| CPC G06F 21/64 (2013.01) [G06F 21/31 (2013.01); G06F 21/57 (2013.01)] | 20 Claims |

|
1. A method of managing data processing systems, the method comprising:
obtaining, by hardware resources of a data processing system of the data processing systems, a security request for access to a management controller of the data processing system to configure the management controller;
deploying, by the hardware resources, a security package to the management controller to place the management controller in a configurable state of operation to enable remote secure configuration of the management controller;
obtaining, by the hardware resources and from the management controller, a configuration for validation;
attempting, by the hardware resources and responsive to the obtaining of the configuration, to verify that the configuration is a trusted configuration;
reverting, by the hardware resources and responsive to the obtaining of the configuration, the management controller to a secure state of operation; and
in an instance of the attempting where the configuration is verified as a trusted configuration:
configuring, by the hardware resources, the management controller to obtain an updated secure state of operation of the management controller.
|