Security for AD Configuration
AD General Setting
Field | Type | Read only | Description |
---|---|---|---|
Status | String | False | Indicator of whether the AD service is enabled |
RacUserName | String | False | User name of an administrator of the AD server |
RacUserPassword | String | False | Password of the administrator |
RacDomain | String | False | Domain for the user |
DCserver1 | String | False | IP address of the AD server 1 |
DCserver2 | String | False | IP address of the AD server 2 |
DCserver3 | String | False | IP address of the AD server 3 |
Request
Get AD General Setting
GET https://{{ip}}/redfish/v1/AccountService/Oem/Lenovo/AD/GeneralSetting
Content-Type: application/json
Response
{
"@odata.context":
"/redfish/v1/$metadata#AccountService.AccountService
(DCServer3,@odata.id,Status,DCServer1,Name,RacUserName,DCServer2,Id,RacDomain)",
"@odata.etag": "\"1583375634\"",
"@odata.id": "/redfish/v1/AccountService/Oem/Lenovo/AD/GeneralSetting",
"@odata.type": "#AccountService.v1_5_0.AccountService",
"DCServer1": "192.168.101.253",
"DCServer2": "192.168.101.254",
"DCServer3": "192.168.101.255",
"Id": "AD Config",
"Name": "AccountService AD Config",
"RacDomain": "lenovo.com",
"RacUserName": "LNV023",
"Status": "enable"
}
Request
PATCH AD General Setting
PATCH https://{{ip}}/redfish/v1/AccountService/Oem/Lenovo/AD/GeneralSetting
Content-Type: application/json
Request body
The properties of this URL should be patched in a group. See the following example patch body:
{
"Status" : "enable",
"RacUserName" : "LNV024",
"RacUserPassword" : "pw2324",
"RacDomain" : "lenovo.com",
"DCServer1" : "192.168.101.253",
"DCServer2" : "192.168.101.254",
"DCServer3" : "192.168.101.255"
}
Response
The response content is 204 with no body.
AD Role Group Setting
Field | Type | Read only | Description |
---|---|---|---|
RoleGroupName | String | False | Role group name. |
RoleGroupDomain | String | False | Role group domain. |
RoleGroupPrivilege | Number | False | Privilege can be none, User, Operator, Administrator, or Oem. |
RoleGroupExtendPrivilege | String | False | Extended privilege, which can be configured as none, KVM enable, Vmedia enable, or both KVM and Vmedia enable. |
Request
Get AD Role Group Setting
GET https://{{ip}}/redfish/v1/AccountService/Oem/Lenovo/AD/RoleGroup/{id}
Content-Type: application/json
Response example
{
"@odata.context": "/redfish/v1/$metadata#AccountService.AccountService",
"@odata.etag": "\"1583378837\"",
"@odata.id": "/redfish/v1/AccountService/Oem/Lenovo/AD/RoleGroup/5",
"@odata.type": "#AccountService.v1_5_0.AccountService",
"Id": "AD USER",
"Name": "AccountService AD User",
"RoleGroupDomain": "lenovo.com",
"RoleGroupExtendPrivilege": "Vmedia enable",
"RoleGroupName": "LNV023",
"RoleGroupPrivilege": "Operator"
}
Request
PATCH AD Role Group Setting
PATCH https://{{ip}}/redfish/v1/AccountService/Oem/Lenovo/AD/RoleGroup/{id}
Content-Type: application/json
Request body
The properties of this URL should be patched in a group. See the following example patch body:
{
"RoleGroupName": "LNVGP1",
"RoleGroupDomain": "lenovo.com",
"RoleGroupPrivilege": "Administrator",
"RoleGroupExtendPrivilege": "KVM enable"
}
Response
The response content is 204 with no body.