
Plug-In Configuration 13
2
Plug-In Configuration
The following sections provide step-by-step instructions for the plug-in initial
configuration. Upgrade, uninstallation, and security role information is also
covered in this chapter.
Security Roles and Permissions
The Dell Management Plug-In encrypts and stores sensitive user credential
information. It does not provide any passwords to client applications to avoid
any improper requests that could lead to issues. The database back-ups are
fully encrypted using custom security phrases, and therefore the data cannot
be misused.
Data Integrity
Communication between the Plug-in, virtual appliance, administration
console, and vCenter is accomplished using SSL/HTTPS. The Plug-in can
generate an SSL certificate used for trusted communication between vCenter
and the appliance. It also verifies and trusts the vCenter server's certificate
before communication and Plug-In registration. The Dell Administration
Portal uses security procedures to avoid improper requests while the keys are
transferred back and forth from the administration console and back-end
services. This type of security causes cross-site request forgeries to not be
successful.
A secure administration console session has a five minute idle minute, and
the session is only valid in the current browser window and/or tab. If the user
tries to open the session in a new window or tab, a security error is created
that asks for a valid session. This action also prevents the user from clicking
any malicious URL that could try to attack the administration console
session.
Comentarios a estos manuales