Security, General security guidelines, Password guidelines – HP Integrated Lights-Out User Manual
Page 43

Configuring iLO 2 43
Security
iLO 2 enables you to customize iLO 2 security settings. To access iLO 2 security settings, select
Administration>Security. iLO 2 security options include
•
SSH key administration (on page
•
SSL certificate administration (on page
•
Two-factor authentication (on page
•
•
iLO 2 encryption
•
HP SIM single sign-on ("
" on page
•
Remote Console Computer Lock (on page
iLO 2 security options enables iLO 2 to provide the following security features:
•
User-defined TCP/IP ports
•
User actions logged in the iLO 2 Event Log
•
Progressive delays for failed login attempts
•
Support for X.509 CA signed certificates
•
Support for securing RBSU
•
Encrypted communication using:
o
SSH key administration
o
SSL certificate administration
•
Support for optional LDAP-based directory services
Some of these options are licensed features. To verify your available options, see the section, "Licensing
(on page
)."
General security guidelines
The following are general guidelines concerning security for iLO 2:
•
For maximum security, iLO 2 should be set up on a separate management network.
•
iLO 2 should not be connected directly to the Internet.
•
A 128-bit cipher strength browser must be used.
Password guidelines
The following is a list of recommended password guidelines. Passwords should:
•
Never be written down or recorded
•
Never be shared with others
•
Not be words generally found in a dictionary, or easy to guess words, such as the company name,
product names, the user's name, or the user's User ID
•
Include at least three of the four following characteristics: