/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_ldap_configuration.robot | 2 Documentation Test Redfish LDAP user configuration. 12 Suite Teardown LDAP Suite Teardown Execution 26 Verify LDAP Configuration Created 27 [Documentation] Verify that LDAP configuration created. 30 Create LDAP Configuration 31 # Call 'Get LDAP Configuration' to verify that LDAP configuration exists. 32 Get LDAP Configuration ${LDAP_TYPE} 38 Verify Redfish LDAP Service Disable 39 [Documentation] Verify that LDAP is disabled and that LDAP user cannot 49 ... msg=LDAP user was able to login even though the LDAP service was disabled. [all …]
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_ldap_sub_menu.robot | 3 Documentation Test OpenBMC GUI "LDAP" sub-menu of "Security and access". 15 ${xpath_ldap_heading} //h1[text()="LDAP"] 38 Verify Navigation To LDAP Page 39 [Documentation] Verify navigation to LDAP page. 45 Verify Existence Of All Sections In LDAP Page 46 [Documentation] Verify existence of all sections in LDAP page. 53 Verify Existence Of All Buttons In LDAP Page 54 [Documentation] Verify existence of all buttons in LDAP page. 65 Verify Existence Of All Checkboxes In LDAP Page 66 [Documentation] Verify existence of all checkboxes in LDAP page. [all …]
|
H A D | test_multiple_interfaces.robot | 45 [Documentation] Verify ability to load LDAP certificate using eth1 IP address. 74 # (e.g. "LDAP Certificate" or "CA Certificate"). 93 ... Select From List By Label ${xpath_certificate_type} LDAP Certificate 103 ... Wait Until Page Contains Successfully added LDAP Certificate.
|
H A D | test_certificates_sub_menu.robot | 107 Verify Installed LDAP Certificate 108 [Documentation] Install LDAP certificate via Redfish and verify it in GUI. 114 # Install LDAP certificate. 121 Wait Until Page Contains LDAP Certificate timeout=10
|
/openbmc/openbmc-test-automation/lib/ |
H A D | bmc_ldap_utils.robot | 2 Documentation This module provides general keywords for LDAP. 6 Get LDAP Configuration Using Redfish 7 [Documentation] Retrieve LDAP Configuration. 11 # ldap_type The LDAP type ("ActiveDirectory" or "LDAP"). 17 Get LDAP Privilege And Group Name Via Redfish 18 [Documentation] Get LDAP groupname via Redfish. 20 # Get LDAP configuration via Redfish. 21 # Sample output of LDAP configuration: 47 # '@odata.id': u'/redfish/v1/AccountService/LDAP/Certificates' 52 ${ldap_config}= Get LDAP Configuration Using Redfish ${LDAP_TYPE} [all …]
|
/openbmc/openbmc-tools/openbmctool/ |
H A D | README.md | 23 Important: After disabling local users, an LDAP user will need to be used for 106 ### Update LDAP client certificate 114 ### Update LDAP root certificate 131 ### Delete LDAP client certificate 137 ### Delete LDAP root certificate 143 Deleting the root certificate can cause an LDAP service outage. Please refer to 144 the LDAP documentation before using this command. 146 ## BMC LDAP Configuration 148 In BMC, LDAP is used for remote authentication. BMC doesn't support remote 151 BMC supports secure/non-secure LDAP configuration. [all …]
|
/openbmc/openbmc-test-automation/gui/test/access_control/ |
H A D | test_obmc_gui_ldap.robot | 3 Documentation Test OpenBMC GUI "LDAP" sub-menu of "Access control". 25 Verify Existence Of All Sections In LDAP Page 26 [Documentation] Verify existence of all sections in LDAP page. 33 Verify Existence Of All Buttons In LDAP Page 34 [Documentation] Verify existence of all buttons in LDAP page. 48 Verify Existence Of All Checkboxes In LDAP Page 49 [Documentation] Verify existence of all checkboxes in LDAP page. 66 Wait Until Page Contains Configure LDAP settings and manage role groups
|
/openbmc/phosphor-user-manager/docs/ |
H A D | README.md | 12 ### LDAP Configuration 14 #### Configure LDAP 17 …ntent-Type: application/json" -X POST -d '{"data":[false,"ldap://<ldap://<LDAP server ip/hostname>… 26 - First time LDAP configuration. 29 #### Upload LDAP Client Certificate 43 #### Clear LDAP Config 49 #### Get LDAP Config
|
/openbmc/webui-vue/src/store/modules/SecurityAndAccess/ |
H A D | LdapStore.js | 98 .then(({ data: { LDAP = {}, ActiveDirectory = {} } }) => { property in AnonymousClassb567187a0401.data 99 const ldapEnabled = LDAP.ServiceEnabled; 103 commit('setLdapProperties', LDAP); 109 const data = { LDAP: properties }; property in LdapStore.actions.saveLdapSettings.data 132 LDAP: { ServiceEnabled: false }, class in AnonymousClassb567187a0801 202 data.LDAP = { RemoteRoleMapping }; 234 data.LDAP = { RemoteRoleMapping }; 261 data.LDAP = { RemoteRoleMapping };
|
/openbmc/phosphor-user-manager/ |
H A D | meson.build | 35 description: 'Path of LDAP configuration file.', 41 description: 'Path of LDAP server CA certificate.', 47 description: 'Path of LDAP client certificate.', 53 description: 'LDAP configuration root.', 59 description: 'D-Bus path of LDAP config object.', 65 description: 'D-Bus busname of LDAP config service.', 71 description: 'path of directory having persisted LDAP configuration enabled property.',
|
/openbmc/openbmc-test-automation/ |
H A D | README.md | 28 - LDAP (Lightweight Directory Access Protocol) 350 - Run LDAP tests: 352 Before using LDAP test functions, be sure appropriate LDAP user(s) and 353 group(s) have been created on your LDAP server. Note: There are multiple ways 354 to create LDAP users / groups and all depend on your LDAP server. One common 360 Note: Currently, LDAP test automation for Redfish API is in progress. The 361 format to invoke LDAP test is as follows: 365 …LDAP Hostname / IP> -v LDAP_BIND_DN:<LDAP Bind DN> -v LDAP_BASE_DN:<LDAP Base DN> -v LDAP_BIND_DN_…
|
/openbmc/phosphor-webui/app/access-control/controllers/ |
H A D | ldap-controller.js | 35 const serviceEnabled = data.LDAP.ServiceEnabled || 37 const ldapServiceEnabled = data.LDAP.ServiceEnabled; 188 if (ldapProperties.LDAP.ServiceEnabled) { 321 LDAP: property in AnonymousFunctionbae13d9f0200.createLdapEnableRequest.ldapRequest 342 ldapRequest = {LDAP: {ServiceEnabled}}; property in AnonymousFunctionbae13d9f0200.createLdapDisableRequest.ldapRequest
|
/openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/libnet/ |
H A D | libnet-ldap-perl_0.68.bb | 1 SUMMARY = "LDAP Perl module" 2 DESCRIPTION = "Net::LDAP is a collection of modules that implements \ 3 a LDAP services API for Perl programs. The module may be used to \
|
/openbmc/openbmc/meta-phosphor/recipes-support/nss-pam-ldapd/ |
H A D | nss-pam-ldapd_0.9.8.bb | 1 SUMMARY = "NSS and PAM module for using LDAP as a naming service" 3 daemon for NSS and PAM lookups using LDAP \ 5 system information from LDAP. It is used by the libnss-ldapd and \
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-networking/python/ |
H A D | python3-ldap_3.4.4.bb | 1 SUMMARY = "Provides a wrapper in Python to LDAP" 2 DESCRIPTION = "This module provides access to the LDAP \
|
/openbmc/docs/architecture/ |
H A D | user-management.md | 154 | | (LDAP / NIS / KRB5) | | 440 ## LDAP section in User Management - OpenBMC - Design document 443 authenticate against an LDAP directory. IPMI interface cannot be used to 444 authenticate against LDAP, since IPMI needs the password in clear text at the 447 In OpenBMC, PAM based authentication is implemented, so for both LDAP users and 450 For the LDAP user accounts, there is no LDAP attribute type that corresponds to 451 the OpenBMC privilege roles. The preferred way is to group LDAP user accounts 452 into LDAP groups. D-Bus API is provided for the user to assign privilege role to 453 the LDAP group. 459 object for the local users. For the LDAP user accounts, the privilege role will [all …]
|
/openbmc/openbmc-test-automation/redfish/managers/ |
H A D | test_multiple_interfaces.robot | 64 Verify LDAP Login Works When Eth1 IP Is Not Configured 65 [Documentation] Verify LDAP login works when eth1 IP is erased. 72 Create LDAP Configuration 78 Verify LDAP Login Works When Both Interfaces Are Configured 79 [Documentation] Verify LDAP login works when both interfaces are configured. 82 Create LDAP Configuration 88 Verify Secure LDAP Login Works When Both Interfaces Are Configured 89 [Documentation] Verify Secure LDAP login works when both the interfaces are configured. 92 Create LDAP Configuration ${LDAP_TYPE} ${LDAP_SERVER_URI_1} ${LDAP_BIND_DN}
|
/openbmc/openbmc/meta-ibm/recipes-extended/pam/libpam/pam.d/ |
H A D | common-auth | 7 # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 12 # Skip google_authenticator for LDAP users (uid=-1)
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/openldap/openldap/ |
H A D | slapd.service | 2 Description=Standalone LDAP Daemon
|
/openbmc/openbmc/meta-phosphor/recipes-support/nss-pam-ldapd/files/ |
H A D | nslcd.service | 2 Description=LDAP daemon
|
/openbmc/phosphor-certificate-manager/ |
H A D | README.md | 46 ### LDAP client certificate management 48 **Purpose:** LDAP client certificate validation
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/ |
H A D | pam-plugin-ldapdb_1.3.1.bb | 1 SUMMARY = "PAM searchless LDAP authentication module"
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/ |
H A D | python3-pyasn1-modules_0.4.1.bb | 3 classes. Includes protocols PDUs definition (SNMP, LDAP etc.) and various\
|
/openbmc/openbmc-test-automation/openpower/ |
H A D | test_inband_bmc_auth_reset.robot | 6 # - Delete the LDAP configuration if there was one.
|
/openbmc/openbmc/poky/meta/recipes-extended/pam/libpam/pam.d/ |
H A D | common-auth | 7 # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the
|