/openbmc/bmcweb/redfish-core/include/ |
H A D | privileges.hpp | 43 * @brief A vector of all privilege names and their indexes 44 * The privilege "OpenBMCHostConsole" is added to users who are members of the 45 * "hostconsole" user group. This privilege is required to access the host 63 * unique privilege name. 65 * A bit is set if the privilege is required (entity domain) or granted 86 for (const char* privilege : privilegeList) in Privileges() local 88 if (!setSinglePrivilege(privilege)) in Privileges() 90 BMCWEB_LOG_CRITICAL("Unable to set privilege {} in constructor", in Privileges() 91 privilege); in Privileges() 97 * @brief Sets given privilege in the bitset [all …]
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_ipmi_redfish_user.robot | 71 Update User Privilege Via Redfish And Verify Using IPMI 72 [Documentation] Update user privilege via Redfish and verify using IPMI. 75 # Create user using Redfish with admin privilege. 85 # Update user privilege to operator using Redfish. 89 # Verify new user privilege level via IPMI. 132 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 149 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 165 Update User Privilege To Operator Via IPMI And Verify Using Redfish 166 [Documentation] Update user privilege to operator via IPMI and verify using Redfish. 168 # Create user using IPMI with admin privilege. [all …]
|
H A D | test_redfish_privilege_registry.robot | 2 Documentation Script to test Redfish privilege registry with various users 10 Suite Setup Create And Verify Various Privilege Users 31 Verify Redfish Privilege Registry Properties 32 [Documentation] Verify the Redfish Privilege Registry properties. 37 # Get the complete Privilege Registry URL 38 ${url}= Get Redfish Privilege Registry json URL 42 # Verify the Privilege Registry Resource. 45 # "Name": "Privilege Mapping array collection", 55 Should Be Equal As Strings ${resp.dict["Name"]} Privilege Mapping array collection 62 Verify Redfish Privilege Registry Mappings Properties For Account Service [all …]
|
H A D | test_ldap_configuration.robot | 144 Verify LDAP User With Admin Privilege Able To Do BMC Reboot 145 [Documentation] Verify that LDAP user with administrator privilege able to do BMC reboot. 152 # With LDAP user and with right privilege trying to do BMC reboot. 158 Verify LDAP User With Operator Privilege Able To Do Host Poweroff 159 [Documentation] Verify that LDAP user with operator privilege can do host 162 [Teardown] Restore LDAP Privilege 168 # Verify that the LDAP user with operator privilege is able to power the system off. 203 Verify LDAP User With Read Privilege Able To Check Inventory 204 [Documentation] Verify that LDAP user with read privilege able to 207 [Teardown] Run Keywords FFDC On Test Case Fail AND Restore LDAP Privilege [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/ |
H A D | PrivilegeMapper.interface.yaml | 2 Implement this interface to set the privilege of the user based on the group 3 name. The users in the group will inherit the privilege mapping of the 8 unique number generated by the application. If the privilege mapping already 11 privilege for a mapping which already exists, the Privilege property in the 13 application consuming the privilege mapping should not cache the object path 21 Creates a mapping for the group to the privilege. 26 Group Name to which the privilege is to be assigned. In the case 29 - name: Privilege 32 The privilege associated with the group. The set of available 35 be thrown if the privilege is invalid. Additional documentation [all …]
|
H A D | PrivilegeMapperEntry.interface.yaml | 2 Implement to provide privilege for the group. 8 Group Name to which the privilege is to be assigned. In the case of 14 - name: Privilege 17 One of the privilege as defined by 20 thrown if the privilege is invalid. Additional documentation on 21 privilege is available here.
|
/openbmc/phosphor-user-manager/phosphor-ldap-config/ |
H A D | ldap_mapper_entry.hpp | 26 * @brief This D-Bus object represents the privilege level for the LDAP group. 38 /** @brief Constructs LDAP privilege mapper entry object. 44 * @param[in] privilege - the privilege for the group 45 * @param[in] parent - LDAP privilege mapper manager 49 const std::string& privilege, Config& parent); 51 /** @brief Constructs LDAP privilege mapper entry object 56 * @param[in] parent - LDAP privilege mapper manager 61 /** @brief Delete privilege mapper entry object 63 * This method deletes the privilege mapper entry. 75 /** @brief Update privilege associated with LDAP group [all …]
|
H A D | ldap_config.hpp | 201 /** @brief Creates a mapping for the group to the privilege 203 * @param[in] groupName - Group Name to which the privilege needs to be 205 * @param[in] privilege - The privilege role associated with the group. 207 * @return On success return the D-Bus object path of the created privilege 210 ObjectPath create(std::string groupName, std::string privilege) override; 212 /** @brief Delete privilege mapping for LDAP group 214 * This method deletes the privilege mapping 220 /** @brief Check if LDAP group privilege mapping requested is valid 222 * Check if the privilege mapping already exists for the LDAP group name 231 /** @brief Check if the privilege level is a valid one [all …]
|
/openbmc/openbmc-test-automation/ipmi/ |
H A D | test_ipmi_user.robot | 75 # Set admin privilege and enable IPMI messaging for newly created user. 76 Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv} 199 # Set admin privilege and enable IPMI messaging for newly created user 200 Set Channel Access ${random_userid} ipmi=on privilege=${admin_level_priv} 251 Test IPMI User Privilege Level 252 [Documentation] Verify IPMI user with user privilege can only run user level commands. 254 [Template] Test IPMI User Privilege 258 #Privilege level User Cmd Status Operator Cmd Status Admin Cmd Status 262 Test IPMI Operator Privilege Level 263 …[Documentation] Verify IPMI user with operator privilege can only run user and operator levels co… [all …]
|
H A D | test_ipmi_general.robot | 135 FOR ${privilege} IN 4 3 2 136 # Input Channel Privilege Level 137 ${channel} ${privilege} 163 Verify Set Session Privilege Level via IPMI Raw Command 164 [Documentation] Set session privilege with given privilege level and verify the response with 167 [Template] Set Session Privilege Level And Verify 176 Verify Set Invalid Session Privilege Level Via IPMI Raw Command 177 [Documentation] Verify set invalid session privilege level via IPMI raw command. 179 [Template] Set Invalid Session Privilege Level And Verify 321 Set Session Privilege Level And Verify [all …]
|
/openbmc/openbmc-test-automation/gui/test/access_control/ |
H A D | test_obmc_gui_local_users.robot | 22 ${xpath_select_privilege} //select[@id="privilege"] 33 Page should contain View privilege role descriptions 89 [Arguments] ${username} ${password} ${privilege}=Administrator 95 # privilege User privilege. 99 Add User Details ${username} ${password} ${privilege} ${account_status} 103 [Arguments] ${username} ${password} ${privilege} ${account_status} 108 # privilege User privilege. 117 Select User Privilege ${privilege} 120 Select User Privilege 121 [Documentation] Select user privilege. [all …]
|
/openbmc/phosphor-host-ipmid/user_channel/ |
H A D | cipher_mgmt.hpp | 52 * privilege levels 54 * @param[in] csPrivilegeLevels - gets filled by cipher suite privilege 65 * suite privilege levels 67 * @param[in] csPrivilegeLevels - cipher suite privilege levels to update 95 /** @brief convert to cipher suite privilege from string to value 97 * @param[in] value - privilege value 99 * @return cipher suite privilege index 103 /** @brief function to convert privilege value to string 105 * @param[in] value - privilege value 107 * @return privilege in string [all …]
|
H A D | user_mgmt.hpp | 57 * Structure for user privilege access (refer spec sec 22.22) 61 uint8_t privilege; member 132 /** @brief determines valid user privilege 134 * @param[in] priv - Privilege 146 /** @brief Converts system privilege to IPMI privilege 148 * @param[in] value - Privilege in string 150 * @return CommandPrivilege - IPMI privilege type 154 /** @brief Converts IPMI privilege to system privilege 156 * @param[in] value - IPMI privilege 158 * @return System privilege in string [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | PrivilegeRegistry.v1_1_5.json | 62 … "description": "List mapping between HTTP methods and privilege required for the resource.", 63 …on": "This property shall list the mapping between HTTP methods and the privilege required for the… 66 "description": "The privilege overrides of properties within a resource.", 70 …"longDescription": "This property shall contain the privilege overrides of properties, such as the… 74 "description": "The privilege overrides of resource URIs.", 78 …"longDescription": "This property shall contain the privilege overrides of resource URIs. The tar… 82 "description": "The privilege overrides of the subordinate resource.", 86 …"longDescription": "This property shall contain the privilege overrides of the subordinate resourc… 133 "description": "The privilege required to complete an HTTP `DELETE` operation.", 137 …"longDescription": "This property shall contain the privilege required to complete an HTTP `DELETE… [all …]
|
/openbmc/openbmc-test-automation/openpower/localuser/ |
H A D | test_ipmi_redfish_user.robot | 25 Create IPMI User Without Any Privilege And Verify Via Redfish 26 [Documentation] Create user using IPMI without privilege and verify user privilege 36 # Verify new user privilege level via Redfish. 37 ${privilege}= Redfish_Utils.Get Attribute 39 Valid Value privilege ['ReadOnly'] 122 Update User Privilege Via Redfish And Verify Using IPMI 123 [Documentation] Update user privilege via Redfish and verify using IPMI. 126 # Create user using Redfish with admin privilege. 142 # Update user privilege to readonly using Redfish. 146 # Verify new user privilege level via IPMI. [all …]
|
/openbmc/phosphor-net-ipmid/command/ |
H A D | session_cmds.hpp | 20 * IPMI Request data for Set Session Privilege Level command 39 * IPMI Response data for Set Session Privilege Level command 58 * @brief Set Session Privilege Command 61 * the session is set to an initial privilege level. A session that is 62 * activated at a maximum privilege level of Callback is set to an initial 63 * privilege level of Callback and cannot be changed. All other sessions are 64 * initially set to USER level, regardless of the maximum privilege level 67 * This command cannot be used to set a privilege level higher than the lowest 68 * of the privilege level set for the user(via the Set User Access command) and 69 * the privilege limit for the channel that was set via the Set Channel Access [all …]
|
H A D | rakp12.cpp | 109 * 6) Requested Privilege Level - 1 byte in RAKP12() 152 // As stated in Set Session Privilege Level command in IPMI Spec, when in RAKP12() 154 // be established with USER privilege as well as all other sessions are in RAKP12() 155 // initially set to USER privilege, regardless of the requested maximum in RAKP12() 156 // privilege. in RAKP12() 157 if (!(static_cast<session::Privilege>( in RAKP12() 159 session::Privilege::CALLBACK)) in RAKP12() 165 session->currentPrivilege(static_cast<uint8_t>(session::Privilege::USER)); in RAKP12() 168 static_cast<session::Privilege>(request->req_max_privilege_level); in RAKP12() 244 if (session->sessionUserPrivAccess.privilege > in RAKP12() [all …]
|
/openbmc/openbmc-tools/openbmctool/ |
H A D | README.md | 202 ### Add privilege mapping 205 openbmctool.py <connection options> ldap privilege-mapper create --groupName=<groupName> --privileg… 208 ### Delete privilege mapping 211 openbmctool.py <connection options> ldap privilege-mapper delete --groupName=<groupName> 214 ### List privilege mapping 217 openbmctool.py <connection options> ldap privilege-mapper list 225 - Configure user privilege. 230 privilege mapping for the LDAP credentials then the user will get the following 233 403, 'LDAP group privilege mapping does not exist'. 235 Action: Add the privilege (refer to the section "Add privilege mapping") [all …]
|
/openbmc/phosphor-net-ipmid/ |
H A D | comm_module.cpp | 25 session::Privilege::HIGHEST_MATCHING, in sessionSetupCommands() 30 session::Privilege::HIGHEST_MATCHING, in sessionSetupCommands() 35 session::Privilege::HIGHEST_MATCHING, in sessionSetupCommands() 41 session::Privilege::HIGHEST_MATCHING, in sessionSetupCommands() 47 session::Privilege::HIGHEST_MATCHING, in sessionSetupCommands() 49 // Set Session Privilege Command in sessionSetupCommands() 53 session::Privilege::USER, in sessionSetupCommands() 59 session::Privilege::CALLBACK, in sessionSetupCommands() 68 iter.command, iter.functor, iter.privilege, iter.sessionless)); in sessionSetupCommands()
|
H A D | command_table.hpp | 56 session::Privilege privilege; member 110 * Every commands has a privilege level which mentions the minimum session 111 * privilege level needed to execute the command 117 Entry(CommandID command, session::Privilege privilege) : in Entry() argument 118 command(command), privilege(privilege) in Entry() 142 return privilege; in getPrivilege() 154 // Specifies the minimum privilege level required to execute this command 155 session::Privilege privilege; member in command::Entry 173 session::Privilege privilege, bool sessionless) : in NetIpmidEntry() argument 174 Entry(command, privilege), functor(functor), sessionless(sessionless) in NetIpmidEntry()
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_user_management_sub_menu.robot | 25 ${xpath_privilege_list_button} //*[@data-test-id='userManagement-select-privilege'] 56 Page should contain View privilege role descriptions 107 Verify User Access Privilege 108 [Documentation] Create a new user with a privilege and verify that user is created. 119 Verify Operator User Privilege 120 [Documentation] Create users with different access privilege 160 # Get random username and user privilege level. 171 Test Modifying User Privilege Of Existing User Via GUI 172 …[Documentation] Modify user privilege of existing user via GUI and verify the changes using Redfi… 176 # Get random username and user privilege level. [all …]
|
/openbmc/docs/designs/ |
H A D | redfish-authorization.md | 21 The Redfish authorization model consists of the privilege model and the 22 operation-to-privilege mapping. 24 In the privilege model, there are fixed set of standard Redfish roles and each 30 The operation-to-privilege mapping is defined for every resource type and 34 request. The Redfish Forum provides a Privilege Registry definition in its 35 official registry collection as a base operation-to-privilege mapping. It also 42 resource only requires the `Login` privilege. On the other hand, the same peer 44 POST operation on certificates requires `ConfigureManager` privilege that the 53 1. https://redfish.dmtf.org/schemas/DSP0266_1.15.1.html#privilege-model 54 2. https://redfish.dmtf.org/schemas/DSP0266_1.15.1.html#redfish-service-operation-to-privilege-mapp… [all …]
|
/openbmc/linux/Documentation/devicetree/bindings/powerpc/ |
H A D | ibm,powerpc-cpu-features.txt | 13 enablement, privilege, and compatibility metadata. 94 - usable-privilege 104 This property describes the privilege levels and/or software components 118 This property describes the HV privilege support required to enable the 119 feature to lesser privilege levels. If the property does not exist then no 137 This property describes the OS privilege support required to enable the 138 feature to lesser privilege levels. If the property does not exist then no 179 This property may exist when the usable-privilege property value has PR bit set. 213 usable-privilege = <1 | 2 | 4>; 219 usable-privilege = <1 | 2>; [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
H A D | PrivilegeRegistry_v1.xml | 37 …scription" String="The `PrivilegeRegistry` schema describes the operation-to-privilege mappings."/> 38 …erm="OData.LongDescription" String="This resource shall contain operation-to-privilege mappings."/> 87 …<Annotation Term="OData.Description" String="The privilege overrides of the subordinate resource."… 88 …on Term="OData.LongDescription" String="This property shall contain the privilege overrides of the… 91 <Annotation Term="OData.Description" String="The privilege overrides of resource URIs."/> 92 …on Term="OData.LongDescription" String="This property shall contain the privilege overrides of res… 95 …<Annotation Term="OData.Description" String="The privilege overrides of properties within a resour… 96 …on Term="OData.LongDescription" String="This property shall contain the privilege overrides of pro… 99 … Term="OData.Description" String="List mapping between HTTP methods and privilege required for the… 100 …ring="This property shall list the mapping between HTTP methods and the privilege required for the… [all …]
|
/openbmc/webui-vue/src/views/SecurityAndAccess/UserManagement/ |
H A D | ModalUser.vue | 102 :label="$t('pageUserManagement.modal.privilege')" 103 label-for="privilege" 106 id="privilege" 107 v-model="form.privilege" 109 data-test-id="userManagement-select-privilege" 110 :state="getValidationState(v$.form.privilege)" 112 @input="v$.form.privilege.$touch()" 121 <template v-if="v$.form.privilege.required.$invalid"> 271 privilege: null, 299 this.form.privilege = value.privilege; [all …]
|