/openbmc/webui-vue/src/store/modules/SecurityAndAccess/ |
H A D | LdapStore.js | 18 activeDirectory: { class in LdapStore.state 31 activeDirectory: (state) => state.activeDirectory, 33 return state.activeDirectory.serviceEnabled; 37 ? 'activeDirectory' 85 state.activeDirectory.serviceEnabled = ServiceEnabled; 86 state.activeDirectory.serviceAddress = ServiceAddresses[0]; 87 state.activeDirectory.bindDn = Authentication.Username; 88 state.activeDirectory.baseDn = BaseDistinguishedNames[0]; 89 state.activeDirectory.userAttribute = UsernameAttribute; 90 state.activeDirectory.groupsAttribute = GroupsAttribute; [all …]
|
/openbmc/phosphor-webui/app/access-control/controllers/ |
H A D | ldap-controller.js | 36 data.ActiveDirectory.ServiceEnabled; 38 const adServiceEnabled = data.ActiveDirectory.ServiceEnabled; 91 * LDAP and ActiveDirectory changes can not be sent together when changing 92 * from ActiveDirectory to LDAP 99 enabledServiceType == 'LDAP' ? 'ActiveDirectory' : 'LDAP'; 190 } else if (ldapProperties.ActiveDirectory.ServiceEnabled) { 191 enabledServiceType = 'ActiveDirectory'; 301 * @param {string} serviceType - 'LDAP' or 'ActiveDirectory' 326 ActiveDirectory: property in AnonymousFunctionbae13d9f0200.createLdapEnableRequest.ldapRequest 335 * @param {string} serviceType - 'LDAP' or 'ActiveDirectory' [all …]
|
H A D | ldap-controller.html | 69 ng-change="ldapProperties.EnabledServiceUpdated = true" value="ActiveDirectory"
|
/openbmc/phosphor-user-manager/test/ |
H A D | ldap_config_test.cpp | 137 ldap_base::Create::Type::ActiveDirectory, "uid", "gid"); in TEST_F() 162 ldap_base::Config::Type::ActiveDirectory); in TEST_F() 196 ldap_base::Config::Type::ActiveDirectory); in TEST_F() 227 ldap_base::Config::Type::ActiveDirectory); in TEST_F() 256 ldap_base::Create::Type::ActiveDirectory, "uid", "gid"); in TEST_F() 274 ldap_base::Config::Type::ActiveDirectory); in TEST_F() 306 ldap_base::Create::Type::ActiveDirectory, "attr1", "attr2"); in TEST_F() 355 ldap_base::Create::Type::ActiveDirectory, "attr1", "attr2"); in TEST_F() 406 ldap_base::Create::Type::ActiveDirectory, "attr1", "attr2"); in TEST_F() 456 ldap_base::Create::Type::ActiveDirectory, "attr1", "attr2"); in TEST_F() [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/Ldap/ |
H A D | Create.interface.yaml | 38 Specifies the the configured server is ActiveDirectory(AD) or 76 - name: ActiveDirectory
|
H A D | Config.interface.yaml | 52 Specifies the the configured server is ActiveDirectory(AD) or 83 - name: ActiveDirectory
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_ldap_configuration.robot | 516 # Disable the LDAP Type from OpenLDAP to ActiveDirectory or vice-versa 584 ${inverse_ldap_type}= Set Variable If '${LDAP_TYPE}' == 'LDAP' ActiveDirectory LDAP 630 Valid Value LDAP_TYPE valid_values=["ActiveDirectory", "LDAP"] 697 # ldap_type The LDAP type ("ActiveDirectory" or "LDAP"). 708 # ldap_type The LDAP type ("ActiveDirectory" or "LDAP"). 761 # ldap_type The LDAP type ("ActiveDirectory" or "LDAP"). 787 # ldap_type The LDAP type ("ActiveDirectory" or "LDAP"). 813 # ldap_type The LDAP type ("ActiveDirectory" or "LDAP"). 836 # ldap_type The LDAP type ("ActiveDirectory" or "LDAP"). 862 # ldap_type The LDAP type ("ActiveDirectory" or "LDAP").
|
/openbmc/bmcweb/redfish-core/lib/ |
H A D | account_service.hpp | 474 if (serverType == "ActiveDirectory") in handleRoleMapPatch() 560 else if (ldapType == "ActiveDirectory") in getLDAPConfigData() 563 "xyz.openbmc_project.User.Ldap.Config.Type.ActiveDirectory"; in getLDAPConfigData() 694 server(openLDAP/ActiveDirectory) 713 server(openLDAP/ActiveDirectory) 733 * server(openLDAP/ActiveDirectory) 754 server(openLDAP/ActiveDirectory) 775 server(openLDAP/ActiveDirectory) 796 server(openLDAP/ActiveDirectory) 817 server(openLDAP/ActiveDirectory) [all …]
|
/openbmc/openbmc-test-automation/lib/ |
H A D | bmc_ldap_utils.robot | 11 # ldap_type The LDAP type ("ActiveDirectory" or "LDAP"). 70 # ldap_type The LDAP type ("ActiveDirectory" or "LDAP").
|
/openbmc/webui-vue/src/views/SecurityAndAccess/Ldap/ |
H A D | Ldap.vue | 89 {{ $t('pageLdap.form.activeDirectory') }} 290 'activeDirectory', 369 ? this.activeDirectory 423 ? this.activeDirectory
|
/openbmc/phosphor-user-manager/phosphor-ldap-config/ |
H A D | ldap_config_mgr.cpp | 181 ConfigIface::Type::ActiveDirectory, *this); in createDefaultObjects() 198 "ActiveDirectory service is already active")); in enableService()
|
H A D | ldap_config.cpp | 250 if (ldapType() == ConfigIface::Type::ActiveDirectory) in writeConfig()
|
/openbmc/openbmc-tools/openbmctool/ |
H A D | README.md | 158 …basDN> --bindPassword=<bindPassword> --scope="sub/one/base" --serverType="OpenLDAP/ActiveDirectory" 170 …basDN> --bindPassword=<bindPassword> --scope="sub/one/base" --serverType="OpenLDAP/ActiveDirectory"
|
H A D | openbmctool.py | 46 'ActiveDirectory' : 'active_directory', 3378 'ActiveDirectory' : 'xyz.openbmc_project.User.Ldap.Create.Type.ActiveDirectory', 3411 'ActiveDirectory' : 'xyz.openbmc_project.User.Ldap.Config.Type.ActiveDirectory', 5022 …parser_ldap_config.add_argument("-t", "--serverType", required=True, choices=['ActiveDirectory','O… 5023 help='Specifies the configured server is ActiveDirectory(AD) or OpenLdap') 5043 …parser_ldap_mapper_create.add_argument("-t", "--serverType", choices=['ActiveDirectory','OpenLDAP'… 5044 help='Specifies the configured server is ActiveDirectory(AD) or OpenLdap') 5051 … parser_ldap_mapper_list.add_argument("-t", "--serverType", choices=['ActiveDirectory','OpenLDAP'], 5052 help='Specifies the configured server is ActiveDirectory(AD) or OpenLdap') 5057 …parser_ldap_mapper_delete.add_argument("-t", "--serverType", choices=['ActiveDirectory','OpenLDAP'… [all …]
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_ldap_sub_menu.robot | 203 Valid Value LDAP_TYPE valid_values=["ActiveDirectory", "LDAP"] 223 # ldap_type The LDAP type ("ActiveDirectory" or "LDAP"). 266 # ldap_type The LDAP type ("ActiveDirectory" or "LDAP").
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema-installed/ |
H A D | CertificateCollection.json | 94 "/redfish/v1/AccountService/ActiveDirectory/Certificates", 100 … "/redfish/v1/Managers/{ManagerId}/RemoteAccountService/ActiveDirectory/Certificates",
|
H A D | AccountService.v1_16_0.json |
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | CertificateCollection.json | 94 "/redfish/v1/AccountService/ActiveDirectory/Certificates", 100 … "/redfish/v1/Managers/{ManagerId}/RemoteAccountService/ActiveDirectory/Certificates",
|
H A D | AccountService.v1_16_0.json |
|
/openbmc/bmcweb/redfish-core/schema/dmtf/installed/ |
H A D | CertificateCollection_v1.xml | 58 <String>/redfish/v1/AccountService/ActiveDirectory/Certificates</String> 64 …<String>/redfish/v1/Managers/{ManagerId}/RemoteAccountService/ActiveDirectory/Certificates</String>
|
H A D | Certificate_v1.xml | 57 <String>/redfish/v1/AccountService/ActiveDirectory/Certificates/{CertificateId}</String> 63 …<String>/redfish/v1/Managers/{ManagerId}/RemoteAccountService/ActiveDirectory/Certificates/{Certif…
|
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
H A D | CertificateCollection_v1.xml | 58 <String>/redfish/v1/AccountService/ActiveDirectory/Certificates</String> 64 …<String>/redfish/v1/Managers/{ManagerId}/RemoteAccountService/ActiveDirectory/Certificates</String>
|
H A D | Certificate_v1.xml | 57 <String>/redfish/v1/AccountService/ActiveDirectory/Certificates/{CertificateId}</String> 63 …<String>/redfish/v1/Managers/{ManagerId}/RemoteAccountService/ActiveDirectory/Certificates/{Certif…
|
/openbmc/docs/designs/ |
H A D | expired-password.md | 257 6. Test on BMC using Linux PAM both with and without LDAP or ActiveDirectory
|
H A D | redfish-authorization.md | 68 It also integrates LDAP (supports either ActiveDirectory or OpenLDAP) for remote
|