/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_ldap_configuration.robot | 2 Documentation Test Redfish LDAP user configuration. 12 Suite Teardown LDAP Suite Teardown Execution 26 Verify LDAP Configuration Created 27 [Documentation] Verify that LDAP configuration created. 30 Create LDAP Configuration 31 # Call 'Get LDAP Configuration' to verify that LDAP configuration exists. 32 Get LDAP Configuration ${LDAP_TYPE} 38 Verify Redfish LDAP Service Disable 39 [Documentation] Verify that LDAP is disabled and that LDAP user cannot 49 ... msg=LDAP user was able to login even though the LDAP service was disabled. [all …]
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_ldap_sub_menu.robot | 3 Documentation Test OpenBMC GUI "LDAP" sub-menu of "Security and access". 15 ${xpath_ldap_heading} //h1[text()="LDAP"] 16 ${xpath_enable_ldap_checkbox} //*[@data-test-id='ldap-checkbox-ldapAuthenticationEnabled'] 17 ${xpath_secure_ldap_checkbox} //*[@data-test-id='ldap-checkbox-secureLdapEnabled'] 18 ${xpath_service_radio_button} //*[@data-test-id="ldap-radio-activeDirectoryEnabled"] 20 ${xpath_ldap_url} //*[@data-test-id='ldap-input-serverUri'] 21 ${xpath_ldap_bind_dn} //*[@data-test-id='ldap-input-bindDn'] 23 ${xpath_ldap_base_dn} //*[@data-test-id='ldap-input-baseDn'] 24 ${xpath_ldap_save_settings} //*[@data-test-id='ldap-button-saveSettings'] 38 Verify Navigation To LDAP Page [all …]
|
/openbmc/openbmc-tools/openbmctool/ |
H A D | README.md | 23 Important: After disabling local users, an LDAP user will need to be used for 106 ### Update LDAP client certificate 109 openbmctool <connection options> certificate update client ldap -f <File> 114 ### Update LDAP root certificate 117 openbmctool <connection options> certificate update authority ldap -f <File> 131 ### Delete LDAP client certificate 134 openbmctool <connection options> certificate delete client ldap 137 ### Delete LDAP root certificate 140 openbmctool <connection options> certificate delete authority ldap 143 Deleting the root certificate can cause an LDAP service outage. Please refer to [all …]
|
/openbmc/openbmc-test-automation/lib/ |
H A D | bmc_ldap_utils.robot | 2 Documentation This module provides general keywords for LDAP. 6 Get LDAP Configuration Using Redfish 7 [Documentation] Retrieve LDAP Configuration. 11 # ldap_type The LDAP type ("ActiveDirectory" or "LDAP"). 17 Get LDAP Privilege And Group Name Via Redfish 18 [Documentation] Get LDAP groupname via Redfish. 20 # Get LDAP configuration via Redfish. 21 # Sample output of LDAP configuration: 31 # 'Username': 'cn=Administrator,dc=ldap,dc=com', 39 # 'BaseDistinguishedNames': ['dc=ldap,dc=com'], [all …]
|
/openbmc/phosphor-user-manager/docs/ |
H A D | README.md | 12 ### LDAP Configuration 14 #### Configure LDAP 17 …ldap://<ldap://<LDAP server ip/hostname>/", "<bindDN>", "<baseDN>","<bindDNPassword>","<searchScop… 23 If the configured ldap server is secure then we need to upload the client 26 - First time LDAP configuration. 29 #### Upload LDAP Client Certificate 33 -X PUT -T <FILE> https://<BMC_IP>/xyz/openbmc_project/certs/client/ldap 43 #### Clear LDAP Config 46 …n/json" -X POST -d '{"data":[]}' https://$BMC_IP/xyz/openbmc_project/user/ldap/config/action/delete 49 #### Get LDAP Config [all …]
|
/openbmc/phosphor-user-manager/test/ |
H A D | utils_test.cpp | 1 #include "phosphor-ldap-config/utils.hpp" 3 #include <ldap.h> 10 namespace ldap namespace 12 constexpr auto ldapScheme = "ldap"; 26 std::string ipAddress = "ldap://0.0.0.0"; in TEST_F() 29 ipAddress = "ldap://9.3.185.83"; in TEST_F() 35 ipAddress = "ldap://9.3.a.83"; in TEST_F() 38 ipAddress = "ldap://9.3.185.a"; in TEST_F() 41 ipAddress = "ldap://x.x.x.x"; in TEST_F() 47 ipAddress = "ldap://0.0.0.0"; in TEST_F() [all …]
|
H A D | ldap_config_test.cpp | 3 #include "phosphor-ldap-config/ldap_config.hpp" 4 #include "phosphor-ldap-config/ldap_config_mgr.hpp" 21 namespace ldap namespace 24 namespace ldap_base = sdbusplus::xyz::openbmc_project::User::Ldap::server; 28 using Config = phosphor::ldap::Config; 36 using namespace phosphor::ldap; in SetUp() 70 class MockConfigMgr : public phosphor::ldap::ConfigMgr 76 phosphor::ldap::ConfigMgr(bus, path, filePath, dbusPersistentFile, in MockConfigMgr() 97 phosphor::ldap::ConfigMgr::restore(); in restore() 103 phosphor::ldap::ConfigMgr::createDefaultObjects(); in createDefaultObjects() [all …]
|
/openbmc/phosphor-webui/app/access-control/controllers/ |
H A D | ldap-controller.js | 2 * Controller for LDAP 35 const serviceEnabled = data.LDAP.ServiceEnabled || 37 const ldapServiceEnabled = data.LDAP.ServiceEnabled; 70 getCertificate('/redfish/v1/AccountService/LDAP/Certificates'); 89 * Save LDAP settings 91 * LDAP and ActiveDirectory changes can not be sent together when changing 92 * from ActiveDirectory to LDAP 99 enabledServiceType == 'LDAP' ? 'ActiveDirectory' : 'LDAP'; 110 toastService.success('Successfully updated LDAP settings.'); 115 // settings were saved. Reloading LDAP to make it clear [all …]
|
H A D | ldap-controller.html | 2 <div class="ldap" id="configuration-ldap"> 4 <h1>LDAP</h1> 7 <p>Configure LDAP settings and manage role groups.</p> 16 <input type="checkbox" aria-labelledby="ldap-auth-label" 20 <span id="ldap-auth-label" class="control__label"> 21 <strong>Enable LDAP authentication</strong> <br> 22 LDAP authentication must be enabled to modify role groups. 30 <legend class="screen-reader-offscreen">LDAP Settings</legend> 34 <input id="secure-ldap-ssl" aria-labelledby="use-ssl" type="checkbox" 39 <span class="control__label" id="use-ssl">Secure LDAP using SSL</span> [all …]
|
/openbmc/phosphor-debug-collector/tools/dreport.d/plugins.d/ |
H A D | ldapdump | 4 # @brief: Get the ldap configuration 12 desc="ldap configuration" 15 xyz.openbmc_project.Ldap.Config \ 16 /xyz/openbmc_project/user/ldap/openldap \ 21 xyz.openbmc_project.Ldap.Config \ 22 /xyz/openbmc_project/user/ldap/active_directory \ 28 "systemctl status xyz.openbmc_project.Ldap.Config" 29 "busctl tree xyz.openbmc_project.Ldap.Config" 30 "busctl call xyz.openbmc_project.Ldap.Config \ 31 /xyz/openbmc_project/user/ldap \ [all …]
|
/openbmc/phosphor-user-manager/phosphor-ldap-config/ |
H A D | ldap_config_mgr.hpp | 8 #include <xyz/openbmc_project/User/Ldap/Config/server.hpp> 9 #include <xyz/openbmc_project/User/Ldap/Create/server.hpp> 15 namespace ldap namespace 26 sdbusplus::xyz::openbmc_project::User::Ldap::server::Create>; 30 * @brief Creates LDAP server configuration. 31 * @details concrete implementation of xyz.openbmc_project.User.Ldap.Create 32 * APIs, in order to create LDAP configuration. 47 * @param[in] filePath - LDAP configuration file. 48 * @param[in] dbusPersistentPath - Persistent path for LDAP D-Bus property. 49 * @param[in] caCertFile - LDAP's CA certificate file. [all …]
|
H A D | utils.hpp | 7 namespace ldap namespace 10 /** @brief checks that the given URI is valid LDAP's URI. 11 * LDAP's URL begins with "ldap://" and LDAPS's URL begins with "ldap://" 13 * @param[in] scheme - LDAP's scheme, scheme equals to "ldaps" to validate 14 * against LDAPS type URI, for LDAP type URI it is equals to "ldap". 19 } // namespace ldap
|
H A D | ldap_config.hpp | 10 #include <xyz/openbmc_project/User/Ldap/Config/server.hpp> 11 #include <xyz/openbmc_project/User/Ldap/Create/server.hpp> 20 namespace ldap namespace 23 using ConfigIface = sdbusplus::xyz::openbmc_project::User::Ldap::server::Config; 26 sdbusplus::xyz::openbmc_project::User::Ldap::server::Create>; 41 * @brief Configuration for LDAP. 42 * @details concrete implementation of xyz.openbmc_project.User.Ldap.Config 43 * API, in order to provide LDAP configuration. 58 * @param[in] filePath - LDAP configuration file. 59 * @param[in] caCertFile - LDAP's CA certificate file. [all …]
|
H A D | ldap_mapper_serialize.hpp | 11 namespace ldap namespace 16 /** @brief Serialize and persist LDAP privilege mapper D-Bus object 18 * @param[in] entry - LDAP privilege mapper entry 19 * @param[in] path - pathname of persisted LDAP mapper entry 25 /** @brief Deserialize a persisted LDAP privilege mapper into a D-Bus object 28 * @param[in/out] entry - reference to LDAP privilege mapper entry object 35 } // namespace ldap
|
H A D | ldap_mapper_entry.hpp | 10 namespace ldap namespace 26 * @brief This D-Bus object represents the privilege level for the LDAP group. 38 /** @brief Constructs LDAP privilege mapper entry object. 43 * @param[in] groupName - LDAP group name 45 * @param[in] parent - LDAP privilege mapper manager 51 /** @brief Constructs LDAP privilege mapper entry object 56 * @param[in] parent - LDAP privilege mapper manager 75 /** @brief Update privilege associated with LDAP group 97 } // namespace ldap
|
/openbmc/webui-vue/src/store/modules/SecurityAndAccess/ |
H A D | LdapStore.js | 9 ldap: { class in LdapStore.state 30 ldap: (state) => state.ldap, 38 : 'ldap'; 61 state.ldap.serviceAddress = ServiceAddresses[0]; 62 state.ldap.serviceEnabled = ServiceEnabled; 63 state.ldap.baseDn = BaseDistinguishedNames[0]; 64 state.ldap.bindDn = Authentication.Username; 65 state.ldap.userAttribute = UsernameAttribute; 66 state.ldap.groupsAttribute = GroupsAttribute; 67 state.ldap.roleGroups = RemoteRoleMapping; [all …]
|
/openbmc/openbmc-test-automation/gui/test/access_control/ |
H A D | test_obmc_gui_ldap.robot | 3 Documentation Test OpenBMC GUI "LDAP" sub-menu of "Access control". 14 ${xpath_enable_ldap_checkbox} //*[@id='ldap-auth-label'] 16 ${xpath_openl_ldap_radio_button} //input[@id='open-ldap'] 25 Verify Existence Of All Sections In LDAP Page 26 [Documentation] Verify existence of all sections in LDAP page. 33 Verify Existence Of All Buttons In LDAP Page 34 [Documentation] Verify existence of all buttons in LDAP page. 48 Verify Existence Of All Checkboxes In LDAP Page 49 [Documentation] Verify existence of all checkboxes in LDAP page. 66 Wait Until Page Contains Configure LDAP settings and manage role groups
|
/openbmc/phosphor-user-manager/ |
H A D | meson.build | 25 description : 'Path of LDAP configuration file.') 28 description : 'Path of LDAP server CA certificate.') 31 description : 'Path of LDAP client certificate.') 33 conf_data.set_quoted('LDAP_CONFIG_ROOT', '/xyz/openbmc_project/user/ldap', 34 description : 'LDAP configuration root.') 36 conf_data.set_quoted('LDAP_CONFIG_DBUS_OBJ_PATH', '/xyz/openbmc_project/user/ldap/config', 37 description : 'D-Bus path of LDAP config object.') 39 conf_data.set_quoted('LDAP_CONFIG_BUSNAME', 'xyz.openbmc_project.Ldap.Config', 40 description : 'D-Bus busname of LDAP config service.') 42 conf_data.set_quoted('LDAP_CONF_PERSIST_PATH', '/var/lib/phosphor-ldap-conf', [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/Ldap/ |
H A D | Config.interface.yaml | 2 Implement to update LDAP mandatory properties. Any service implementing 3 User.Ldap.Config interface on one or more objects must implement 10 Specifies the LDAP URI of the server to connect to. 30 update the service implementing the LDAP client.This is just to 33 the same, but once we find better way to update the ldap password we 53 OpenLdap. It's just an indication for the LDAP stack running on the 64 the name of the Group in the LDAP server. 69 the username in the LDAP server. 81 Possible LDAP Types.
|
H A D | Create.interface.yaml | 2 Implement to create LDAP name service daemon configuration file. 11 xyz/openbmc_project/User/Ldap/Config.interface.yaml. 16 Specifies the LDAP URI of the server to connect to. 39 OpenLdap. It's just an indication for the LDAP stack running on 46 in the LDAP server. 51 LDAP server. 74 Possible LDAP Types.
|
/openbmc/webui-vue/src/views/SecurityAndAccess/Ldap/ |
H A D | Ldap.vue | 15 data-test-id="ldap-checkbox-ldapAuthenticationEnabled" 40 id="enable-secure-ldap" 43 data-test-id="ldap-checkbox-secureLdapEnabled" 77 data-test-id="ldap-radio-activeDirectoryEnabled" 85 data-test-id="ldap-radio-activeDirectoryEnabled" 107 data-test-id="ldap-input-serverUri" 125 data-test-id="ldap-input-bindDn" 140 data-test-id="ldap-input-togglePassword" 164 data-test-id="ldap-input-baseDn" 184 data-test-id="ldap-input-userIdAttribute" [all …]
|
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Ldap/ |
H A D | meson.build | 5 sdbusplus_current_path = 'xyz/openbmc_project/User/Ldap' 8 'xyz/openbmc_project/User/Ldap/Config__markdown'.underscorify(), 9 input: [ '../../../../../yaml/xyz/openbmc_project/User/Ldap/Config.interface.yaml', ], 17 'xyz/openbmc_project/User/Ldap/Config', 25 'xyz/openbmc_project/User/Ldap/Create__markdown'.underscorify(), 26 input: [ '../../../../../yaml/xyz/openbmc_project/User/Ldap/Create.interface.yaml', ], 34 'xyz/openbmc_project/User/Ldap/Create',
|
/openbmc/openbmc/meta-phosphor/recipes-phosphor/users/ |
H A D | phosphor-user-manager_git.bb | 36 FILES:phosphor-ldap += " \ 37 ${bindir}/phosphor-ldap-conf \ 45 USERADD_PACKAGES = "${PN} phosphor-ldap" 48 PACKAGE_BEFORE_PN = "phosphor-ldap" 52 GROUPADD_PARAM:phosphor-ldap = "priv-admin; priv-operator; priv-user " 54 DBUS_SERVICE:phosphor-ldap = " \ 55 xyz.openbmc_project.Ldap.Config.service \
|
/openbmc/openbmc-test-automation/ |
H A D | README.md | 28 - LDAP (Lightweight Directory Access Protocol) 350 - Run LDAP tests: 352 Before using LDAP test functions, be sure appropriate LDAP user(s) and 353 group(s) have been created on your LDAP server. Note: There are multiple ways 354 to create LDAP users / groups and all depend on your LDAP server. One common 360 Note: Currently, LDAP test automation for Redfish API is in progress. The 361 format to invoke LDAP test is as follows: 365 …ldap(s)//LDAP Hostname / IP> -v LDAP_BIND_DN:<LDAP Bind DN> -v LDAP_BASE_DN:<LDAP Base DN> -v LDAP…
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-networking/python/ |
H A D | python3-ldap_3.4.4.bb | 1 SUMMARY = "Provides a wrapper in Python to LDAP" 2 DESCRIPTION = "This module provides access to the LDAP \ 6 HOMEPAGE = "http://www.python-ldap.org/" 12 PYPI_PACKAGE = "python-ldap" 21 -e 's/= ldap_r/= ldap/g' ${S}/setup.cfg
|