/openbmc/qemu/tests/qemu-iotests/ |
H A D | 172.out | 31 account-invalid = "auto" 32 account-failed = "auto" 60 account-invalid = "auto" 61 account-failed = "auto" 99 account-invalid = "auto" 100 account-failed = "auto" 113 account-invalid = "auto" 114 account-failed = "auto" 156 account-invalid = "auto" 157 account-failed = "auto" [all …]
|
/openbmc/openbmc/meta-ibm/recipes-phosphor/images/ |
H A D | obmc-phosphor-image.bbappend | 17 # DISTRO_FEATURES += "ibm-service-account-policy" 19 # The service account policy is as follows: 20 # root - The root account remains present. It is needed for internal 29 # The admin account does not have a home directory. 35 # The service account is not authorized to IPMI because of the inherent 38 # The service account does not have a home directory. The home directory is 47 # Add group "wheel" (before adding the "service" account). 52 # Add the "admin" account. 58 # Add the "service" account. 65 …-phosphor-image += "${@bb.utils.contains('DISTRO_FEATURES', 'ibm-service-account-policy', "${IBM_E… [all …]
|
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/ |
H A D | common-account | 2 # /etc/pam.d/common-account - authorization settings common to all services 17 account [success=2 new_authtok_reqd=done default=ignore] pam_unix.so 18 -account [success=1 new_authtok_reqd=done default=ignore] pam_ldap.so ignore_unknown_user igno… 20 account requisite pam_deny.so 22 account required pam_faillock.so 26 account required pam_permit.so
|
/openbmc/openbmc/meta-ibm/recipes-extended/pam/libpam/pam.d/ |
H A D | common-account | 2 # /etc/pam.d/common-account - authorization settings common to all services 17 account [success=2 new_authtok_reqd=done default=ignore] pam_unix.so 18 -account [success=1 new_authtok_reqd=done default=ignore] pam_ldap.so ignore_unknown_user igno… 20 account requisite pam_deny.so 22 account required pam_faillock.so 26 account required pam_permit.so
|
/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/ |
H A D | shadow-update-pam-conf.patch | 8 In yocto it obey the way with Debian/Ubuntu, and the names are common-auth, common-account, 36 account required pam_permit.so 46 account required pam_permit.so 56 account required pam_permit.so 66 account required pam_permit.so 76 account required pam_permit.so 86 account required pam_permit.so 96 account required pam_permit.so 106 account required pam_permit.so 116 account required pam_permit.so
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/vlock/vlock-2.2.3/ |
H A D | vlock_pam | 1 # Use the default auth and account policies for vlock 3 account include common-account
|
/openbmc/openbmc/poky/meta/recipes-connectivity/openssh/openssh/ |
H A D | sshd | 4 account required pam_nologin.so 5 account include common-account
|
/openbmc/openbmc/poky/meta/recipes-extended/pam/libpam/pam.d/ |
H A D | common-account | 2 # /etc/pam.d/common-account - authorization settings common to all services 17 account [success=1 new_authtok_reqd=done default=ignore] pam_unix.so 19 account requisite pam_deny.so 23 account required pam_permit.so
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_user_management_sub_menu.robot | 94 [Documentation] Verify existence of all buttons and fields in account policy settings page. 130 [Documentation] Verify that user account and properties saved through reboots. 134 # Create an User account. 145 [Documentation] Delete user account via GUI. 148 # Create new user account via GUI. 164 # Create new user account. 167 # Expect failure while creating second user account with same username. 180 # Create new user account. 210 …[Documentation] Test modifying user account status of existing user via GUI and verify changes us… 214 # Get random username, user privilege level and account status. [all …]
|
/openbmc/qemu/tests/unit/ |
H A D | test-timed-average.c | 25 static void account(TimedAverage *ta) in account() function 51 account(&ta); in test_average() 71 account(&ta); in test_average()
|
/openbmc/openbmc/poky/meta/recipes-extended/at/at/ |
H A D | pam.conf.patch | 25 -@include common-account 27 +account include common-account
|
/openbmc/linux/fs/smb/server/mgmt/ |
H A D | user_config.c | 12 struct ksmbd_user *ksmbd_login_user(const char *account) in ksmbd_login_user() argument 17 resp = ksmbd_ipc_login_request(account); in ksmbd_login_user() 38 user->name = kstrdup(resp->account, GFP_KERNEL); in ksmbd_alloc_user()
|
/openbmc/openbmc/poky/meta/recipes-extended/cronie/cronie/ |
H A D | crond_pam_config.patch | 27 account required pam_access.so 28 -account include system-auth 29 +account include common-auth
|
/openbmc/linux/Documentation/mm/ |
H A D | overcommit-accounting.rst | 73 * We account mmap memory mappings 74 * We account mprotect changes in commit 75 * We account mremap changes in size 76 * We account brk 77 * We account munmap
|
/openbmc/openbmc/poky/meta/recipes-core/dropbear/dropbear/ |
H A D | dropbear | 4 account include common-account
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-dbs/postgresql/files/ |
H A D | postgresql.pam | 3 account include common-account
|
/openbmc/docs/designs/ |
H A D | expired-password.md | 23 authentication and account validation steps typically result in outcomes like 27 correct and the account being accessed is valid. 28 2. Failure, when either the access credentials are invalid or the account being 29 accessed is invalid. For example, the account itself (not merely its 32 account is valid except the account's password is expired (such as indicated 36 PasswordChangeRequired the same as an account that is invalid for any other 69 - An account with an expired password must not be allowed to use the BMC (except 83 - The BMC has at least one account with a default password built in. 94 and is not based on time. An account with an expired password is neither 102 access via an account which has an expired password. If the access [all …]
|
/openbmc/openbmc/poky/meta/recipes-extended/sudo/files/ |
H A D | sudo.pam | 3 account include common-account
|
/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/pam.d/ |
H A D | login | 49 # account requisite pam_time.so 54 # account required pam_access.so 74 # Standard Un*x account and session 75 account include common-account
|
H A D | chfn | 13 account include common-account
|
H A D | chsh | 18 account include common-account
|
/openbmc/bmcweb/config/ |
H A D | pam-webserver | 7 account include common-account
|
/openbmc/openbmc/poky/meta/recipes-graphics/wayland/weston-init/ |
H A D | weston-autologin | 4 account required pam_nologin.so 5 account required pam_unix.so
|
/openbmc/linux/fs/smb/server/ |
H A D | ksmbd_netlink.h | 130 __s8 account[KSMBD_REQ_MAX_ACCOUNT_NAME_SZ]; /* user account name */ member 141 __s8 account[KSMBD_REQ_MAX_ACCOUNT_NAME_SZ]; /* user account name */ member 199 __s8 account[KSMBD_REQ_MAX_ACCOUNT_NAME_SZ]; member 228 __s8 account[KSMBD_REQ_MAX_ACCOUNT_NAME_SZ]; /* user account name */ member
|
H A D | transport_ipc.h | 14 ksmbd_ipc_login_request(const char *account); 28 int ksmbd_ipc_logout_request(const char *account, int flags);
|