Home
last modified time | relevance | path

Searched full:ldap (Results 1 – 25 of 168) sorted by relevance

1234567

/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_ldap_configuration.robot2 Documentation Test Redfish LDAP user configuration.
12 Suite Teardown LDAP Suite Teardown Execution
26 Verify LDAP Configuration Created
27 [Documentation] Verify that LDAP configuration created.
30 Create LDAP Configuration
31 # Call 'Get LDAP Configuration' to verify that LDAP configuration exists.
32 Get LDAP Configuration ${LDAP_TYPE}
38 Verify Redfish LDAP Service Disable
39 [Documentation] Verify that LDAP is disabled and that LDAP user cannot
49 ... msg=LDAP user was able to login even though the LDAP service was disabled.
[all …]
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_ldap_sub_menu.robot3 Documentation Test OpenBMC GUI "LDAP" sub-menu of "Security and access".
15 ${xpath_ldap_heading} //h1[text()="LDAP"]
16 ${xpath_enable_ldap_checkbox} //*[@data-test-id='ldap-checkbox-ldapAuthenticationEnabled']
17 ${xpath_secure_ldap_checkbox} //*[@data-test-id='ldap-checkbox-secureLdapEnabled']
18 ${xpath_service_radio_button} //*[@data-test-id="ldap-radio-activeDirectoryEnabled"]
20 ${xpath_ldap_url} //*[@data-test-id='ldap-input-serverUri']
21 ${xpath_ldap_bind_dn} //*[@data-test-id='ldap-input-bindDn']
23 ${xpath_ldap_base_dn} //*[@data-test-id='ldap-input-baseDn']
24 ${xpath_ldap_save_settings} //*[@data-test-id='ldap-button-saveSettings']
38 Verify Navigation To LDAP Page
[all …]
/openbmc/openbmc-tools/openbmctool/
H A DREADME.md23 Important: After disabling local users, an LDAP user will need to be used for
106 ### Update LDAP client certificate
109 openbmctool <connection options> certificate update client ldap -f <File>
114 ### Update LDAP root certificate
117 openbmctool <connection options> certificate update authority ldap -f <File>
131 ### Delete LDAP client certificate
134 openbmctool <connection options> certificate delete client ldap
137 ### Delete LDAP root certificate
140 openbmctool <connection options> certificate delete authority ldap
143 Deleting the root certificate can cause an LDAP service outage. Please refer to
[all …]
/openbmc/openbmc-test-automation/lib/
H A Dbmc_ldap_utils.robot2 Documentation This module provides general keywords for LDAP.
6 Get LDAP Configuration Using Redfish
7 [Documentation] Retrieve LDAP Configuration.
11 # ldap_type The LDAP type ("ActiveDirectory" or "LDAP").
17 Get LDAP Privilege And Group Name Via Redfish
18 [Documentation] Get LDAP groupname via Redfish.
20 # Get LDAP configuration via Redfish.
21 # Sample output of LDAP configuration:
31 # 'Username': 'cn=Administrator,dc=ldap,dc=com',
39 # 'BaseDistinguishedNames': ['dc=ldap,dc=com'],
[all …]
/openbmc/phosphor-user-manager/docs/
H A DREADME.md12 ### LDAP Configuration
14 #### Configure LDAP
17ldap://<ldap://<LDAP server ip/hostname>/", "<bindDN>", "<baseDN>","<bindDNPassword>","<searchScop…
23 If the configured ldap server is secure then we need to upload the client
26 - First time LDAP configuration.
29 #### Upload LDAP Client Certificate
33 -X PUT -T <FILE> https://<BMC_IP>/xyz/openbmc_project/certs/client/ldap
43 #### Clear LDAP Config
46 …n/json" -X POST -d '{"data":[]}' https://$BMC_IP/xyz/openbmc_project/user/ldap/config/action/delete
49 #### Get LDAP Config
[all …]
/openbmc/phosphor-user-manager/test/
H A Dutils_test.cpp1 #include "phosphor-ldap-config/utils.hpp"
3 #include <ldap.h>
10 namespace ldap namespace
12 constexpr auto ldapScheme = "ldap";
26 std::string ipAddress = "ldap://0.0.0.0"; in TEST_F()
29 ipAddress = "ldap://9.3.185.83"; in TEST_F()
35 ipAddress = "ldap://9.3.a.83"; in TEST_F()
38 ipAddress = "ldap://9.3.185.a"; in TEST_F()
41 ipAddress = "ldap://x.x.x.x"; in TEST_F()
47 ipAddress = "ldap://0.0.0.0"; in TEST_F()
[all …]
H A Dldap_config_test.cpp3 #include "phosphor-ldap-config/ldap_config.hpp"
4 #include "phosphor-ldap-config/ldap_config_mgr.hpp"
21 namespace ldap namespace
24 namespace ldap_base = sdbusplus::xyz::openbmc_project::User::Ldap::server;
28 using Config = phosphor::ldap::Config;
36 using namespace phosphor::ldap; in SetUp()
70 class MockConfigMgr : public phosphor::ldap::ConfigMgr
76 phosphor::ldap::ConfigMgr(bus, path, filePath, dbusPersistentFile, in MockConfigMgr()
97 phosphor::ldap::ConfigMgr::restore(); in restore()
103 phosphor::ldap::ConfigMgr::createDefaultObjects(); in createDefaultObjects()
[all …]
/openbmc/phosphor-webui/app/access-control/controllers/
H A Dldap-controller.js2 * Controller for LDAP
35 const serviceEnabled = data.LDAP.ServiceEnabled ||
37 const ldapServiceEnabled = data.LDAP.ServiceEnabled;
70 getCertificate('/redfish/v1/AccountService/LDAP/Certificates');
89 * Save LDAP settings
91 * LDAP and ActiveDirectory changes can not be sent together when changing
92 * from ActiveDirectory to LDAP
99 enabledServiceType == 'LDAP' ? 'ActiveDirectory' : 'LDAP';
110 toastService.success('Successfully updated LDAP settings.');
115 // settings were saved. Reloading LDAP to make it clear
[all …]
H A Dldap-controller.html2 <div class="ldap" id="configuration-ldap">
4 <h1>LDAP</h1>
7 <p>Configure LDAP settings and manage role groups.</p>
16 <input type="checkbox" aria-labelledby="ldap-auth-label"
20 <span id="ldap-auth-label" class="control__label">
21 <strong>Enable LDAP authentication</strong> <br>
22 LDAP authentication must be enabled to modify role groups.
30 <legend class="screen-reader-offscreen">LDAP Settings</legend>
34 <input id="secure-ldap-ssl" aria-labelledby="use-ssl" type="checkbox"
39 <span class="control__label" id="use-ssl">Secure LDAP using SSL</span>
[all …]
/openbmc/phosphor-debug-collector/tools/dreport.d/plugins.d/
H A Dldapdump4 # @brief: Get the ldap configuration
12 desc="ldap configuration"
15 xyz.openbmc_project.Ldap.Config \
16 /xyz/openbmc_project/user/ldap/openldap \
21 xyz.openbmc_project.Ldap.Config \
22 /xyz/openbmc_project/user/ldap/active_directory \
28 "systemctl status xyz.openbmc_project.Ldap.Config"
29 "busctl tree xyz.openbmc_project.Ldap.Config"
30 "busctl call xyz.openbmc_project.Ldap.Config \
31 /xyz/openbmc_project/user/ldap \
[all …]
/openbmc/phosphor-user-manager/phosphor-ldap-config/
H A Dldap_config_mgr.hpp8 #include <xyz/openbmc_project/User/Ldap/Config/server.hpp>
9 #include <xyz/openbmc_project/User/Ldap/Create/server.hpp>
15 namespace ldap namespace
26 sdbusplus::xyz::openbmc_project::User::Ldap::server::Create>;
30 * @brief Creates LDAP server configuration.
31 * @details concrete implementation of xyz.openbmc_project.User.Ldap.Create
32 * APIs, in order to create LDAP configuration.
47 * @param[in] filePath - LDAP configuration file.
48 * @param[in] dbusPersistentPath - Persistent path for LDAP D-Bus property.
49 * @param[in] caCertFile - LDAP's CA certificate file.
[all …]
H A Dutils.hpp7 namespace ldap namespace
10 /** @brief checks that the given URI is valid LDAP's URI.
11 * LDAP's URL begins with "ldap://" and LDAPS's URL begins with "ldap://"
13 * @param[in] scheme - LDAP's scheme, scheme equals to "ldaps" to validate
14 * against LDAPS type URI, for LDAP type URI it is equals to "ldap".
19 } // namespace ldap
H A Dldap_config.hpp10 #include <xyz/openbmc_project/User/Ldap/Config/server.hpp>
11 #include <xyz/openbmc_project/User/Ldap/Create/server.hpp>
20 namespace ldap namespace
23 using ConfigIface = sdbusplus::xyz::openbmc_project::User::Ldap::server::Config;
26 sdbusplus::xyz::openbmc_project::User::Ldap::server::Create>;
41 * @brief Configuration for LDAP.
42 * @details concrete implementation of xyz.openbmc_project.User.Ldap.Config
43 * API, in order to provide LDAP configuration.
58 * @param[in] filePath - LDAP configuration file.
59 * @param[in] caCertFile - LDAP's CA certificate file.
[all …]
H A Dldap_mapper_serialize.hpp11 namespace ldap namespace
16 /** @brief Serialize and persist LDAP privilege mapper D-Bus object
18 * @param[in] entry - LDAP privilege mapper entry
19 * @param[in] path - pathname of persisted LDAP mapper entry
25 /** @brief Deserialize a persisted LDAP privilege mapper into a D-Bus object
28 * @param[in/out] entry - reference to LDAP privilege mapper entry object
35 } // namespace ldap
H A Dldap_mapper_entry.hpp10 namespace ldap namespace
26 * @brief This D-Bus object represents the privilege level for the LDAP group.
38 /** @brief Constructs LDAP privilege mapper entry object.
43 * @param[in] groupName - LDAP group name
45 * @param[in] parent - LDAP privilege mapper manager
51 /** @brief Constructs LDAP privilege mapper entry object
56 * @param[in] parent - LDAP privilege mapper manager
75 /** @brief Update privilege associated with LDAP group
97 } // namespace ldap
/openbmc/webui-vue/src/store/modules/SecurityAndAccess/
H A DLdapStore.js9 ldap: { class in LdapStore.state
30 ldap: (state) => state.ldap,
38 : 'ldap';
61 state.ldap.serviceAddress = ServiceAddresses[0];
62 state.ldap.serviceEnabled = ServiceEnabled;
63 state.ldap.baseDn = BaseDistinguishedNames[0];
64 state.ldap.bindDn = Authentication.Username;
65 state.ldap.userAttribute = UsernameAttribute;
66 state.ldap.groupsAttribute = GroupsAttribute;
67 state.ldap.roleGroups = RemoteRoleMapping;
[all …]
/openbmc/openbmc-test-automation/gui/test/access_control/
H A Dtest_obmc_gui_ldap.robot3 Documentation Test OpenBMC GUI "LDAP" sub-menu of "Access control".
14 ${xpath_enable_ldap_checkbox} //*[@id='ldap-auth-label']
16 ${xpath_openl_ldap_radio_button} //input[@id='open-ldap']
25 Verify Existence Of All Sections In LDAP Page
26 [Documentation] Verify existence of all sections in LDAP page.
33 Verify Existence Of All Buttons In LDAP Page
34 [Documentation] Verify existence of all buttons in LDAP page.
48 Verify Existence Of All Checkboxes In LDAP Page
49 [Documentation] Verify existence of all checkboxes in LDAP page.
66 Wait Until Page Contains Configure LDAP settings and manage role groups
/openbmc/phosphor-user-manager/
H A Dmeson.build25 description : 'Path of LDAP configuration file.')
28 description : 'Path of LDAP server CA certificate.')
31 description : 'Path of LDAP client certificate.')
33 conf_data.set_quoted('LDAP_CONFIG_ROOT', '/xyz/openbmc_project/user/ldap',
34 description : 'LDAP configuration root.')
36 conf_data.set_quoted('LDAP_CONFIG_DBUS_OBJ_PATH', '/xyz/openbmc_project/user/ldap/config',
37 description : 'D-Bus path of LDAP config object.')
39 conf_data.set_quoted('LDAP_CONFIG_BUSNAME', 'xyz.openbmc_project.Ldap.Config',
40 description : 'D-Bus busname of LDAP config service.')
42 conf_data.set_quoted('LDAP_CONF_PERSIST_PATH', '/var/lib/phosphor-ldap-conf',
[all …]
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/Ldap/
H A DConfig.interface.yaml2 Implement to update LDAP mandatory properties. Any service implementing
3 User.Ldap.Config interface on one or more objects must implement
10 Specifies the LDAP URI of the server to connect to.
30 update the service implementing the LDAP client.This is just to
33 the same, but once we find better way to update the ldap password we
53 OpenLdap. It's just an indication for the LDAP stack running on the
64 the name of the Group in the LDAP server.
69 the username in the LDAP server.
81 Possible LDAP Types.
H A DCreate.interface.yaml2 Implement to create LDAP name service daemon configuration file.
11 xyz/openbmc_project/User/Ldap/Config.interface.yaml.
16 Specifies the LDAP URI of the server to connect to.
39 OpenLdap. It's just an indication for the LDAP stack running on
46 in the LDAP server.
51 LDAP server.
74 Possible LDAP Types.
/openbmc/webui-vue/src/views/SecurityAndAccess/Ldap/
H A DLdap.vue15 data-test-id="ldap-checkbox-ldapAuthenticationEnabled"
40 id="enable-secure-ldap"
43 data-test-id="ldap-checkbox-secureLdapEnabled"
77 data-test-id="ldap-radio-activeDirectoryEnabled"
85 data-test-id="ldap-radio-activeDirectoryEnabled"
107 data-test-id="ldap-input-serverUri"
125 data-test-id="ldap-input-bindDn"
140 data-test-id="ldap-input-togglePassword"
164 data-test-id="ldap-input-baseDn"
184 data-test-id="ldap-input-userIdAttribute"
[all …]
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Ldap/
H A Dmeson.build5 sdbusplus_current_path = 'xyz/openbmc_project/User/Ldap'
8 'xyz/openbmc_project/User/Ldap/Config__markdown'.underscorify(),
9 input: [ '../../../../../yaml/xyz/openbmc_project/User/Ldap/Config.interface.yaml', ],
17 'xyz/openbmc_project/User/Ldap/Config',
25 'xyz/openbmc_project/User/Ldap/Create__markdown'.underscorify(),
26 input: [ '../../../../../yaml/xyz/openbmc_project/User/Ldap/Create.interface.yaml', ],
34 'xyz/openbmc_project/User/Ldap/Create',
/openbmc/openbmc/meta-phosphor/recipes-phosphor/users/
H A Dphosphor-user-manager_git.bb36 FILES:phosphor-ldap += " \
37 ${bindir}/phosphor-ldap-conf \
45 USERADD_PACKAGES = "${PN} phosphor-ldap"
48 PACKAGE_BEFORE_PN = "phosphor-ldap"
52 GROUPADD_PARAM:phosphor-ldap = "priv-admin; priv-operator; priv-user "
54 DBUS_SERVICE:phosphor-ldap = " \
55 xyz.openbmc_project.Ldap.Config.service \
/openbmc/openbmc-test-automation/
H A DREADME.md28 - LDAP (Lightweight Directory Access Protocol)
350 - Run LDAP tests:
352 Before using LDAP test functions, be sure appropriate LDAP user(s) and
353 group(s) have been created on your LDAP server. Note: There are multiple ways
354 to create LDAP users / groups and all depend on your LDAP server. One common
360 Note: Currently, LDAP test automation for Redfish API is in progress. The
361 format to invoke LDAP test is as follows:
365ldap(s)//LDAP Hostname / IP> -v LDAP_BIND_DN:<LDAP Bind DN> -v LDAP_BASE_DN:<LDAP Base DN> -v LDAP…
/openbmc/openbmc/meta-openembedded/meta-python/recipes-networking/python/
H A Dpython3-ldap_3.4.4.bb1 SUMMARY = "Provides a wrapper in Python to LDAP"
2 DESCRIPTION = "This module provides access to the LDAP \
6 HOMEPAGE = "http://www.python-ldap.org/"
12 PYPI_PACKAGE = "python-ldap"
21 -e 's/= ldap_r/= ldap/g' ${S}/setup.cfg

1234567