Oracle® EDR InfiniBand Switch and Virtualized I/O Systems Hardware Security Guide

Exit Print View

Updated: September 2016
 
 

User Accounts

  • Implement secure authentication protocols such at active directory, LDAP, and RADIUS. Use centralized management of authentication and authorization.

  • Limit the use of the root superuser account. Instead, create less privileged Oracle ILOM accounts for administration only. A general guideline, create and use user accounts with the least privilege sufficient to perform certain tasks.

  • Use access control lists where appropriate.

  • Set time-outs for extended sessions.

  • Set privilege levels.

  • Create a system banner to remind the user that unauthorized access is prohibited.