Home
last modified time | relevance | path

Searched refs:User (Results 1 – 25 of 756) sorted by relevance

12345678910>>...31

/openbmc/openbmc/poky/bitbake/doc/
H A Dreleases.rst11 - :yocto_docs:`BitBake 2.10 User Manual </bitbake/2.10/>`
17 - :yocto_docs:`BitBake 2.8 User Manual </bitbake/2.8/>`
23 - :yocto_docs:`BitBake 2.0 User Manual </bitbake/2.0/>`
33 - :yocto_docs:`BitBake 2.6 User Manual </bitbake/2.6/>`
39 - :yocto_docs:`BitBake 2.4 User Manual </bitbake/2.4/>`
45 - :yocto_docs:`BitBake 2.2 User Manual </bitbake/2.2/>`
51 - :yocto_docs:`BitBake 1.52 User Manual </bitbake/1.52/>`
57 - :yocto_docs:`BitBake 1.50 User Manual </bitbake/1.50/>`
63 - :yocto_docs:`BitBake 1.48 User Manual </bitbake/1.48/>`
69 - :yocto_docs:`BitBake 1.46 User Manual </bitbake/1.46/>`
[all …]
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/
H A Dmeson.build13 sdbusplus_current_path = 'xyz/openbmc_project/User'
16 'xyz/openbmc_project/User/AccountPolicy__markdown'.underscorify(),
18 '../../../../yaml/xyz/openbmc_project/User/AccountPolicy.interface.yaml',
32 'xyz/openbmc_project/User/AccountPolicy',
40 'xyz/openbmc_project/User/Attributes__markdown'.underscorify(),
42 '../../../../yaml/xyz/openbmc_project/User/Attributes.interface.yaml',
56 'xyz/openbmc_project/User/Attributes',
64 'xyz/openbmc_project/User/Common__markdown'.underscorify(),
65 input: ['../../../../yaml/xyz/openbmc_project/User/Common.errors.yaml'],
78 'xyz/openbmc_project/User/Common',
[all …]
/openbmc/openbmc-test-automation/redfish/dmtf_tools/
H A Dtest_redfishtool_local_user.robot31 [Teardown] Redfishtool Delete User "UserT100"
33 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true
34 Redfishtool Verify User "UserT100" "ReadOnly"
40 [Teardown] Redfishtool Delete User "UserT100"
42 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true
43 Redfishtool Update User Role "UserT100" "Administrator"
44 Redfishtool Verify User "UserT100" "Administrator"
51 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true
52 Redfishtool Delete User "UserT100"
53 ${status}= Redfishtool Verify User Name Exists "UserT100"
[all …]
/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_user.robot34 # User defined count.
39 Verify IPMI User Summary
44 ... Delete Created User ${random_userid}
46 ${initial_user_count} ${maximum_ids}= Get Enabled User Count
48 ${random_userid} ${random_username}= Create Random IPMI User
53 ${current_user_count} ${maximum_ids}= Get Enabled User Count
61 Verify IPMI User List
65 ... Delete Created User ${random_userid}
67 ${random_userid} ${random_username}= Create Random IPMI User
78 ${users_access}= Get User Access Ipmi ${CHANNEL_NUMBER}
[all …]
H A Dtest_ipmi_payload.robot93 Verify Set User Access Payload For Standard Payload SOL
96 [Teardown] Run Keywords Set User Access Payload For Given User ${user_id_in_hex}
97 ... AND Delete Created User ${userid}
100 ${userid} ${username}= Create And Verify IPMI User
105 …${default_user_access_payload}= Get User Access Payload For Given Channel ${userid_in_hex_format}
108 Set User Access Payload For Given User ${user_id_in_hex} Disable
113 Verify Set User Access Payload For Operator Privileged User
116 [Teardown] Run Keywords Delete Created User ${userid} AND FFDC On Test Case Fail
118 ${userid} ${username}= Create And Verify IPMI User ${operator_priv} Operator
127 Verify Set User Access Payload For Invalid User
[all …]
/openbmc/openbmc-test-automation/gui/test/access_control/
H A Dtest_obmc_gui_local_users.robot29 Verify Existence Of All Sections In Local User Management Page
36 Verify Existence Of All Buttons In Local User Management Page
46 Verify Existence Of All Input Boxes In Local User Management Page
53 Add User And Verify
58 Delete User testUser1
59 Add User testUser1 testUserPwd1 Administrator
63 Delete User And Verify
68 Delete User testUser2
69 Add User testUser2 testUserPwd2 Callback
70 Delete User testUser2
[all …]
/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_user_account.robot31 Verify Redfish Admin User Persistence After Reboot
35 ... Redfish Create User admin_user TestPwd123 Administrator ${True}
43 Redfish Verify User admin_user TestPwd123 Administrator ${True}
46 Verify Redfish Operator User Persistence After Reboot
50 ... Redfish Create User operator_user TestPwd123 Operator ${True}
58 Redfish Verify User operator_user TestPwd123 Operator ${True}
61 Verify Redfish Readonly User Persistence After Reboot
65 ... Redfish Create User readonly_user TestPwd123 ReadOnly ${True}
73 Redfish Verify User readonly_user TestPwd123 ReadOnly ${True}
76 Redfish Create and Verify Admin User
[all...]
H A Dtest_ipmi_redfish_user.robot23 ${empty_name_pattern} ^User Name\\s.*\\s:\\s$
27 Create Admin Redfish User And Verify Login Via IPMI
46 Update User Password Via Redfish And Verify Using IPMI
71 Update User Privilege Via Redfish And Verify Using IPMI
106 Delete User Via Redfish And Verify Using IPMI
128 Create IPMI User And Verify Login Via Redfish
132 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
144 Update User Password Via IPMI And Verify Using Redfish
149 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
165 Update User Privilege To Operator Via IPMI And Verify Using Redfish
[all …]
/openbmc/linux/Documentation/arch/arm/
H A Dsunxi.rst26 * User Manual
28 …http://dl.linux-sunxi.org/A10/A10%20User%20Manual%20-%20v1.20%20%282012-04-09%2c%20DECRYPTED%29.pdf
41 * User Manual
43 http://dl.linux-sunxi.org/A13/A13%20User%20Manual%20-%20v1.2%20%282013-01-08%29.pdf
57 * User Manual
59 http://dl.linux-sunxi.org/A20/A20%20User%20Manual%202013-03-22.pdf
67 * User Manual
69 http://dl.linux-sunxi.org/A23/A23%20User%20Manual%20V1.0%2020130830.pdf
78 * User Manual
88 * User Manual
[all …]
/openbmc/docs/architecture/
H A Duser-management.md1 # User Management - OpenBMC - Design document
18 4. User creation has to be generic in nature wherever possible.
25 6. User name, Password, Group and Privilege roles are maintained by the common
28 words, with the exception of User Name, Password, Group and Privileged Role,
59 groups (i.e. User will have same privilege for REDFISH / Webserver / IPMI / SSH
60 / HostConsole). User can belong to any one of the following privilege roles at
73 ## Common User Manager - D-Bus API (phosphor-user-manager)
75 User Manager service exposes D-Bus methods for user-management operations. It
76 exposes `xyz.openbmc_project.User.Manager` as a service and handles objects
78 https://github.com/openbmc/phosphor-dbus-interfaces/tree/master/yaml/xyz/openbmc_project/User
[all …]
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/
H A DREADME.md1 # User Management
5 User Manager service exposes D-Bus methods for user management operations.
7 ### User Manager Interface
9 User manager interface `xyz.openbmc_project.User.Manager` provides following
12 #### xyz.openbmc_project.User.Manager interface
28 #### xyz.openbmc_project.User.AccountPolicy interface
42 User manager daemon, will create user objects for every user existing in the
44 object can be handled through 'org.freedesktop.DBus.ObjectManager'. User object
47 #### xyz.openbmc_project.User.Attributes interface
53 - UserEnabled - User enabled state.
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Ldap/
H A Dmeson.build5 sdbusplus_current_path = 'xyz/openbmc_project/User/Ldap'
8 'xyz/openbmc_project/User/Ldap/Config__markdown'.underscorify(),
10 '../../../../../yaml/xyz/openbmc_project/User/Ldap/Config.interface.yaml',
24 'xyz/openbmc_project/User/Ldap/Config',
32 'xyz/openbmc_project/User/Ldap/Create__markdown'.underscorify(),
34 '../../../../../yaml/xyz/openbmc_project/User/Ldap/Create.interface.yaml',
48 'xyz/openbmc_project/User/Ldap/Create',
/openbmc/openbmc-test-automation/security/
H A Dtest_bmc_expire_password.robot51 Expire And Change Root User Password And Access Via SSH
55 ... Restore Default Password For Root User AND FFDC On Test Case Fail
72 ... Restore Default Password For Root User AND FFDC On Test Case Fail
83 Expire And Change Root User Password Via Redfish And Verify
88 ... Restore Default Password For Root User
92 Verify User Password Expired Using Redfish ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD}
102 Verify Error While Creating User With Expired Password
106 ... Restore Default Password For Root User AND FFDC On Test Case Fail
110 Verify User Password Expired Using Redfish ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD}
123 ... AND Restore Default Password For Root User AND FFDC On Test Case Fail
[all …]
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_user_management_sub_menu.robot3 Documentation Test OpenBMC GUI "User management" sub-menu of "Security and access".
16 ${xpath_user_management_heading} //h1[text()="User management"]
45 Verify Navigation To User Management Page
52 Verify Existence Of All Sections In User Management Page
59 Verify Existence Of All Input Boxes In User Management Page
66 Verify Existence Of All Buttons In User Management Page
76 Verify Existence Of All Button And Fields In Add User
107 Verify User Access Privilege
111 [Template] Create User And Verify
119 Verify Operator User Privilege
[all …]
/openbmc/linux/Documentation/virt/acrn/
H A Dintroduction.rst7 hardware. It has a privileged management VM, called Service VM, to manage User
11 devices for a User VM based on command line configurations. ACRN Hypervisor
19 Service VM User VM
35 ACRN userspace allocates memory for the User VM, configures and initializes the
36 devices used by the User VM, loads the virtual bootloader, initializes the
37 virtual CPU state and handles I/O request accesses from the User VM. It uses
/openbmc/openbmc-test-automation/openpower/localuser/
H A Dtest_ipmi_redfish_user.robot25 Create IPMI User Without Any Privilege And Verify Via Redfish
42 Create Admin User Via Redfish And Verify Login Via IPMI
58 Enable IPMI Access To User Using Redfish ${random_username}
67 Delete User Via Redfish And Verify Using IPMI
81 Enable IPMI Access To User Using Redfish ${random_username}
95 Update User Password Via Redfish And Verify Using IPMI
109 Enable IPMI Access To User Using Redfish ${random_username}
122 Update User Privilege Via Redfish And Verify Using IPMI
136 Enable IPMI Access To User Using Redfish ${random_username}
165 Create IPMI Random User With Password And Privilege
[all …]
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Common/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/Common'
6 'xyz/openbmc_project/User/Common__cpp'.underscorify(),
7 input: ['../../../../../yaml/xyz/openbmc_project/User/Common.errors.yaml'],
20 'xyz/openbmc_project/User/Common',
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-requests-toolbelt/
H A D720240501dca0b4eacc3295665d7ced8719e11d2.patch33 - "User-Agent": "python-requests/2.8.1"
43 + "User-Agent": [
103 - "User-Agent": "python-requests/2.8.1"
113 + "User-Agent": [
173 - "User-Agent": "python-requests/2.8.1"
183 + "User-Agent": [
243 - "User-Agent": "python-requests/2.8.1"
253 + "User-Agent": [
313 - "User-Agent": "python-requests/2.8.1"
323 + "User-Agent": [
[all …]
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/MultiFactorAuthConfiguration/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/MultiFactorAuthConfiguration'
6 'xyz/openbmc_project/User/MultiFactorAuthConfiguration__cpp'.underscorify(),
8 '../../../../../yaml/xyz/openbmc_project/User/MultiFactorAuthConfiguration.interface.yaml',
28 'xyz/openbmc_project/User/MultiFactorAuthConfiguration',
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/TOTPAuthenticator/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/TOTPAuthenticator'
6 'xyz/openbmc_project/User/TOTPAuthenticator__cpp'.underscorify(),
8 '../../../../../yaml/xyz/openbmc_project/User/TOTPAuthenticator.interface.yaml',
28 'xyz/openbmc_project/User/TOTPAuthenticator',
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Manager/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/Manager'
6 'xyz/openbmc_project/User/Manager__cpp'.underscorify(),
8 '../../../../../yaml/xyz/openbmc_project/User/Manager.interface.yaml',
28 'xyz/openbmc_project/User/Manager',
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/PrivilegeMapperEntry/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/PrivilegeMapperEntry'
6 'xyz/openbmc_project/User/PrivilegeMapperEntry__cpp'.underscorify(),
8 '../../../../../yaml/xyz/openbmc_project/User/PrivilegeMapperEntry.interface.yaml',
28 'xyz/openbmc_project/User/PrivilegeMapperEntry',
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/PrivilegeMapper/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/PrivilegeMapper'
6 'xyz/openbmc_project/User/PrivilegeMapper__cpp'.underscorify(),
8 '../../../../../yaml/xyz/openbmc_project/User/PrivilegeMapper.interface.yaml',
28 'xyz/openbmc_project/User/PrivilegeMapper',
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/TOTPState/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/TOTPState'
6 'xyz/openbmc_project/User/TOTPState__cpp'.underscorify(),
8 '../../../../../yaml/xyz/openbmc_project/User/TOTPState.interface.yaml',
28 'xyz/openbmc_project/User/TOTPState',
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Attributes/
H A Dmeson.build3 sdbusplus_current_path = 'xyz/openbmc_project/User/Attributes'
6 'xyz/openbmc_project/User/Attributes__cpp'.underscorify(),
8 '../../../../../yaml/xyz/openbmc_project/User/Attributes.interface.yaml',
28 'xyz/openbmc_project/User/Attributes',

12345678910>>...31