Dell EMC DRM-3-4-4 Repository Manager User Guide

June 14, 2024
DELL EMC

Dell EMC DRM-3-4-4 Repository Manager

Dell-EMC-DRM-3-4-4-Repository-Manager-product

Product Information

Specifications

  • Product Name: Dell Repository Manager
  • Version: 3.4.4
  • Security Configuration Guide: October 2023 Rev. A00

Notes, Cautions, and Warnings

  • NOTE: A NOTE indicates important information that helps you make better use of your product.
  • CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
  • WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

Preface

  • As part of an effort to improve its product lines, Dell periodically releases revisions of its software and hardware. Some functions that are described in this document might not support all versions of the software or hardware in use. The product release notes provide the most up-to-date information about product features.
  • Contact your Dell technical support professional if a product does not function properly or does not function as described in this document. This document was accurate at publication time. To ensure that you are using the latest version of this document, go to https://www.dell.com/support.

Deployment Models
This chapter provides information about different deployment models for the Dell Repository Manager. It includes details on security profiles and their configurations.

Security Profiles
Security profiles in Dell Repository Manager allow users to configure and manage security settings for their software and hardware. These profiles ensure the authenticity and integrity of the repository.

Miscellaneous Configuration and Management
This chapter covers miscellaneous configuration and management topics related to Dell Repository Manager.

Dell Repository Manager Licensing
The Dell Repository Manager requires proper licensing for its usage. This section provides information on how to obtain and manage the appropriate licenses.

Protect Authenticity and Integrity
This section explains the importance of protecting the authenticity and integrity of the Dell Repository Manager. It provides guidelines and best practices to ensure the security of the repository.

FAQs

Q: Where can I find the latest version of the Dell Repository Manager documentation?
A: You can find the latest version of the documentation at https://www.dell.com/support.

Q: What should I do if my Dell Repository Manager does not function properly?
A: Please contact your Dell technical support professional for assistance with any issues related to the functioning of Dell Repository Manager.

Notes, cautions, and warnings

  • NOTE: A NOTE indicates important information that helps you make better use of your product.
  • CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
  • WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

Preface

As part of an effort to improve its product lines, Dell periodically releases revisions of its software and hardware. Some functions that are described in this document might not support all versions of the software or hardware in use. The product release notes provide the most up-to-date information about product features. Contact your Dell technical support professional if a product does not function properly or does not function as described in this document. This document was accurate at publication time. To ensure that you are using the latest version of this document, go to https://www.dell.com/support.

Legacy disclaimers
The information in the publication is provided as-is. Dell Technologies makes no representations or warranties of any kind regarding the information in the publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. In the no event shall Dell Technologies, its affiliates or suppliers, be liable for any damages arising from or related to the information contained in or actions that you decide to take based thereon, including any direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell Technologies, its affiliates or suppliers have been advised of the possibility of such damages.

The Security Configuration Guide intends to be a reference. The guidance is provided based on a diverse set of installed systems and may not represent the risk or guidance to your local installation and individual environment. It is recommended that all users determine the applicability of this information to their individual environments and take appropriate actions. All aspects of this Security Configuration Guide are subject to change without notice and on a case-by-case basis. Your use of the information that is contained in this document or materials that are linked in, is at your own risk. Dell reserves the right to change or update this document in its sole discretion and without notice at any time.

Scope of the document
This document includes information about security features and capabilities of Dell Repository Manager (DRM).

Audience
This document is intended for the individuals who are responsible for managing security for the Dell Repository Manager.

Revision History
Table 1. Document revision history

Revision Date Description
A00 October 2023 Initial release

Document References
In addition to this guide, you can access the other guides available at dell.com/support. Dell Repository Manager supports creating artifacts to update services for Dell systems using Dell System Update, Bootable ISO, and Server Update Utility Update. For configuration-related information, see DSU, Bootable ISO, and SUU User’s Guide. For more information, see Dell Repository Manager Software Support Matrix. Go to the support site, click product support

Repository Manager to access the following documents:

  • Dell Repository Manager User’s Guide
  • Dell Repository Manager Release Notes
  • Dell Repository Manager Software Support Matrix

Security resources

Getting help
Contact your Dell technical support professional if a product does not function properly or does not function as described in this document. This document was accurate at publication time. To ensure that you are using the latest version of this document, go to dell.com/support

Reporting security vulnerabilities
Dell takes reports of potential security vulnerabilities in the products seriously. If you discover a security vulnerability, it is recommended to report it to Dell immediately. For the latest on how to report a security issue to Dell, see the Dell Vulnerability Response Policy on the Dell.com site.

Topics:

  • Terms used in this document
Terms used in this document

Table 2. Terms used in this document

Terminology Description
DRM Dell Repository Manager
DUP Dell Update Package
SUU Server Update Utility
DSU Dell System Update
iDRAC Integrated Dell Remote Access Controller
OMEnt OpenManage Enterprise
OMIVV OpenManage Integration for VMWare VCenter
OMIMSSC OpenManage Integration for Microsoft System Center

Deployment models

Dell Repository Manager can be installed on the supported Microsoft Windows and Linux operating systems to generate the artifacts that can be used to deploy and upgrade the system.

NOTE:

  • The cleanup of the installation directory is performed before installing DRM and while uninstalling DRM on Windows operating systems. Ensure that you take a backup of installation logs before upgrading DRM.
  • The installation of DRM is restricted if the symbolic links are available in the installation directory or working directory file path. Ensure that you remove the symbolic links from the directory file path and retry installation.

For more information about the installation, see Dell Repository Manager User’s Guide at dell.com/docs.

Topics:

  • Security profiles
Security profiles

DRM has a default security profile for secure HTTPS access with a self-signed certificate during installations. The downloaded artifacts such as DUPs, catalogs, and plugins are signed by Dell.

Product and subsystem security

Security controls map
The Dell Repository Manager (DRM) is an application within the Dell OpenManage portfolio that allows IT Administrators to manage the system updates. Dell Repository Manager provides a searchable interface that is used to create custom software collections, that are known as bundles and repositories of Dell Update Packages (DUPs). These bundles and repositories allow the deployment of multiple firmware updates at once.

The DRM User Interface (UI) interacts with the DRM service through HTTPs protocol. Dell Repository Manager (DRM) interacts with downloads.dell.com to download the DUPs, catalogs, and other artifacts such as plugins and DRM updates through HTTPs protocol. DRM interacts with various consoles such as iDRAC and OME to collect inventory information over the HTTPs protocol. This protocol is the only supported way to connect to the various consoles. Also, DRM interacts with any network or file share through CIFS or SMB v2 protocols.

Dell-EMC-DRM-3-4-4-Repository-Manager-fig-1

As the diagram depicts, DRM interacts with downloads.dell.com through HTTPS protocol and with the network share through the CIFS/SMBv2.

Authentication

Access control
Dell Repository Manager functions as a service. In linux operating system, the service runs with the least privileges as drmuser. In windows operating system, by default the services run with the privileges as same as LocalService account (If you install or upgrade DRM 3.4.3 or above with Restricted Access mode). The system administrator can choose to run the DRM service with system level privileges during DRM installation in windows.

NOTE:
If the restricted access mode is selected, the recommendation is to disable the privilege SeImpersonatePrivilege in your system to enhance the security protocols.

  • In CLI mode, the DRM logs are downloaded to a network share location, only if you have accessed the network share location on the system before. However, unable to download the DRM logs if the network share location is not accessed before.
  • In GUI mode, to download the DRM logs in network share location if not accessed before, then it prompts to log in with user credentials for the first time. However, after accessing the network share location once to download the logs, it does not prompt for credentials and the DRM logs are downloaded to same network share location.

Login security settings

Remote connection security
DRM uses open-source library for remote connection using CIFS/SMBv2 and does not log the credentials mentioned for connections.

User and credential management
Dell Repository Manager stores all the user credentials in a database with an encrypted format. The database is password protected that user provides during the installation. The password can be modified by an administrator or a user with the administrative privileges. All the traffic between the User interface (UI) and the service are managed using HTTPs.

Password Complexity
DRM Database password must contain at least eight characters that has at least one character each in upper case, lower case, and a numeric character.

Network security

  • DRM supports only HTTPs connection to connect downloads.dell.com, and then download the catalogs, DUPs, and plugins. These artifacts are signed by Dell.
  • DRM performs SHA 256 hash verification and PGP sign verification for all the downloaded artifacts.

Network exposure
DRM can only be accessed within the system and cannot be reached by any other system over the network

Outbound ports
Outbound ports are used by Dell Repository Manager Update when connecting to a remote system. The table below lists the DRM outbound ports.

Table 3. Outbound ports

Port number Layer 4 Protocol Service
80 TCP HTTP
139 or 445 TCP SMB/CIFS
443 TCP HTTPs

Data security

  • DRM stores all sensitive information, such as passwords, in databases in an encrypted format. DRM uses certificates for secure HTTP access (HTTPS). DRM installs a java store and uses a self-signed certificate to secure HTTPS transactions.
  • DRM database is protected by a password that is provided by the user during the installation phase. This password is stored in an encrypted format in a file that is locked using another layer of password. The password that locks the file is generated randomly and varies according to various system parameters.

Auditing and logging
DRM creates log and stores in the working directory. The log files size between 1 MB to 10 MB. For more information about Troubleshooting, or Log files, see the Dell Repository Manager User’s Guide available at dell.com/support.

Serviceability

  • The support website https://www.dell.com/support provides access to licensing information, product documentation, advisories, downloads, and troubleshooting information. This information helps you to resolve a product issue before you contact support team.
  • Special login is not required to enable DRM for service personnel.
  • Ensure that you install security patches and other updates when available, including the Dell Repository Manager updates.

Product code integrity
The Dell Repository Manager installer is signed by Dell. It is recommended that you verify the authenticity of the Dell Repository Manager installer signature.

Miscellaneous configuration and management

Topics:

  • Dell Repository Manager licensing
  • Protect authenticity and integrity

Dell Repository Manager licensing
DRM has open-source approval for internal dependencies and is installed with the application on the box. It can also be found at https://opensource.dell.com/releases/drm/. For more information about licensing of Dell Repository Manager, see the Dell Repository Manager User’s Guide available at www.dell.com/support.

Protect authenticity and integrity
To ensure the integrity of product, the installation and update of components for Dell Repository Manager are signed.

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals