Implement secure authentication protocols such at active directory, LDAP, and RADIUS. Use centralized management of authentication and authorization.
Limit the use of the root superuser account. Instead, create less privileged Oracle ILOM accounts for administration only. A general guideline, create and use user accounts with the least privilege sufficient to perform certain tasks.
Use access control lists where appropriate.
Set time-outs for extended sessions.
Set privilege levels.
Create a system banner to remind the user that unauthorized access is prohibited.