Security management of DC-SCM

Several products in the HPE server product lines implement norms from the OpenCompute Project (OCP) community. This documentation section depicts Redfish security specificities related to Modular Hardware Systems (MHS) and involving the Datacenter Secure Module (DC-SCM).

Supported URIs and methods

The following URIs are implemented in MHS based systems:

  • /redfish/v1/Managers/1/SecurityService/Actions/HpeSecurityService.RebindHPM (POST)
  • /redfish/v1/ComponentIntegrity/HPM (GET)

Binding DC-SCM and HPM

Replacing the HPM requires replacing the DC-SCM and binding it with the HPM. This binding process creates a trust relationship between the HPM and DC-SCM. This relationship enables the system to detect any unauthorized HPM replacement.

Prerequisites

Users must have a combination of Administrator role and Recovery Set privileges. After replacement, perform the following steps:

  1. Perform POST for the URI: /redfish/v1/Managers/1/SecurityService/Actions/HpeSecurityService.RebindHPM No payload
  2. After the bind is executed, check the HPM authentication status by performing a GET against: /redfish/v1/ComponentIntegrity/HPM/ . The ExtendedVerificationStatus property should be Success .
  3. Perform AC power cycle. If binding fails, download the AHS log and contact HPE Support .

Error Codes

Possible error codes are listed below:

  • UnsupportedSecurityState - The security state of HPE iLO 6 (DC-SCM module) is invalid.
  • InsufficientPrivilege - User does not have recovery privilege.
  • ActionNotSupported - Redfish URIs are executed on a non-MHS based system.
  • InternalErrorWithParam with return value - The code gives a return value. HPE Support can identify the issue using the return value.