Home
last modified time | relevance | path

Searched refs:LDAP (Results 1 – 25 of 45) sorted by relevance

12

/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_ldap_configuration.robot2 Documentation Test Redfish LDAP user configuration.
12 Suite Teardown LDAP Suite Teardown Execution
26 Verify LDAP Configuration Created
27 [Documentation] Verify that LDAP configuration created.
30 Create LDAP Configuration
31 # Call 'Get LDAP Configuration' to verify that LDAP configuration exists.
32 Get LDAP Configuration ${LDAP_TYPE}
38 Verify Redfish LDAP Service Disable
39 [Documentation] Verify that LDAP is disabled and that LDAP user cannot
50 ... msg=LDAP user was able to login even though the LDAP service was disabled.
[all …]
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_ldap_sub_menu.robot3 Documentation Test OpenBMC GUI "LDAP" sub-menu of "Security and access".
15 ${xpath_ldap_heading} //h1[text()="LDAP"]
38 Verify Navigation To LDAP Page
39 [Documentation] Verify navigation to LDAP page.
45 Verify Existence Of All Sections In LDAP Page
46 [Documentation] Verify existence of all sections in LDAP page.
53 Verify Existence Of All Buttons In LDAP Page
54 [Documentation] Verify existence of all buttons in LDAP page.
65 Verify Existence Of All Checkboxes In LDAP Page
66 [Documentation] Verify existence of all checkboxes in LDAP page.
[all …]
H A Dtest_multiple_interfaces.robot45 [Documentation] Verify ability to load LDAP certificate using eth1 IP address.
74 # (e.g. "LDAP Certificate" or "CA Certificate").
95 Select From List By Label ${xpath_certificate_type} LDAP Certificate
108 Wait Until Page Contains Successfully added LDAP Certificate.
H A Dtest_certificates_sub_menu.robot105 Verify Delete Button Should Be Disabled For HTTPS And LDAP Certificates
106 [Documentation] Verify delete buttons should be disabled for HTTPS and LDAP certificates.
143 Verify Installed LDAP Certificate
144 [Documentation] Install LDAP certificate via Redfish and verify it in GUI.
150 # Install LDAP certificate.
157 Wait Until Page Contains LDAP Certificate timeout=10
/openbmc/openbmc-test-automation/lib/
H A Dbmc_ldap_utils.robot2 Documentation This module provides general keywords for LDAP.
6 Get LDAP Configuration Using Redfish
7 [Documentation] Retrieve LDAP Configuration.
11 # ldap_type The LDAP type ("ActiveDirectory" or "LDAP").
17 Get LDAP Privilege And Group Name Via Redfish
18 [Documentation] Get LDAP groupname via Redfish.
20 # Get LDAP configuration via Redfish.
21 # Sample output of LDAP configuration:
47 # '@odata.id': u'/redfish/v1/AccountService/LDAP/Certificates'
52 ${ldap_config}= Get LDAP Configuration Using Redfish ${LDAP_TYPE}
[all …]
/openbmc/openbmc-tools/openbmctool/
H A DREADME.md23 Important: After disabling local users, an LDAP user will need to be used for
106 ### Update LDAP client certificate
114 ### Update LDAP root certificate
131 ### Delete LDAP client certificate
137 ### Delete LDAP root certificate
143 Deleting the root certificate can cause an LDAP service outage. Please refer to
144 the LDAP documentation before using this command.
146 ## BMC LDAP Configuration
148 In BMC, LDAP is used for remote authentication. BMC doesn't support remote
151 BMC supports secure/non-secure LDAP configuration.
[all …]
/openbmc/phosphor-user-manager/docs/
H A DREADME.md12 ### LDAP Configuration
14 #### Configure LDAP
17 …ntent-Type: application/json" -X POST -d '{"data":[false,"ldap://<ldap://<LDAP server ip/hostname>…
26 - First time LDAP configuration.
29 #### Upload LDAP Client Certificate
43 #### Clear LDAP Config
49 #### Get LDAP Config
/openbmc/webui-vue/src/store/modules/SecurityAndAccess/
H A DLdapStore.js98 .then(({ data: { LDAP = {}, ActiveDirectory = {} } }) => { property in AnonymousClassb567187a0401.data
99 const ldapEnabled = LDAP.ServiceEnabled;
103 commit('setLdapProperties', LDAP);
109 const data = { LDAP: properties }; property in LdapStore.actions.saveLdapSettings.data
132 LDAP: { ServiceEnabled: false }, class in AnonymousClassb567187a0801
202 data.LDAP = { RemoteRoleMapping };
234 data.LDAP = { RemoteRoleMapping };
263 data.LDAP = { RemoteRoleMapping };
/openbmc/phosphor-user-manager/
H A Dmeson.build35 description: 'Path of LDAP configuration file.',
41 description: 'Path of LDAP server CA certificate.',
47 description: 'Path of LDAP client certificate.',
53 description: 'LDAP configuration root.',
59 description: 'D-Bus path of LDAP config object.',
65 description: 'D-Bus busname of LDAP config service.',
71 description: 'path of directory having persisted LDAP configuration enabled property.',
H A Dmeson.options3 option('ldap', type: 'feature', description: 'Enable LDAP support')
/openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/libnet/
H A Dlibnet-ldap-perl_0.68.bb1 SUMMARY = "LDAP Perl module"
2 DESCRIPTION = "Net::LDAP is a collection of modules that implements \
3 a LDAP services API for Perl programs. The module may be used to \
/openbmc/openbmc-test-automation/
H A DREADME.md28 - LDAP (Lightweight Directory Access Protocol)
316 - Run LDAP tests via robot CLI interface:
318 Before using LDAP test functions, be sure appropriate LDAP user(s) and
319 group(s) have been created on your LDAP server. Note: There are multiple ways
320 to create LDAP users / groups and all depend on your LDAP server. One common
326 The format to invoke LDAP test is as follows:
330LDAP Hostname / IP> -v LDAP_BIND_DN:<LDAP Bind DN> -v LDAP_BASE_DN:<LDAP Base DN> -v LDAP_BIND_DN_…
/openbmc/phosphor-webui/app/access-control/controllers/
H A Dldap-controller.js35 const serviceEnabled = data.LDAP.ServiceEnabled ||
37 const ldapServiceEnabled = data.LDAP.ServiceEnabled;
188 if (ldapProperties.LDAP.ServiceEnabled) {
321 LDAP: property in AnonymousFunctionbae13d9f0200.createLdapEnableRequest.ldapRequest
342 ldapRequest = {LDAP: {ServiceEnabled}}; property in AnonymousFunctionbae13d9f0200.createLdapDisableRequest.ldapRequest
/openbmc/openbmc/meta-phosphor/recipes-support/nss-pam-ldapd/
H A Dnss-pam-ldapd_0.9.13.bb1 SUMMARY = "NSS and PAM module for using LDAP as a naming service"
3 daemon for NSS and PAM lookups using LDAP \
5 system information from LDAP. It is used by the libnss-ldapd and \
/openbmc/openbmc/meta-openembedded/meta-python/recipes-networking/python/
H A Dpython3-ldap_3.4.4.bb1 SUMMARY = "Provides a wrapper in Python to LDAP"
2 DESCRIPTION = "This module provides access to the LDAP \
/openbmc/openbmc/meta-ibm/recipes-extended/pam/libpam/pam.d/
H A Dcommon-auth7 # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the
12 # Skip google_authenticator for LDAP users (uid=-1)
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/openldap/openldap/
H A Dslapd.service2 Description=Standalone LDAP Daemon
/openbmc/openbmc/meta-phosphor/recipes-support/nss-pam-ldapd/files/
H A Dnslcd.service2 Description=LDAP daemon
/openbmc/openbmc-test-automation/redfish/managers/
H A Dtest_multiple_interfaces.robot66 Verify LDAP Login Works When Eth1 IP Is Not Configured
67 [Documentation] Verify LDAP login works when eth1 IP is erased.
74 Create LDAP Configuration
80 Verify LDAP Login Works When Both Interfaces Are Configured
81 [Documentation] Verify LDAP login works when both interfaces are configured.
84 Create LDAP Configuration
90 Verify Secure LDAP Login Works When Both Interfaces Are Configured
91 [Documentation] Verify Secure LDAP login works when both the interfaces are configured.
94 Create LDAP Configuration ${LDAP_TYPE} ${LDAP_SERVER_URI_1} ${LDAP_BIND_DN}
/openbmc/docs/architecture/
H A Duser-management.md154 | | (LDAP / NIS / KRB5) | |
440 ## LDAP section in User Management - OpenBMC - Design document
443 authenticate against an LDAP directory. IPMI interface cannot be used to
444 authenticate against LDAP, since IPMI needs the password in clear text at the
447 In OpenBMC, PAM based authentication is implemented, so for both LDAP users and
450 For the LDAP user accounts, there is no LDAP attribute type that corresponds to
451 the OpenBMC privilege roles. The preferred way is to group LDAP user accounts
452 into LDAP groups. D-Bus API is provided for the user to assign privilege role to
453 the LDAP group.
459 object for the local users. For the LDAP user accounts, the privilege role will
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/
H A Dpam-plugin-ldapdb_1.3.1.bb1 SUMMARY = "PAM searchless LDAP authentication module"
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/
H A Dpython3-pyasn1-modules_0.4.2.bb3 classes. Includes protocols PDUs definition (SNMP, LDAP etc.) and various\
/openbmc/phosphor-certificate-manager/
H A DREADME.md46 ### LDAP client certificate management
48 **Purpose:** LDAP client certificate validation
/openbmc/openbmc/poky/meta/recipes-extended/pam/libpam/pam.d/
H A Dcommon-auth7 # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the
/openbmc/openbmc-test-automation/openpower/
H A Dtest_inband_bmc_auth_reset.robot6 # - Delete the LDAP configuration if there was one.

12