/openbmc/qemu/tests/qemu-iotests/ |
H A D | 172.out | 31 account-invalid = "auto" 32 account-failed = "auto" 60 account-invalid = "auto" 61 account-failed = "auto" 99 account-invalid = "auto" 100 account-failed = "auto" 113 account-invalid = "auto" 114 account-failed = "auto" 157 account-failed = "auto" 171 account-failed = "auto" [all …]
|
/openbmc/openbmc/meta-ibm/recipes-phosphor/images/ |
H A D | obmc-phosphor-image.bbappend | 20 # DISTRO_FEATURES += "ibm-service-account-policy" 22 # The service account policy is as follows: 23 # root - The root account remains present. It is needed for internal 32 # The admin account does not have a home directory. 38 # The service account is not authorized to IPMI because of the inherent 41 # The service account does not have a home directory. The home directory is 50 # Add group "wheel" (before adding the "service" account). 55 # Add the "admin" account. 61 # Add the "service" account. 70 # The service account needs sudo. [all …]
|
/openbmc/openbmc/meta-ibm/recipes-extended/pam/libpam/pam.d/ |
H A D | common-account | 2 # /etc/pam.d/common-account - authorization settings common to all services 17 account [success=ignore default=ignore] pam_google_authenticator.so 18 account [success=2 new_authtok_reqd=done default=ignore] pam_unix.so 19 -account [success=1 new_authtok_reqd=done default=ignore] pam_ldap.so ignore_unknown_user igno… 21 account requisite pam_deny.so 23 account required pam_faillock.so 27 account required pam_permit.so
|
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/ |
H A D | common-account | 2 # /etc/pam.d/common-account - authorization settings common to all services 17 account [success=2 new_authtok_reqd=done default=ignore] pam_unix.so 18 -account [success=1 new_authtok_reqd=done default=ignore] pam_ldap.so ignore_unknown_user igno… 20 account requisite pam_deny.so 22 account required pam_faillock.so 26 account required pam_permit.so
|
/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/ |
H A D | shadow-update-pam-conf.patch | 8 In yocto it obey the way with Debian/Ubuntu, and the names are common-auth, common-account, 36 account required pam_permit.so 46 account required pam_permit.so 56 account required pam_permit.so 66 account required pam_permit.so 76 account required pam_permit.so 86 account required pam_permit.so 96 account required pam_permit.so 106 account required pam_permit.so 116 account required pam_permit.so
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/vlock/vlock-2.2.3/ |
H A D | vlock_pam | 1 # Use the default auth and account policies for vlock 3 account include common-account
|
/openbmc/openbmc/poky/meta/recipes-connectivity/openssh/openssh/ |
H A D | sshd | 4 account required pam_nologin.so 5 account include common-account
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/ |
H A D | AccountPolicy.interface.yaml | 2 Provides global user account policy related management. 9 user. Value of 0 indicates that account lockout feature is disabled. 16 Configures timeout needed (in seconds) to unlock the account after a 17 lockout. Value of 0 indicates that account must be unlocked manually.
|
/openbmc/openbmc/poky/meta/recipes-extended/pam/libpam/pam.d/ |
H A D | common-account | 2 # /etc/pam.d/common-account - authorization settings common to all services 17 account [success=1 new_authtok_reqd=done default=ignore] pam_unix.so 19 account requisite pam_deny.so 23 account required pam_permit.so
|
/openbmc/openbmc/poky/meta/recipes-core/dropbear/dropbear/ |
H A D | dropbear | 4 account include common-account
|
/openbmc/openbmc/poky/meta/recipes-extended/at/at/ |
H A D | pam.conf.patch | 25 -@include common-account 27 +account include common-account
|
/openbmc/qemu/tests/unit/ |
H A D | test-timed-average.c | 25 static void account(TimedAverage *ta) in account() function 51 account(&ta); in test_average() 71 account(&ta); in test_average()
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_user_management_sub_menu.robot | 134 # Create an User account. 145 [Documentation] Delete user account via GUI. 148 # Create new user account via GUI. 164 # Create new user account. 180 # Create new user account. 219 # Create new user account. 222 # Modify user account status via GUI. 227 # Switch the user account status to its opposite state. 241 # Verify account status via Redfish. 261 # Initialize the new password for the account. [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-dbs/postgresql/files/ |
H A D | postgresql.pam | 3 account include common-account
|
/openbmc/openbmc/poky/meta/recipes-extended/cronie/cronie/ |
H A D | crond_pam_config.patch | 27 account required pam_access.so 28 -account include system-auth 29 +account include common-auth
|
/openbmc/linux/fs/smb/server/mgmt/ |
H A D | user_config.c | 12 struct ksmbd_user *ksmbd_login_user(const char *account) in ksmbd_login_user() argument 17 resp = ksmbd_ipc_login_request(account); in ksmbd_login_user() 38 user->name = kstrdup(resp->account, GFP_KERNEL); in ksmbd_alloc_user()
|
/openbmc/openbmc/poky/meta/recipes-extended/sudo/files/ |
H A D | sudo.pam | 3 account include common-account
|
/openbmc/linux/Documentation/mm/ |
H A D | overcommit-accounting.rst | 73 * We account mmap memory mappings 74 * We account mprotect changes in commit 75 * We account mremap changes in size 76 * We account brk 77 * We account munmap
|
/openbmc/bmcweb/config/ |
H A D | pam-webserver | 7 account include common-account
|
/openbmc/openbmc/poky/meta/recipes-graphics/wayland/weston-init/ |
H A D | weston-autologin | 4 account required pam_nologin.so 5 account required pam_unix.so
|
/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/pam.d/ |
H A D | chfn | 13 account include common-account
|
H A D | login | 49 # account requisite pam_time.so 54 # account required pam_access.so 74 # Standard Un*x account and session 75 account include common-account
|
/openbmc/docs/designs/ |
H A D | expired-password.md | 23 authentication and account validation steps typically result in outcomes like 27 correct and the account being accessed is valid. 28 2. Failure, when either the access credentials are invalid or the account being 29 accessed is invalid. For example, the account itself (not merely its 32 account is valid except the account's password is expired (such as indicated 36 PasswordChangeRequired the same as an account that is invalid for any other 83 - The BMC has at least one account with a default password built in. 94 and is not based on time. An account with an expired password is neither 102 access via an account which has an expired password. If the access 116 '/redfish/v1/AccountService/Accounts/<account>' resources are enhanced to [all …]
|
/openbmc/linux/fs/smb/server/ |
H A D | ksmbd_netlink.h | 130 __s8 account[KSMBD_REQ_MAX_ACCOUNT_NAME_SZ]; /* user account name */ member 141 __s8 account[KSMBD_REQ_MAX_ACCOUNT_NAME_SZ]; /* user account name */ member 199 __s8 account[KSMBD_REQ_MAX_ACCOUNT_NAME_SZ]; member 228 __s8 account[KSMBD_REQ_MAX_ACCOUNT_NAME_SZ]; /* user account name */ member
|
H A D | transport_ipc.h | 14 ksmbd_ipc_login_request(const char *account); 28 int ksmbd_ipc_logout_request(const char *account, int flags);
|