/openbmc/openbmc/meta-phosphor/recipes-phosphor/ipmi/phosphor-ipmi-config/ |
H A D | cs_privilege_levels.json | 3 "CipherID0": "priv-admin", 4 "CipherID1": "priv-admin", 5 "CipherID10": "priv-admin", 6 "CipherID11": "priv-admin", 7 "CipherID12": "priv-admin", 8 "CipherID13": "priv-admin", 9 "CipherID14": "priv-admin", 10 "CipherID15": "priv-admin", 11 "CipherID2": "priv-admin", 12 "CipherID3": "priv-admin", [all …]
|
H A D | channel_access.json | 7 "priv_limit": "priv-admin" 14 "priv_limit": "priv-admin"
|
/openbmc/openbmc/meta-ibm/recipes-phosphor/user/user/ |
H A D | update_admin_account.sh | 2 # Purpose: creates /home/admin directory and updates admin user 3 # home directory to /home/admin 5 # Update admin user home directory 6 if id -u "admin" >/dev/null 2>&1; then 7 # admin user exists 8 homedir=$(grep '^admin:' /etc/passwd | cut -d: -f6) 10 echo "Changing admin user home directory" 11 mkdir -p /home/admin 12 chmod 0755 /home/admin 13 chown --recursive admin:admin /home/admin [all …]
|
/openbmc/openbmc/poky/bitbake/lib/toaster/bldcollector/ |
H A D | admin.py | 5 from django.contrib import admin 11 class BitbakeVersionAdmin(admin.ModelAdmin): 23 class ReleaseAdmin(admin.ModelAdmin): 27 class ToasterSettingAdmin(admin.ModelAdmin): 31 class LayerVersionsAdmin(admin.ModelAdmin): 34 admin.site.register(Layer_Version, LayerVersionsAdmin) 35 admin.site.register(BitbakeVersion, BitbakeVersionAdmin) 36 admin.site.register(Release, ReleaseAdmin) 37 admin.site.register(ToasterSetting, ToasterSettingAdmin)
|
/openbmc/openbmc/meta-ibm/recipes-phosphor/images/ |
H A D | obmc-phosphor-image.bbappend | 21 # admin - Provides administrative control over the BMC. The role is 22 # SystemAdministrator. Admin users have access to interfaces including: 27 # The admin has access to the host console: ssh -p2200 admin@${bmc}. 28 # The admin account does not have a home directory. 31 # OemIBMServiceAgent. The service user has full admin access, plus access 51 # Add the "admin" account. 53 useradd --groups priv-admin,redfish,web -s /sbin/nologin admin; \ 54 usermod -p ${DEFAULT_OPENBMC_PASSWORD} admin; \ 59 useradd -M -d / --groups priv-admin,redfish,web,wheel service; \
|
/openbmc/openbmc-test-automation/security/ |
H A D | test_bmc_expire_password.robot | 194 Verify Expire And Change Admin User Password Via GUI 195 [Documentation] Force expire admin password and update admin password via GUI. 205 # Verify that admin user should not be able to login with expired password. 221 Expire Admin Password And Check IPMI Access Fails 222 [Documentation] Expire admin user password and expect an error while access via IPMI. 232 Verify Expire Admin Password And Update Bad Password Length Via Redfish 233 [Documentation] Expire admin password and update bad password with more than 20 characters 245 Verify Error While Creating User With Expired Admin Password 246 [Documentation] Expire admin password and expect an error while creating new user. 248 [Teardown] Restore Default Password For Admin User [all …]
|
/openbmc/openbmc/poky/bitbake/lib/toaster/toastermain/ |
H A D | urls.py | 18 # Uncomment the next two lines to enable the admin: 19 from django.contrib import admin 20 admin.autodiscover() 27 # Uncomment the admin/doc line below to enable admin documentation: 28 # url(r'^admin/doc/', include('django.contrib.admindocs.urls')), 55 # Uncomment the next line to enable the admin: 56 url(r'^admin/', admin.site.urls),
|
/openbmc/openbmc-test-automation/openpower/ext_interfaces/ |
H A D | test_vmicert_management.robot | 22 @{ADMIN} admin_user TestPwd123 variable 27 &{USERS} Administrator=${ADMIN} ReadOnly=${ReadOnly} 57 # Request root certificate from admin user. 149 Get Concurrent Root Certificate Requests From Multiple Admin Users 164 Get Concurrent CSR Requests From Multiple Admin Users 179 Get Concurrent Corrupted CSR Requests From Multiple Admin Users 196 …[Documentation] Get multiple concurrent root certificate from non admin users and verify no error… 211 Get Concurrent Root Certificate Request From Admin And Non Admin Users 212 [Documentation] Get multiple concurrent root certificate from admin and non admin users 227 Get Concurrent Root Certificate Request From Different Non Admin Users [all …]
|
H A D | test_client_identifier.robot | 76 Create Session For Non Admin User 77 [Documentation] Create Session for non-admin user. 79 [Template] Non Admin User To Create Session 141 Create A Non Admin Session With ClientID 161 Verify A Non Admin Session Created With ClientID 197 Non Admin User To Create Session 198 [Documentation] Non Admin user create a session and verify the session is created. 215 …${session_info}= Create A Non Admin Session With ClientID ${client_ids} ${username} ${password} 216 Verify A Non Admin Session Created With ClientID ${client_ids} ${session_info}
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/krb5/ |
H A D | krb5_1.21.3.bb | 29 file://etc/init.d/krb5-admin-server \ 31 file://etc/default/krb5-admin-server \ 33 file://krb5-admin-server.service \ 89 echo "RUN_KADMIND=true" >> ${D}/${sysconfdir}/default/krb5-admin-server 101 install -m 0644 ${UNPACKDIR}/krb5-admin-server.service ${D}${systemd_system_unitdir} 111 PACKAGE_BEFORE_PN =+ "${PN}-admin-server \ 136 FILES:${PN}-admin-server = "${sbindir}/kadmin.local \ 139 ${sysconfdir}/default/krb5-admin-server \ 140 ${sysconfdir}/init.d/krb5-admin-server \ 141 ${systemd_system_unitdir}/krb5-admin-server.service" [all …]
|
/openbmc/openbmc/poky/bitbake/lib/toaster/bldcontrol/ |
H A D | admin.py | 5 from django.contrib import admin 8 class BuildEnvironmentAdmin(admin.ModelAdmin): 11 admin.site.register(BuildEnvironment, BuildEnvironmentAdmin)
|
/openbmc/openbmc/meta-inventec/meta-starscream/recipes-phosphor/image/ |
H A D | obmc-phosphor-image.bbappend | 4 useradd -e '' -ou 0 -d /home/root -G priv-admin,root,sudo,ipmi,web,redfish -p 'gzW59equAcJAg' sysad… 5 useradd -e '' -ou 0 -d /home/root -G priv-admin,root,sudo,ipmi,web,redfish -p 'kFdHdjRkot8KQ' admin…
|
/openbmc/openbmc/meta-nvidia/meta-gb200nvl-obmc/recipes-phosphor/ipmi/phosphor-ipmi-config/ |
H A D | channel_access.json | 7 "priv_limit" : "priv-admin" 14 "priv_limit" : "priv-admin" 21 "priv_limit" : "priv-admin"
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_user_account.robot | 2 Documentation Test suite for verifying Redfish admin, readonly operation user accounts. 32 Verify Redfish Admin User Persistence After Reboot 33 [Documentation] Verify Redfish admin user persistence after reboot. 76 Redfish Create and Verify Admin User 103 Verify Redfish Admin User Login With Wrong Password 104 [Documentation] Verify Redfish create admin user with valid password and make sure 105 ... admin user failed to login with wrong password. 133 Verify Login with Deleted Redfish Admin User 134 [Documentation] Verify login with deleted Redfish admin user. 160 Verify Admin User Creation Without Enabling It [all …]
|
H A D | test_redfish_privilege_registry.robot | 3 ... such as test, admin, operator, readonly, patched. 11 Suite Teardown Delete Created Redfish Users Except Default Admin 127 Verify Admin User Privileges Via Redfish 128 [Documentation] Verify Admin user privileges via Redfish. 203 [Documentation] Create and verify admin, test, operator, and readonly users. 234 Delete Created Redfish Users Except Default Admin 235 [Documentation] Delete the admin, patched, operator, readonly, and post users.
|
/openbmc/openbmc/meta-inventec/meta-transformers/recipes-phosphor/image/ |
H A D | obmc-phosphor-image.bbappend | 2 useradd -e '' -ou 0 -d /home/root -G priv-admin,root,sudo,ipmi,web,redfish -p 'gzW59equAcJAg' sysad… 3 useradd -e '' -ou 0 -d /home/root -G priv-admin,root,sudo,ipmi,web,redfish -p 'kFdHdjRkot8KQ' admin…
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-extended/tgt/files/ |
H A D | tgtd.init | 22 tgt-admin -s >/dev/null 2>&1 42 tgt-admin -f -e -c $TGTD_CONFIG 54 tgt-admin --update ALL -c /dev/null &>/dev/null 74 tgt-admin --update ALL -c $TGTD_CONFIG &>/dev/null 84 tgt-admin -s >/dev/null 2>&1
|
H A D | tgtd.service | 16 ExecStartPost=@SBINDIR@/tgt-admin -e -c $TGTD_CONFIG 22 ExecReload=@SBINDIR@/tgt-admin --update ALL -c $TGTD_CONFIG 28 ExecStop=@SBINDIR@/tgt-admin --update ALL -c /dev/null
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/BIOSConfig/ |
H A D | Password.interface.yaml | 14 User name - user / admin. 18 Current user/ admin Password. 22 New user/ admin Password.
|
/openbmc/bmcweb/redfish-core/include/generated/enums/ |
H A D | storage_controller.hpp | 12 Admin, enumerator 27 {NVMeControllerType::Admin, "Admin"},
|
/openbmc/openbmc/poky/bitbake/bin/ |
H A D | bitbake-hashserv | 47 Setting "--anon-perms @all" or "--anon-perms @user-admin" is not allowed, since 62 @db-admin - Manage the hash database(s). This includes cleaning the 64 @user-admin - The ability to manage user accounts. This includes, creating 119 "--admin-user", 121 help="Create default admin user with name ADMIN_USER ($HASHSERVER_ADMIN_USER)", 124 "--admin-password", 126 help="Create default admin user with password ADMIN_PASSWORD ($HASHSERVER_ADMIN_PASSWORD)",
|
/openbmc/openbmc-test-automation/redfish/update_service/ |
H A D | test_redfish_bmc_code_update.robot | 38 @{ADMIN} admin_user TestPwd123 variable 39 &{USERS} Administrator=${ADMIN} 132 Verify If The Modified Admin Credential Is Valid Post Image Switched To Backup 133 [Documentation] Verify updated admin credential remain same post switch to back up image. 140 Expire And Update New Password Via Redfish ${ADMIN[0]} ${ADMIN[1]} 0penBmc123 147 # verify modified admin password on backup image. 152 Verify If The Modified Admin Credential Is Valid Post Update 153 [Documentation] Verify updated admin credential remain same post code update image. 158 Expire And Update New Password Via Redfish ${ADMIN[0]} ${ADMIN[1]} 0penBmc123 164 # verify modified admin credentials on latest image.
|
/openbmc/phosphor-host-ipmid/oem/nvidia/ |
H A D | bootstrap-credentials-oem-cmds.cpp | 199 ipmi::Privilege::Admin, ipmi::ipmiGetUsbVendorIdProductId); in registerBootstrapCredentialsOemCommands() 204 ipmi::Privilege::Admin, ipmi::ipmiGetUsbSerialNumber); in registerBootstrapCredentialsOemCommands() 209 ipmi::Privilege::Admin, ipmi::ipmiGetRedfishHostName); in registerBootstrapCredentialsOemCommands() 214 ipmi::Privilege::Admin, ipmi::ipmiGetIpmiChannelRfHi); in registerBootstrapCredentialsOemCommands() 219 ipmi::Privilege::Admin, ipmi::ipmiGetRedfishServiceUUID); in registerBootstrapCredentialsOemCommands() 224 ipmi::Privilege::Admin, ipmi::ipmiGetRedfishServicePort); in registerBootstrapCredentialsOemCommands()
|
/openbmc/openbmc/meta-google/recipes-google/default-users/ |
H A D | default-users.bb | 19 -G 'web,redfish,priv-admin' Megapede; " 20 GROUPMEMS_PARAM:${PN} = "-g priv-admin -a root; "
|
/openbmc/openbmc/meta-phosphor/classes/ |
H A D | phosphor-deploy-ssh-keys.bbclass | 55 is_group=`grep "priv-admin" ${IMAGE_ROOTFS}/etc/group || true` 58 perform_groupadd "${IMAGE_ROOTFS}" "-R ${IMAGE_ROOTFS} priv-admin" 61 perform_usermod "${IMAGE_ROOTFS}" "-R ${IMAGE_ROOTFS} -a -G priv-admin ${username}"
|