HPE OneView supports two authentication modes: standard username/password and two-factor authentication using smart cards. The library handles both throughDocumentation Index
Fetch the complete documentation index at: https://mintlify.com/HewlettPackard/POSH-HPEOneView/llms.txt
Use this file to discover all available pages before exploring further.
Connect-OVMgmt, and the resulting connection object records which method was used.
Standard username/password authentication
The traditional login flow works as follows:Provide credentials
The user provides a username and password. The library accepts these as plain text (
-UserName / -Password), as a [PSCredential] object (-Credential), or prompts interactively if neither is provided.Validate against directory
HPE OneView checks the credentials:
- For local users, it validates against the HPE OneView internal database.
- For enterprise directory users, it forwards the credentials to the configured LDAP/Active Directory server.
Determine permissions
After successful authentication, HPE OneView assigns permissions:
- For local users, permissions are based on the roles configured on the account.
- For directory users, HPE OneView retrieves the user’s group membership from the directory and maps groups to roles configured in HPE OneView.
Two-factor authentication with smart cards
Two-factor authentication (2FA) requires two verification factors:- Something you possess — a smart card (Common Access Card / CAC or Personal Identity Verification / PIV card)
- Something you know — the PIN for the smart card
The Infrastructure Administrator can customize which fields of the X.509 certificate HPE OneView uses to extract the username and domain. See
Set-OVApplianceTwoFactorAuthentication for configuration details.Getting the certificate from PowerShell
The smart card certificate is accessible through PowerShell’sCert: provider. Smart card certificates typically have an Enhanced Key Usage (EKU) of Smart Card Logon:
Connecting with a certificate
Pass the certificate object toConnect-OVMgmt using the -Certificate parameter:
-LoginAcknowledge switch is available on all parameter sets and can be used to suppress login banner acknowledgement prompts:
AuthType in the connection object
TheAuthType property of the resulting HPEOneView.Appliance.Connection object reflects how authentication was performed:
| AuthType value | Authentication method |
|---|---|
Credential | Username and password (local user or directory) |
Certificate | X.509 smart card / CAC / PIV two-factor authentication |
AuthLoginDomain property is set to the Active Directory authentication directory that validated the certificate.
Examining permissions after 2FA login
After a certificate-based login,ActivePermissions works identically to a standard login. The property contains the full set of HPEOneView.Appliance.ConnectionPermission objects available to the authenticated user:
ScopeName, RoleName, and Active properties. To reduce to a subset of these permissions for a scoped task, use Push-OVAppliancePermission. See connection permissions for details.
Using scopes to filter resources
Scopes define named subsets of resources. When a scope is applied to a cmdlet’s-Scope parameter, only resources that are members of that scope are returned.
Scopes can be used to filter the following resource types:
- Enclosures
- Server hardware
- Networks (Ethernet, FC, and FCoE)
- Network sets
- Interconnects (excluding SAS resources)
- Logical interconnects (excluding SAS resources)
- Logical interconnect groups (excluding SAS resources)
- Switches
- Logical switches
- Logical switch groups
ActivePermissions. The -Scope parameter narrows this to a specific named subset.
See also
- Appliance connections — How connection objects and $ConnectedSessions work
- Connection permissions — Reduce session privileges with Push-OVAppliancePermission
- Scopes and roles — Built-in roles and how scopes restrict access
Get-Help Connect-OVMgmtGet-Help Set-OVApplianceTwoFactorAuthentication