Home > Servers > Systems Management > White Papers > Server Configuration Profiles: Reference Guide > Enabling SEKM settings on the iDRAC
The two prerequisites can be found in SecurityCertificate.1#CertType, SecurityCertificate.1#CertData for the Server CA (KMS_SERVER_CA), and SecurityCertificate.2#CertType, SecurityCertificate.2#CertData for the CSR (SEKM_SSL_CERT).
The configuration results for the SCP Import operation confirm the successful enablement of SEKM using the SEKM.1#SEKMStatus attribute.
racadm>>lclog viewconfigresult ‐j JID_581182121065 SeqNumber = 5966
FQDD = iDRAC.Embedded.1
Job Name = Import Configuration DisplayValue = SEKM.1#SEKMStatus Name = SEKM.1#SEKMStatus OldValue = Disabled
NewValue = Enabled Status = Success ErrCode = 0
SeqNumber = 5963
The SEKM certificate installation can be confirmed using the same configuration results by checking the CertData and CertType attributes.
SeqNumber = 5963
FQDD = iDRAC.Embedded.1
Job Name = Import Configuration DisplayValue = Certificate Data
Name = SecurityCertificate.1#CertData OldValue = ******
NewValue = ****** Status = Success ErrCode = 0
DisplayValue = Certificate Type
Name = SecurityCertificate.1#CertType OldValue = ""
NewValue = KMS_SERVER_CA Status = Success
ErrCode = 0
DisplayValue = Certificate Data
Name = SecurityCertificate.2#CertData OldValue = ******
NewValue = ****** Status = Success ErrCode = 0
DisplayValue = Certificate Type
Name = SecurityCertificate.2#CertType OldValue = ""
NewValue = SEKM_SSL_CERT Status = Success
ErrCode = 0
Note: iDRAC SEKM attributes must be configured in a separate SCP Import operation (or another interface) before enabling SEKM on a PERC device and creating a locked virtual disk. These operations cannot be combined in a single SCP Import.