ANAVEM
Reference
Languagefr
Server management visualization representing Redfish API connectivity
ExplainedRedfish

What is Redfish? Definition, How It Works & Use Cases

Redfish is a modern RESTful API standard for server management, replacing legacy IPMI. Learn how Redfish works, its benefits, and implementation best practices.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
16 March 2026 9 min 6
RedfishSystem Administration 9 min
Introduction

Overview

Picture this: You're managing a data center with hundreds of servers, and one goes down at 2 AM. With traditional management protocols like IPMI, you'd need specialized tools, complex command-line interfaces, and often struggle with vendor-specific implementations. But what if you could manage that server using the same RESTful API principles that power modern web applications? That's exactly what Redfish delivers—a standardized, modern approach to server management that's transforming how IT professionals handle hardware infrastructure.

Developed by the Distributed Management Task Force (DMTF), Redfish represents a fundamental shift from legacy management protocols to a web-friendly, JSON-based standard that speaks the language of modern IT operations. Since its introduction in 2015, Redfish has gained widespread adoption across major server vendors, becoming the de facto standard for out-of-band server management in enterprise environments.

What is Redfish?

Redfish is an open industry standard specification that defines a RESTful interface for the management of servers, storage systems, networking equipment, and other converged infrastructure. It provides a secure, multi-node computer system management interface that uses JSON payloads over HTTPS transport protocols.

Think of Redfish as the modern equivalent of a universal remote control for your data center hardware. Just as a universal remote can control different TV brands using standardized infrared signals, Redfish allows you to manage servers from different vendors using standardized HTTP requests and JSON responses. Unlike older protocols that required vendor-specific tools and complex binary formats, Redfish uses familiar web technologies that any developer can understand and implement.

Related: What is Microservices? Definition, How It Works & Use Cases

Related: What is Virtualization? Definition, How It Works & Use Cases

Related: What is Syslog? Definition, How It Works & Use Cases

Related: What is SAN? Definition, How It Works & Use Cases

Related: What is SCADA? Definition, How It Works & Use Cases

Related: What is Backup? Definition, How It Works & Use Cases

Related: What is a Cluster? Definition, How It Works & Use Cases

Related: What is Monitoring? Definition, How It Works & Use Cases

Related: What is VMware? Definition, How It Works & Use Cases

Related: What is Failover? Definition, How It Works & Use Cases

Related: What is Microservices? Definition, How It Works & Use Cases

Related: What is Virtualization? Definition, How It Works & Use Cases

Related: What is Syslog? Definition, How It Works & Use Cases

Related: What is SAN? Definition, How It Works & Use Cases

Related: What is SCADA? Definition, How It Works & Use Cases

Related: What is Backup? Definition, How It Works & Use Cases

Related: What is a Cluster? Definition, How It Works & Use Cases

Related: What is Failover? Definition, How It Works & Use Cases

Related: What is Monitoring? Definition, How It Works & Use Cases

Related: What is VMware? Definition, How It Works & Use Cases

Related: What is Microservices? Definition, How It Works & Use Cases

Related: What is Virtualization? Definition, How It Works & Use Cases

Related: What is Syslog? Definition, How It Works & Use Cases

Related: What is SAN? Definition, How It Works & Use Cases

Related: What is SCADA? Definition, How It Works & Use Cases

Related: What is Backup? Definition, How It Works & Use Cases

Related: What is a Cluster? Definition, How It Works & Use Cases

Related: What is Failover? Definition, How It Works & Use Cases

Related: What is Monitoring? Definition, How It Works & Use Cases

Related: What is VMware? Definition, How It Works & Use Cases

Related: What is Microservices? Definition, How It Works & Use Cases

Related: What is Virtualization? Definition, How It Works & Use Cases

Related: What is Syslog? Definition, How It Works & Use Cases

Related: What is SAN? Definition, How It Works & Use Cases

Related: What is SCADA? Definition, How It Works & Use Cases

Related: What is VMware? Definition, How It Works & Use Cases

Related: What is Backup? Definition, How It Works & Use Cases

Related: What is a Cluster? Definition, How It Works & Use Cases

Related: What is Failover? Definition, How It Works & Use Cases

Related: What is Monitoring? Definition, How It Works & Use Cases

Related: What is NAS? Definition, How It Works & Use Cases

Related: What is Microservices? Definition, How It Works & Use Cases

Related: What is Virtualization? Definition, How It Works & Use Cases

Related: What is Syslog? Definition, How It Works & Use Cases

Related: What is SAN? Definition, How It Works & Use Cases

Related: What is VMware? Definition, How It Works & Use Cases

Related: What is Backup? Definition, How It Works & Use Cases

Related: What is a Cluster? Definition, How It Works & Use Cases

Related: What is Failover? Definition, How It Works & Use Cases

Related: What is Monitoring? Definition, How It Works & Use Cases

Related: What is Microservices? Definition, How It Works & Use Cases

Related: What is Virtualization? Definition, How It Works & Use Cases

Related: What is WMI? Definition, How It Works & Use Cases

Related: What is Syslog? Definition, How It Works & Use Cases

Related: What is SAN? Definition, How It Works & Use Cases

Related: What is Backup? Definition, How It Works & Use Cases

Related: What is Microservices? Definition, How It Works & Use Cases

Related: What is a Cluster? Definition, How It Works & Use Cases

Related: What is Failover? Definition, How It Works & Use Cases

Related: What is Monitoring? Definition, How It Works & Use Cases

Related: What is PLC? Definition, How It Works & Use Cases

Related: What is IIoT? Definition, How It Works & Use Cases

Related: What is Bash? Definition, How It Works & Use Cases

Related: What is SCADA? Definition, How It Works & Use Cases

Related: What is NAS? Definition, How It Works & Use Cases

Related: What is SLA? Definition, How It Works & Use Cases

Related: What is Virtualization? Definition, How It Works & Use Cases

Related: What is WMI? Definition, How It Works & Use Cases

Related: What is Backup? Definition, How It Works & Use Cases

Related: What is Microservices? Definition, How It Works & Use Cases

Related: What is SLA? Definition, How It Works & Use Cases

Related: What is SCADA? Definition, How It Works & Use Cases

Related: What is IIoT? Definition, How It Works & Use Cases

Related: What is HL7? Definition, How It Works & Use Cases

Related: What is HCI? Definition, How It Works & Use Cases

Related: What is VMware? Definition, How It Works & Use Cases

Related: What is Hyper-V? Definition, How It Works & Use Cases

Related: What is Monitoring? Definition, How It Works & Use Cases

Related: What is Failover? Definition, How It Works & Use Cases

Related: What is a Cluster? Definition, How It Works & Use Cases

Related: What is Virtualization? Definition, How It Works & Use Cases

Related: What is WMI? Definition, How It Works & Use Cases

Related: What is Backup? Definition, How It Works & Use Cases

Related: What is Syslog? Definition, How It Works & Use Cases

Related: What is Microservices? Definition, How It Works & Use Cases

The specification is maintained by the DMTF and is designed to replace aging protocols like IPMI (Intelligent Platform Management Interface) and SNMP for hardware management tasks. Redfish operates through the server's Baseboard Management Controller (BMC), providing out-of-band access to system information, configuration, and control functions even when the main operating system is offline.

How does Redfish work?

Redfish operates as a RESTful web service that runs on the server's BMC, providing a standardized interface for hardware management operations. The protocol follows a hierarchical data model that represents the managed system as a collection of resources organized in a tree structure.

The core workflow follows these steps:

  1. Service Discovery: Clients connect to the Redfish service root at a well-known URI (typically /redfish/v1/) to discover available resources and capabilities.
  2. Authentication: The client authenticates using standard HTTP authentication methods, including basic authentication, session-based authentication, or modern OAuth 2.0 tokens.
  3. Resource Navigation: The client navigates through the resource tree using hypermedia links embedded in JSON responses, following REST principles for discoverability.
  4. Operations Execution: Management operations are performed using standard HTTP methods—GET for reading data, POST for creating resources or triggering actions, PATCH for updates, and DELETE for removal.
  5. Event Handling: Redfish supports server-sent events (SSE) and webhooks for real-time notifications about hardware status changes, alerts, and system events.

The data model represents physical and logical components as resources with properties, actions, and relationships. For example, a server chassis contains multiple systems, each system has processors and memory modules, and each component has associated sensors and configuration parameters. This hierarchical structure mirrors the actual hardware organization, making it intuitive for administrators to navigate and manage.

Redfish implementations typically include a schema registry that defines the structure and validation rules for all resources, ensuring consistency across different vendor implementations while allowing for vendor-specific extensions when needed.

What is Redfish used for?

Server Lifecycle Management

Redfish excels in comprehensive server lifecycle management, from initial deployment through decommissioning. IT teams use Redfish APIs to automate server provisioning, configure BIOS settings, manage firmware updates, and monitor hardware health across entire server fleets. This includes tasks like setting boot order, configuring RAID arrays, and managing power states—all through standardized API calls that work consistently across different hardware vendors.

Infrastructure Monitoring and Alerting

Modern data centers rely on Redfish for real-time hardware monitoring and intelligent alerting systems. The protocol provides access to hundreds of sensors monitoring temperature, voltage, fan speeds, and component health. Unlike legacy SNMP implementations, Redfish delivers this data in structured JSON format with rich metadata, making it easier to integrate with modern monitoring platforms like Prometheus, Grafana, or cloud-native observability solutions.

Cloud and Virtualization Platform Integration

Major cloud platforms and virtualization solutions leverage Redfish for bare-metal server management. OpenStack Ironic, VMware vSphere, and Microsoft System Center use Redfish APIs to provision physical servers, manage power operations, and collect hardware inventory data. This integration enables true hybrid cloud scenarios where physical infrastructure is managed with the same programmatic approaches used for virtual resources.

DevOps and Infrastructure as Code

Redfish's RESTful nature makes it ideal for DevOps workflows and Infrastructure as Code practices. Teams use Redfish APIs in Ansible playbooks, Terraform providers, and custom automation scripts to treat server hardware configuration as code. This approach enables version-controlled infrastructure changes, automated compliance checking, and consistent deployment patterns across development, staging, and production environments.

Edge Computing and IoT Infrastructure

As edge computing deployments grow, Redfish provides standardized management for distributed server infrastructure. Edge locations often lack on-site IT staff, making remote management capabilities crucial. Redfish's lightweight HTTP-based protocol works well over WAN connections, enabling centralized management of edge servers, industrial computers, and IoT gateways from a central operations center.

Advantages and disadvantages of Redfish

Advantages:

  • Modern Web Standards: Uses familiar HTTP/HTTPS, JSON, and REST principles that developers already understand, reducing learning curve and integration complexity.
  • Vendor Neutrality: Provides consistent APIs across different hardware vendors, eliminating the need for vendor-specific management tools and reducing operational complexity.
  • Enhanced Security: Supports modern authentication methods, TLS encryption, and role-based access control, addressing security weaknesses in legacy protocols like IPMI.
  • Rich Data Model: Offers comprehensive hardware representation with detailed metadata, relationships, and extensibility for vendor-specific features.
  • Real-time Events: Provides efficient event notification mechanisms through server-sent events and webhooks, enabling responsive monitoring and alerting.
  • Scalability: Designed for modern data center scales with efficient bulk operations and parallel processing capabilities.

Disadvantages:

  • Implementation Maturity: While widely adopted, some vendor implementations may have inconsistencies or missing features compared to legacy protocols.
  • Resource Overhead: JSON parsing and HTTP processing require more computational resources on BMCs compared to binary protocols like IPMI.
  • Complexity for Simple Tasks: Basic operations that were simple in IPMI may require multiple API calls and more complex logic in Redfish.
  • Transition Challenges: Organizations with extensive IPMI-based tooling face significant migration efforts to adopt Redfish-based solutions.
  • Network Dependencies: Relies heavily on network connectivity and HTTP infrastructure, which may be problematic in some isolated or high-security environments.

Redfish vs IPMI

The comparison between Redfish and IPMI represents a generational shift in server management approaches, with each protocol reflecting the technological priorities of its era.

AspectRedfishIPMI
Protocol TypeRESTful HTTP/HTTPS with JSONBinary protocol over UDP/TCP
Data FormatHuman-readable JSON with schemasBinary packets with vendor variations
SecurityModern TLS, OAuth 2.0, RBACBasic authentication, weak encryption
DiscoverabilityHypermedia-driven with service rootStatic command sets, limited discovery
Vendor ConsistencyStandardized schema with extensionsSignificant vendor-specific variations
Development ComplexityStandard HTTP libraries and toolsSpecialized libraries and knowledge
Event HandlingServer-sent events, webhooksSNMP traps, polling-based
ScalabilityDesigned for modern data center scaleLimited by protocol design

While IPMI served the industry well for over two decades, its limitations become apparent in modern environments. IPMI's binary protocol requires specialized knowledge and tools, making automation and integration challenging. Security vulnerabilities in IPMI implementations have been well-documented, with many organizations disabling IPMI entirely due to security concerns.

Redfish addresses these limitations by embracing web standards and modern security practices. However, IPMI's simplicity and universal support mean it remains relevant for basic management tasks, especially in environments where Redfish implementations are incomplete or unavailable.

Best practices with Redfish

  1. Implement Proper Authentication and Authorization: Always use strong authentication mechanisms and implement role-based access control. Avoid default credentials and consider certificate-based authentication for automated systems. Regularly rotate credentials and audit access logs to maintain security posture.
  2. Use Schema Validation: Validate all API requests and responses against published Redfish schemas to ensure compatibility and catch implementation issues early. Implement proper error handling for schema validation failures and maintain compatibility matrices for different vendor implementations.
  3. Design for Vendor Portability: Write management code that relies on standard Redfish resources and properties rather than vendor-specific extensions. Use feature detection and graceful degradation when vendor-specific capabilities are unavailable, ensuring your solutions work across different hardware platforms.
  4. Implement Efficient Polling and Event Handling: Use Redfish event subscriptions and server-sent events instead of frequent polling to reduce network traffic and BMC load. Implement exponential backoff for failed requests and respect rate limiting to avoid overwhelming management controllers.
  5. Monitor BMC Performance and Health: Track BMC response times, error rates, and resource utilization to identify performance issues before they impact operations. Implement health checks for Redfish services and have fallback procedures when management interfaces become unavailable.
  6. Maintain Version Compatibility: Test your Redfish implementations against multiple schema versions and vendor firmware releases. Document compatibility requirements and maintain backward compatibility when possible. Plan for schema evolution and implement version negotiation in your applications.

Conclusion

Redfish represents a pivotal evolution in server management technology, bringing hardware administration into the modern era of web-based APIs and cloud-native operations. As organizations continue to embrace automation, Infrastructure as Code, and hybrid cloud architectures, Redfish's RESTful approach and rich data model provide the foundation for scalable, secure, and vendor-neutral hardware management.

The protocol's adoption across major server vendors and integration into leading cloud platforms demonstrates its maturity and industry acceptance. While challenges remain in transitioning from legacy protocols and ensuring consistent vendor implementations, the benefits of standardization, security, and developer-friendly interfaces make Redfish an essential technology for modern IT infrastructure.

For IT professionals looking to modernize their hardware management practices, investing in Redfish knowledge and tooling will pay dividends as the industry continues its shift toward API-driven infrastructure management. The future of data center operations lies in treating hardware as programmable infrastructure, and Redfish provides the standardized interface to make that vision a reality.

Frequently Asked Questions

What is Redfish in simple terms?+
Redfish is a modern web-based standard for managing servers and other hardware remotely. It uses familiar HTTP requests and JSON responses instead of complex binary protocols, making it easier for IT professionals to automate hardware management tasks.
What is Redfish used for?+
Redfish is used for comprehensive server management including monitoring hardware health, configuring BIOS settings, managing power states, updating firmware, and collecting system inventory. It's particularly valuable for data center automation and cloud infrastructure management.
Is Redfish the same as IPMI?+
No, Redfish is a modern replacement for IPMI. While both provide out-of-band server management, Redfish uses RESTful APIs with JSON over HTTPS, offering better security, standardization, and developer-friendly interfaces compared to IPMI's binary protocol.
How do I get started with Redfish?+
Start by checking if your servers support Redfish through their BMC interfaces. Most modern servers from major vendors include Redfish support. You can explore the API using tools like curl or Postman, then integrate Redfish calls into your automation scripts or management platforms.
What are the security advantages of Redfish over IPMI?+
Redfish provides modern security features including TLS encryption, OAuth 2.0 authentication, role-based access control, and secure credential management. These features address many security vulnerabilities found in legacy IPMI implementations, making Redfish much safer for production environments.
References

Official Resources (2)

Emanuel DE ALMEIDA
Written by

Emanuel DE ALMEIDA

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...