Home
last modified time | relevance | path

Searched full:admin (Results 1 – 25 of 213) sorted by relevance

123456789

/openbmc/openbmc/meta-phosphor/recipes-phosphor/ipmi/phosphor-ipmi-config/
H A Dcs_privilege_levels.json3 "CipherID0": "priv-admin",
4 "CipherID1": "priv-admin",
5 "CipherID10": "priv-admin",
6 "CipherID11": "priv-admin",
7 "CipherID12": "priv-admin",
8 "CipherID13": "priv-admin",
9 "CipherID14": "priv-admin",
10 "CipherID15": "priv-admin",
11 "CipherID2": "priv-admin",
12 "CipherID3": "priv-admin",
[all …]
H A Dchannel_access.json7 "priv_limit": "priv-admin"
14 "priv_limit": "priv-admin"
/openbmc/openbmc/meta-ibm/recipes-phosphor/user/user/
H A Dupdate_admin_account.sh2 # Purpose: creates /home/admin directory and updates admin user
3 # home directory to /home/admin
5 # Update admin user home directory
6 if id -u "admin" >/dev/null 2>&1; then
7 # admin user exists
8 homedir=$(grep '^admin:' /etc/passwd | cut -d: -f6)
10 echo "Changing admin user home directory"
11 mkdir -p /home/admin
12 chmod 0755 /home/admin
13 chown --recursive admin:admin /home/admin
[all …]
/openbmc/openbmc/poky/bitbake/lib/toaster/bldcollector/
H A Dadmin.py5 from django.contrib import admin
11 class BitbakeVersionAdmin(admin.ModelAdmin):
23 class ReleaseAdmin(admin.ModelAdmin):
27 class ToasterSettingAdmin(admin.ModelAdmin):
31 class LayerVersionsAdmin(admin.ModelAdmin):
34 admin.site.register(Layer_Version, LayerVersionsAdmin)
35 admin.site.register(BitbakeVersion, BitbakeVersionAdmin)
36 admin.site.register(Release, ReleaseAdmin)
37 admin.site.register(ToasterSetting, ToasterSettingAdmin)
/openbmc/openbmc/meta-ibm/recipes-phosphor/images/
H A Dobmc-phosphor-image.bbappend21 # admin - Provides administrative control over the BMC. The role is
22 # SystemAdministrator. Admin users have access to interfaces including:
27 # The admin has access to the host console: ssh -p2200 admin@${bmc}.
28 # The admin account does not have a home directory.
31 # OemIBMServiceAgent. The service user has full admin access, plus access
51 # Add the "admin" account.
53 useradd --groups priv-admin,redfish,web -s /sbin/nologin admin; \
54 usermod -p ${DEFAULT_OPENBMC_PASSWORD} admin; \
59 useradd -M -d / --groups priv-admin,redfish,web,wheel service; \
/openbmc/openbmc-test-automation/security/
H A Dtest_bmc_expire_password.robot194 Verify Expire And Change Admin User Password Via GUI
195 [Documentation] Force expire admin password and update admin password via GUI.
205 # Verify that admin user should not be able to login with expired password.
221 Expire Admin Password And Check IPMI Access Fails
222 [Documentation] Expire admin user password and expect an error while access via IPMI.
232 Verify Expire Admin Password And Update Bad Password Length Via Redfish
233 [Documentation] Expire admin password and update bad password with more than 20 characters
245 Verify Error While Creating User With Expired Admin Password
246 [Documentation] Expire admin password and expect an error while creating new user.
248 [Teardown] Restore Default Password For Admin User
[all …]
/openbmc/openbmc/poky/bitbake/lib/toaster/toastermain/
H A Durls.py18 # Uncomment the next two lines to enable the admin:
19 from django.contrib import admin
20 admin.autodiscover()
27 # Uncomment the admin/doc line below to enable admin documentation:
28 # url(r'^admin/doc/', include('django.contrib.admindocs.urls')),
55 # Uncomment the next line to enable the admin:
56 url(r'^admin/', admin.site.urls),
/openbmc/openbmc-test-automation/openpower/ext_interfaces/
H A Dtest_vmicert_management.robot22 @{ADMIN} admin_user TestPwd123 variable
27 &{USERS} Administrator=${ADMIN} ReadOnly=${ReadOnly}
57 # Request root certificate from admin user.
149 Get Concurrent Root Certificate Requests From Multiple Admin Users
164 Get Concurrent CSR Requests From Multiple Admin Users
179 Get Concurrent Corrupted CSR Requests From Multiple Admin Users
196 …[Documentation] Get multiple concurrent root certificate from non admin users and verify no error…
211 Get Concurrent Root Certificate Request From Admin And Non Admin Users
212 [Documentation] Get multiple concurrent root certificate from admin and non admin users
227 Get Concurrent Root Certificate Request From Different Non Admin Users
[all …]
H A Dtest_client_identifier.robot76 Create Session For Non Admin User
77 [Documentation] Create Session for non-admin user.
79 [Template] Non Admin User To Create Session
141 Create A Non Admin Session With ClientID
161 Verify A Non Admin Session Created With ClientID
197 Non Admin User To Create Session
198 [Documentation] Non Admin user create a session and verify the session is created.
215 …${session_info}= Create A Non Admin Session With ClientID ${client_ids} ${username} ${password}
216 Verify A Non Admin Session Created With ClientID ${client_ids} ${session_info}
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/krb5/
H A Dkrb5_1.21.3.bb29 file://etc/init.d/krb5-admin-server \
31 file://etc/default/krb5-admin-server \
33 file://krb5-admin-server.service \
89 echo "RUN_KADMIND=true" >> ${D}/${sysconfdir}/default/krb5-admin-server
101 install -m 0644 ${UNPACKDIR}/krb5-admin-server.service ${D}${systemd_system_unitdir}
111 PACKAGE_BEFORE_PN =+ "${PN}-admin-server \
136 FILES:${PN}-admin-server = "${sbindir}/kadmin.local \
139 ${sysconfdir}/default/krb5-admin-server \
140 ${sysconfdir}/init.d/krb5-admin-server \
141 ${systemd_system_unitdir}/krb5-admin-server.service"
[all …]
/openbmc/openbmc/poky/bitbake/lib/toaster/bldcontrol/
H A Dadmin.py5 from django.contrib import admin
8 class BuildEnvironmentAdmin(admin.ModelAdmin):
11 admin.site.register(BuildEnvironment, BuildEnvironmentAdmin)
/openbmc/openbmc/meta-inventec/meta-starscream/recipes-phosphor/image/
H A Dobmc-phosphor-image.bbappend4 useradd -e '' -ou 0 -d /home/root -G priv-admin,root,sudo,ipmi,web,redfish -p 'gzW59equAcJAg' sysad…
5 useradd -e '' -ou 0 -d /home/root -G priv-admin,root,sudo,ipmi,web,redfish -p 'kFdHdjRkot8KQ' admin
/openbmc/openbmc/meta-nvidia/meta-gb200nvl-obmc/recipes-phosphor/ipmi/phosphor-ipmi-config/
H A Dchannel_access.json7 "priv_limit" : "priv-admin"
14 "priv_limit" : "priv-admin"
21 "priv_limit" : "priv-admin"
/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_user_account.robot2 Documentation Test suite for verifying Redfish admin, readonly operation user accounts.
32 Verify Redfish Admin User Persistence After Reboot
33 [Documentation] Verify Redfish admin user persistence after reboot.
76 Redfish Create and Verify Admin User
103 Verify Redfish Admin User Login With Wrong Password
104 [Documentation] Verify Redfish create admin user with valid password and make sure
105 ... admin user failed to login with wrong password.
133 Verify Login with Deleted Redfish Admin User
134 [Documentation] Verify login with deleted Redfish admin user.
160 Verify Admin User Creation Without Enabling It
[all …]
H A Dtest_redfish_privilege_registry.robot3 ... such as test, admin, operator, readonly, patched.
11 Suite Teardown Delete Created Redfish Users Except Default Admin
127 Verify Admin User Privileges Via Redfish
128 [Documentation] Verify Admin user privileges via Redfish.
203 [Documentation] Create and verify admin, test, operator, and readonly users.
234 Delete Created Redfish Users Except Default Admin
235 [Documentation] Delete the admin, patched, operator, readonly, and post users.
/openbmc/openbmc/meta-inventec/meta-transformers/recipes-phosphor/image/
H A Dobmc-phosphor-image.bbappend2 useradd -e '' -ou 0 -d /home/root -G priv-admin,root,sudo,ipmi,web,redfish -p 'gzW59equAcJAg' sysad…
3 useradd -e '' -ou 0 -d /home/root -G priv-admin,root,sudo,ipmi,web,redfish -p 'kFdHdjRkot8KQ' admin
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-extended/tgt/files/
H A Dtgtd.init22 tgt-admin -s >/dev/null 2>&1
42 tgt-admin -f -e -c $TGTD_CONFIG
54 tgt-admin --update ALL -c /dev/null &>/dev/null
74 tgt-admin --update ALL -c $TGTD_CONFIG &>/dev/null
84 tgt-admin -s >/dev/null 2>&1
H A Dtgtd.service16 ExecStartPost=@SBINDIR@/tgt-admin -e -c $TGTD_CONFIG
22 ExecReload=@SBINDIR@/tgt-admin --update ALL -c $TGTD_CONFIG
28 ExecStop=@SBINDIR@/tgt-admin --update ALL -c /dev/null
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/BIOSConfig/
H A DPassword.interface.yaml14 User name - user / admin.
18 Current user/ admin Password.
22 New user/ admin Password.
/openbmc/bmcweb/redfish-core/include/generated/enums/
H A Dstorage_controller.hpp12 Admin, enumerator
27 {NVMeControllerType::Admin, "Admin"},
/openbmc/openbmc/poky/bitbake/bin/
H A Dbitbake-hashserv47 Setting "--anon-perms @all" or "--anon-perms @user-admin" is not allowed, since
62 @db-admin - Manage the hash database(s). This includes cleaning the
64 @user-admin - The ability to manage user accounts. This includes, creating
119 "--admin-user",
121 help="Create default admin user with name ADMIN_USER ($HASHSERVER_ADMIN_USER)",
124 "--admin-password",
126 help="Create default admin user with password ADMIN_PASSWORD ($HASHSERVER_ADMIN_PASSWORD)",
/openbmc/openbmc-test-automation/redfish/update_service/
H A Dtest_redfish_bmc_code_update.robot38 @{ADMIN} admin_user TestPwd123 variable
39 &{USERS} Administrator=${ADMIN}
132 Verify If The Modified Admin Credential Is Valid Post Image Switched To Backup
133 [Documentation] Verify updated admin credential remain same post switch to back up image.
140 Expire And Update New Password Via Redfish ${ADMIN[0]} ${ADMIN[1]} 0penBmc123
147 # verify modified admin password on backup image.
152 Verify If The Modified Admin Credential Is Valid Post Update
153 [Documentation] Verify updated admin credential remain same post code update image.
158 Expire And Update New Password Via Redfish ${ADMIN[0]} ${ADMIN[1]} 0penBmc123
164 # verify modified admin credentials on latest image.
/openbmc/phosphor-host-ipmid/oem/nvidia/
H A Dbootstrap-credentials-oem-cmds.cpp199 ipmi::Privilege::Admin, ipmi::ipmiGetUsbVendorIdProductId); in registerBootstrapCredentialsOemCommands()
204 ipmi::Privilege::Admin, ipmi::ipmiGetUsbSerialNumber); in registerBootstrapCredentialsOemCommands()
209 ipmi::Privilege::Admin, ipmi::ipmiGetRedfishHostName); in registerBootstrapCredentialsOemCommands()
214 ipmi::Privilege::Admin, ipmi::ipmiGetIpmiChannelRfHi); in registerBootstrapCredentialsOemCommands()
219 ipmi::Privilege::Admin, ipmi::ipmiGetRedfishServiceUUID); in registerBootstrapCredentialsOemCommands()
224 ipmi::Privilege::Admin, ipmi::ipmiGetRedfishServicePort); in registerBootstrapCredentialsOemCommands()
/openbmc/openbmc/meta-google/recipes-google/default-users/
H A Ddefault-users.bb19 -G 'web,redfish,priv-admin' Megapede; "
20 GROUPMEMS_PARAM:${PN} = "-g priv-admin -a root; "
/openbmc/openbmc/meta-phosphor/classes/
H A Dphosphor-deploy-ssh-keys.bbclass55 is_group=`grep "priv-admin" ${IMAGE_ROOTFS}/etc/group || true`
58 perform_groupadd "${IMAGE_ROOTFS}" "-R ${IMAGE_ROOTFS} priv-admin"
61 perform_usermod "${IMAGE_ROOTFS}" "-R ${IMAGE_ROOTFS} -a -G priv-admin ${username}"

123456789