summaryrefslogtreecommitdiffstats
path: root/xyz/openbmc_project/User/Ldap/Config.interface.yaml
Commit message (Collapse)AuthorAgeFilesLines
* Ldap: Add the BindDn password in the config interfaceRatan Gupta2019-04-101-0/+13
| | | | | | | | | | | | | | | | | Specifies the credentials with which to bind,Implementation should consider changing the permissions of the underlying file to only grant access to the root user. This property value should not be reflected on the D-bus object itself. Implementation can use the given value and update the service implementing the LDAP client.This is just to facilitate the support for changing the bin dn password if needed. Currently this property is over D-bus, There are security concerns for the same, but once we find better way to update the ldap password we would fix it. Change-Id: I69a4334134c0567d67be4b0071a80b7c9977316e Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com>
* Re-enable "Add few additional properties in the LDAP config"Ratan Gupta2019-03-081-1/+10
| | | | | | | | | | | This commit enables the changes for the commit e5c0eef46a4fc09256332bf3afe699d60aaebbb3. The backend changes are done through the following commit https://gerrit.openbmc-project.xyz/#/c/openbmc/phosphor-user-manager/+/18552/ Change-Id: I3a8069b8bfb7947371084892875a282413b4c749 Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com>
* Revert "Add few additional properties in the LDAP config"Brad Bishop2019-02-201-10/+1
| | | | | | | | This reverts commit e5c0eef46a4fc09256332bf3afe699d60aaebbb3. The backend is not ready for this. Change-Id: I1ed768f904e9297407996a8e92d8105b636dd172 Signed-off-by: Brad Bishop <bradleyb@fuzziesquirrel.com>
* Add few additional properties in the LDAP configRatan Gupta2019-02-181-1/+10
| | | | | | | | | | | | | | | | | | | | | | User can provide these properties to configure the LDAP. UsernameAttribute: In certain ldap server userid is "cn" and in other ldap server it becomes "uid" GroupNameAttribute: In certain ldap server groupid is gid and in other ldap server is PrimaryGroupID etc. Both properties exist in the LDAP server and admin of LDAP server can opt for any property to specify the userID and same is true for other properties(GroupName). It is aligned with redfish also. https://redfish.dmtf.org/schemas/AccountService.v1_3_1.json Change-Id: I3689d03bd80f62cc26fe840a9176875499c87554 Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com>
* Fix invalid enum value in User/Ldap/Config.interface.yamlLei YU2019-01-091-1/+1
| | | | | | | | | | | | | | | | The interfaces sets the default value for a enum property to 0, which causes the generated server.hpp file contains code like: SearchScope _lDAPSearchScope = SearchScope::0; Fix it by specify the enum value instead of 0. Tested: Verify the generated code becomes below and pass the build. SearchScope _lDAPSearchScope = SearchScope::sub; Change-Id: I509b6968d32dec38d1592103df9821b2fc99b5d6 Signed-off-by: Lei YU <mine260309@gmail.com>
* Ldap: Remove the secure property from the ldap config and create interfaceRatan Gupta2018-11-071-8/+1
| | | | | | | | | | Secure property is not required as URI itself tells that whether the configured LDAP is secure or not. For secure server, URI would be ldaps://<hostname/ip> and for nonsecure ldap server URI would be ldap://<hostname/ip> Change-Id: Ieb1b1466f0da8f6bb5695595fab8ec1e5b0e9075 Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com>
* Don't store LDAP Bind passwordDeepak Kodihalli2018-11-071-8/+0
| | | | | | | | | | | | Remove LDAP Bind password from the Ldap.Config interface. It is unnecessary and undesirable to store this password in a D-Bus object. The Ldap.Create interface still accepts the Bind password, as before. If an admin has to change the Ldap bind password, they'd need to recreate the LDAP config. Change-Id: Ie5a8002bed3fd8c57500af588d9b010190f5ff9b Signed-off-by: Deepak Kodihalli <dkodihal@in.ibm.com>
* Declare errors in Config and Create interfacesNagaraju Goruganti2018-11-071-0/+1
| | | | | | | | | | | | The Config interface and Create interface can throw a "NoCACertificate" error. For example: If LDAP server's CA certificate not provided and someone tries to enable secure LDAP, this error should be thrown. Change-Id: Ie773245fb7c6b36f25cd1acca2bfc3b0391dfeac Signed-off-by: Nagaraju Goruganti <ngorugan@in.ibm.com> Signed-off-by: Deepak Kodihalli <dkodihal@in.ibm.com>
* Declare errors in config interfaceNagaraju Goruganti2018-10-051-0/+18
| | | | | | | | The config interface can throw an InternalFailure or InvalidArgument errors. Change-Id: Ida1a690e3b3137e621b27b788cfde28b7f31da5f Signed-off-by: Nagaraju Goruganti <ngorugan@in.ibm.com>
* Add an Interface to configure LDAP name service daemonNagaraju Goruganti2018-09-131-0/+57
It defines interfaces to create and to update LDAP config file. It defines two interfaces - one is to create a config file and the another one is to allow updates to happen to individual properties. Change-Id: I2f8182ad6d6d6945650d6ff0865c40106973fdec Signed-off-by: Nagaraju Goruganti <ngorugan@in.ibm.com>
OpenPOWER on IntegriCloud