Home
last modified time | relevance | path

Searched refs:User (Results 1 – 25 of 389) sorted by relevance

12345678910>>...16

/openbmc/openbmc/poky/bitbake/doc/
H A Dreleases.rst11 - :yocto_docs:`BitBake 2.10 User Manual </bitbake/2.10/>`
17 - :yocto_docs:`BitBake 2.8 User Manual </bitbake/2.8/>`
23 - :yocto_docs:`BitBake 2.0 User Manual </bitbake/2.0/>`
33 - :yocto_docs:`BitBake 2.6 User Manual </bitbake/2.6/>`
39 - :yocto_docs:`BitBake 2.4 User Manual </bitbake/2.4/>`
45 - :yocto_docs:`BitBake 2.2 User Manual </bitbake/2.2/>`
51 - :yocto_docs:`BitBake 1.52 User Manual </bitbake/1.52/>`
57 - :yocto_docs:`BitBake 1.50 User Manual </bitbake/1.50/>`
63 - :yocto_docs:`BitBake 1.48 User Manual </bitbake/1.48/>`
69 - :yocto_docs:`BitBake 1.46 User Manual </bitbake/1.46/>`
[all …]
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/
H A Dmeson.build13 sdbusplus_current_path = 'xyz/openbmc_project/User'
16 'xyz/openbmc_project/User/AccountPolicy__markdown'.underscorify(),
18 '../../../../yaml/xyz/openbmc_project/User/AccountPolicy.interface.yaml',
32 'xyz/openbmc_project/User/AccountPolicy',
40 'xyz/openbmc_project/User/Attributes__markdown'.underscorify(),
42 '../../../../yaml/xyz/openbmc_project/User/Attributes.interface.yaml',
56 'xyz/openbmc_project/User/Attributes',
64 'xyz/openbmc_project/User/Common__markdown'.underscorify(),
65 input: ['../../../../yaml/xyz/openbmc_project/User/Common.errors.yaml'],
78 'xyz/openbmc_project/User/Common',
[all …]
/openbmc/openbmc-test-automation/redfish/dmtf_tools/
H A Dtest_redfishtool_local_user.robot31 [Teardown] Redfishtool Delete User "UserT100"
33 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true
34 Redfishtool Verify User "UserT100" "ReadOnly"
40 [Teardown] Redfishtool Delete User "UserT100"
42 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true
43 Redfishtool Update User Role "UserT100" "Administrator"
44 Redfishtool Verify User "UserT100" "Administrator"
51 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true
52 Redfishtool Delete User "UserT100"
53 ${status}= Redfishtool Verify User Name Exists "UserT100"
[all …]
/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_user.robot34 # User defined count.
39 Verify IPMI User Summary
44 ... Delete Created User ${random_userid}
46 ${initial_user_count} ${maximum_ids}= Get Enabled User Count
48 ${random_userid} ${random_username}= Create Random IPMI User
53 Enable IPMI User And Verify ${random_userid}
56 ${current_user_count} ${maximum_ids}= Get Enabled User Count
64 Verify IPMI User List
68 ... Delete Created User ${random_userid}
70 ${random_userid} ${random_username}= Create Random IPMI User
[all …]
H A Dtest_ipmi_payload.robot92 Verify Set User Access Payload For Standard Payload SOL
95 [Teardown] Run Keywords Set User Access Payload For Given User ${user_id_in_hex}
96 ... AND Delete Created User ${userid}
99 ${userid} ${username}= Create And Verify IPMI User
104 …${default_user_access_payload}= Get User Access Payload For Given Channel ${userid_in_hex_format}
107 Set User Access Payload For Given User ${user_id_in_hex} Disable
112 Verify Set User Access Payload For Operator Privileged User
115 [Teardown] Run Keywords Delete Created User ${userid} AND FFDC On Test Case Fail
117 ${userid} ${username}= Create And Verify IPMI User ${operator_priv} Operator
126 Verify Set User Access Payload For Invalid User
[all …]
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Ldap/
H A Dmeson.build5 sdbusplus_current_path = 'xyz/openbmc_project/User/Ldap'
8 'xyz/openbmc_project/User/Ldap/Config__markdown'.underscorify(),
10 '../../../../../yaml/xyz/openbmc_project/User/Ldap/Config.interface.yaml',
24 'xyz/openbmc_project/User/Ldap/Config',
32 'xyz/openbmc_project/User/Ldap/Create__markdown'.underscorify(),
34 '../../../../../yaml/xyz/openbmc_project/User/Ldap/Create.interface.yaml',
48 'xyz/openbmc_project/User/Ldap/Create',
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/
H A DREADME.md1 # User Management
5 User Manager service exposes D-Bus methods for user management operations.
7 ### User Manager Interface
9 User manager interface `xyz.openbmc_project.User.Manager` provides following
12 #### xyz.openbmc_project.User.Manager interface
28 #### xyz.openbmc_project.User.AccountPolicy interface
42 User manager daemon, will create user objects for every user existing in the
44 object can be handled through 'org.freedesktop.DBus.ObjectManager'. User object
47 #### xyz.openbmc_project.User.Attributes interface
53 - UserEnabled - User enabled state.
/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_user_account.robot36 ... Redfish Create User admin_user TestPwd123 Administrator ${True}
37 ... AND Redfish Create User readonly_user TestPwd123 ReadOnly ${True}
46 Redfish Verify User admin_user TestPwd123 Administrator ${True}
47 Redfish Verify User readonly_user TestPwd123 ReadOnly ${True}
50 Verify Redfish Operator User Persistence After Reboot
54 ... Redfish Create User operator_user TestPwd123 Operator ${True}
62 Redfish Verify User operator_user TestPwd123 Operator ${True}
65 Redfish Create and Verify Admin User
68 [Template] Redfish Create And Verify User
74 Redfish Create and Verify Operator User
[all …]
H A Dtest_ipmi_redfish_user.robot25 ${empty_name_pattern} ^User Name\\s.*\\s:\\s$
29 Create Admin Redfish User And Verify Login Via IPMI
48 Update User Password Via Redfish And Verify Using IPMI
73 Update User Privilege Via Redfish And Verify Using IPMI
108 Delete User Via Redfish And Verify Using IPMI
130 Create IPMI User And Verify Login Via Redfish
134 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
146 Update User Password Via IPMI And Verify Using Redfish
151 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
167 Update User Privilege To Operator Via IPMI And Verify Using Redfish
[all …]
/openbmc/docs/architecture/
H A Duser-management.md1 # User Management - OpenBMC - Design document
18 4. User creation has to be generic in nature wherever possible.
25 6. User name, Password, Group and Privilege roles are maintained by the common
28 words, with the exception of User Name, Password, Group and Privileged Role,
59 groups (i.e. User will have same privilege for REDFISH / Webserver / IPMI / SSH
60 / HostConsole). User can belong to any one of the following privilege roles at
73 ## Common User Manager - D-Bus API (phosphor-user-manager)
75 User Manager service exposes D-Bus methods for user-management operations. It
76 exposes `xyz.openbmc_project.User.Manager` as a service and handles objects
78 <https://github.com/openbmc/phosphor-dbus-interfaces/tree/master/yaml/xyz/openbmc_project/User>
[all …]
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Common/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/Common'
6 'xyz/openbmc_project/User/Common__cpp'.underscorify(),
7 input: ['../../../../../yaml/xyz/openbmc_project/User/Common.errors.yaml'],
20 'xyz/openbmc_project/User/Common',
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/AccountPolicy/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/AccountPolicy'
6 'xyz/openbmc_project/User/AccountPolicy__cpp'.underscorify(),
8 '../../../../../yaml/xyz/openbmc_project/User/AccountPolicy.interface.yaml',
28 'xyz/openbmc_project/User/AccountPolicy',
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/MultiFactorAuthConfiguration/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/MultiFactorAuthConfiguration'
6 'xyz/openbmc_project/User/MultiFactorAuthConfiguration__cpp'.underscorify(),
8 '../../../../../yaml/xyz/openbmc_project/User/MultiFactorAuthConfiguration.interface.yaml',
28 'xyz/openbmc_project/User/MultiFactorAuthConfiguration',
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/TOTPAuthenticator/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/TOTPAuthenticator'
6 'xyz/openbmc_project/User/TOTPAuthenticator__cpp'.underscorify(),
8 '../../../../../yaml/xyz/openbmc_project/User/TOTPAuthenticator.interface.yaml',
28 'xyz/openbmc_project/User/TOTPAuthenticator',
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Manager/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/Manager'
6 'xyz/openbmc_project/User/Manager__cpp'.underscorify(),
8 '../../../../../yaml/xyz/openbmc_project/User/Manager.interface.yaml',
28 'xyz/openbmc_project/User/Manager',
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/PrivilegeMapperEntry/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/PrivilegeMapperEntry'
6 'xyz/openbmc_project/User/PrivilegeMapperEntry__cpp'.underscorify(),
8 '../../../../../yaml/xyz/openbmc_project/User/PrivilegeMapperEntry.interface.yaml',
28 'xyz/openbmc_project/User/PrivilegeMapperEntry',
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/PrivilegeMapper/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/PrivilegeMapper'
6 'xyz/openbmc_project/User/PrivilegeMapper__cpp'.underscorify(),
8 '../../../../../yaml/xyz/openbmc_project/User/PrivilegeMapper.interface.yaml',
28 'xyz/openbmc_project/User/PrivilegeMapper',
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/TOTPState/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/TOTPState'
6 'xyz/openbmc_project/User/TOTPState__cpp'.underscorify(),
8 '../../../../../yaml/xyz/openbmc_project/User/TOTPState.interface.yaml',
28 'xyz/openbmc_project/User/TOTPState',
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Attributes/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/Attributes'
6 'xyz/openbmc_project/User/Attributes__cpp'.underscorify(),
8 '../../../../../yaml/xyz/openbmc_project/User/Attributes.interface.yaml',
28 'xyz/openbmc_project/User/Attributes',
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Ldap/Create/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/Ldap/Create'
6 'xyz/openbmc_project/User/Ldap/Create__cpp'.underscorify(),
8 '../../../../../../yaml/xyz/openbmc_project/User/Ldap/Create.interface.yaml',
28 'xyz/openbmc_project/User/Ldap/Create',
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Ldap/Config/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/Ldap/Config'
6 'xyz/openbmc_project/User/Ldap/Config__cpp'.underscorify(),
8 '../../../../../../yaml/xyz/openbmc_project/User/Ldap/Config.interface.yaml',
28 'xyz/openbmc_project/User/Ldap/Config',
/openbmc/openbmc-test-automation/security/
H A Dtest_bmc_expire_password.robot51 Expire And Change Root User Password And Access Via SSH
55 ... Restore Default Password For Root User AND FFDC On Test Case Fail
72 ... Restore Default Password For Root User AND FFDC On Test Case Fail
83 Expire And Change Root User Password Via Redfish And Verify
88 ... Restore Default Password For Root User
92 Verify User Password Expired Using Redfish ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD}
102 Verify Error While Creating User With Expired Password
106 ... Restore Default Password For Root User AND FFDC On Test Case Fail
110 Verify User Password Expired Using Redfish ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD}
123 ... AND Restore Default Password For Root User AND FFDC On Test Case Fail
[all …]
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_user_management_sub_menu.robot3 Documentation Test OpenBMC GUI "User management" sub-menu of "Security and access".
16 ${xpath_user_management_heading} //h1[text()="User management"]
45 Verify Navigation To User Management Page
52 Verify Existence Of All Sections In User Management Page
59 Verify Existence Of All Input Boxes In User Management Page
66 Verify Existence Of All Buttons In User Management Page
76 Verify Existence Of All Button And Fields In Add User
107 Verify User Access Privilege
111 [Template] Create User And Verify
119 Verify Operator User Privilege
[all …]
/openbmc/openbmc-test-automation/openpower/localuser/
H A Dtest_ipmi_redfish_user.robot23 Create IPMI User Without Any Privilege And Verify Via Redfish
40 Create Admin User Via Redfish And Verify Login Via IPMI
56 Enable IPMI Access To User Using Redfish ${random_username}
65 Delete User Via Redfish And Verify Using IPMI
79 Enable IPMI Access To User Using Redfish ${random_username}
93 Update User Password Via Redfish And Verify Using IPMI
107 Enable IPMI Access To User Using Redfish ${random_username}
120 Update User Privilege Via Redfish And Verify Using IPMI
134 Enable IPMI Access To User Using Redfish ${random_username}
163 Create IPMI Random User With Password And Privilege
[all …]
/openbmc/openbmc-test-automation/lib/pdu/
H A Dschneider.robot26 Telnet.Read Until User Name :
48 # Location : Unknown User : Super User
59 # Super User : Enabled RADIUS : Disabled
60 # Administrator : Disabled Device User : Disabled
61 # Read-Only User : Disabled Network-Only User : Disabled

12345678910>>...16