To provide an appropriate level of security, configure boot loader authentication on your VMware virtual appliances. If the system boot loader requires no authentication, users with console access to the system might be able to alter the system boot configuration or boot the system to single user or maintenance mode, which can result in denial of service or unauthorized system access.
- Verify whether a boot password exists in the /boot/grub/grub.cfg file on your virtual appliances.
- If no password exists, run the /usr/bin/grub2-mkpasswd-pbkdf2 command on your virtual appliance.
A password is generated, and the command supplies the hash output.
- Add following lines at the end of /etc/grub.d/40_custom.
password_pbkdf2 root <hash of password>
- Backup /boot/grub/grub.cfg file by using:
cp /boot/grub/grub.cfg /boot/grub/grub.cfg.vropsbackup
- Update the grub configuration by running the /usr/sbin/grub2-mkconfig -o /boot/grub/grub.cfg command.
What to do next
- Restore the old grub.cfg by running the following command:
cp /boot/grub/grub.cfg.vropsbackup /boot/grub/grub.cfg
- Upgrade vRealize Operations Manager.
- Follow all the steps described under Set Boot Loader Authentication after the upgrade of vRealize Operations Manager.