| /openbmc/phosphor-host-ipmid/oem/nvidia/ |
| H A D | bootstrap-credentials-oem-cmds.cpp | 198 ipmi::Privilege::Admin, ipmi::ipmiGetUsbVendorIdProductId); in registerBootstrapCredentialsOemCommands() 203 ipmi::Privilege::Admin, ipmi::ipmiGetUsbSerialNumber); in registerBootstrapCredentialsOemCommands() 208 ipmi::Privilege::Admin, ipmi::ipmiGetRedfishHostName); in registerBootstrapCredentialsOemCommands() 213 ipmi::Privilege::Admin, ipmi::ipmiGetIpmiChannelRfHi); in registerBootstrapCredentialsOemCommands() 218 ipmi::Privilege::Admin, ipmi::ipmiGetRedfishServiceUUID); in registerBootstrapCredentialsOemCommands() 223 ipmi::Privilege::Admin, ipmi::ipmiGetRedfishServicePort); in registerBootstrapCredentialsOemCommands()
|
| H A D | biosconfigcommands.cpp | 184 ipmi::Privilege::Admin, ipmi::ipmiSetBiosPassword); in registerBiosConfigCommands() 187 ipmi::Privilege::Admin, ipmi::ipmiGetBiosPassword); in registerBiosConfigCommands()
|
| /openbmc/bmcweb/redfish-core/include/generated/enums/ |
| H A D | storage_controller.hpp | 12 Admin, enumerator 27 {NVMeControllerType::Admin, "Admin"},
|
| /openbmc/openbmc-test-automation/openpower/ext_interfaces/ |
| H A D | test_client_identifier.robot | 76 Create Session For Non Admin User 79 [Template] Non Admin User To Create Session 141 Create A Non Admin Session With ClientID 161 Verify A Non Admin Session Created With ClientID 197 Non Admin User To Create Session 198 [Documentation] Non Admin user create a session and verify the session is created. 215 …${session_info}= Create A Non Admin Session With ClientID ${client_ids} ${username} ${password} 216 Verify A Non Admin Session Created With ClientID ${client_ids} ${session_info}
|
| H A D | test_vmicert_management.robot | 149 Get Concurrent Root Certificate Requests From Multiple Admin Users 164 Get Concurrent CSR Requests From Multiple Admin Users 179 Get Concurrent Corrupted CSR Requests From Multiple Admin Users 211 Get Concurrent Root Certificate Request From Admin And Non Admin Users 227 Get Concurrent Root Certificate Request From Different Non Admin Users 352 Send Concurrent CSR Request From Admin And Non Admin Users And Verify 368 Send Concurrent CSR Request From Non Admin Users And Verify 383 Get Root Certificate And Send Corrupted CSR From Admin CSR Request From Operator Concurrently 400 Get Root Certificate From Operator And Send Corrupted CSR Request And CSR Request From Admin Concur… 417 Get Root Certificate From Operator And Admin Send CSR Request From Admin Concurrently [all …]
|
| H A D | test_savearea_management.robot | 218 Non Admin Users Fail To Upload Partition File 221 [Template] Non Admin User To Upload Partition File 227 Non Admin User Delete Non Existence Of Partition File 230 [Template] Non Admin Delete Non Existence Partition File 787 Non Admin User To Upload Partition File 808 Non Admin Delete Non Existence Partition File
|
| /openbmc/phosphor-host-ipmid/ |
| H A D | systemintfcmds.cpp | 157 ipmi::Privilege::Admin, ipmiAppReadEventBuffer); in registerNetFnAppFunctions() 162 ipmi::Privilege::Admin, ipmiAppSetBMCGlobalEnable); in registerNetFnAppFunctions() 171 ipmi::app::cmdGetMessageFlags, ipmi::Privilege::Admin, in registerNetFnAppFunctions()
|
| H A D | globalhandler.cpp | 49 ipmi::app::cmdColdReset, ipmi::Privilege::Admin, in registerNetFnGlobalFunctions()
|
| H A D | ipmid-new.cpp | 548 privilege = Privilege::Admin; in executionEntry() 712 realPriv = ipmi::Privilege::Admin; in ipmi_register_callback() 718 realPriv = ipmi::Privilege::Admin; in ipmi_register_callback() 721 realPriv = ipmi::Privilege::Admin; in ipmi_register_callback() 754 ipmi::Privilege::Admin, h); in registerHandler() 781 bus, netFn, lun, cmd, 0, 0, 0, ipmi::Privilege::Admin, 0, 0, in handleLegacyIpmiCommand()
|
| H A D | sbmrhandler.cpp | 307 ipmi::Privilege::Admin, ipmi::sendBootProgressCode); in registerNetfnSBMRFunctions()
|
| /openbmc/openbmc-test-automation/security/ |
| H A D | test_bmc_expire_password.robot | 194 Verify Expire And Change Admin User Password Via GUI 221 Expire Admin Password And Check IPMI Access Fails 232 Verify Expire Admin Password And Update Bad Password Length Via Redfish 245 Verify Error While Creating User With Expired Admin Password 248 [Teardown] Restore Default Password For Admin User 261 Verify New Admin Password Persistency After BMC Reboot 265 [Teardown] Restore Default Password For Admin User 278 Expire And Change Admin User Password Via Redfish And Verify 282 [Teardown] Restore Default Password For Admin User 296 Verify Maximum Failed Attempts For Admin User And Check Account Locked [all …]
|
| /openbmc/openbmc/meta-security/recipes-ids/suricata/ |
| H A D | suricata.inc | 2 SECTION = "security Monitor/Admin"
|
| /openbmc/phosphor-host-ipmid/user_channel/ |
| H A D | usercommands.cpp | 658 ipmi::Privilege::Admin, ipmiSetUserAccess); in registerUserIpmiFunctions() 662 ipmi::Privilege::Admin, ipmiGetUserAccess); in registerUserIpmiFunctions() 666 ipmi::Privilege::Admin, ipmiGetUserName); in registerUserIpmiFunctions() 669 ipmi::app::cmdSetUserName, ipmi::Privilege::Admin, in registerUserIpmiFunctions() 674 ipmi::Privilege::Admin, ipmiSetUserPassword); in registerUserIpmiFunctions() 683 ipmi::Privilege::Admin, ipmiSetUserPayloadAccess); in registerUserIpmiFunctions()
|
| /openbmc/openbmc/meta-openembedded/meta-webserver/recipes-webadmin/webmin/files/ |
| H A D | webmin.service | 2 Description=Webmin Admin Tool
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/librdkafka/ |
| H A D | librdkafka_1.8.2.bb | 3 providing Producer, Consumer and Admin clients."
|
| /openbmc/intel-ipmi-oem/src/ |
| H A D | firmware-update.cpp | 1706 ipmi::Privilege::Admin, ipmiGetFwVersionInfo); in registerFirmwareFunctions() 1711 ipmi::Privilege::Admin, ipmiGetFwSecurityVersionInfo); in registerFirmwareFunctions() 1716 ipmi::Privilege::Admin, ipmiGetFwRootCertData); in registerFirmwareFunctions() 1722 ipmi::Privilege::Admin, ipmiFirmwareMaxTransferSize); in registerFirmwareFunctions() 1727 ipmi::Privilege::Admin, ipmiGetBmcExecutionContext); in registerFirmwareFunctions() 1732 ipmi::Privilege::Admin, ipmiGetFwUpdateRandomNumber); in registerFirmwareFunctions() 1737 ipmi::Privilege::Admin, ipmiSetFirmwareUpdateMode); in registerFirmwareFunctions() 1742 ipmi::Privilege::Admin, ipmiExitFirmwareUpdateMode); in registerFirmwareFunctions() 1747 ipmi::Privilege::Admin, in registerFirmwareFunctions() 1753 ipmi::Privilege::Admin, ipmiGetFirmwareUpdateStatus); in registerFirmwareFunctions() [all …]
|
| H A D | manufacturingcommands.cpp | 1597 ipmi::Privilege::Admin, ipmi::appMTMGetSignal); in register_mtm_commands() 1601 ipmi::Privilege::Admin, ipmi::appMTMSetSignal); in register_mtm_commands() 1605 ipmi::Privilege::Admin, ipmi::mtmKeepAlive); in register_mtm_commands() 1609 ipmi::Privilege::Admin, ipmi::setManufacturingData); in register_mtm_commands() 1613 ipmi::Privilege::Admin, ipmi::getManufacturingData); in register_mtm_commands() 1617 ipmi::Privilege::Admin, ipmi::setFITcLayout); in register_mtm_commands() 1621 ipmi::Privilege::Admin, ipmi::mtmBMCFeatureControl); in register_mtm_commands() 1625 ipmi::Privilege::Admin, in register_mtm_commands() 1630 ipmi::Privilege::Admin, ipmi::clearCMOS); in register_mtm_commands()
|
| H A D | bmccontrolservices.cpp | 206 intel::general::cmdControlBmcServices, Privilege::Admin, in register_netfn_bmc_control_functions()
|
| /openbmc/openbmc-test-automation/redfish/account_service/ |
| H A D | test_redfish_privilege_registry.robot | 11 Suite Teardown Delete Created Redfish Users Except Default Admin 127 Verify Admin User Privileges Via Redfish 128 [Documentation] Verify Admin user privileges via Redfish. 234 Delete Created Redfish Users Except Default Admin
|
| H A D | test_user_account.robot | 32 Verify Redfish Admin And ReadOnly Users Persistence After Reboot 65 Redfish Create and Verify Admin User 92 Verify Redfish Admin User Login With Wrong Password 122 Verify Login with Deleted Redfish Admin User 149 Verify Admin User Creation Without Enabling It 336 Verify Admin User Privilege 360 Verify Operator User Role Change Using Admin Privilege User 429 Verify History Password For Redfish Admin And Readonly User 439 Verify Minimum Password Length For Redfish Admin And Readonly User 495 Verify SSH Login Access With Admin User [all …]
|
| /openbmc/ipmi-fru-parser/ |
| H A D | strgfnhandler.cpp | 93 ipmi::Privilege::Admin, ipmiStorageWriteFruData); in registerNetFnStorageWriteFru()
|
| /openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-freezegun/ |
| H A D | 1777174bb97c0b514033a09b820078b0d117f4a8.patch | 4 Subject: [PATCH] Admin: Support Python 3.13
|
| /openbmc/docs/designs/ |
| H A D | nmi-dbus-interface.md | 23 Whenever the host is unresponsive/running, Admin needs to trigger an NMI event 60 2. Admin/User can use the Redfish URI ComputerSystem.Reset that allows POST
|
| /openbmc/openbmc/meta-security/recipes-ids/tripwire/ |
| H A D | tripwire_2.4.3.7.bb | 5 SECTION = "security Monitor/Admin"
|
| /openbmc/openbmc/meta-ibm/recipes-phosphor/images/ |
| H A D | obmc-phosphor-image.bbappend | 22 # SystemAdministrator. Admin users have access to interfaces including:
|