Tucked among the plethora of capabilities that debut in OneFS 9.12 is Root Lockdown Mode (RLM), a security feature designed to disable and block access to the cluster’s root account. This new RLM functionality enforces role-based access controls (RBAC) for cluster administrators, thereby reducing the risk of a single privileged user bypassing security policies and performing potentially destructive operations on the cluster configuration or its data. Given that the root account has inherent, unaudited permissions to override security controls, restricting its access can significantly strengthen PowerScale’s security posture.
RLM is managed through the OneFS hardening engine, which is part of a cluster’s compliance mode framework.

RLM leverages the OneFS compliance mode protections provided by the hardening engine and requires both the ‘Hardening’ and ‘SmartLock’ licenses to function. It introduces a new hardening profile, aptly named ‘root-lockdown’, which can be applied or disabled as desired. However, transitioning between RLM states does involve a complete cluster reboot. Plus, if MPA is active, the operation must be approved by multiple parties. OneFS services, and admins, can inspect ‘sysctl’ values to determine whether the cluster is operating in Compliance Mode or RLM.
Note that, unlike MPA, RLM in OneFS 9.12, does not have a WebUI interface, and so is only configurable via the command line (CLI).
Under the hood, when hardening is activated, the security hardening engine reads the desired configuration, such as RLM, from its config files. Sets of rules, or config items, are applied to the hardening configuration to increase security and, in the case of RML, ensure disablement of a cluster’s root account. These rules are grouped by profile, which contain collections of named rules. Profiles are stored in separate .xml files under /etc/isi_hardening/profiles.
# ls /etc/isi_hardening/profiles profile_root-lockdown.xml profile_stig.xml
As of OneFS 9.12, there are two hardening profiles available:
- Root Lockdown Mode (RLM)
- STIG compliance
Plus, the hardening infrastructure is in place to support additional profiles as and when they are required.
Individual rules are stored in separate .xml files under /etc/isi_hardening/rules:
# ls /etc/isi_hardening/rules rules_apache.xml rules_celog.xml rules_root.xml rules_audit.xml rules_fips.xml rules_shell_timeout.xml rules_auth.xml rules_misc.xml rules_umask.xml rules_banners.xml rules_password.xml rules_cacpiv.xml rules_pki_ocsp.xml
For example, the ‘rules_root.xml’ file for disabling the root account:
# cat rules_root.xml
<!-- Copyright (c) 2024-2025 Dell Inc. or its subsidiaries. All Rights Reserved. -->
<CONFIG_ITEMS>
<CONFIG_ITEM id="disable_root_account" version="1">
<PapiOperation>
<DO>
<URI>/auth/users/root</URI>
<BODY>{"enabled": false}</BODY>
<KEY>users</KEY>
</DO>
<UNDO>
<URI>/auth/users/root</URI>
<BODY>{"enabled": true}</BODY>
<KEY>users</KEY>
</UNDO>
<ACTION_SCOPE>CLUSTER</ACTION_SCOPE>
<IGNORE>FALSE</IGNORE>
</PapiOperation>
</CONFIG_ITEM>
<CONFIG_ITEM id="root_shell_nologin" version="1">
<PapiOperation>
<DO>
<URI>/auth/users/root</URI>
<BODY>{"shell": "/sbin/nologin"}</BODY>
<KEY>users</KEY>
</DO>
<UNDO>
<URI>/auth/users/root</URI>
<BODY>{"shell": "/usr/local/bin/zsh"}</BODY>
<KEY>users</KEY>
</UNDO>
<ACTION_SCOPE>CLUSTER</ACTION_SCOPE>
<IGNORE>FALSE</IGNORE>
</PapiOperation>
</CONFIG_ITEM>
</CONFIG_ITEMS>
Rules are grouped by functional area affected, and can apply to platform API configuration ‘collections’. For example, a rule can be applied to all NFS exports or all SyncIQ policies. In addition to actionable rules, ‘check-only’ rules are supported which apply no changes.
The hardening engine rules allow comparator logic in addition to equality, and can evaluate conditions like whether a string is empty or non-empty, and if a given timeout is greater or equal to the required value. The RLM profile specifies the following hardening rule set:
# cat /etc/isi_hardening/profiles/profile_root-lockdown.xml <?xml version="1.0" encoding="UTF-8"?> <!-- Copyright (c) 2024-2025 Dell Inc. or its subsidiaries. All Rights Reserved. --> <Profiles version="1"> <Profile> <Name>root-lockdown</Name> <Description>Enable security settings that disable the root account.</Description> <Rule>set_rlm_cluster_wide</Rule> <Rule>require_disabled_STIG_profile</Rule> <Rule>require_password_single_user_mode</Rule> <Rule>require_rlm_aclr_users</Rule> <Rule>require_rlm_cluster_state</Rule> <Rule>disable_kdb</Rule> <Rule>disable_root_account</Rule> <Rule>root_shell_nologin</Rule> <Rule>check_disable_root_account</Rule> <Rule>check_root_shell_nologin</Rule> <Rule>check_rlm_sysctls</Rule> </Profile> </Profiles>
Most of the above RLM rule definitions live in the ‘/etc/isi_hardening/rules/rules_misc.xml’ file. For example:
# grep -A 10 "disable_root" /etc/isi_hardening/rules/rules_misc.xml
<CONFIG_ITEM id="check_disable_root_account" version="1">
<PapiOperation>
<CHECK>
<URI>/auth/users/root</URI>
<BODY>{"enabled": false}</BODY>
<KEY>users</KEY>
</CHECK>
<ACTION_SCOPE>NODE</ACTION_SCOPE>
<IGNORE>FALSE</IGNORE>
<RETRIES>0</RETRIES>
</PapiOperation>
The hardening engine also includes a reporting component, allowing detailed reports to be generated that indicate which hardening rules are applied or not, as well as overall compliance status. Hardening report generation can be initiated with the following CLI command syntax:
# isi hardening reports create ...............Hardening operation complete. # isi hardening reports list Name Applied Status Creation Date Report Age ----------------------------------------------------------------- root-lockdown Yes Compliant Fri Oct 24 14:28:40 2025 3m18s ----------------------------------------------------------------- Total: 1
A recommended practice is to configure and enable RLM in combination with the OneFS Multi-Party Approval (MPA) feature. MPA is an administrative approval mechanism that requires at least one additional trusted party to sign off on a requested change, for certain privileged actions within a PowerScale cluster. MPA helps to mitigate the risk of data loss or system configuration damage from critical actions, by vastly reducing the likelihood of accidental or malicious execution of consequential operations. As such, enabling RLM on a cluster with MPA configured means that any requested change to the RLM state will require additional approval.
The application or removal of RLM necessitates a full cluster reboot to ensure that all relevant system controls (sysctls) are properly enforced or cleared. The hardening report (‘isi hardening reports create/view’) can be used to determine which nodes require rebooting during this process.
When expanding a cluster that has RLM enabled, only nodes that have already been rebooted into Compliance Mode using the setup wizard (option 4) are permitted to join. Any new node joining an RLM-enabled cluster must be manually rebooted to inherit the RLM configuration.
In the next article in this series, we’ll explore the processes and procedures for configuring and managing RLM.







































































