- View and configure user security hardening rules for iBMC users.
- View and manage the permissions of local iBMC users.
Parameter Description
Parameter |
Description |
---|---|
System Lock |
iBMC system lock mode, which can be enabled or disabled. By default, this parameter is disabled. After this parameter is enabled, only the following operations are allowed:
NOTE:
This parameter is available only in the advanced iBMC edition under the license control. Only the system administrator have rights to set it. |
OS User Management |
Function of user management on the service system. If this function is enabled, the service system can send user management commands, such as adding or deleting users, user roles, and passwords, to manage iBMC users. It is enabled by default.
For security purposes, set this parameter to Disable. |
Password Check |
Password check verifies whether the passwords meet complexity requirements. It is enabled by default. The password check function is enabled by default. The check includes:
NOTE:
|
SSH Password Authentication |
SSH password authentication allows users to log in to the iBMC over SSH by using the password or public key.
It is enabled by default. |
TLS Versions |
TLS protocol version used to ensure data security and integrity during communication between two applications. TLS can be enabled to ensure a secure connection between a web browser and a web server.
NOTE:
|
Password Validity (days) |
Validity period (in days) of a user password. Value range: 0 to 365 The value 0 indicates that the password never expires. Default value: 0 NOTE:
For security purposes, set a proper password validity period and change the password periodically. |
Minimum Password Length |
Minimum length of the local user password or SNMPv3 encryption password. This parameter is valid only when the password check function is enabled. Value range: 8 to 20 Default value: 8 |
Minimum Password Age (days) |
Minimum time (in days) for which the password must be used. The password cannot be changed during this period. Value range: 0 to 365 The value 0 indicates that the passwords do not have a minimum password age. Default value: 0 NOTE:
The minimum password age must be at least ten days earlier than the password expiration day.
|
Inactive Timelimit (days) |
Maximum idle period (in days) after which the user account will be disabled. Value:
The value 0 indicates unlimited time, that is, idle user accounts will never be disabled. Default value: 0 |
Emergency Login User |
User name for logging in to the iBMC in emergencies. This user is not restricted by any login rules or login interfaces, and the password of this user will never expire. NOTE:
|
Previous Passwords Disallowed |
Number of previous passwords that cannot be reused as a new password. Value range: 0 to 5 The value 0 indicates that all previous passwords are allowed. Default value: 5 |
User Lockout Policy |
Maximum number of consecutive invalid login attempts allowed and the account locking duration.
After a user account is locked, the user can attempt to log in only after the account locking duration expires. NOTE:
|
Certificate Expiry Notification (days) |
Number of days in advance users are notified that the iBMC certificates are about to expire. For example, if it is set to 7, an alarm will be reported when the certificate expiry time is less than or equal to 7 days. Value range: 7 to 180 Default value: 90 |
Parameter |
Description |
---|---|
Time |
Time period in which users are allowed to log in. The value can be in one of the following formats:
NOTE:
|
IP |
IP address or IP address range allowed for login. The value can be in one of the following formats:
|
MAC |
MAC address or MAC address range allowed for login. The value can be in one of the following formats:
|
Parameter |
Description |
---|---|
Administrator |
User who can perform all operations. The permissions of Administrator cannot be changed. |
Operator |
User who can perform basic management, KVM management, VMM management, and power control, query information, and configure their own passwords. The permissions of Operator cannot be changed. |
Common User |
User who can query information and configure their own passwords. The permissions of Common User cannot be changed. |
Custom Role 1 to 4 |
User who can perform the specified operations. |
User Mgmt |
Perform user and password configuration. User Mgmt includes the following:
|
Basic Mgmt |
Perform basic configuration of server out-of-band management. Basic Mgmt includes the following:
|
Remote Console |
|
VMM |
|
Security Mgmt |
Perform configuration and query of security features. Security Mgmt includes the following:
|
Power Control |
|
Diagnostics |
Perform fault locating and commissioning operations. Diagnostics includes the following:
|
Query |
Query information excepting security settings, diagnostics, two-factor authentication settings, online user settings, and system information. |
Own password & SSH |
Configure their own passwords and manage the SSH public key, SNMPv3 encryption password, and SNMPv3 encryption and authentication algorithms. System default users have this permission by default. Custom users can be assigned with this permission. |
Parameter |
Description |
---|---|
Security Banner |
Login security banner, which can be enabled or disabled. If it is set to It is enabled by default. |
Security Banner Text |
Security banner text to be displayed on the login page. Value: a string of up to 1024 characters. |
Enabling the Security Hardening Function
- Set parameters as required. For details about the parameters, see Table 3-51.
- Click Save.
Configuring Login Rules
The iBMC supports up to three login rules. Users who comply with any one of the three rules can log in to the iBMC.
A login rule is effective for local users, LDAP groups, SNMPv3 services or interfaces of CLI(SSH), KVM_VMM, RMCP, and Redfish interfaces only when it meets the following two conditions:
- The login rule is configured and enabled in the Login Rules area.
- The login rule is selected in the configuration area.
- If a login rule is empty and the rule status is enabled and saved, there is no login restrictions.
- If the login rule text box is empty, there is no login rule restriction.
- In the Login Rules area, click Edit in the Operation column.
- Set the rule status to
.
- Set the login rules. For details about the parameters, see Table 3-52.
- Click Save.
Setting the Login Security Banner
- On the Login Security Banner tab page, set Security Banner to
.
- Enter the security information in the security banner text box.
- Click Save.
Restoring the Default Login Security Banner
- On the Login Security Banner tab page, set Security Banner to
.
- Click Restore Defaults.
- Click Save.