0% found this document useful (0 votes)
47 views72 pages

86A165FS03-SHC Reference

Bull Sequana SAP HANA SHC Reference

Uploaded by

psyberdude
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views72 pages

86A165FS03-SHC Reference

Bull Sequana SAP HANA SHC Reference

Uploaded by

psyberdude
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 72

BullSequana SH

SHC Reference Guide

86 A1 65FS 03 - October 2023


The following copyright notice protects this book under Copyright laws which prohibit such
actions as, but not limited to, copying, distributing, modifying, and making derivative works.

Copyright ©Eviden SAS 2023

Printed in France

Trademarks and Acknowledgements

We acknowledge the right of proprietors of trademarks mentioned in this manual.

All brand names and software and hardware product names are subject to trademark and/or
patent protection.

Quoting of brand and product names is for information purposes only and does not represent
trademark and/or patent misuse.

Hardware

October 2023

Eviden
30 bis rue du Nid de Pie
49000 Angers
FRANCE

The information in this document is subject to change without notice. Eviden will not be liable for errors
contained herein, or for incidental or consequential damages in connection with the use of this material.
Table of Contents

Table of Contents i

Preface p-1
Intended Readers p-1

Chapter 1. Getting started 1-1


1.1. Overview 1-1
1.2. Connecting to the Server Hardware Console (SHC) 1-2
1.3. The Overview page 1-3
1.4. SHC features 1-5
1.5. Changing the user password 1-7
1.6. Stopping the SHC 1-9

Chapter 2. Monitoring the system 2-1


2.1. Checking hardware information 2-1
2.2. Checking event logs 2-4
2.3. Checking the sensors 2-6
2.4. Collecting logs 2-7

Chapter 3. Controlling the system 3-1


3.1. Managing server power operations 3-1
3.1.1. Power management features overview 3-1
3.1.2. Checking Power State 3-3
3.1.3. Setting boot options 3-5
3.1.4. Powering on the server 3-6
3.1.5. Rebooting or shutting down the server 3-8
3.2. Connecting to the Keyboard, Video, Mouse (KVM) 3-9
3.3. Connecting to the Serial Over LAN (SOL) console 3-10
3.4. Creating a virtual media session 3-11
3.5. Configuring the power restore policy 3-12
3.6. Enabling or disabling the server identification LED 3-13
3.7. Excluding or including hardware components 3-14
3.8. Resetting settings to default values 3-16
3.9. Managing power usage 3-19
3.10. Rebooting BMC 3-20

Chapter 4. Configuring the management controller 4-1


4.1. Setting date and time 4-1
4.2. Managing firmware versions 4-3

Contents i
4.3. Managing network settings 4-5
4.4. Configuring Rsyslog 4-7
4.5. Configuring KVM settings 4-8
4.6. Partitioning 4-9
4.6.1. Checking partition 4-9
4.6.2. Creating new partitions 4-10

Chapter 5. Managing users 5-1


5.1. Managing client sessions 5-1
5.2. Configuring LDAP 5-2
5.3. Managing local users 5-4
5.3.1. Viewing a user list 5-4
5.3.2. Viewing privilege roles 5-5
5.3.3. Setting the account policy 5-6
5.3.4. Creating a new user account 5-7
5.4. Managing SSL certificates 5-9
5.4.1. Viewing SSL certificates 5-9
5.4.2. Adding a certificate 5-9
5.4.3. Generating a Certificate Signing Request (CSR) 5-10
5.4.4. Deleting a certificate 5-12
5.4.5. Updating a certificate automatically 5-13

ii SHC Reference Guide


Preface

This guide explains how to use the SHC to manage the server.

See The Bull support web site for the most up­to­date product information,
documentation, firmware updates, software fixes and service offers:
https://support.bull.com

Intended Readers
This guide is intended for use by system administrators and operators.

Preface p-1
p-2 SHC Reference Guide
Chapter 1. Getting started

1.1. Overview
The Server Hardware Console (SHC) for BullSequana SH servers provides a web
based interface to manage, configure and monitor the server.

The SHC is powered by OpenBMC, an open source implementation of the


Baseboard Management Controller (BMC) firmware stack.

Chapter 1. Getting started 1-1


1.2. Connecting to the Server Hardware Console (SHC)
Prerequisites

■ A laptop is connected to the primary module via the LAN

■ Chrome or Firefox web browsers are recommended

■ Setting the language of the web browser to English is recommended

Procedure

1. Open a web browser on the laptop.

2. Enter the module IP address or host name into the address bar, using the
secure protocol HTTPS.

The SHC authentication page opens.

3. Complete the User name and Password fields and click Log in.

The Overview page opens.

Important It is strongly recommended to change the initial password once


the setup is completed, taking care to record the new account
details for subsequent connections.

1-2 SHC Reference Guide


1.3. The Overview page
The Overview page provides a summary of the system details and status. It also
includes links to some server management and configuration features.

Note Some operations, for example, editing network settings, can be performed
both from the shortcut (J) on the Overview page or via the feature tab on
the left hand side (A).

Mark Description
Feature tabs with sub-items used to monitor, manage and configure a
A
server
B The connected module
C Product serial number of the module
D Summary of the server health status with a link to the System Logs
Server power status with a link to the Server power operations page.
E
Button available for the primary module
F Partitioning button with a link to the Partitioning page.
Refresh button for the Overview page with the date and time of the
G
last refresh

Chapter 1. Getting started 1-3


Mark Description
H User name button with links to profile settings and the log out
I BMC date and time
J Link to the Serial over LAN (SoL) console page
K Link to the Network Settings page
L Summary of the server information
M Summary of the power information
View high priority event logs. Critical events only are shown. To see all
N
the event logs click View all event logs
O Summary of the network information
Summary of the BMC information including type of firmware image
P
and security status

1-4 SHC Reference Guide


1.4. SHC features
The SHC tabs include features to:

■ Provide an overview of the server

■ Monitor the health of the server

■ Manage the server

■ Configure the server

■ Configure access and user settings for the server

Some features are only available for the primary module

Tab Item Availability


Server information Primary and secondary
BMC information Primary and secondary
Overview Power consumption Primary and secondary
Network information Primary and secondary
High priority event logs Primary and secondary
Hardware information Primary and secondary
Event log Primary and secondary
Health
Sensors Primary and secondary
Log Collect Primary and secondary
Server power operation Primary
KVM Primary
SOL console Primary
Virtual Media Primary
Power restore policy Primary
Control
Server ID LED Primary and secondary
Hardware exclusion Primary and secondary
Reset to default Primary and secondary
Manage power usage Primary
Reboot BMC Primary and secondary

Chapter 1. Getting started 1-5


Tab Item Availability
Date and time settings Primary and secondary
Firmware Primary and secondary
Network settings Primary and secondary
Configuration
Rsyslog Primary and secondary
KVM settings Primary and secondary
Partitioning (*) Primary and secondary
Client sessions Primary and secondary
LDAP Primary and secondary
Access control
Local user management Primary and secondary
SSL certificates Primary and secondary

(*) multi-module servers only

1-6 SHC Reference Guide


1.5. Changing the user password
Important It is strongly recommended to change the initial password once
the setup is completed, taking care to record the new account
details for subsequent connections.

1. From the user profile button, click Profile settings.

The Profile settings page opens.

Chapter 1. Getting started 1-7


2. Enter and confirm the new password.

– The password must be between 8 and 20 characters long

– The password must be a mixture of upper case letters, lower case letters,
numbers and special characters

– The password must be different from the user name

3. Click Save settings.

1-8 SHC Reference Guide


1.6. Stopping the SHC
From the user profile button, click Log out to stop the SHC.

Chapter 1. Getting started 1-9


1-10 SHC Reference Guide
Chapter 2. Monitoring the system

2.1. Checking hardware information


1. From the Health tab, click Hardware information. The Hardware information
page opens.

Chapter 2. Monitoring the system 2-1


2. Click the downward pointing arrow (B) to expand the information details for a
component.

2-2 SHC Reference Guide


3. Click Get identity Card (A) to get the server card as a json file.

Chapter 2. Monitoring the system 2-3


2.2. Checking event logs
Displaying event logs

From the Health tab, click Event logs. The Event logs page opens.

Up to 1 000 logs are displayed for the queried module.

Mark Description
A Module identifier
B Alphabetical search
C Log deletion
D Date range search
E Severity filter
F Export of log to a json file

2-4 SHC Reference Guide


Filtering event logs

1. Select the module identifier (A).

2. Enter one or more search criteria among alphabetical search (B), date range (D)
and severity (E) to filter the event logs displayed.

Exporting event logs

Click the arrow (F) to export an event log to a json file.

Deleting event logs

Click (C) to delete all event logs.

Chapter 2. Monitoring the system 2-5


2.3. Checking the sensors
Displaying sensors

From the Health tab, click Sensors. The Sensors page opens.

Sensors are displayed for the selected module.

Mark Description
A Module identifier
B Alphabetical search
C Status filter
D Sensor type filter

Filtering sensors

1. Select the module identifier (A).

2. Set one or more search criteria among alphabetical search (B), status (C) and
sensor type (D) tofilter the sensors displayed.

2-6 SHC Reference Guide


2.4. Collecting logs
A log file is a collection of the logs for the connected module.

Note Log files are stored in a circular way, when place is needed the oldest ones
are deleted.

Displaying logs

From the Health tab,click Log Collect. The Log Collect page opens.

The list of log files is displayed.

Mark Description
A Log file creation
B Module identification
C Alphabetical search
D Data range search
E Log file download
F Log file deletion

Filtering BMC logs

1. Select the module identifier (B).

2. Enter the search item (C) and/or the date range (D) to filter the log files
displayed.

Chapter 2. Monitoring the system 2-7


Creating a new log

Click Get logs (A) to create a new log collection.

Exporting event logs

Click the arrow (E) to download a log file.

Deleting event logs

Click (F) to delete a log file.

2-8 SHC Reference Guide


Chapter 3. Controlling the system

3.1. Managing server power operations


3.1.1. Power management features overview

From the Control tab, click Server power operations. The Server power
operations page opens.

Chapter 3. Controlling the system 3-1


Current status
■ On

Host status ■ Off

■ Not available

Last power operation Date and time of last power operation


Memory size detected by the BIOS during last
Last memory size
boot
Host OS boot settings
■ None

■ Pxe - Boots from a PXE server

■ Hdd - Boots from a hard disk


Boot Setting Override
■ Diags - Boots from the diagnostic partition

■ BiosSetup - Boots from the BIOS menu

■ Usb - Boots from a USB key

Enable one time boot Select to apply the boot setting once
Ensures the system will only boot if the TPM is
Enable button for TPM
fully functional. This feature can be enabled or
Required Policy
disabled with the Enabled button
Save button Saves the Host OS boot settings

3-2 SHC Reference Guide


Operations
Only visible when the server power status is Off
Power on button
Powers on the server
Only visible when the server power status is
Running

■ Orderly - Shuts down the operating system


before the server reboots
Reboot server ■ Immediate - Server reboots immediately
without the operating system shutting down.
N.B. Risk of data loss and corruption

Reboot button - Reboots the server applying the


reboot option selected
Only visible when the server power status is
Running

■ Orderly - Shuts down the operating system


before the server shuts down
Shutdown server ■ Immediate - Server shuts down immediately
without the operating system shutting down.
N.B. Risk of data loss and corruption

Shut down button - Shuts down the server


applying the shut down option selected

3.1.2. Checking Power State

From the Control tab, click Server power operations. The Server power operations
page opens.

Chapter 3. Controlling the system 3-3


Current Status
■ On

Host status ■ Off

■ Not available

Last power operation Date and time of last power operation

3-4 SHC Reference Guide


3.1.3. Setting boot options

1. From the Control tab, click Server power operations. The Server power
operations page opens.

2. In the Host OS boot settings section, select the boot setting required from the
boot setting override drop-down list.

Host OS boot settings


■ None

■ Pxe - Boots from a PXE server

■ Hdd - Boots from a hard disk


Boot Setting Override
■ Diags - Boots from the diagnostic partition

■ BiosSetup - Boots from the BIOS menu

■ Usb - Boots from a USB key

3. If required, Enable one time boot to apply the boot setting once.

Chapter 3. Controlling the system 3-5


4. If required, enable the TPMrequired policy, so that the system only boots when
the Trusted Platform Module (TPM) is functional.

5. Click Save.

3.1.4. Powering on the server

1. From the Control tab, click Server power operations. The Server power
operations page opens.

3-6 SHC Reference Guide


2. In the Operations section, click Power on.

A message is displayed

Chapter 3. Controlling the system 3-7


3.1.5. Rebooting or shutting down the server

1. From the Control tab, click Server power operations. The Server power
operations page opens.

2. In the Operations section, select the mode and click Reboot or Shutdown.

3-8 SHC Reference Guide


3.2. Connecting to the Keyboard, Video, Mouse (KVM)
From the Control tab, click KVM. The KVM page opens.

Note The KVM keyboard layout can be configured with the KVM settings feature.

Chapter 3. Controlling the system 3-9


3.3. Connecting to the Serial Over LAN (SOL) console
1. From the Control tab, click SOL console. The Serial over LAN console page
opens.

2. If required, click the Open in new tab link to open the console in a new
window.

3-10 SHC Reference Guide


3.4. Creating a virtual media session
Note Only users with Administrator privilege have access to this feature.

1. From the Control tab, click Virtual media. The Virtual media page opens.

2. Click Add file.

3. Select an ISO file for the boot.

4. Click Start.

Chapter 3. Controlling the system 3-11


3.5. Configuring the power restore policy
The power restore policy determines how the system starts after a power
disturbance.

1. From the Control tab, click Power restore policy. The Power restore policy
page opens.

2. Select the policy.

Power restore
Description
policy
Always On The system always powers on when power is applied
The system always remains powered off when power is
Always Off
applied
The system returns to its last power state when power is
Last state
applied

3. Click Save Settings.

3-12 SHC Reference Guide


3.6. Enabling or disabling the server identification LED
1. From the Control tab, click Server ID LED. The Server ID LED page opens.

2. Turn the server indicator LED on to identify the module.

See The Description Guide to locate the blue server identification LED at the
rear of the server.

Chapter 3. Controlling the system 3-13


3.7. Excluding or including hardware components
1. From the Control tab, click Hardware Exclusion. The Hardware Exclusion
page opens.

3-14 SHC Reference Guide


2. Select the check box(es) for the component(s) to be excluded.

3. Clear the check box(es) for the component(s) to be included.

Chapter 3. Controlling the system 3-15


3.8. Resetting settings to default values
Important It is strongly recommended to shut down the system before
resetting the setting values.

Note Only users with Administrator privilege have access to this feature.

1. From the Control tab, click Reset to default. The Reset to default page opens.

2. Select the components to reset and click Reset.

3-16 SHC Reference Guide


3. Carefully read the caution points.

Reset BIOS settings

Reset BMC settings

4. Select the option Continue without shutting down the system if needed to
go on.

Chapter 3. Controlling the system 3-17


5. Click Reset BIOS settings or Reset BMC settings depending on the function
performed.

6. Use the default user account to connect to the SHC after the Reset of the BMC
settings.

SHC default login


Username admin
Password 0penBmc*.

Note The 0 in the default password is the number zero.

3-18 SHC Reference Guide


3.9. Managing power usage
Note Only users with Administrator privilege have access to this feature.

1. From the Control tab, click Manage power usage. The Manage power usage
page opens.

2. To set a power cap:

a. Select Apply power cap.

b. Set the power cap value in the Power Cap Value (in watts) box.

3. Click Save.

Note The power consumption and power cap value are indicated on the
Overview page.

Chapter 3. Controlling the system 3-19


3.10. Rebooting BMC
Note Only users with Administrator privilege have access to this feature.

1. From the Control tab, click RebootBMC. The RebootBMC page opens.

2. Select the modules to reset.

3. Click the Reboot BMC(s) button and confirm.

A success message is displayed.

3-20 SHC Reference Guide


Chapter 4. Configuring the management controller

4.1. Setting date and time


1. From the Configuration tab, click Date and time settings. The Date and time
settings page opens.

2. Select the date and time configuration:

– Manual

– Network Time Protocol (NTP) servers

3. Click Save settings.

Chapter 4. Configuring the management controller 4-1


4. Click Profile Settings at the top of the page. The Profile settings page opens.

5. Select the timezone display:

– Default (UTC)

– Browser offset

6. Click Save settings.

4-2 SHC Reference Guide


4.2. Managing firmware versions

WARNING W018
It is mandatory to consult the documentation delivered with the firmware files
before proceeding to update firmware.
The update process may take some time and MUST NOT be interrupted. No
other actions may be performed during the process.
Only qualified personnel are authorized to update firmware.

If several firmwares are updated, the upgrade must be done in the following order:

1. BMC

2. CEB_PFR_CPLD

3. BIOS

4. CEB_MAIN_FPGA

5. CEB_IO_FPGA

6. CEB_P_CPLD

7. CPLD_ED

8. CPLD_EDR

9. CPLD_RGPU

10. EDSFFRaidMngt_EDR

Important It strongly recommended to respect the firmware update order.

Prerequisite

The server is powered off

Chapter 4. Configuring the management controller 4-3


Procedure

1. From the Configuration tab, click Firmware. The Firmware page opens.

2. To update a firmware :

a. Click Add file to select the firmware file.

b. Check Force Update option if the firmware version is the same as the one
already installed.

c. Click Start update.

4-4 SHC Reference Guide


4.3. Managing network settings
1. From the Configuration tab, click Network settings. The Network settings
page opens.

Chapter 4. Configuring the management controller 4-5


System
Default gateway Default gateway IP address
Hostname The server hostname
Mac address The server MAC address
IP4V
When enabled, the server IP address is retrieved
DHCP
from a DHCP server
Static When enabled, the server IP address is static
DHCP
IP address Server IP address
Subnet mask Sub-net mask for the host
Static
IP address Server IP address
Subnet mask Sub-net mask for the host
Add static IP Click this button to add a static IP address
Static DNS
IP address DNS server IP address
Add DNS server Click this button to add a DNS server address

2. Enter the system parameters: default gateway and hostname.

3. Select IPV4 configuration: DHCP or Static.

4. Add a static IP address if required.

5. Add a DNS server if required.

6. Click Save settings.

4-6 SHC Reference Guide


4.4. Configuring Rsyslog
1. From the Configuration tab, click Rsyslog. The Rsyslog page opens.

Rsyslog
Enable When selected, this option allows events to be sent by the
Syslog syslog protocol on a Linux platform, in order to centralize all the
Forwarding events
IP address Syslog server IP address
Port Syslog server listening port

2. Select Enable Syslog Forwarding and complete the fields as required.

3. Click Save settings.

Chapter 4. Configuring the management controller 4-7


4.5. Configuring KVM settings
1. From the Configuration tab, click KVM settings. The KVM settings page
opens.

2. Select the keyboard layout language from the drop-down list.

3. Click Save settings.

4-8 SHC Reference Guide


4.6. Partitioning
4.6.1. Checking partition

From the Configuration tab, click Partitionning. The Partitioning page opens.

Chapter 4. Configuring the management controller 4-9


4.6.2. Creating new partitions

1. Click Create Partition for each new partition required.

4-10 SHC Reference Guide


2. From the current partitions boxes, drag and drop the server modules to the
new partitions ones.

Important
■ All the server modules must be redistributed to the new
partitions.

■ For each new partition, the server module with the lowest
module number becomes the primary. Check that the new
primary is connected to the LAN.

3. Click Apply the new partitioning.

4. Click Confirm in the confirmation dialog box to launch the partioning, which
may take a few minutes to complete. All the Baseboard Manangement
Controllers (BMCs) will reboot.

5. After the reboot, connect to the SHC.

Chapter 4. Configuring the management controller 4-11


6. From the Configuration tab click Partitioning, the Partitioning page opens.

7. Check the new partitioning.

4-12 SHC Reference Guide


Chapter 5. Managing users

5.1. Managing client sessions


1. From the Access control tab, click Client session. The Client sessions page
opens.

2. To disconnect the user, click Disconnect.

Chapter 5. Managing users 5-1


5.2. Configuring LDAP
1. From the Access control tab, click LDAP, the LDAP page opens.

Settings
Enable LDAP
Allows LDAP authentication to be configured
authentication
Secures LDAP server using a Secure Socket Layer
Secure LDAP using SSL
certificate
Redirects to the SSL certificates page. The link is
Manage SSL certificates
active when LDAP authentication is enabled
Selects the LDAP service type:

Service type ■ Open LDAP

■ Microsoft Active Directory

Server URI ldap://<LDAP Server IP>

5-2 SHC Reference Guide


Settings
Bind DN Bind Distinguished Name
Bind password Bind user password
Base Distinguished Name. The point from which a
Base DN
server will start searching for users
The log in attribute that uniquely identifies a single
User ID attribute
user record
The log in attribute that uniquely identifies a group
Group ID attribute
user record
Save settings button Saves the configurations
Role groups
Role groups enable a set of permissions to be assigned to a group of
administrators or specialist users.
Group name Group name
Group privilege Role assigned to the group

2. Set the configuration and cllck Save settings.

Chapter 5. Managing users 5-3


5.3. Managing local users
5.3.1. Viewing a user list

From the Access control tab, click Local user management. The Local user
management page opens.

Local user management


Username Name the user uses to log on
Privilege Role assigned to the user
When enabled, the user account is active and the user is
able to log on. When disabled, the user's account is
Status
unavailable: the user's account is maintained but it is no
longer possible to log on using this account
Buttons

Edit button to display and modify the user account

Remove button to delete the user

5-4 SHC Reference Guide


5.3.2. Viewing privilege roles

1. From the Access tab, click Local user management. The Local user
management page opens.

2. Click View privilege role descriptions to display the roles.

Chapter 5. Managing users 5-5


5.3.3. Setting the account policy

1. From the Access tab, click Local user management. The Local user
management page opens.

2. Click the Account policy settings tab. The Account policy settings page
opens.

Account policy settings


Max failed login The number of failed login attempts allowed. The value
attempts must be set between 0 (default) and 65535
A locked user account stays locked until it is unlocked
Manual
manually
Automatic after Automatic unlock after the period set in the Timeout
timeout duration parameter
Timeout duration Period in seconds during which the user account
(seconds) remains locked. The minimum setting is 1 second

3. Complete the fields as required.

4. Click Save.

5-6 SHC Reference Guide


5.3.4. Creating a new user account

1. From the Access tab, click Local user management. The Local user
management page opens.

2. Click Add user tab. The Add user page opens.

Chapter 5. Managing users 5-7


Add user
Account status When selected, the user account is active and the user is
enabled able to log on. This is the default status
Account status
When selected, the user's account is unavailable
disabled
Name the user uses to log on

l Names cannot start with number


Username
l Special characters are not allowed except
underscores
Use the drop-down list to select the role to assign to the
Privilege
user
The password the user will use to log on
User password
■ The password must be between 8 and 20 characters
long

■ The password must be a mixture of upper case letters,


Confirm user
lower case letters, numbers and special characters
password
■ The password must be different from the user name

3. Complete the fields as required.

4. Click Add user. The user is created.

5-8 SHC Reference Guide


5.4. Managing SSL certificates
5.4.1. Viewing SSL certificates

From the Access control tab, click SSL certificates. The SSL certificates page
opens.

SSL certificates
Certificate Certificate name
Issued by
Certificate details
Issued to
Valid from
Validity period
Valid until
Actions

Remove button to delete the certificate

Refresh button to check if a more up-to-date version of the


certificate is available

5.4.2. Adding a certificate

1. From the Access control tab, click SSL certificates. The SSL certificates page
opens.

Chapter 5. Managing users 5-9


2. Click the Add new certificate tab. The Add new certificate page opens.

3. Use the drop-down list to select a certificate type. There are two possible
options:

– LDAP Certificate

– CA Certificate

4. Click Add file and select a certificate file.

Note The certificate file must be a .pem file.

5. Click Add.

5.4.3. Generating a Certificate Signing Request (CSR)

Important A valid SSL certificate is required to use the HTTPS protocol. By


default, a temporary certificate is delivered. For optimum
security, it is advised to generate and install a new certificate.

1. From the Access control tab, click SSL certificates. The SSL certificates page
opens.

5-10 SHC Reference Guide


2. Click the Generate CSR tab. The CSR generating page opens.

Certificate Signing Request (CSR)


Select an option:

Certificate type ■ HTTPS Certificate

■ LDAP Certificate

Country Select a country


Select:

Private key - Key pair algorithm ■ EC

■ RSA

State Name of the state


City Name of the city
Company name Name of the company
Company unit Generally the name of the department

Chapter 5. Managing users 5-11


Certificate Signing Request (CSR)
"Fully Qualified Domain Name" (FQDN)
example: hostName.DomainName.Top-
LevelDomain.
Common name If the Common Name differs from the
network name, a security warning will
pop up when the system is accessed
using HTTPS
Depending on the certification authority,
it may be necessary to define a challenge
password to authorize later changes to
Challenge password - optional
the certificate (example: revocation of the
certificate). The minimum length of this
password is four characters
Contact person - optional Generally the administrator's name
Generally the administrator's email
Email address -optional
address
Multiple alternate names separated by
Alternate name - optional
space

3. Complete the fields. Define the key pair algorithm for the private key:

– For RSA key pair algorithm, select the key bit length

– For EC key pair algorithm, select the key curve ID

4. Click Generate CSR to generate the CSR.

5. Click Download to save the CSR to the computer or Copy to save its content
into the clipboard and send it to the Certification Authority, who will check the
information, and then generate and return a signed certificate.

6. When the signed certificate is received, use the Add new certificate tab to
install the certificate.

5.4.4. Deleting a certificate

1. From the Access control tab, click SSL certificates. The SSL certificates page
opens.

5-12 SHC Reference Guide


2. Click the remove button for the required certificate.

3. Click Remove in the confirmation dialog box to remove the certificate.

5.4.5. Updating a certificate automatically

1. From the Access control tab, click SSL certificates. The SSL certificates page
opens.

2. Click the refresh button for the required certificate.

3. The certificate will be updated if a newer version is available.

Chapter 5. Managing users 5-13


5-14 SHC Reference Guide
eviden.com

You might also like