HP Xw460c HP Integrated Lights-Out 2 User Guide for Firmware 1.75 and 1.77 - Page 47

Setting up two-factor authentication for the first time, Apply, Setting up local user accounts, Ctrl+C

Page 47 highlights

When two-factor authentication is enabled, access by the CPQLOCFG utility is disabled because CPQLOCFG does not meet all authentication requirements. However, the HPONCFG utility works because administrator privileges on the host system are required to execute the utility. A trusted CA certificate is required for two-factor authentication to function. You cannot change the TwoFactor Authentication Enforcement setting to Enabled if a trusted CA certificate is not configured. Also, you must map a client certificate to a local user account if local user accounts are used. If iLO 2 is using directory authentication, client certificate mapping to local user accounts is optional. To change two-factor authentication security settings for iLO 2: 1. Log in to iLO 2 using an account that has the Configure iLO 2 Settings privilege. 2. Click Administration>Security>Two-Factor Authentication. 3. Change the settings by entering your selections in the fields. 4. Click Apply to save the changes. The Certificate Revocation Checking setting controls whether iLO 2 uses the certificate CRL distribution points attribute to download the latest CRL and verify revocation of the client certificate. If the client certificate is contained in the CRL, or if you cannot download the CRL, access is denied. The CRL distribution point must be available and accessible to iLO 2 when Certificate Revocation Checking is set to Yes. The Certificate Owner Field setting specifies which attribute of the client certificate to use when authenticating with the directory. Only use the Certificate Owner Field setting if directory authentication is enabled. Configuration of the Certificate Owner Field depends on the version of directory support used, the directory configuration, and the certificate issuance policy of your organization. If SAN is specified, iLO 2 extracts the User Principle Name from the Subject Alternative Name attribute and then uses the User Principle Name when authenticating with the directory (for example, [email protected]). For example, if the subject name is /DC=com/DC=domain/OU=organization/CN=user, iLO 2 will derive CN=user,OU=organization,DC=domain,DC=com. Setting up two-factor authentication for the first time When setting up two-factor authentication for the first time, you can use either local user accounts or directory user accounts. For more information on two-factor authentication settings, see the "Two-Factor Authentication (on page 46)" section. Setting up local user accounts 1. Obtain the public certificate from the CA that issues user certificates or smart cards in your organization. 2. Export the certificate in Base64-encoded format to a file on your desktop (for example, CAcert.txt). 3. Obtain the public certificate of the user who needs access to iLO 2. 4. Export the certificate in Base64-encoded format to a file on your desktop (for example, Usercert.txt). 5. Open the file CAcert.txt in Notepad, select all of the text, and copy it by pressing the Ctrl+C keys. 6. Log in to iLO 2, and browse to the Two-Factor Authentication Settings page. 7. Click Import Trusted CA Certificate. The Import Root CA Certificate page appears. 8. Click inside the white text area so that your cursor is in the text area, and paste the contents of the clipboard by pressing the Ctrl+V keys. 9. Click Import Root CA Certificate. The Two-Factor Authentication Settings page appears again with information displayed under Trusted CA Certificate Information. Configuring iLO 2 47

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235

Configuring iLO 2 47
When two-factor authentication is enabled, access by the CPQLOCFG utility is disabled because
CPQLOCFG does not meet all authentication requirements. However, the HPONCFG utility works
because administrator privileges on the host system are required to execute the utility.
A trusted CA certificate is required for two-factor authentication to function. You cannot change the Two-
Factor Authentication Enforcement setting to Enabled if a trusted CA certificate is not configured. Also,
you must map a client certificate to a local user account if local user accounts are used. If iLO 2 is using
directory authentication, client certificate mapping to local user accounts is optional.
To change two-factor authentication security settings for iLO 2:
1.
Log in to iLO 2 using an account that has the Configure iLO 2 Settings privilege.
2.
Click
Administration>Security>Two-Factor Authentication.
3.
Change the settings by entering your selections in the fields.
4.
Click
Apply
to save the changes.
The Certificate Revocation Checking setting controls whether iLO 2 uses the certificate CRL distribution
points attribute to download the latest CRL and verify revocation of the client certificate. If the client
certificate is contained in the CRL, or if you cannot download the CRL, access is denied. The CRL
distribution point must be available and accessible to iLO 2 when Certificate Revocation Checking is set
to
Yes.
The Certificate Owner Field setting specifies which attribute of the client certificate to use when
authenticating with the directory. Only use the Certificate Owner Field setting if directory authentication is
enabled. Configuration of the Certificate Owner Field depends on the version of directory support used,
the directory configuration, and the certificate issuance policy of your organization. If SAN is specified,
iLO 2 extracts the User Principle Name from the Subject Alternative Name attribute and then uses the User
Principle Name when authenticating with the directory (for example, [email protected]). For
example, if the subject name is
/DC=com/DC=domain/OU=organization/CN=user
, iLO 2 will
derive
CN=user,OU=organization,DC=domain,DC=com
.
Setting up two-factor authentication for the first time
When setting up two-factor authentication for the first time, you can use either local user accounts or
directory user accounts. For more information on two-factor authentication settings, see the "Two-Factor
Authentication (on page
46
)" section.
Setting up local user accounts
1.
Obtain the public certificate from the CA that issues user certificates or smart cards in your
organization.
2.
Export the certificate in Base64-encoded format to a file on your desktop (for example, CAcert.txt).
3.
Obtain the public certificate of the user who needs access to iLO 2.
4.
Export the certificate in Base64-encoded format to a file on your desktop (for example, Usercert.txt).
5.
Open the file CAcert.txt in Notepad, select all of the text, and copy it by pressing the
Ctrl+C
keys.
6.
Log in to iLO 2, and browse to the Two-Factor Authentication Settings page.
7.
Click
Import Trusted CA Certificate.
The Import Root CA Certificate page appears.
8.
Click inside the white text area so that your cursor is in the text area, and paste the contents of the
clipboard by pressing the
Ctrl+V
keys.
9.
Click
Import Root CA Certificate
. The Two-Factor Authentication Settings page appears again with
information displayed under Trusted CA Certificate Information.