Figure 8.
Flowchart for calculating current privileges
NOTE:
This section describing user privileges applies to local accounts as
well as directory accounts.
Login process using two-factor authentication
With the version 1.80 firmware release, iLO provides a more robust authentication scheme
supporting Microsoft Internet Explorer only. This authentication scheme involves using two factors of
authentication. The user is authenticated by providing both of these factors:
1.
Something the user knows, a password or PIN
2.
Something the user possesses, the private key for their digital certificate
Users have the ability to store their digital certificates and private keys wherever they choose. It is
likely, however, that smart cards and USB keys will be widely accepted due to their portability and
secure methods of protecting private keys.
16