6 Other Optional Configurations
The features explained in this section do not provide a GUI. The following features require the administrator to issue the Linux commands provided in the instructions.
6.1 Authentication for Single User Mode
This section describes the procedure to require authentication for single user mode.
6.2 Changing OS User Account Default Passwords
This section describes the procedure to change the default passwords for all OS accounts that need to change the respective default passwords.
6.3 Changing Login Display Message
This section describes the procedure to change the login display message.
6.4 Forcing iLO to Use Strong Encryption
This section describes the procedure for an administrator to force iLO to use strong encryption.
6.5 Setting Up rsyslog for External Logging
This section describes the procedure to set up rsyslog for external logging to a central server from NOAMs and SOAMs.
6.6 Adding sudo Users
This section describes how new OS users can perform priviledged operations through the configuration of the “sudo” capability.
The “sudo” configuration supports very granular authorization to an individual OS user for certain desired commands.
admusr
to enter a password in
order to run the commands using sudo access:
- Log in as
admusr
on the source server.login: admusr Password: <current admin user password>
- Run the following command to check out the
plat.admusr.sudo
file:$ sudo rcstool co /usr/TKLC/plat/etc/sudoers.d/plat.admusr.sudo
- Run the following command to suppress the NOPASSWD
line:
$ sudo sed -i '/^%admgrp ALL = NOPASSWD: ALL$/ s/^/#/' \ /usr/TKLC/plat/etc/sudoers.d/plat.admusr.sudo
- Run the following command to check in the
plat.admusr.sudo
file:$ sudo rcstool ci /usr/TKLC/plat/etc/sudoers.d/plat.admusr.sudo “require password”
After making this change, all activities through sudo by the admusr requires admusr password. Existing documentation does not and will not indicate this.
The sudo configuration file is constructed from piece parts; the syntax is complex, and editing mistakes could leave a system without the required access. For this reason, details of the configuration rules are available through Oracle Help Center (OHC) or by opening a ticket with My Oracle Support.