Home
last modified time | relevance | path

Searched refs:Admin (Results 1 – 25 of 46) sorted by relevance

12

/openbmc/phosphor-host-ipmid/oem/nvidia/
H A Dbootstrap-credentials-oem-cmds.cpp198 ipmi::Privilege::Admin, ipmi::ipmiGetUsbVendorIdProductId); in registerBootstrapCredentialsOemCommands()
203 ipmi::Privilege::Admin, ipmi::ipmiGetUsbSerialNumber); in registerBootstrapCredentialsOemCommands()
208 ipmi::Privilege::Admin, ipmi::ipmiGetRedfishHostName); in registerBootstrapCredentialsOemCommands()
213 ipmi::Privilege::Admin, ipmi::ipmiGetIpmiChannelRfHi); in registerBootstrapCredentialsOemCommands()
218 ipmi::Privilege::Admin, ipmi::ipmiGetRedfishServiceUUID); in registerBootstrapCredentialsOemCommands()
223 ipmi::Privilege::Admin, ipmi::ipmiGetRedfishServicePort); in registerBootstrapCredentialsOemCommands()
H A Dbiosconfigcommands.cpp184 ipmi::Privilege::Admin, ipmi::ipmiSetBiosPassword); in registerBiosConfigCommands()
187 ipmi::Privilege::Admin, ipmi::ipmiGetBiosPassword); in registerBiosConfigCommands()
/openbmc/bmcweb/redfish-core/include/generated/enums/
H A Dstorage_controller.hpp12 Admin, enumerator
27 {NVMeControllerType::Admin, "Admin"},
/openbmc/openbmc-test-automation/openpower/ext_interfaces/
H A Dtest_client_identifier.robot76 Create Session For Non Admin User
79 [Template] Non Admin User To Create Session
141 Create A Non Admin Session With ClientID
161 Verify A Non Admin Session Created With ClientID
197 Non Admin User To Create Session
198 [Documentation] Non Admin user create a session and verify the session is created.
215 …${session_info}= Create A Non Admin Session With ClientID ${client_ids} ${username} ${password}
216 Verify A Non Admin Session Created With ClientID ${client_ids} ${session_info}
H A Dtest_vmicert_management.robot149 Get Concurrent Root Certificate Requests From Multiple Admin Users
164 Get Concurrent CSR Requests From Multiple Admin Users
179 Get Concurrent Corrupted CSR Requests From Multiple Admin Users
211 Get Concurrent Root Certificate Request From Admin And Non Admin Users
227 Get Concurrent Root Certificate Request From Different Non Admin Users
352 Send Concurrent CSR Request From Admin And Non Admin Users And Verify
368 Send Concurrent CSR Request From Non Admin Users And Verify
383 Get Root Certificate And Send Corrupted CSR From Admin CSR Request From Operator Concurrently
400 Get Root Certificate From Operator And Send Corrupted CSR Request And CSR Request From Admin Concur…
417 Get Root Certificate From Operator And Admin Send CSR Request From Admin Concurrently
[all …]
H A Dtest_savearea_management.robot218 Non Admin Users Fail To Upload Partition File
221 [Template] Non Admin User To Upload Partition File
227 Non Admin User Delete Non Existence Of Partition File
230 [Template] Non Admin Delete Non Existence Partition File
787 Non Admin User To Upload Partition File
808 Non Admin Delete Non Existence Partition File
/openbmc/phosphor-host-ipmid/
H A Dsystemintfcmds.cpp157 ipmi::Privilege::Admin, ipmiAppReadEventBuffer); in registerNetFnAppFunctions()
162 ipmi::Privilege::Admin, ipmiAppSetBMCGlobalEnable); in registerNetFnAppFunctions()
171 ipmi::app::cmdGetMessageFlags, ipmi::Privilege::Admin, in registerNetFnAppFunctions()
H A Dglobalhandler.cpp49 ipmi::app::cmdColdReset, ipmi::Privilege::Admin, in registerNetFnGlobalFunctions()
H A Dipmid-new.cpp548 privilege = Privilege::Admin; in executionEntry()
712 realPriv = ipmi::Privilege::Admin; in ipmi_register_callback()
718 realPriv = ipmi::Privilege::Admin; in ipmi_register_callback()
721 realPriv = ipmi::Privilege::Admin; in ipmi_register_callback()
754 ipmi::Privilege::Admin, h); in registerHandler()
781 bus, netFn, lun, cmd, 0, 0, 0, ipmi::Privilege::Admin, 0, 0, in handleLegacyIpmiCommand()
H A Dsbmrhandler.cpp307 ipmi::Privilege::Admin, ipmi::sendBootProgressCode); in registerNetfnSBMRFunctions()
/openbmc/openbmc-test-automation/security/
H A Dtest_bmc_expire_password.robot194 Verify Expire And Change Admin User Password Via GUI
221 Expire Admin Password And Check IPMI Access Fails
232 Verify Expire Admin Password And Update Bad Password Length Via Redfish
245 Verify Error While Creating User With Expired Admin Password
248 [Teardown] Restore Default Password For Admin User
261 Verify New Admin Password Persistency After BMC Reboot
265 [Teardown] Restore Default Password For Admin User
278 Expire And Change Admin User Password Via Redfish And Verify
282 [Teardown] Restore Default Password For Admin User
296 Verify Maximum Failed Attempts For Admin User And Check Account Locked
[all …]
/openbmc/openbmc/meta-security/recipes-ids/suricata/
H A Dsuricata.inc2 SECTION = "security Monitor/Admin"
/openbmc/phosphor-host-ipmid/user_channel/
H A Dusercommands.cpp658 ipmi::Privilege::Admin, ipmiSetUserAccess); in registerUserIpmiFunctions()
662 ipmi::Privilege::Admin, ipmiGetUserAccess); in registerUserIpmiFunctions()
666 ipmi::Privilege::Admin, ipmiGetUserName); in registerUserIpmiFunctions()
669 ipmi::app::cmdSetUserName, ipmi::Privilege::Admin, in registerUserIpmiFunctions()
674 ipmi::Privilege::Admin, ipmiSetUserPassword); in registerUserIpmiFunctions()
683 ipmi::Privilege::Admin, ipmiSetUserPayloadAccess); in registerUserIpmiFunctions()
/openbmc/openbmc/meta-openembedded/meta-webserver/recipes-webadmin/webmin/files/
H A Dwebmin.service2 Description=Webmin Admin Tool
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/librdkafka/
H A Dlibrdkafka_1.8.2.bb3 providing Producer, Consumer and Admin clients."
/openbmc/intel-ipmi-oem/src/
H A Dfirmware-update.cpp1706 ipmi::Privilege::Admin, ipmiGetFwVersionInfo); in registerFirmwareFunctions()
1711 ipmi::Privilege::Admin, ipmiGetFwSecurityVersionInfo); in registerFirmwareFunctions()
1716 ipmi::Privilege::Admin, ipmiGetFwRootCertData); in registerFirmwareFunctions()
1722 ipmi::Privilege::Admin, ipmiFirmwareMaxTransferSize); in registerFirmwareFunctions()
1727 ipmi::Privilege::Admin, ipmiGetBmcExecutionContext); in registerFirmwareFunctions()
1732 ipmi::Privilege::Admin, ipmiGetFwUpdateRandomNumber); in registerFirmwareFunctions()
1737 ipmi::Privilege::Admin, ipmiSetFirmwareUpdateMode); in registerFirmwareFunctions()
1742 ipmi::Privilege::Admin, ipmiExitFirmwareUpdateMode); in registerFirmwareFunctions()
1747 ipmi::Privilege::Admin, in registerFirmwareFunctions()
1753 ipmi::Privilege::Admin, ipmiGetFirmwareUpdateStatus); in registerFirmwareFunctions()
[all …]
H A Dmanufacturingcommands.cpp1597 ipmi::Privilege::Admin, ipmi::appMTMGetSignal); in register_mtm_commands()
1601 ipmi::Privilege::Admin, ipmi::appMTMSetSignal); in register_mtm_commands()
1605 ipmi::Privilege::Admin, ipmi::mtmKeepAlive); in register_mtm_commands()
1609 ipmi::Privilege::Admin, ipmi::setManufacturingData); in register_mtm_commands()
1613 ipmi::Privilege::Admin, ipmi::getManufacturingData); in register_mtm_commands()
1617 ipmi::Privilege::Admin, ipmi::setFITcLayout); in register_mtm_commands()
1621 ipmi::Privilege::Admin, ipmi::mtmBMCFeatureControl); in register_mtm_commands()
1625 ipmi::Privilege::Admin, in register_mtm_commands()
1630 ipmi::Privilege::Admin, ipmi::clearCMOS); in register_mtm_commands()
H A Dbmccontrolservices.cpp206 intel::general::cmdControlBmcServices, Privilege::Admin, in register_netfn_bmc_control_functions()
/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_redfish_privilege_registry.robot11 Suite Teardown Delete Created Redfish Users Except Default Admin
127 Verify Admin User Privileges Via Redfish
128 [Documentation] Verify Admin user privileges via Redfish.
234 Delete Created Redfish Users Except Default Admin
H A Dtest_user_account.robot32 Verify Redfish Admin And ReadOnly Users Persistence After Reboot
65 Redfish Create and Verify Admin User
92 Verify Redfish Admin User Login With Wrong Password
122 Verify Login with Deleted Redfish Admin User
149 Verify Admin User Creation Without Enabling It
336 Verify Admin User Privilege
360 Verify Operator User Role Change Using Admin Privilege User
429 Verify History Password For Redfish Admin And Readonly User
439 Verify Minimum Password Length For Redfish Admin And Readonly User
495 Verify SSH Login Access With Admin User
[all …]
/openbmc/ipmi-fru-parser/
H A Dstrgfnhandler.cpp93 ipmi::Privilege::Admin, ipmiStorageWriteFruData); in registerNetFnStorageWriteFru()
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-freezegun/
H A D1777174bb97c0b514033a09b820078b0d117f4a8.patch4 Subject: [PATCH] Admin: Support Python 3.13
/openbmc/docs/designs/
H A Dnmi-dbus-interface.md23 Whenever the host is unresponsive/running, Admin needs to trigger an NMI event
60 2. Admin/User can use the Redfish URI ComputerSystem.Reset that allows POST
/openbmc/openbmc/meta-security/recipes-ids/tripwire/
H A Dtripwire_2.4.3.7.bb5 SECTION = "security Monitor/Admin"
/openbmc/openbmc/meta-ibm/recipes-phosphor/images/
H A Dobmc-phosphor-image.bbappend22 # SystemAdministrator. Admin users have access to interfaces including:

12