![HP AB500A - Integrated Lights-Out Advanced Скачать руководство пользователя страница 19](http://html.mh-extra.com/html/hp/ab500a-integrated-lights-out-advanced/ab500a-integrated-lights-out-advanced_technology-brief_164234019.webp)
3.
The iLO device securely sends a one-time login token to the second browser window. The token
contains base-64 encoded hash values of a random secret key and a random session key. This
token is sent securely over SSL so a LAN sniffer cannot capture it.
4.
The Java applet in the second browser window decodes (using base-64) the information within the
token.
5.
The Java applet passes the decoded information back to the remote console applet as the
username and password.
6.
The remote console applet compares the original login token with the decoded username and
password from the Java applet, and allows a login if the data match.
This process is identical for the Integrated Remote Console ActiveX control.
Figure 10.
Initiating a remote console session
6: Comparison of applet
and user name permits
l
Figure 11 shows schematically how iLO constructs the one-time login token:
1.
The original browser session contains a 40-character random session key. Programming code
stored in the remote console applet generates a 40-character random secret. The random session
key is concatenated with the random secret.
2.
The iLO device performs an MD5 hash
7
on the concatenated line, and then converts the MD5
hash to ASCII. This step guarantees that the session key remains obscured. This prevents a user
from hijacking another session accidentally or deliberately by using his valid session key to
reattach to a different user’s session.
3.
The session ID is concatenated with the 32-character ASCII hash to obtain a second new line.
7
An MD5 hash is a
one-way encryption method that takes a message and converts it into32 digit hexademical
number, also called a message digest.
19