Home
last modified time | relevance | path

Searched refs:LDAP (Results 1 – 25 of 44) sorted by relevance

12

/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_ldap_configuration.robot2 Documentation Test Redfish LDAP user configuration.
12 Suite Teardown LDAP Suite Teardown Execution
26 Verify LDAP Configuration Created
27 [Documentation] Verify that LDAP configuration created.
30 Create LDAP Configuration
31 # Call 'Get LDAP Configuration' to verify that LDAP configuration exists.
32 Get LDAP Configuration ${LDAP_TYPE}
38 Verify Redfish LDAP Service Disable
39 [Documentation] Verify that LDAP is disabled and that LDAP user cannot
49 ... msg=LDAP user was able to login even though the LDAP service was disabled.
[all …]
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_ldap_sub_menu.robot3 Documentation Test OpenBMC GUI "LDAP" sub-menu of "Security and access".
15 ${xpath_ldap_heading} //h1[text()="LDAP"]
38 Verify Navigation To LDAP Page
39 [Documentation] Verify navigation to LDAP page.
45 Verify Existence Of All Sections In LDAP Page
46 [Documentation] Verify existence of all sections in LDAP page.
53 Verify Existence Of All Buttons In LDAP Page
54 [Documentation] Verify existence of all buttons in LDAP page.
65 Verify Existence Of All Checkboxes In LDAP Page
66 [Documentation] Verify existence of all checkboxes in LDAP page.
[all …]
H A Dtest_multiple_interfaces.robot45 [Documentation] Verify ability to load LDAP certificate using eth1 IP address.
74 # (e.g. "LDAP Certificate" or "CA Certificate").
93 ... Select From List By Label ${xpath_certificate_type} LDAP Certificate
103 ... Wait Until Page Contains Successfully added LDAP Certificate.
H A Dtest_certificates_sub_menu.robot107 Verify Installed LDAP Certificate
108 [Documentation] Install LDAP certificate via Redfish and verify it in GUI.
114 # Install LDAP certificate.
121 Wait Until Page Contains LDAP Certificate timeout=10
/openbmc/openbmc-test-automation/lib/
H A Dbmc_ldap_utils.robot2 Documentation This module provides general keywords for LDAP.
6 Get LDAP Configuration Using Redfish
7 [Documentation] Retrieve LDAP Configuration.
11 # ldap_type The LDAP type ("ActiveDirectory" or "LDAP").
17 Get LDAP Privilege And Group Name Via Redfish
18 [Documentation] Get LDAP groupname via Redfish.
20 # Get LDAP configuration via Redfish.
21 # Sample output of LDAP configuration:
47 # '@odata.id': u'/redfish/v1/AccountService/LDAP/Certificates'
52 ${ldap_config}= Get LDAP Configuration Using Redfish ${LDAP_TYPE}
[all …]
/openbmc/openbmc-tools/openbmctool/
H A DREADME.md23 Important: After disabling local users, an LDAP user will need to be used for
106 ### Update LDAP client certificate
114 ### Update LDAP root certificate
131 ### Delete LDAP client certificate
137 ### Delete LDAP root certificate
143 Deleting the root certificate can cause an LDAP service outage. Please refer to
144 the LDAP documentation before using this command.
146 ## BMC LDAP Configuration
148 In BMC, LDAP is used for remote authentication. BMC doesn't support remote
151 BMC supports secure/non-secure LDAP configuration.
[all …]
/openbmc/openbmc-test-automation/gui/test/access_control/
H A Dtest_obmc_gui_ldap.robot3 Documentation Test OpenBMC GUI "LDAP" sub-menu of "Access control".
25 Verify Existence Of All Sections In LDAP Page
26 [Documentation] Verify existence of all sections in LDAP page.
33 Verify Existence Of All Buttons In LDAP Page
34 [Documentation] Verify existence of all buttons in LDAP page.
48 Verify Existence Of All Checkboxes In LDAP Page
49 [Documentation] Verify existence of all checkboxes in LDAP page.
66 Wait Until Page Contains Configure LDAP settings and manage role groups
/openbmc/phosphor-user-manager/docs/
H A DREADME.md12 ### LDAP Configuration
14 #### Configure LDAP
17 …ntent-Type: application/json" -X POST -d '{"data":[false,"ldap://<ldap://<LDAP server ip/hostname>…
26 - First time LDAP configuration.
29 #### Upload LDAP Client Certificate
43 #### Clear LDAP Config
49 #### Get LDAP Config
/openbmc/webui-vue/src/store/modules/SecurityAndAccess/
H A DLdapStore.js98 .then(({ data: { LDAP = {}, ActiveDirectory = {} } }) => { property in AnonymousClassb567187a0401.data
99 const ldapEnabled = LDAP.ServiceEnabled;
103 commit('setLdapProperties', LDAP);
109 const data = { LDAP: properties }; property in LdapStore.actions.saveLdapSettings.data
132 LDAP: { ServiceEnabled: false }, class in AnonymousClassb567187a0801
202 data.LDAP = { RemoteRoleMapping };
234 data.LDAP = { RemoteRoleMapping };
261 data.LDAP = { RemoteRoleMapping };
/openbmc/phosphor-user-manager/
H A Dmeson.build35 description: 'Path of LDAP configuration file.',
41 description: 'Path of LDAP server CA certificate.',
47 description: 'Path of LDAP client certificate.',
53 description: 'LDAP configuration root.',
59 description: 'D-Bus path of LDAP config object.',
65 description: 'D-Bus busname of LDAP config service.',
71 description: 'path of directory having persisted LDAP configuration enabled property.',
/openbmc/openbmc-test-automation/
H A DREADME.md28 - LDAP (Lightweight Directory Access Protocol)
350 - Run LDAP tests:
352 Before using LDAP test functions, be sure appropriate LDAP user(s) and
353 group(s) have been created on your LDAP server. Note: There are multiple ways
354 to create LDAP users / groups and all depend on your LDAP server. One common
360 Note: Currently, LDAP test automation for Redfish API is in progress. The
361 format to invoke LDAP test is as follows:
365LDAP Hostname / IP> -v LDAP_BIND_DN:<LDAP Bind DN> -v LDAP_BASE_DN:<LDAP Base DN> -v LDAP_BIND_DN_…
/openbmc/phosphor-webui/app/access-control/controllers/
H A Dldap-controller.js35 const serviceEnabled = data.LDAP.ServiceEnabled ||
37 const ldapServiceEnabled = data.LDAP.ServiceEnabled;
188 if (ldapProperties.LDAP.ServiceEnabled) {
321 LDAP: property in AnonymousFunctionbae13d9f0200.createLdapEnableRequest.ldapRequest
342 ldapRequest = {LDAP: {ServiceEnabled}}; property in AnonymousFunctionbae13d9f0200.createLdapDisableRequest.ldapRequest
/openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/libnet/
H A Dlibnet-ldap-perl_0.68.bb1 SUMMARY = "LDAP Perl module"
2 DESCRIPTION = "Net::LDAP is a collection of modules that implements \
3 a LDAP services API for Perl programs. The module may be used to \
/openbmc/openbmc/meta-phosphor/recipes-support/nss-pam-ldapd/
H A Dnss-pam-ldapd_0.9.8.bb1 SUMMARY = "NSS and PAM module for using LDAP as a naming service"
3 daemon for NSS and PAM lookups using LDAP \
5 system information from LDAP. It is used by the libnss-ldapd and \
/openbmc/openbmc/meta-openembedded/meta-python/recipes-networking/python/
H A Dpython3-ldap_3.4.4.bb1 SUMMARY = "Provides a wrapper in Python to LDAP"
2 DESCRIPTION = "This module provides access to the LDAP \
/openbmc/docs/architecture/
H A Duser-management.md154 | | (LDAP / NIS / KRB5) | |
440 ## LDAP section in User Management - OpenBMC - Design document
443 authenticate against an LDAP directory. IPMI interface cannot be used to
444 authenticate against LDAP, since IPMI needs the password in clear text at the
447 In OpenBMC, PAM based authentication is implemented, so for both LDAP users and
450 For the LDAP user accounts, there is no LDAP attribute type that corresponds to
451 the OpenBMC privilege roles. The preferred way is to group LDAP user accounts
452 into LDAP groups. D-Bus API is provided for the user to assign privilege role to
453 the LDAP group.
459 object for the local users. For the LDAP user accounts, the privilege role will
[all …]
/openbmc/openbmc-test-automation/redfish/managers/
H A Dtest_multiple_interfaces.robot64 Verify LDAP Login Works When Eth1 IP Is Not Configured
65 [Documentation] Verify LDAP login works when eth1 IP is erased.
72 Create LDAP Configuration
78 Verify LDAP Login Works When Both Interfaces Are Configured
79 [Documentation] Verify LDAP login works when both interfaces are configured.
82 Create LDAP Configuration
88 Verify Secure LDAP Login Works When Both Interfaces Are Configured
89 [Documentation] Verify Secure LDAP login works when both the interfaces are configured.
92 Create LDAP Configuration ${LDAP_TYPE} ${LDAP_SERVER_URI_1} ${LDAP_BIND_DN}
/openbmc/openbmc/meta-ibm/recipes-extended/pam/libpam/pam.d/
H A Dcommon-auth7 # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the
12 # Skip google_authenticator for LDAP users (uid=-1)
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/openldap/openldap/
H A Dslapd.service2 Description=Standalone LDAP Daemon
/openbmc/openbmc/meta-phosphor/recipes-support/nss-pam-ldapd/files/
H A Dnslcd.service2 Description=LDAP daemon
/openbmc/phosphor-certificate-manager/
H A DREADME.md46 ### LDAP client certificate management
48 **Purpose:** LDAP client certificate validation
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/
H A Dpam-plugin-ldapdb_1.3.1.bb1 SUMMARY = "PAM searchless LDAP authentication module"
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/
H A Dpython3-pyasn1-modules_0.4.1.bb3 classes. Includes protocols PDUs definition (SNMP, LDAP etc.) and various\
/openbmc/openbmc-test-automation/openpower/
H A Dtest_inband_bmc_auth_reset.robot6 # - Delete the LDAP configuration if there was one.
/openbmc/openbmc/poky/meta/recipes-extended/pam/libpam/pam.d/
H A Dcommon-auth7 # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the

12