Home
last modified time | relevance | path

Searched refs:Admin (Results 1 – 25 of 55) sorted by relevance

123

/openbmc/openbmc-test-automation/openpower/ext_interfaces/
H A Dtest_client_identifier.robot76 Create Session For Non Admin User
79 [Template] Non Admin User To Create Session
140 Create A Non Admin Session With ClientID
160 Verify A Non Admin Session Created With ClientID
196 Non Admin User To Create Session
197 [Documentation] Non Admin user create a session and verify the session is created.
214 …${session_info}= Create A Non Admin Session With ClientID ${client_ids} ${username} ${password}
215 Verify A Non Admin Session Created With ClientID ${client_ids} ${session_info}
H A Dtest_vmicert_management.robot149 Get Concurrent Root Certificate Requests From Multiple Admin Users
164 Get Concurrent CSR Requests From Multiple Admin Users
179 Get Concurrent Corrupted CSR Requests From Multiple Admin Users
211 Get Concurrent Root Certificate Request From Admin And Non Admin Users
227 Get Concurrent Root Certificate Request From Different Non Admin Users
352 Send Concurrent CSR Request From Admin And Non Admin Users And Verify
368 Send Concurrent CSR Request From Non Admin Users And Verify
383 Get Root Certificate And Send Corrupted CSR From Admin CSR Request From Operator Concurrently
400 Get Root Certificate From Operator And Send Corrupted CSR Request And CSR Request From Admin Concur…
417 Get Root Certificate From Operator And Admin Send CSR Request From Admin Concurrently
[all …]
H A Dtest_savearea_management.robot218 Non Admin Users Fail To Upload Partition File
221 [Template] Non Admin User To Upload Partition File
227 Non Admin User Delete Non Existence Of Partition File
230 [Template] Non Admin Delete Non Existence Partition File
780 Non Admin User To Upload Partition File
801 Non Admin Delete Non Existence Partition File
/openbmc/bmcweb/redfish-core/include/generated/enums/
H A Dstorage_controller.hpp12 Admin, enumerator
27 {NVMeControllerType::Admin, "Admin"},
/openbmc/linux/Documentation/ABI/testing/
H A Dsysfs-class-firmware-attributes159 For example a "BIOS Admin" password and "System" Password can be set,
162 - An "Admin" password is used for preventing modification to the BIOS
217 Note, password management is session specific. If Admin password is set,
229 On Dell, Lenovo and HP systems, if Admin password is set, then all BIOS attributes
231 On Lenovo systems if you change the Admin password the new password is not active until
281 echo "supervisor password" > authentication/Admin/current_password
282 echo "signed certificate" > authentication/Admin/certificate
286 echo "signature" > authentication/Admin/signature
287 echo "signed certificate" > authentication/Admin/certificate
291 echo "signature" > authentication/Admin/signature
[all …]
/openbmc/openbmc-test-automation/security/
H A Dtest_bmc_expire_password.robot194 Verify Expire And Change Admin User Password Via GUI
221 Expire Admin Password And Check IPMI Access Fails
232 Verify Expire Admin Password And Update Bad Password Length Via Redfish
245 Verify Error While Creating User With Expired Admin Password
248 [Teardown] Restore Default Password For Admin User
261 Verify New Admin Password Persistency After BMC Reboot
265 [Teardown] Restore Default Password For Admin User
278 Expire And Change Admin User Password Via Redfish And Verify
282 [Teardown] Restore Default Password For Admin User
296 Verify Maximum Failed Attempts For Admin User And Check Account Locked
[all …]
/openbmc/phosphor-host-ipmid/
H A Dsystemintfcmds.cpp157 ipmi::Privilege::Admin, ipmiAppReadEventBuffer); in registerNetFnAppFunctions()
162 ipmi::Privilege::Admin, ipmiAppSetBMCGlobalEnable); in registerNetFnAppFunctions()
171 ipmi::app::cmdGetMessageFlags, ipmi::Privilege::Admin, in registerNetFnAppFunctions()
H A Dipmid-new.cpp545 privilege = Privilege::Admin; in executionEntry()
709 realPriv = ipmi::Privilege::Admin; in ipmi_register_callback()
715 realPriv = ipmi::Privilege::Admin; in ipmi_register_callback()
718 realPriv = ipmi::Privilege::Admin; in ipmi_register_callback()
751 ipmi::Privilege::Admin, h); in registerHandler()
778 bus, netFn, lun, cmd, 0, 0, 0, ipmi::Privilege::Admin, 0, 0, in handleLegacyIpmiCommand()
H A Dglobalhandler.cpp51 ipmi::app::cmdColdReset, ipmi::Privilege::Admin, in registerNetFnGlobalFunctions()
/openbmc/phosphor-host-ipmid/user_channel/
H A Dusercommands.cpp646 ipmi::Privilege::Admin, ipmiSetUserAccess); in registerUserIpmiFunctions()
650 ipmi::Privilege::Admin, ipmiGetUserAccess); in registerUserIpmiFunctions()
654 ipmi::Privilege::Admin, ipmiGetUserName); in registerUserIpmiFunctions()
657 ipmi::app::cmdSetUserName, ipmi::Privilege::Admin, in registerUserIpmiFunctions()
662 ipmi::Privilege::Admin, ipmiSetUserPassword); in registerUserIpmiFunctions()
671 ipmi::Privilege::Admin, ipmiSetUserPayloadAccess); in registerUserIpmiFunctions()
/openbmc/intel-ipmi-oem/src/
H A Dfirmware-update.cpp1706 ipmi::Privilege::Admin, ipmiGetFwVersionInfo); in registerFirmwareFunctions()
1711 ipmi::Privilege::Admin, ipmiGetFwSecurityVersionInfo); in registerFirmwareFunctions()
1716 ipmi::Privilege::Admin, ipmiGetFwRootCertData); in registerFirmwareFunctions()
1722 ipmi::Privilege::Admin, ipmiFirmwareMaxTransferSize); in registerFirmwareFunctions()
1727 ipmi::Privilege::Admin, ipmiGetBmcExecutionContext); in registerFirmwareFunctions()
1732 ipmi::Privilege::Admin, ipmiGetFwUpdateRandomNumber); in registerFirmwareFunctions()
1737 ipmi::Privilege::Admin, ipmiSetFirmwareUpdateMode); in registerFirmwareFunctions()
1742 ipmi::Privilege::Admin, ipmiExitFirmwareUpdateMode); in registerFirmwareFunctions()
1747 ipmi::Privilege::Admin, in registerFirmwareFunctions()
1753 ipmi::Privilege::Admin, ipmiGetFirmwareUpdateStatus); in registerFirmwareFunctions()
[all …]
H A Dmanufacturingcommands.cpp1593 ipmi::Privilege::Admin, ipmi::appMTMGetSignal); in register_mtm_commands()
1597 ipmi::Privilege::Admin, ipmi::appMTMSetSignal); in register_mtm_commands()
1601 ipmi::Privilege::Admin, ipmi::mtmKeepAlive); in register_mtm_commands()
1605 ipmi::Privilege::Admin, ipmi::setManufacturingData); in register_mtm_commands()
1609 ipmi::Privilege::Admin, ipmi::getManufacturingData); in register_mtm_commands()
1613 ipmi::Privilege::Admin, ipmi::setFITcLayout); in register_mtm_commands()
1617 ipmi::Privilege::Admin, ipmi::mtmBMCFeatureControl); in register_mtm_commands()
1621 ipmi::Privilege::Admin, in register_mtm_commands()
1626 ipmi::Privilege::Admin, ipmi::clearCMOS); in register_mtm_commands()
H A Dbmccontrolservices.cpp206 intel::general::cmdControlBmcServices, Privilege::Admin, in register_netfn_bmc_control_functions()
/openbmc/openbmc/meta-security/recipes-ids/suricata/
H A Dsuricata.inc2 SECTION = "security Monitor/Admin"
/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_redfish_privilege_registry.robot11 Suite Teardown Delete Created Redfish Users Except Default Admin
125 Verify Admin User Privileges Via Redfish
126 [Documentation] Verify Admin user privileges via Redfish.
232 Delete Created Redfish Users Except Default Admin
H A Dtest_user_account.robot31 Verify Redfish Admin User Persistence After Reboot
76 Redfish Create and Verify Admin User
103 Verify Redfish Admin User With Wrong Password
130 Verify Login with Deleted Redfish Admin User
157 Verify Admin User Creation Without Enabling It
337 Verify Admin User Privilege
360 Verify Operator User Role Change Using Admin Privilege User
509 Verify SSH Login Access With Admin User
/openbmc/linux/Documentation/networking/device_drivers/ethernet/google/
H A Dgve.rst41 - Admin Queue
73 - Admin Queue messages and registers are all Big Endian.
77 Admin Queue (AQ)
79 The Admin Queue is a PAGE_SIZE memory block, treated as an array of AQ
/openbmc/openbmc/meta-openembedded/meta-webserver/recipes-webadmin/webmin/files/
H A Dwebmin.service2 Description=Webmin Admin Tool
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/librdkafka/
H A Dlibrdkafka_1.8.2.bb3 providing Producer, Consumer and Admin clients."
/openbmc/fb-ipmi-oem/src/
H A Dgroupextcommands.cpp72 ipmi::Privilege::Admin, ipmiSBMRSendBootProgress); in registerSBMRFunctions()
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-freezegun/
H A D1777174bb97c0b514033a09b820078b0d117f4a8.patch4 Subject: [PATCH] Admin: Support Python 3.13
/openbmc/docs/designs/
H A Dnmi-dbus-interface.md23 Whenever the host is unresponsive/running, Admin needs to trigger an NMI event
60 2. Admin/User can use the Redfish URI ComputerSystem.Reset that allows POST
/openbmc/linux/drivers/net/ethernet/marvell/octeontx2/
H A DKconfig10 tristate "Marvell OcteonTX2 RVU Admin Function driver"
/openbmc/linux/Documentation/networking/device_drivers/ethernet/amazon/
H A Dena.rst15 through an Admin Queue.
26 is advertised by the device via the Admin Queue), a dedicated MSI-X
68 - Admin Queue (AQ) and Admin Completion Queue (ACQ)
/openbmc/linux/drivers/block/zram/
H A DKconfig86 of zRAM. Admin could see the information via

123