Security management of DC-SCM
Several products in the HPE server product lines implement norms from the OpenCompute Project (OCP) community. This documentation section depicts Redfish security specificities related to Modular Hardware Systems (MHS) and involving the Datacenter Secure Module (DC-SCM).
Supported URIs and methods
The following URIs are implemented in MHS based systems:
-
/redfish/v1/Managers/1/SecurityService/Actions/HpeSecurityService.RebindHPM
(POST) -
/redfish/v1/ComponentIntegrity/HPM
(GET)
Binding DC-SCM and HPM
Replacing the HPM requires replacing the DC-SCM and binding it with the HPM. This binding process creates a trust relationship between the HPM and DC-SCM. This relationship enables the system to detect any unauthorized HPM replacement.
Prerequisites
-
Users must have a combination of
Administrator
role andRecovery Set
privileges. - The security jumper must be disabled or powered off.
After replacement, perform the following steps:
-
Perform POST for the URI:
/redfish/v1/Managers/1/SecurityService/Actions/HpeSecurityService.RebindHPM
No payload -
After the bind is executed, check the HPM authentication status by
performing a GET against:
/redfish/v1/ComponentIntegrity/HPM/
. TheExtendedVerificationStatus
property should beSuccess
. - Perform AC power cycle. If binding fails, download the AHS log and contact HPE Support .
Error Codes
Possible error codes are listed below:
-
UnsupportedSecurityState
- The security state of HPE iLO 6 (DC-SCM module) is invalid. -
InsufficientPrivilege
- User does not have recovery privilege. -
ActionNotSupported
- Redfish URIs are executed on a non-MHS based system. -
InternalErrorWithParam with return value
- The code gives a return value. HPE Support can identify the issue using the return value.