WO2020038106A1 - 一种bmc的管理方法、管理系统及相关装置 - Google Patents

一种bmc的管理方法、管理系统及相关装置 Download PDF

Info

Publication number
WO2020038106A1
WO2020038106A1 PCT/CN2019/093327 CN2019093327W WO2020038106A1 WO 2020038106 A1 WO2020038106 A1 WO 2020038106A1 CN 2019093327 W CN2019093327 W CN 2019093327W WO 2020038106 A1 WO2020038106 A1 WO 2020038106A1
Authority
WO
WIPO (PCT)
Prior art keywords
address
administrator
super administrator
bmc
preset operation
Prior art date
Application number
PCT/CN2019/093327
Other languages
English (en)
French (fr)
Inventor
贾帅帅
Original Assignee
郑州云海信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 郑州云海信息技术有限公司 filed Critical 郑州云海信息技术有限公司
Publication of WO2020038106A1 publication Critical patent/WO2020038106A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Definitions

  • the present application relates to the field of servers, and in particular, to a management method, a management system for a BMC, a computer-readable storage medium, and a server.
  • the information security system in the network environment is the key to ensuring information security, including computer security operating systems, various security protocols, security mechanisms (digital signatures, information authentication, data encryption, etc.), and up to the security system, any security vulnerability can be Threat to global security.
  • the server stores a variety of information data from all walks of life. There is no shortage of important data, so security is the first consideration.
  • BMC Baseboard Management Controller
  • the purpose of this application is to provide a BMC management method, a management system, a computer-readable storage medium, and a server, so as to solve the problem of low BMC management security in the existing server.
  • this application provides a BMC management method.
  • the specific technical solutions are as follows:
  • the administrator IP address determines to perform the preset operation corresponding to the first request instruction, sending a second request instruction to the super administrator IP address;
  • the preset operation includes updating the BMC or updating the BIOS.
  • the method further includes:
  • the method further includes:
  • This application also provides a BMC management system, including:
  • a first request module configured to send a first request instruction to an administrator IP address when the BMC requests a preset operation
  • a second request module configured to send a second request instruction to the super administrator IP address if the administrator IP address determines to perform the preset operation corresponding to the first request instruction;
  • An operation execution module is configured to execute the preset operation after the super administrator IP address confirms execution of the preset operation according to the second request instruction.
  • the management system further includes:
  • a setting module configured to set the super administrator IP address.
  • the management system further includes:
  • a unbinding request module configured to send a unbinding request to the super administrator IP address when the super administrator IP address is changed
  • the resetting module is configured to reset the super administrator IP address after the unbinding request is confirmed.
  • the present application also provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the steps of the management method as described above are implemented.
  • the present application also provides a server including a memory and a processor, where the computer program is stored in the memory, and the processor implements the steps of the management method as described above when the computer program in the memory is called.
  • a BMC management method provided in this application includes: when the BMC requests a preset operation, sending a first request instruction to an administrator IP address; if the administrator IP address determines to execute the first request The preset operation corresponding to the instruction sends a second request instruction to the super administrator IP address; after the super administrator IP address confirms execution of the preset operation according to the second request instruction, the preset operation is performed operating.
  • This application implements dual-user control on the BMC in the server by setting a super administrator IP on the BMC. Achieve double confirmation of the operation in the server, even if the administrator user in the BMC confirms the misoperation due to personal mistakes, the misoperation can be rejected through the super administrator IP, which reduces the impact of personal operations on the server system security and protects the server
  • the safe and reliable operation provides important guarantee for server information security.
  • the present application also provides a BMC management system, a computer-readable storage medium, and a server, which also have the above-mentioned beneficial effects, and are not repeated here.
  • FIG. 1 is a flowchart of a BMC management method according to an embodiment of the present application
  • FIG. 2 is a flowchart of unbinding an IP address of a super administrator according to an embodiment of the present application
  • FIG. 3 is a schematic structural diagram of a BMC management system according to an embodiment of the present application.
  • FIG. 1 is a flowchart of a management method of a BMC according to an embodiment of the present application.
  • the management method includes:
  • the server is the core of the entire network system and computing platform. Many important data are stored on the server.
  • the BMC is the server steward. It uses sensors to monitor the status of a computer, network server, or other hardware-driven device. Take control of the server.
  • the BMC can also control the BIOS refresh. As the front line of the server startup, the BIOS holds the highest voice of the server. Therefore, more secure control of the BMC is equivalent to more secure control of the server.
  • the preset operation is not limited herein, and the specific content of the preset operation should be set by a person skilled in the art from the perspective of the actual requirements and security of the server. It can be understood that the BMC can request to perform most operations in the server, and these operations have different effects on the server, and therefore correspond to different permissions. For example, if you perform a self-test on a component in the server (such as detecting host temperature, fan speed, etc.), high-level permissions are not required. However, when there is an operation that has a greater impact on the server's operation, such as updating the BMC or updating the BIOS, the BMC admin identity confirmation is usually required at this time.
  • the admin permissions are used to manage high-level operations. Therefore, this step is mainly directed to operations that require admin authority determination. Before performing such operations, it is necessary to send a first request command to the administrator IP address where the admin authority is located to request execution of the operation.
  • the first request instruction is generally an IPMI instruction (Intelligent Platform Management Interface).
  • a second request instruction is sent to the super administrator IP address at this time.
  • the content of the second request instruction and part of the first request instruction should be substantially the same, or that at least both include the execution request for the operation, but only because the object of the request is different (the first request instruction is sent To the administrator's IP address, and the second request instruction is sent to the super administrator's IP address), so there may be differences in the form and sending method.
  • the form and sending method of the first request instruction and the second request instruction There is no limitation on the form and sending method of the first request instruction and the second request instruction. The specific settings should be made by those skilled in the art according to the administrator IP address and the super administrator IP address.
  • the administrator IP address and the super administrator IP address do not have to be on a server.
  • Each server should have an admin right, which corresponds to an administrator IP address, but the super administrator IP address, or super administrator rights, is not the case.
  • Super administrator rights and administrator rights can be one-to-one or one-to-many, that is, there is only one super administrator right in several servers. In this way, when sending the second request instruction, the second request instruction needs to be sent to the server where the IP address of the super administrator is located.
  • the super administrator IP address can be set when a user logs in to the server BMC for the first time.
  • the setting sequence and setting relationship between the super administrator IP address and the administrator IP address are not limited herein.
  • the administrator IP address of each server is set earlier than the super administrator IP address. That is, after all servers have been set with the administrator IP address, the super administrator IP address is set.
  • the server where the super administrator IP address is located may or may not have an administrator IP address. This should be set by those skilled in the art.
  • the restarted server usually includes the server where the super administrator's IP address is located, and the servers restricted by the super administrator's permissions, that is, all servers managed by the super administrator.
  • the super administrator rights must be at least equal to the administrator rights, in other words, the super administrator rights must not be less than the administrator rights. That is, the operation content that can be determined by the administrator authority must be determined by the super administrator authority, but the operation content that can be determined by the super administrator authority may not be determined by the super administrator authority.
  • the second request instruction is generally an IPMI instruction.
  • the preset operation can be performed.
  • this embodiment is equivalent to performing a second determination on the preset operation. Only operations that have been confirmed by the administrator authority and the super administrator authority can be performed by the BMC. Achieve double confirmation of the operation in the server. Even if the administrator user in the BMC confirms the misoperation due to personal mistakes, the misoperation can be rejected through the super administrator IP, which reduces the impact of personal operations on the server system security and protects the server.
  • the safe and reliable operation provides important guarantee for server information security.
  • FIG. 2 is a flowchart of unbinding a super administrator IP address according to an embodiment of the present application. Based on the foregoing embodiment, as a preferred embodiment, for a super administrator IP address, the method may further include:
  • This embodiment aims to realize the replacement of the super administrator's IP address, and the purpose is to facilitate remote management of the server system. It can be understood that the previous embodiment implements the security guarantee of the BMC operation in the server system, but when implementing the remote control of the server, it is difficult to obtain the super administrator IP's determination of the preset operation, or perform the BMC multiple times During the operation, repeatedly obtaining the IP address of the super administrator at the remote end will cause some trouble. At this time, you can replace the IP address of the super administrator.
  • the local client BMC sends an unbinding request to the super administrator IP address.
  • the specific information content of the unbinding request is not limited herein. It can be understood that the unbinding request needs to include at least the information of the super administrator's IP address requesting the unbinding and the security information related to the identity confirmation of the local client BMC.
  • the unbinding request contains the login password of the server where the IP address of the super administrator is located, or other information with authentication functions.
  • the super administrator IP address can be reset on the local client BMC.
  • the following introduces a BMC management system provided in the embodiments of the present application.
  • the management system described below and the management method described above can refer to each other.
  • FIG. 3 is a schematic structural diagram of a BMC management system according to an embodiment of the present application. This application also provides a BMC management system, including:
  • a first request module 100 configured to send a first request instruction to an administrator IP address when the BMC requests a preset operation
  • a second request module 200 configured to send a second request instruction to a super administrator IP address if the administrator IP address determines to perform the preset operation corresponding to the first request instruction;
  • the operation execution module 300 is configured to execute the preset operation after the super administrator IP address confirms execution of the preset operation according to the second request instruction.
  • the management system further includes:
  • a setting module configured to set the super administrator IP address.
  • the method further includes:
  • the restart module is configured to restart the server to make the super administrator IP address take effect.
  • the management system further includes:
  • a unbinding request module configured to send a unbinding request to the super administrator IP address when the super administrator IP address is changed
  • the resetting module is configured to reset the super administrator IP address after the unbinding request is confirmed.
  • the present application also provides a computer-readable storage medium on which a computer program is stored.
  • the storage medium may include various media that can store program codes, such as a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk.
  • This application further provides a server, which may include a memory and a processor.
  • the memory stores a computer program.
  • the processor calls the computer program in the memory, the steps provided in the foregoing embodiments may be implemented.
  • the server may also include various network interfaces, power supplies, and other components.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Telephonic Communication Services (AREA)
  • Computer And Data Communications (AREA)

Abstract

一种BMC的管理方法、管理系统及相关装置,该方法包括:当BMC请求进行预设操作时,向管理员IP地址发送第一请求指令;若管理员IP地址确定执行第一请求指令对应的预设操作,向超级管理员IP地址发送第二请求指令;在超级管理员IP地址根据第二请求指令确认执行预设操作后,执行预设操作。通过对BMC设置超级管理员IP,实现了对于服务器中BMC的双用户控制。实现了对于服务器中操作的双重确认,减小了个人操作对服务器系统安全的影响,保障了服务器的安全可靠运行,为服务器信息安全提供了重要保障。

Description

一种BMC的管理方法、管理系统及相关装置
本申请要求于2018年8月24日提交中国专利局、申请号为201810972546.1、发明名称为“一种BMC的管理方法、管理系统及相关装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及服务器领域,特别涉及一种BMC的管理方法、管理系统,一种计算机可读存储介质和一种服务器。
背景技术
网络环境下的信息安全体系是保证信息安全的关键,包括计算机安全操作系统、各种安全协议、安全机制(数字签名、信息认证、数据加密等),直至安全系统,其中任何一个安全漏洞便可以威胁全局安全。而服务器保存着各行各业,各种各样的信息数据。其中不乏重要数据,所以安全是首要考虑的问题。虽然BMC(Baseboard Management Controller,基本管理控制器)增加了user用户和admin用户,用来区分各自的应用权限,但是相对于admin用户而言,权限太高,从而没有操作限制,个人操作的失误率将直接影响服务器的运行安全。
因此,如何提高服务器中BMC的管理安全是本领域技术人员亟需解决的问题。
发明内容
本申请的目的是提供一种BMC的管理方法、管理系统,一种计算机可读存储介质和一种服务器,解决现有服务器中BMC管理安全程度低的问题。
为解决上述技术问题,本申请提供一种BMC的管理方法,具体技术方案如下:
当所述BMC请求进行预设操作时,向管理员IP地址发送第一请求指令;
若所述管理员IP地址确定执行所述第一请求指令对应的所述预设操作,向超级管理员IP地址发送第二请求指令;
在所述超级管理员IP地址根据所述第二请求指令确认执行所述预设操作后,执行所述预设操作。
其中,所述预设操作包括更新所述BMC或更新BIOS。
其中,所述BMC请求进行预设操作之前,还包括:
设置所述超级管理员IP地址。
其中,设置所述超级管理员IP地址之后,所述BMC请求进行预设操作之前,还包括:
重启服务器,以使所述超级管理员IP地址生效。
其中,还包括:
当更换所述超级管理员IP地址时,向所述超级管理员IP地址发送解绑请求;
当所述解绑请求被确认后,重新设置所述超级管理员IP地址。
本申请还提供一种BMC的管理系统,包括:
第一请求模块,用于当所述BMC请求进行预设操作时,向管理员IP地址发送第一请求指令;
第二请求模块,用于若所述管理员IP地址确定执行所述第一请求指令对应的所述预设操作,向超级管理员IP地址发送第二请求指令;
操作执行模块,用于在所述超级管理员IP地址根据所述第二请求指令确认执行所述预设操作后,执行所述预设操作。
其中,所述管理系统还包括:
设置模块,用于设置所述超级管理员IP地址。
其中,所述管理系统还包括:
解绑请求模块,用于当更换所述超级管理员IP地址时,向所述超级管理员IP地址发送解绑请求;
重置模块,用于当所述解绑请求被确认后,重新设置所述超级管理员IP地址。
本申请还提供一种计算机可读存储介质,其上存储有计算机程序,所 述计算机程序被处理器执行时实现如上所述的管理方法的步骤。
本申请还提供一种服务器,包括存储器和处理器,所述存储器中存有计算机程序,所述处理器调用所述存储器中的计算机程序时实现如上所述的管理方法的步骤。
本申请所提供的一种BMC的管理方法,包括:当所述BMC请求进行预设操作时,向管理员IP地址发送第一请求指令;若所述管理员IP地址确定执行所述第一请求指令对应的所述预设操作,向超级管理员IP地址发送第二请求指令;在所述超级管理员IP地址根据所述第二请求指令确认执行所述预设操作后,执行所述预设操作。
本申请通过对BMC设置超级管理员IP,实现了对于服务器中BMC的双用户控制。实现了对于服务器中操作的双重确认,即使BMC中管理员用户因个人失误确认了误操作,通过超级管理员IP可以拒绝该误操作,减小了个人操作对服务器系统安全的影响,保障了服务器的安全可靠运行,为服务器信息安全提供了重要保障。本申请还提供了一种BMC的管理系统,一种计算机可读存储介质和一种服务器,同样具有上述有益效果,此处不再赘述。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对现有技术和实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本申请实施例所提供的一种BMC的管理方法的流程图;
图2为本申请实施例所提供的解绑超级管理员IP地址的流程图;
图3为本申请实施例所提供的一种BMC的管理系统结构示意图。
具体实施方式
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描 述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
请参考图1,图1为本申请实施例所提供的一种BMC的管理方法的流程图,该管理方法包括:
S101:当所述BMC请求进行预设操作时,向管理员IP地址发送第一请求指令;
服务器是整个网络系统和计算平台的核心,许多重要的数据都保存在服务器上。BMC又是服务器的管家,它利用传感器来监视一台计算机、网络服务器,或者是其他硬件驱动设备的状态。掌握着服务器的控制权。并且BMC还可以控制BIOS的刷新,BIOS作为服务器启动的最前线,掌握着服务器的最高话语权。所以更加安全的控制了BMC,就相当于更加安全的控制了服务器。
在此对于预设操作不作限定,预设操作的具体内容应由本领域技术人员从服务器的实际需求及安全性的角度出发进行相应的设定。可以理解的是,BMC可以请求执行服务器中的大多数操作,这些操作对服务器的影响并不相同,也因此对应不同的权限。举例而言,若是对服务器中某个组件进行故障自检(例如检测主机温度,风扇转速等),则无需高级别的权限。然而当存在对服务器工作运行影响较大的操作时,例如更新所述BMC或更新BIOS时,此时通常需要BMC的admin身份确认。需要说明的是,现有的BMC上只存在两类权限,一个是用户权限,另一个即admin权限(管理员权限),admin权限用于管理高权限操作。因此,本步骤主要针对于需要admin权限确定的操作,这类操作在执行前需要向admin权限所在的管理员IP地址发送第一请求命令,以请求执行操作。
通常,第一请求指令一般为IPMI指令(Intelligent Platform Management Interface,智能平台管理接口)。
S102:若所述管理员IP地址确定执行所述第一请求指令对应的所述预设操作,向超级管理员IP地址发送第二请求指令;
当管理员IP地址对应的admin权限确定执行第一请求指令对应的所述 预设操作时,此时向超级管理员IP地址发送第二请求指令。需要说明是,第二请求指令的内容和第一请求指令的部分内容实质上应当是相同的,或者说,至少都包含对于操作的执行请求,只不过因为请求的对象不同(第一请求指令发送至管理员IP地址,第二请求指令发送至超级管理员IP地址),因此在形式和发送方式上可能有所区别,在此对于第一请求指令和第二请求指令的形式和发送方式不作限定,具体应由本领域技术人员根据管理员IP地址、超级管理员IP地址作相应的设定。
需要说明的是,管理员IP地址和超级管理员IP地址并非必须在一台服务器上。每一台服务器都应具有一个admin权限,对应一个管理员IP地址,而超级管理员IP地址,或者说超级管理员权限则不然。超级管理员权限和管理员权限可以为一对一,也可以为一对多,即若干服务器中只有一个超级管理员权限。这样在发送第二请求指令时需要将第二请求指令发送至超级管理员IP地址所在的服务器。
本实施例默认在BMC请求进行预设操作之前,还存在设置超级管理员IP地址的步骤。具体的,设置超级管理员IP地址可以在用户初次登录服务器BMC时,进行超级管理员IP地址的设置。在此对于超级管理员IP地址和管理员IP地址之间的设置顺序、设置关系不作限定。通常每台服务器的管理员IP地址的设置早于超级管理员IP地址的设置,即在所有服务器均已设置完管理员IP地址后,设置超级管理员IP地址。而超级管理员IP地址所在的服务器可以设置或不设置管理员IP地址,这一点应由本领域技术人员作设定。
此外,在设定超级管理员IP地址之后,尚不能直接令超级管理员IP地址起到作用。此时,通常还需要重启服务器,以使得超级管理员IP地址生效。重启的服务器通常包括超级管理员IP地址所在的服务器,以及被该超级管理员权限所限制管理的服务器,即接受该超级管理员身份管理的所有服务器。
需要说明的是,超级管理员权限至少要等于管理员权限,换句话说,超级管理员权限一定不小于管理员权限。即管理员权限可以确定的操作内容一定可以被超级管理员权限所确定,但超级管理员权限可以确定的操作 内容却不一定可以被超级管理员权限所确定。
同样的,第二请求指令一般也为IPMI指令。
S103:在所述超级管理员IP地址根据所述第二请求指令确认执行所述预设操作后,执行所述预设操作。
当超级管理员权限也确定经管理员权限认可实施的预设操作时,方可执行该预设操作。
也因此,本实施例相当于对预设操作执行了二次确定,只有先后经过管理员权限和超级管理员权限确认后的操作才可以被BMC执行。实现了对于服务器中操作的双重确认,即使BMC中管理员用户因个人失误确认了误操作,通过超级管理员IP可以拒绝该误操作,减小了个人操作对服务器系统安全的影响,保障了服务器的安全可靠运行,为服务器信息安全提供了重要保障。
参见图2,图2为本申请实施例所提供的解绑超级管理员IP地址的流程图,基于上述实施例,作为优选的实施例,对于超级管理员IP地址,还可以包括:
S201:当更换所述超级管理员IP地址时,向所述超级管理员IP地址发送解绑请求;
S202:当所述解绑请求被确认后,重新设置所述超级管理员IP地址。
本实施例旨在实现超级管理员IP地址的更换,目的是方便对服务器系统的远程管理。可以理解的是,上一实施例实现了对服务器系统中BMC操作的安全保障,但在实现对服务器的远程控制时,难以获取超级管理员IP对于预设操作的确定,或者,多次进行BMC操作时,反复获得位于远端的超级管理员IP地址会带来一定的麻烦。此时可以进行超级管理员IP地址的更换。
此时,本地的客户端BMC向超级管理员IP地址发送解绑请求。在此对于解绑请求的具体信息内容不作限定。可以理解的是,解绑请求中至少需要包括请求解绑超级管理员IP地址的信息,以及本地客户端BMC的与身份确认的相关安全信息。例如,解绑请求中包含超级管理员IP地址所在 服务器的登录密码,或者其他具有身份认证功能的信息等。
当超级管理员IP地址所在的服务器端确认该解绑请求后,即可在本地的客户端BMC重新设置超级管理员IP地址。
下面对本申请实施例所提供的一种BMC的管理系统进行介绍,下文描述的管理系统与上文描述的管理方法可相互对应参照。
参见图3,图3为本申请实施例所提供的一种BMC的管理系统结构示意图。本申请还提供一种BMC的管理系统,包括:
第一请求模块100,用于当所述BMC请求进行预设操作时,向管理员IP地址发送第一请求指令;
第二请求模块200,用于若所述管理员IP地址确定执行所述第一请求指令对应的所述预设操作,向超级管理员IP地址发送第二请求指令;
操作执行模块300,用于在所述超级管理员IP地址根据所述第二请求指令确认执行所述预设操作后,执行所述预设操作。
基于上述实施例,作为优选的实施例,所述管理系统还包括:
设置模块,用于设置所述超级管理员IP地址。
基于上述实施例,作为优选的实施例,设置所述超级管理员IP地址之后,所述BMC请求进行预设操作之前,还包括:
重启模块,用于重启服务器,以使所述超级管理员IP地址生效。
基于上述实施例,作为优选的实施例,所述管理系统还包括:
解绑请求模块,用于当更换所述超级管理员IP地址时,向所述超级管理员IP地址发送解绑请求;
重置模块,用于当所述解绑请求被确认后,重新设置所述超级管理员IP地址。
本申请还提供了一种计算机可读存储介质,其上存有计算机程序,该计算机程序被执行时可以实现上述实施例所提供的步骤。该存储介质可以包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机 存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
本申请还提供了一种服务器,可以包括存储器和处理器,所述存储器中存有计算机程序,所述处理器调用所述存储器中的计算机程序时,可以实现上述实施例所提供的步骤。当然所述服务器还可以包括各种网络接口,电源等组件。
说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似部分互相参见即可。对于实施例提供的系统而言,由于其与实施例提供的方法相对应,所以描述的比较简单,相关之处参见方法部分说明即可。
本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想。应当指出,对于本技术领域的普通技术人员来说,在不脱离本申请原理的前提下,还可以对本申请进行若干改进和修饰,这些改进和修饰也落入本申请权利要求的保护范围内。
还需要说明的是,在本说明书中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。

Claims (10)

  1. 一种BMC的管理方法,其特征在于,包括:
    当所述BMC请求进行预设操作时,向管理员IP地址发送第一请求指令;
    若所述管理员IP地址确定执行所述第一请求指令对应的所述预设操作,向超级管理员IP地址发送第二请求指令;
    在所述超级管理员IP地址根据所述第二请求指令确认执行所述预设操作后,执行所述预设操作。
  2. 根据权利要求1所述的管理方法,其特征在于,所述预设操作包括更新所述BMC或更新BIOS。
  3. 根据权利要求1所述的管理方法,其特征在于,所述BMC请求进行预设操作之前,还包括:
    设置所述超级管理员IP地址。
  4. 根据权利要求3所述的管理方法,其特征在于,设置所述超级管理员IP地址之后,所述BMC请求进行预设操作之前,还包括:
    重启服务器,以使所述超级管理员IP地址生效。
  5. 根据权利要求1所述的管理方法,其特征在于,还包括:
    当更换所述超级管理员IP地址时,向所述超级管理员IP地址发送解绑请求;
    当所述解绑请求被确认后,重新设置所述超级管理员IP地址。
  6. 一种BMC的管理系统,其特征在于,包括:
    第一请求模块,用于当所述BMC请求进行预设操作时,向管理员IP地址发送第一请求指令;
    第二请求模块,用于若所述管理员IP地址确定执行所述第一请求指令对应的所述预设操作,向超级管理员IP地址发送第二请求指令;
    操作执行模块,用于在所述超级管理员IP地址根据所述第二请求指令确认执行所述预设操作后,执行所述预设操作。
  7. 根据权利要求6所述的管理系统,其特征在于,还包括:
    设置模块,用于设置所述超级管理员IP地址。
  8. 根据权利要求6所述的管理系统,其特征在于,还包括:
    解绑请求模块,用于当更换所述超级管理员IP地址时,向所述超级管理员IP地址发送解绑请求;
    重置模块,用于当所述解绑请求被确认后,重新设置所述超级管理员IP地址。
  9. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求1-4任一项所述的管理方法的步骤。
  10. 一种服务器,其特征在于,包括存储器和处理器,所述存储器中存有计算机程序,所述处理器调用所述存储器中的计算机程序时实现如权利要求1-4任一项所述的管理方法的步骤。
PCT/CN2019/093327 2018-08-24 2019-06-27 一种bmc的管理方法、管理系统及相关装置 WO2020038106A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810972546.1A CN109189425A (zh) 2018-08-24 2018-08-24 一种bmc的管理方法、管理系统及相关装置
CN201810972546.1 2018-08-24

Publications (1)

Publication Number Publication Date
WO2020038106A1 true WO2020038106A1 (zh) 2020-02-27

Family

ID=64919551

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/093327 WO2020038106A1 (zh) 2018-08-24 2019-06-27 一种bmc的管理方法、管理系统及相关装置

Country Status (2)

Country Link
CN (1) CN109189425A (zh)
WO (1) WO2020038106A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109189425A (zh) * 2018-08-24 2019-01-11 郑州云海信息技术有限公司 一种bmc的管理方法、管理系统及相关装置
CN109901875B (zh) * 2019-02-28 2022-08-12 苏州浪潮智能科技有限公司 一种适用于多地区的bmc及服务器

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160328576A1 (en) * 2015-05-08 2016-11-10 YC Wellness, Inc. Integration platform and application interfaces for remote data management and security
CN106446638A (zh) * 2016-10-14 2017-02-22 郑州云海信息技术有限公司 一种云计算操作系统安全访问方法及装置
CN106919812A (zh) * 2015-12-26 2017-07-04 腾讯科技(深圳)有限公司 一种应用进程权限管理方法和装置
CN107025155A (zh) * 2017-03-04 2017-08-08 郑州云海信息技术有限公司 基于ipmitool远程建立user的测试方法及装置
CN109189425A (zh) * 2018-08-24 2019-01-11 郑州云海信息技术有限公司 一种bmc的管理方法、管理系统及相关装置
CN110058803A (zh) * 2017-12-20 2019-07-26 三星电子株式会社 存储设备的本地管理控制台

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7484105B2 (en) * 2001-08-16 2009-01-27 Lenovo (Singapore) Ptd. Ltd. Flash update using a trusted platform module
US8166539B2 (en) * 2006-02-24 2012-04-24 Dell Products L.P. Authentication of baseboard management controller users in a blade server system
CN103945268B (zh) * 2014-03-17 2017-10-27 深圳创维-Rgb电子有限公司 一种基于多帐号与多目标设备的控制处理方法及系统
US9935945B2 (en) * 2015-11-05 2018-04-03 Quanta Computer Inc. Trusted management controller firmware
CN105743887B (zh) * 2016-01-26 2019-06-28 中标软件有限公司 一种云计算平台的访问控制装置
CN107590390A (zh) * 2016-07-06 2018-01-16 鸿富锦精密工业(武汉)有限公司 芯片更新系统及方法
CN108171088B (zh) * 2017-12-26 2021-12-03 武汉大学 一种基于bmc的服务器硬件可信性保护方法及装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160328576A1 (en) * 2015-05-08 2016-11-10 YC Wellness, Inc. Integration platform and application interfaces for remote data management and security
CN106919812A (zh) * 2015-12-26 2017-07-04 腾讯科技(深圳)有限公司 一种应用进程权限管理方法和装置
CN106446638A (zh) * 2016-10-14 2017-02-22 郑州云海信息技术有限公司 一种云计算操作系统安全访问方法及装置
CN107025155A (zh) * 2017-03-04 2017-08-08 郑州云海信息技术有限公司 基于ipmitool远程建立user的测试方法及装置
CN110058803A (zh) * 2017-12-20 2019-07-26 三星电子株式会社 存储设备的本地管理控制台
CN109189425A (zh) * 2018-08-24 2019-01-11 郑州云海信息技术有限公司 一种bmc的管理方法、管理系统及相关装置

Also Published As

Publication number Publication date
CN109189425A (zh) 2019-01-11

Similar Documents

Publication Publication Date Title
US10819701B2 (en) Autonomous secrets management for a managed service identity
JP7225326B2 (ja) ユーザアカウントと企業ワークスペースとの関連付け
US9069965B2 (en) System and method for secure information handling system flash memory access
US10542044B2 (en) Authentication incident detection and management
US10579810B2 (en) Policy protected file access
US10911299B2 (en) Multiuser device staging
US9438629B2 (en) Sensitive information leakage prevention system, sensitive information leakage prevention method, and computer-readable recording medium
US20190286813A1 (en) Autonomous secrets management for a temporary shared access signature service
US10778666B2 (en) Co-existence of management applications and multiple user device management
US20150220710A1 (en) System control
CN108289074B (zh) 用户账号登录方法及装置
WO2020038106A1 (zh) 一种bmc的管理方法、管理系统及相关装置
US11108781B2 (en) Systems and methods for managing device privileges
US20230359741A1 (en) Trusted boot method and apparatus, electronic device, and readable storage medium
JP4938233B2 (ja) 管理サーバ及び情報処理装置、並びに、それらの制御方法、ネットワーク管理システム、コンピュータプログラム及びコンピュータ可読記憶媒体
US11443029B2 (en) Password hint policies on a user provided device
US11411813B2 (en) Single user device staging
US11405379B1 (en) Multi-factor message-based authentication for network resources
CN113051035A (zh) 一种远程控制方法、装置、系统及宿主机
US20200401561A1 (en) Method, device, and computer program product for managing data object
US10567387B1 (en) Systems and methods for managing computing device access to local area computer networks
US10089325B1 (en) Method and system for using micro objects
US9231970B2 (en) Security-aware admission control of requests in a distributed system
US20220269769A1 (en) Delegating multi-factor authentication in legacy databases
Hooper Cybersecurity for media technology products

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19853001

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19853001

Country of ref document: EP

Kind code of ref document: A1