Home
last modified time | relevance | path

Searched full:privilege (Results 1 – 25 of 521) sorted by relevance

12345678910>>...21

/openbmc/bmcweb/redfish-core/include/
H A Dprivileges.hpp43 * @brief A vector of all privilege names and their indexes
44 * The privilege "OpenBMCHostConsole" is added to users who are members of the
45 * "hostconsole" user group. This privilege is required to access the host
63 * unique privilege name.
65 * A bit is set if the privilege is required (entity domain) or granted
86 for (const char* privilege : privilegeList) in Privileges() local
88 if (!setSinglePrivilege(privilege)) in Privileges()
90 BMCWEB_LOG_CRITICAL("Unable to set privilege {} in constructor", in Privileges()
91 privilege); in Privileges()
97 * @brief Sets given privilege in the bitset
[all …]
/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_ipmi_redfish_user.robot71 Update User Privilege Via Redfish And Verify Using IPMI
72 [Documentation] Update user privilege via Redfish and verify using IPMI.
75 # Create user using Redfish with admin privilege.
85 # Update user privilege to operator using Redfish.
89 # Verify new user privilege level via IPMI.
132 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
149 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
165 Update User Privilege To Operator Via IPMI And Verify Using Redfish
166 [Documentation] Update user privilege to operator via IPMI and verify using Redfish.
168 # Create user using IPMI with admin privilege.
[all …]
H A Dtest_redfish_privilege_registry.robot2 Documentation Script to test Redfish privilege registry with various users
10 Suite Setup Create And Verify Various Privilege Users
31 Verify Redfish Privilege Registry Properties
32 [Documentation] Verify the Redfish Privilege Registry properties.
37 # Get the complete Privilege Registry URL
38 ${url}= Get Redfish Privilege Registry json URL
42 # Verify the Privilege Registry Resource.
45 # "Name": "Privilege Mapping array collection",
55 Should Be Equal As Strings ${resp.dict["Name"]} Privilege Mapping array collection
62 Verify Redfish Privilege Registry Mappings Properties For Account Service
[all …]
H A Dtest_ldap_configuration.robot144 Verify LDAP User With Admin Privilege Able To Do BMC Reboot
145 [Documentation] Verify that LDAP user with administrator privilege able to do BMC reboot.
152 # With LDAP user and with right privilege trying to do BMC reboot.
158 Verify LDAP User With Operator Privilege Able To Do Host Poweroff
159 [Documentation] Verify that LDAP user with operator privilege can do host
162 [Teardown] Restore LDAP Privilege
168 # Verify that the LDAP user with operator privilege is able to power the system off.
203 Verify LDAP User With Read Privilege Able To Check Inventory
204 [Documentation] Verify that LDAP user with read privilege able to
207 [Teardown] Run Keywords FFDC On Test Case Fail AND Restore LDAP Privilege
[all …]
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/
H A DPrivilegeMapper.interface.yaml2 Implement this interface to set the privilege of the user based on the group
3 name. The users in the group will inherit the privilege mapping of the
8 unique number generated by the application. If the privilege mapping already
11 privilege for a mapping which already exists, the Privilege property in the
13 application consuming the privilege mapping should not cache the object path
21 Creates a mapping for the group to the privilege.
26 Group Name to which the privilege is to be assigned. In the case
29 - name: Privilege
32 The privilege associated with the group. The set of available
35 be thrown if the privilege is invalid. Additional documentation
[all …]
H A DPrivilegeMapperEntry.interface.yaml2 Implement to provide privilege for the group.
8 Group Name to which the privilege is to be assigned. In the case of
14 - name: Privilege
17 One of the privilege as defined by
20 thrown if the privilege is invalid. Additional documentation on
21 privilege is available here.
/openbmc/phosphor-user-manager/phosphor-ldap-config/
H A Dldap_mapper_entry.hpp26 * @brief This D-Bus object represents the privilege level for the LDAP group.
38 /** @brief Constructs LDAP privilege mapper entry object.
44 * @param[in] privilege - the privilege for the group
45 * @param[in] parent - LDAP privilege mapper manager
49 const std::string& privilege, Config& parent);
51 /** @brief Constructs LDAP privilege mapper entry object
56 * @param[in] parent - LDAP privilege mapper manager
61 /** @brief Delete privilege mapper entry object
63 * This method deletes the privilege mapper entry.
75 /** @brief Update privilege associated with LDAP group
[all …]
H A Dldap_config.hpp201 /** @brief Creates a mapping for the group to the privilege
203 * @param[in] groupName - Group Name to which the privilege needs to be
205 * @param[in] privilege - The privilege role associated with the group.
207 * @return On success return the D-Bus object path of the created privilege
210 ObjectPath create(std::string groupName, std::string privilege) override;
212 /** @brief Delete privilege mapping for LDAP group
214 * This method deletes the privilege mapping
220 /** @brief Check if LDAP group privilege mapping requested is valid
222 * Check if the privilege mapping already exists for the LDAP group name
231 /** @brief Check if the privilege level is a valid one
[all …]
/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_user.robot75 # Set admin privilege and enable IPMI messaging for newly created user.
76 Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv}
199 # Set admin privilege and enable IPMI messaging for newly created user
200 Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv}
251 Test IPMI User Privilege Level
252 [Documentation] Verify IPMI user with user privilege can only run user level commands.
254 [Template] Test IPMI User Privilege
258 #Privilege level User Cmd Status Operator Cmd Status Admin Cmd Status
262 Test IPMI Operator Privilege Level
263 …[Documentation] Verify IPMI user with operator privilege can only run user and operator levels co…
[all …]
H A Dtest_ipmi_general.robot135 FOR ${privilege} IN 4 3 2
136 # Input Channel Privilege Level
137 ${channel} ${privilege}
163 Verify Set Session Privilege Level via IPMI Raw Command
164 [Documentation] Set session privilege with given privilege level and verify the response with
167 [Template] Set Session Privilege Level And Verify
176 Verify Set Invalid Session Privilege Level Via IPMI Raw Command
177 [Documentation] Verify set invalid session privilege level via IPMI raw command.
179 [Template] Set Invalid Session Privilege Level And Verify
321 Set Session Privilege Level And Verify
[all …]
/openbmc/openbmc-test-automation/gui/test/access_control/
H A Dtest_obmc_gui_local_users.robot22 ${xpath_select_privilege} //select[@id="privilege"]
33 Page should contain View privilege role descriptions
89 [Arguments] ${username} ${password} ${privilege}=Administrator
95 # privilege User privilege.
99 Add User Details ${username} ${password} ${privilege} ${account_status}
103 [Arguments] ${username} ${password} ${privilege} ${account_status}
108 # privilege User privilege.
117 Select User Privilege ${privilege}
120 Select User Privilege
121 [Documentation] Select user privilege.
[all …]
/openbmc/phosphor-host-ipmid/user_channel/
H A Dcipher_mgmt.hpp52 * privilege levels
54 * @param[in] csPrivilegeLevels - gets filled by cipher suite privilege
65 * suite privilege levels
67 * @param[in] csPrivilegeLevels - cipher suite privilege levels to update
95 /** @brief convert to cipher suite privilege from string to value
97 * @param[in] value - privilege value
99 * @return cipher suite privilege index
103 /** @brief function to convert privilege value to string
105 * @param[in] value - privilege value
107 * @return privilege in string
[all …]
H A Duser_mgmt.hpp57 * Structure for user privilege access (refer spec sec 22.22)
61 uint8_t privilege; member
132 /** @brief determines valid user privilege
134 * @param[in] priv - Privilege
146 /** @brief Converts system privilege to IPMI privilege
148 * @param[in] value - Privilege in string
150 * @return CommandPrivilege - IPMI privilege type
154 /** @brief Converts IPMI privilege to system privilege
156 * @param[in] value - IPMI privilege
158 * @return System privilege in string
[all …]
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/
H A DPrivilegeRegistry.v1_1_5.json62 … "description": "List mapping between HTTP methods and privilege required for the resource.",
63 …on": "This property shall list the mapping between HTTP methods and the privilege required for the…
66 "description": "The privilege overrides of properties within a resource.",
70 …"longDescription": "This property shall contain the privilege overrides of properties, such as the…
74 "description": "The privilege overrides of resource URIs.",
78 …"longDescription": "This property shall contain the privilege overrides of resource URIs. The tar…
82 "description": "The privilege overrides of the subordinate resource.",
86 …"longDescription": "This property shall contain the privilege overrides of the subordinate resourc…
133 "description": "The privilege required to complete an HTTP `DELETE` operation.",
137 …"longDescription": "This property shall contain the privilege required to complete an HTTP `DELETE…
[all …]
/openbmc/openbmc-test-automation/openpower/localuser/
H A Dtest_ipmi_redfish_user.robot25 Create IPMI User Without Any Privilege And Verify Via Redfish
26 [Documentation] Create user using IPMI without privilege and verify user privilege
36 # Verify new user privilege level via Redfish.
37 ${privilege}= Redfish_Utils.Get Attribute
39 Valid Value privilege ['ReadOnly']
122 Update User Privilege Via Redfish And Verify Using IPMI
123 [Documentation] Update user privilege via Redfish and verify using IPMI.
126 # Create user using Redfish with admin privilege.
142 # Update user privilege to readonly using Redfish.
146 # Verify new user privilege level via IPMI.
[all …]
/openbmc/phosphor-net-ipmid/command/
H A Dsession_cmds.hpp20 * IPMI Request data for Set Session Privilege Level command
39 * IPMI Response data for Set Session Privilege Level command
58 * @brief Set Session Privilege Command
61 * the session is set to an initial privilege level. A session that is
62 * activated at a maximum privilege level of Callback is set to an initial
63 * privilege level of Callback and cannot be changed. All other sessions are
64 * initially set to USER level, regardless of the maximum privilege level
67 * This command cannot be used to set a privilege level higher than the lowest
68 * of the privilege level set for the user(via the Set User Access command) and
69 * the privilege limit for the channel that was set via the Set Channel Access
[all …]
H A Drakp12.cpp109 * 6) Requested Privilege Level - 1 byte in RAKP12()
152 // As stated in Set Session Privilege Level command in IPMI Spec, when in RAKP12()
154 // be established with USER privilege as well as all other sessions are in RAKP12()
155 // initially set to USER privilege, regardless of the requested maximum in RAKP12()
156 // privilege. in RAKP12()
157 if (!(static_cast<session::Privilege>( in RAKP12()
159 session::Privilege::CALLBACK)) in RAKP12()
165 session->currentPrivilege(static_cast<uint8_t>(session::Privilege::USER)); in RAKP12()
168 static_cast<session::Privilege>(request->req_max_privilege_level); in RAKP12()
244 if (session->sessionUserPrivAccess.privilege > in RAKP12()
[all …]
/openbmc/openbmc-tools/openbmctool/
H A DREADME.md202 ### Add privilege mapping
205 openbmctool.py <connection options> ldap privilege-mapper create --groupName=<groupName> --privileg…
208 ### Delete privilege mapping
211 openbmctool.py <connection options> ldap privilege-mapper delete --groupName=<groupName>
214 ### List privilege mapping
217 openbmctool.py <connection options> ldap privilege-mapper list
225 - Configure user privilege.
230 privilege mapping for the LDAP credentials then the user will get the following
233 403, 'LDAP group privilege mapping does not exist'.
235 Action: Add the privilege (refer to the section "Add privilege mapping")
[all …]
/openbmc/phosphor-net-ipmid/
H A Dcomm_module.cpp25 session::Privilege::HIGHEST_MATCHING, in sessionSetupCommands()
30 session::Privilege::HIGHEST_MATCHING, in sessionSetupCommands()
35 session::Privilege::HIGHEST_MATCHING, in sessionSetupCommands()
41 session::Privilege::HIGHEST_MATCHING, in sessionSetupCommands()
47 session::Privilege::HIGHEST_MATCHING, in sessionSetupCommands()
49 // Set Session Privilege Command in sessionSetupCommands()
53 session::Privilege::USER, in sessionSetupCommands()
59 session::Privilege::CALLBACK, in sessionSetupCommands()
68 iter.command, iter.functor, iter.privilege, iter.sessionless)); in sessionSetupCommands()
H A Dcommand_table.hpp56 session::Privilege privilege; member
110 * Every commands has a privilege level which mentions the minimum session
111 * privilege level needed to execute the command
117 Entry(CommandID command, session::Privilege privilege) : in Entry() argument
118 command(command), privilege(privilege) in Entry()
142 return privilege; in getPrivilege()
154 // Specifies the minimum privilege level required to execute this command
155 session::Privilege privilege; member in command::Entry
173 session::Privilege privilege, bool sessionless) : in NetIpmidEntry() argument
174 Entry(command, privilege), functor(functor), sessionless(sessionless) in NetIpmidEntry()
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_user_management_sub_menu.robot25 ${xpath_privilege_list_button} //*[@data-test-id='userManagement-select-privilege']
56 Page should contain View privilege role descriptions
107 Verify User Access Privilege
108 [Documentation] Create a new user with a privilege and verify that user is created.
119 Verify Operator User Privilege
120 [Documentation] Create users with different access privilege
160 # Get random username and user privilege level.
171 Test Modifying User Privilege Of Existing User Via GUI
172 …[Documentation] Modify user privilege of existing user via GUI and verify the changes using Redfi…
176 # Get random username and user privilege level.
[all …]
/openbmc/docs/designs/
H A Dredfish-authorization.md21 The Redfish authorization model consists of the privilege model and the
22 operation-to-privilege mapping.
24 In the privilege model, there are fixed set of standard Redfish roles and each
30 The operation-to-privilege mapping is defined for every resource type and
34 request. The Redfish Forum provides a Privilege Registry definition in its
35 official registry collection as a base operation-to-privilege mapping. It also
42 resource only requires the `Login` privilege. On the other hand, the same peer
44 POST operation on certificates requires `ConfigureManager` privilege that the
53 1. https://redfish.dmtf.org/schemas/DSP0266_1.15.1.html#privilege-model
54 2. https://redfish.dmtf.org/schemas/DSP0266_1.15.1.html#redfish-service-operation-to-privilege-mapp…
[all …]
/openbmc/linux/Documentation/devicetree/bindings/powerpc/
H A Dibm,powerpc-cpu-features.txt13 enablement, privilege, and compatibility metadata.
94 - usable-privilege
104 This property describes the privilege levels and/or software components
118 This property describes the HV privilege support required to enable the
119 feature to lesser privilege levels. If the property does not exist then no
137 This property describes the OS privilege support required to enable the
138 feature to lesser privilege levels. If the property does not exist then no
179 This property may exist when the usable-privilege property value has PR bit set.
213 usable-privilege = <1 | 2 | 4>;
219 usable-privilege = <1 | 2>;
[all …]
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/
H A DPrivilegeRegistry_v1.xml37 …scription" String="The `PrivilegeRegistry` schema describes the operation-to-privilege mappings."/>
38 …erm="OData.LongDescription" String="This resource shall contain operation-to-privilege mappings."/>
87 …<Annotation Term="OData.Description" String="The privilege overrides of the subordinate resource."…
88 …on Term="OData.LongDescription" String="This property shall contain the privilege overrides of the…
91 <Annotation Term="OData.Description" String="The privilege overrides of resource URIs."/>
92 …on Term="OData.LongDescription" String="This property shall contain the privilege overrides of res…
95 …<Annotation Term="OData.Description" String="The privilege overrides of properties within a resour…
96 …on Term="OData.LongDescription" String="This property shall contain the privilege overrides of pro…
99 … Term="OData.Description" String="List mapping between HTTP methods and privilege required for the…
100 …ring="This property shall list the mapping between HTTP methods and the privilege required for the…
[all …]
/openbmc/webui-vue/src/views/SecurityAndAccess/UserManagement/
H A DModalUser.vue102 :label="$t('pageUserManagement.modal.privilege')"
103 label-for="privilege"
106 id="privilege"
107 v-model="form.privilege"
109 data-test-id="userManagement-select-privilege"
110 :state="getValidationState(v$.form.privilege)"
112 @input="v$.form.privilege.$touch()"
121 <template v-if="v$.form.privilege.required.$invalid">
271 privilege: null,
299 this.form.privilege = value.privilege;
[all …]

12345678910>>...21