Method and system for detecting user permission of Redfish interface

A technology of user authority and authority, applied in transmission systems, electrical components, etc., can solve the problems of low efficiency and cumbersome operation of manual detection, and achieve the effect of facilitating rapid and accurate comparison of test return values, simple expression, and improving test efficiency.

Active Publication Date: 2019-12-24
SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a method and system for detecting the user authority of the Redfish interface to solve the problems of low efficiency and cumbersome operation of manual detection in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting user permission of Redfish interface
  • Method and system for detecting user permission of Redfish interface
  • Method and system for detecting user permission of Redfish interface

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to clearly illustrate the technical features of this solution, the present invention will be described in detail below through specific implementation modes and in conjunction with the accompanying drawings. The following disclosure provides many different embodiments or examples for implementing different structures of the present invention. To simplify the disclosure of the present invention, components and arrangements of specific examples are described below. Furthermore, the present invention may repeat reference numerals and / or letters in different instances. This repetition is for the purpose of simplicity and clarity and does not in itself indicate a relationship between the various embodiments and / or arrangements discussed. It should be noted that components illustrated in the figures are not necessarily drawn to scale. Descriptions of well-known components and processing techniques and processes are omitted herein to avoid unnecessarily limiting the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method for detecting user permission of a Redfish interface. The method comprises the steps of according to an interface permission design requirement, setting a permission control mechanism, the Redfish interface request is sent by a program; obtaining return information of a server, performing comprehensive detection on the viewing permission, the session ID deletion permission and the account operation permission of each user; comparing the result with the authority control mechanism to obtain the detection result of the current Redfish interfaceuser authority, the whole process does not need human participation, the test efficiency is improved, omission is not caused, and whether the requirement of the authority control mechanism is met is accurately and rapidly detected.

Description

technical field [0001] The invention relates to the technical field of interface authority detection, in particular to a method and system for detecting interface user authority of Redfish (a modern hardware management specification jointly proposed by Hewlett-Packard, Dell, Emerson and Intel). Background technique [0002] In today's server product BMC (Baseboard Management Controller, baseboard management controller), more and more BMCs start to use Redfish to manage servers. For BMCs with various user roles, a security assessment is required before leaving the factory. Redfish interface user authority control vulnerability detection is one of the important ones. [0003] Manually performing user access control vulnerabilities on the Redfish interface is an existing detection method. The test process is carried out with instructions, and the instructions for different operations are different, and the instructions also include sessionID for authentication. Different per...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/105H04L63/20
Inventor 常磊
Owner SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products