CN109409051A - A kind of user information configuration method and device - Google Patents
A kind of user information configuration method and device Download PDFInfo
- Publication number
- CN109409051A CN109409051A CN201811306237.7A CN201811306237A CN109409051A CN 109409051 A CN109409051 A CN 109409051A CN 201811306237 A CN201811306237 A CN 201811306237A CN 109409051 A CN109409051 A CN 109409051A
- Authority
- CN
- China
- Prior art keywords
- structure body
- order line
- user
- request message
- parameter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3058—Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component, e.g. monitoring of power, currents, temperature, humidity, position, vibrations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Quality & Reliability (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a kind of user information configuration method and devices, comprising: receives order line, and the parameter of verification command row using order line parsing module;Using order line parsing module by order line assignment to global user's information structure body;Global user's information structure body assignment is packaged by use information processing module to request message structure body;Parameter in use information processing module checking request message structure body;User information configuration is carried out by the parameter in request message structure body based on verification result use information processing module.Technical solution of the present invention is able to use order line to carry out user information configuration to different BMC or different types of BMC, is not necessarily to login system, improves operational safety.
Description
Technical field
The present invention relates to computer fields, and more specifically, more particularly to a kind of user information configuration method and dress
It sets.
Background technique
Baseboard controller (BMC) can be formed by the information of the voltage of monitoring system, fan, power supply and hardware resource
Log shows the operating status of information alert custom system and the information of system, is that can pass through BMC when system goes wrong
It is checked.Sometimes for using BMC subscriber information module to be managed user information and the operation such as authority distribution, and manage
Member needs login system that could configure to user information, such as because of maloperation, may will affect the safety of system.
Administrator's login system in the prior art may cause maloperation influence safety aiming at the problem that, at present there has been no
Effective solution scheme.
Summary of the invention
In view of this, the purpose of the embodiment of the present invention is to propose a kind of user information configuration method and device, can make
User information configuration is carried out to different BMC or different types of BMC with order line, is not necessarily to login system, improves safe operation
Property.
Based on above-mentioned purpose, the one side of the embodiment of the present invention provides a kind of user information configuration method, including following
Step:
Order line, and the parameter of verification command row are received using order line parsing module;
Using order line parsing module by order line assignment to global user's information structure body;
Global user's information structure body assignment is packaged by use information processing module to request message structure body;
Parameter in use information processing module checking request message structure body;
User information is carried out by the parameter in request message structure body based on verification result use information processing module to match
It sets.
In some embodiments, the parameter of order line includes command function row, and the parameter of verification command row includes following
Step:
List all available command function rows;
Judge whether the command function row of order line is available command function row;
When the command function row of order line is available, judge the non-functional command line parameter value of order line whether meet with
The relevant pre-defined rule of command function row.
In some embodiments, available command function row includes at least one of: get, set, del, id,
Username, passwd, operator, complexity.
In some embodiments, the parameter in checking request message structure body includes:
Judge whether the User ID in request message structure body is occupied;
When the User ID in request message structure body is occupied, order line is determined as to require modification and User ID
Corresponding user information;
When the User ID in request message structure body is unoccupied, order line is determined as requiring to be established according to User ID
Corresponding user information.
In some embodiments, the parameter in checking request message structure body further include:
When the password complexity in request message structure body is enabled to be had been switched on, password complexity information is verified.
In some embodiments, when password complexity information is unsatisfactory for pre-provisioning request, method is terminated, not according to request
Parameter in message structure body adds new user or Modify password to execute.
In some embodiments, the ginseng in request message structure body is passed through based on verification result use information processing module
It includes: to carry out user information configuration by Intelligent Platform Management Interface that number, which carries out user information configuration,.
In some embodiments, method further include: carrying out user information with postponing, use information processing module will be used
The result of family information configuration is stored in results messages structural body and by the information in results messages structural body after format analysis processing
It shows.
The another aspect of the embodiment of the present invention additionally provides a kind of user information configuration device, comprising:
At least one processor;With
Memory is stored with the program code that processor can be run, and wherein program code includes:
Order line parsing module, for receiving the parameter of order line and verification command row;Order line assignment is used to the overall situation
Family information structure;With
Message processing module, for global user's information structure body assignment to be packaged to request message structure body;It tests
Demonstrate,prove the parameter in request message structure body;And user's letter is carried out by the parameter in request message structure body based on verification result
Breath configuration.
The another aspect of the embodiment of the present invention additionally provides a kind of server, or configures dress with above-mentioned user information
It sets.
The present invention has following advantageous effects: user information configuration method provided in an embodiment of the present invention and device,
The parameter that order line and verification command row are received by using order line parsing module, by order line assignment to global user information
Structural body;Global user's information structure body assignment is packaged by use information processing module to request message structure body, verifying
Parameter in request message structure body simultaneously carries out user information by the parameter in request message structure body based on verification result and matches
The technical solution set is able to use order line to carry out user information configuration to different BMC or different types of BMC, without stepping on
Recording system improves operational safety.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
Other embodiments are obtained according to these attached drawings.
Fig. 1 is the flow diagram of user information configuration method provided by the invention;
Fig. 2 is the detail flowchart of user information configuration method provided by the invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with specific embodiment, and reference
The embodiment of the present invention is further described in attached drawing.
It should be noted that all statements for using " first " and " second " are for differentiation two in the embodiment of the present invention
The non-equal entity of a same names or non-equal parameter, it is seen that " first ", " second " do not answer only for the convenience of statement
It is interpreted as the restriction to the embodiment of the present invention, subsequent embodiment no longer illustrates this one by one.
Based on above-mentioned purpose, the first aspect of the embodiment of the present invention proposes one kind and is able to use order line and comes to not
The embodiment of the method for user information configuration is carried out with BMC or different types of BMC.Shown in fig. 1 is use provided by the invention
The flow diagram of the embodiment of family information configuring methods.
The user information configuration method, comprising the following steps:
Step S101 receives order line, and the parameter of verification command row using order line parsing module;
Step S103, using order line parsing module by order line assignment to global user's information structure body;
Step S105, use information processing module carry out global user's information structure body assignment to request message structure body
Encapsulation;
Step S107, the parameter in use information processing module checking request message structure body;
Step S109 is used based on verification result use information processing module by the parameter in request message structure body
Family information configuration.
In the prior art when carrying out user configuration, administrator, which needs to log in BMC, to configure user information, accidentally
Operation may will affect the safety of system, and can be complete if configure user information using command line interface
Maloperation is avoided the problem that entirely.The embodiment of the present invention proposes a kind of method and device for realizing BMC user configuration order line, passes through
Addition and delete user information, addition or modification user right, the function of user name and password carries out configuration operation to user,
Facilitate administrator to configure by way of order line to user information, improves the safety of system.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, Ke Yitong
Computer program is crossed to instruct related hardware and complete, the program can be stored in a computer-readable storage medium,
The program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can for magnetic disk,
CD, read-only memory (ROM) or random access memory (RAM) etc..The embodiment of the computer program, Ke Yida
The effect identical or similar to corresponding aforementioned any means embodiment.
In some embodiments, the parameter of order line includes command function row, and the parameter of verification command row includes following
Step:
List all available command function rows;
Judge whether the command function row of order line is available command function row;
When the command function row of order line is available, judge the non-functional command line parameter value of order line whether meet with
The relevant pre-defined rule of command function row.
In some embodiments, available command function row includes at least one of: get, set, del, id,
Username, passwd, operator, complexity.Each parameter list corresponds to this different function.Correspondingly,
User function order line includes that user's addition function, user's deletion function, user password complexity ena-bung function and modification are used
Family informational function.When adding and modifying user, User ID, user name, user password, user right can be operated.
Delete operation can be carried out to User ID when deleting user.Enabled user's complexity is to carry out verification operation to password.
Disclosed method is also implemented as the computer program executed by CPU, the calculating according to embodiments of the present invention
Machine program may be stored in a computer readable storage medium.When the computer program is executed by CPU, executes the present invention and implement
The above-mentioned function of being limited in method disclosed in example.Above method step also can use controller and for storing so that controlling
Device realizes that the computer readable storage medium of the computer program of above-mentioned steps is realized.
In some embodiments, the parameter in checking request message structure body includes:
Judge whether the User ID in request message structure body is occupied;
When the User ID in request message structure body is occupied, order line is determined as to require modification and User ID
Corresponding user information;
When the User ID in request message structure body is unoccupied, order line is determined as requiring to be established according to User ID
Corresponding user information.
In some embodiments, the parameter in checking request message structure body further include:
When the password complexity in request message structure body is enabled to be had been switched on, password complexity information is verified.
In some embodiments, when password complexity information is unsatisfactory for pre-provisioning request, method is terminated, not according to request
Parameter in message structure body adds new user or Modify password to execute.
In some embodiments, the ginseng in request message structure body is passed through based on verification result use information processing module
It includes: to carry out user information configuration by Intelligent Platform Management Interface that number, which carries out user information configuration,.
The various illustrative steps in conjunction with described in disclosure herein may be implemented as electronic hardware, computer software or
The combination of the two.In order to clearly demonstrate this interchangeability of hardware and software, with regard to the function of various illustrated steps
General description has been carried out to it.This function be implemented as software be also implemented as hardware depending on concrete application with
And it is applied to the design constraint of whole system.Those skilled in the art can realize in various ways for every kind of concrete application
The function, but this realization decision should not be interpreted as causing a departure from range disclosed by the embodiments of the present invention.
As shown in Fig. 2, request message structure body and results messages structural body are designed first, by global user's information structure body
Corresponding data be assigned to message structure body and be packaged, then the data in message structural body are verified.As user id
In the presence of, user information can be modified, new user information is otherwise added;When adding new user information or Modify password, judge
Whether password complexity enabled state opens, if enabled, checks password complexity information.Finally can by the message of encapsulation into
Row is sent, and completes user information inquiry and configuration feature by IPMI protocol.
In some embodiments, method further include: carrying out user information with postponing, use information processing module will be used
The result of family information configuration is stored in results messages structural body and by the information in results messages structural body after format analysis processing
It shows.
In one or more exemplary designs, the function can be real in hardware, software, firmware or any combination thereof
It is existing.If realized in software, can be stored in using the function as one or more instruction or code computer-readable
It is transmitted on medium or by computer-readable medium.Computer-readable medium includes computer storage media and communication media,
The communication media includes any medium for helping for computer program to be transmitted to another position from a position.Storage medium
It can be any usable medium that can be accessed by a general purpose or special purpose computer.As an example and not restrictive, the computer
Readable medium may include RAM, ROM, EEPROM, CD-ROM or other optical disc memory apparatus, disk storage equipment or other magnetic
Property storage equipment, or can be used for carry or storage form be instruct or data structure required program code and can
Any other medium accessed by general or specialized computer or general or specialized processor.In addition, any connection is ok
It is properly termed as computer-readable medium.For example, if using coaxial cable, optical fiber cable, twisted pair, digital subscriber line
(DSL) or such as wireless technology of infrared ray, radio and microwave to send software from website, server or other remote sources,
Then above-mentioned coaxial cable, optical fiber cable, twisted pair, DSL or such as wireless technology of infrared ray, radio and microwave are included in
The definition of medium.As used herein, disk and CD include compact disk (CD), laser disk, CD, digital versatile disc
(DVD), floppy disk, Blu-ray disc, wherein disk usually magnetically reproduce data, and CD using laser optics reproduce data.On
The combination for stating content should also be as being included in the range of computer-readable medium.
From above-described embodiment as can be seen that user information configuration method provided in an embodiment of the present invention, by using order
Row parsing module receives the parameter of order line and verification command row, by order line assignment to global user's information structure body;It uses
Global user's information structure body assignment is packaged by message processing module to request message structure body, checking request message structure
Parameter in body and the technical solution for carrying out user information configuration by the parameter in request message structure body based on verification result,
It is able to use order line to carry out user information configuration to different BMC or different types of BMC, is not necessarily to login system, improve behaviour
Make safety.
It is important to note that each step in each embodiment of above-mentioned user information configuration method can phase
Mutually intersect, replace, increase, delete, therefore, these reasonable permutation and combination transformation should also be as belonging in user information configuration method
In protection scope of the present invention, and protection scope of the present invention should not be confined on the embodiment.
Based on above-mentioned purpose, the second aspect of the embodiment of the present invention proposes one kind and is able to use order line and comes to not
The embodiment of the device of user information configuration is carried out with BMC or different types of BMC.Described device includes:
At least one processor;With
Memory is stored with the program code that processor can be run, and wherein program code includes:
Order line parsing module, for receiving the parameter of order line and verification command row;Order line assignment is used to the overall situation
Family information structure;With
Message processing module, for global user's information structure body assignment to be packaged to request message structure body;It tests
Demonstrate,prove the parameter in request message structure body;And user's letter is carried out by the parameter in request message structure body based on verification result
Breath configuration.
It can be various electric terminal equipments, such as mobile phone, a number that the embodiment of the present invention, which discloses described device, equipment etc.,
Word assistant (PDA), tablet computer (PAD), smart television etc., are also possible to large-scale terminal device, such as server, therefore this hair
Protection scope disclosed in bright embodiment should not limit as certain certain types of device, equipment.The embodiment of the present invention discloses described
Client can be with the combining form of electronic hardware, computer software or both be applied to any one of the above electric terminal
In equipment.
Computer readable storage medium (such as memory) as described herein can be volatile memory or non-volatile
Memory, or may include both volatile memory and nonvolatile memory.As an example and not restrictive, it is non-easy
The property lost memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically-erasable
Programming ROM (EEPROM) or flash memory.Volatile memory may include random access memory (RAM), which can
To serve as external cache.As an example and not restrictive, RAM can be obtained in a variety of forms, such as synchronous
RAM (DRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate SDRAM (DDR SDRAM), enhancing SDRAM
(ESDRAM), synchronization link DRAM (SLDRAM) and directly Rambus RAM (DRRAM).The storage of disclosed aspect is set
The standby memory for being intended to including but not limited to these and other suitable type.
Based on above-mentioned purpose, in terms of the third of the embodiment of the present invention, proposes one kind and be able to use order line and come to not
The embodiment of the server of user information configuration is carried out with BMC or different types of BMC.Server has above-mentioned user information
Configuration device.
The various exemplary servers in conjunction with described in disclosure herein, which can use, to be designed to execute institute here
The following component of function is stated to realize or execute: general processor, digital signal processor (DSP), specific integrated circuit
(ASIC), field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hard
Any combination of part component or these components.General processor can be microprocessor, but alternatively, and processor can be with
It is any conventional processors, controller, microcontroller or state machine.Processor also may be implemented as calculating the combination of equipment,
For example, the combination of DSP and microprocessor, multi-microprocessor, one or more microprocessors combination DSP and/or any other
This configuration.
From above-described embodiment as can be seen that user information configuration device provided in an embodiment of the present invention and server, all
The parameter that order line and verification command row are received using order line parsing module is crossed, by order line assignment to global user information knot
Structure body;Global user's information structure body assignment is packaged by use information processing module to request message structure body, and verifying is asked
It seeks the parameter in message structure body and user information configuration is carried out by the parameter in request message structure body based on verification result
Technical solution, be able to use order line to carry out user information configuration to different BMC or different types of BMC, without logging in
System improves operational safety.
It is important to note that above-mentioned user information configuration device and the embodiment of server are believed using the user
The embodiment of configuration method is ceased to illustrate the course of work of each module, and those skilled in the art can be it is readily conceivable that will
These module applications are into the other embodiments of the user information configuration method.Certainly, due to the user information configuration side
Each step in method embodiment can be intersected, replaces, increases, be deleted, therefore, these reasonable permutation and combination transformation
Should also be as belonging to the scope of protection of the present invention in the user information configuration device and server, and should not will be of the invention
Protection scope is confined on the embodiment.
It is exemplary embodiment disclosed by the invention above, it should be noted that in the sheet limited without departing substantially from claim
Under the premise of inventive embodiments scope of disclosure, it may be many modifications and modify.According to open embodiment described herein
The function of claim to a method, step and/or movement be not required to the execution of any particular order.In addition, although the present invention is implemented
Element disclosed in example can be described or be required in the form of individual, but be unless explicitly limited odd number, it is understood that be multiple.
It should be understood that it is used in the present context, unless the context clearly supports exceptions, singular " one
It is a " it is intended to also include plural form.It is to be further understood that "and/or" used herein refers to including one or one
Any and all possible combinations of a above project listed in association.The embodiment of the present invention discloses embodiment sequence number
Description, does not represent the advantages or disadvantages of the embodiments.
It should be understood by those ordinary skilled in the art that: the discussion of any of the above embodiment is exemplary only, not
It is intended to imply that range disclosed by the embodiments of the present invention (including claim) is limited to these examples;In the think of of the embodiment of the present invention
Under road, it can also be combined between the technical characteristic in above embodiments or different embodiments, and exist as described above
Many other variations of the different aspect of the embodiment of the present invention, for simplicity, they are not provided in details.Therefore, all at this
Within the spirit and principle of inventive embodiments, any omission, modification, equivalent replacement, improvement for being made etc. should be included in this hair
Within the protection scope of bright embodiment.
Claims (10)
1. a kind of user information configuration method, which comprises the following steps:
Order line is received using order line parsing module, and verifies the parameter of the order line;
Using order line parsing module by the order line assignment to global user's information structure body;
The global user's information structure body assignment is packaged by use information processing module to request message structure body;
Use information processing module verifies the parameter in the request message structure body;
User's letter is carried out by the parameter in the request message structure body based on the verification result use information processing module
Breath configuration.
2. being verified the method according to claim 1, wherein the parameter of the order line includes command function row
The parameter of the order line the following steps are included:
List all available command function rows;
Judge whether the command function row of the order line is available command function row;
When the command function row of the order line is available, judge whether the non-functional command line parameter value of the order line accords with
Close pre-defined rule relevant to the command function row.
3. according to the method described in claim 2, it is characterized in that, the available command function row include it is following at least it
One: get, set, del, id, username, passwd, operator, complexity.
4. the method according to claim 1, wherein the parameter verified in the request message structure body includes:
Judge whether the User ID in the request message structure body is occupied;
When the User ID in the request message structure body is occupied, the order line is determined as to require modification and institute
State the corresponding user information of User ID;
When the User ID in the request message structure body is unoccupied, the order line is determined as requiring according to the use
Family ID establishes corresponding user information.
5. according to the method described in claim 4, it is characterized in that, the parameter verified in the request message structure body is also wrapped
It includes:
When the password complexity in the request message structure body is enabled to be had been switched on, password complexity information is verified.
6. according to the method described in claim 5, it is characterized in that, when the password complexity information is unsatisfactory for pre-provisioning request
Method terminates, and the new user of addition or Modify password are not executed according to the parameter in the request message structure body.
7. the method according to claim 1, wherein being passed through based on the verification result use information processing module
It includes: to carry out the use by Intelligent Platform Management Interface that parameter in the request message structure body, which carries out user information configuration,
Family information configuration.
8. the method according to claim 1, wherein further include: match in progress user information and postpones, use information
The result that user information configures is stored in results messages structural body and will be in the results messages structural body by processing module
Information is shown after format analysis processing.
9. a kind of user information configuration device characterized by comprising
At least one processor;With
Memory is stored with the program code that processor can be run, and wherein said program code includes:
Order line parsing module, for receiving order line and verifying the parameter of the order line;By the order line assignment to entirely
Office's user's information structure body;With
Message processing module, for the global user's information structure body assignment to be packaged to request message structure body;It tests
Demonstrate,prove the parameter in the request message structure body;And the ginseng in the request message structure body is passed through based on the verification result
Number carries out user information configuration.
10. a kind of server, which is characterized in that have user information configuration device as claimed in claim 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811306237.7A CN109409051A (en) | 2018-11-05 | 2018-11-05 | A kind of user information configuration method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811306237.7A CN109409051A (en) | 2018-11-05 | 2018-11-05 | A kind of user information configuration method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109409051A true CN109409051A (en) | 2019-03-01 |
Family
ID=65471619
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811306237.7A Pending CN109409051A (en) | 2018-11-05 | 2018-11-05 | A kind of user information configuration method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109409051A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111597518A (en) * | 2020-04-21 | 2020-08-28 | 云知声智能科技股份有限公司 | Docker engine user authority security control method and device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859158A (en) * | 2005-08-05 | 2006-11-08 | 华为技术有限公司 | Command line conflict detecting and service configuration realizing method |
CN102902547A (en) * | 2012-10-18 | 2013-01-30 | 上海师范大学 | Command construction and analysis method of command line interface |
CN102902493A (en) * | 2012-10-09 | 2013-01-30 | 上海斐讯数据通信技术有限公司 | Storage device and storage method for port information |
CN104503798A (en) * | 2014-12-29 | 2015-04-08 | 杭州华三通信技术有限公司 | Method and device for configuring server |
CN106911499A (en) * | 2017-02-19 | 2017-06-30 | 郑州云海信息技术有限公司 | The method and device that a kind of rapid configuration BMC systems are set |
CN107895107A (en) * | 2017-12-21 | 2018-04-10 | 郑州云海信息技术有限公司 | A kind of method and system of batch setting BMC username and passwords |
-
2018
- 2018-11-05 CN CN201811306237.7A patent/CN109409051A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859158A (en) * | 2005-08-05 | 2006-11-08 | 华为技术有限公司 | Command line conflict detecting and service configuration realizing method |
CN102902493A (en) * | 2012-10-09 | 2013-01-30 | 上海斐讯数据通信技术有限公司 | Storage device and storage method for port information |
CN102902547A (en) * | 2012-10-18 | 2013-01-30 | 上海师范大学 | Command construction and analysis method of command line interface |
CN104503798A (en) * | 2014-12-29 | 2015-04-08 | 杭州华三通信技术有限公司 | Method and device for configuring server |
CN106911499A (en) * | 2017-02-19 | 2017-06-30 | 郑州云海信息技术有限公司 | The method and device that a kind of rapid configuration BMC systems are set |
CN107895107A (en) * | 2017-12-21 | 2018-04-10 | 郑州云海信息技术有限公司 | A kind of method and system of batch setting BMC username and passwords |
Non-Patent Citations (1)
Title |
---|
张兴龙: "IPMITOOL 配置BMC用户设置", 《HTTPS://WWW.CNBLOGS.COM/ZHANGXINGLONG/P/5237980.HTML》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111597518A (en) * | 2020-04-21 | 2020-08-28 | 云知声智能科技股份有限公司 | Docker engine user authority security control method and device |
CN111597518B (en) * | 2020-04-21 | 2023-05-05 | 云知声智能科技股份有限公司 | Method and device for controlling user permission security of Docker engine |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20140351882A1 (en) | Systems and methods for the rapid deployment of network security devices | |
CN109510846A (en) | API Calls system, method, apparatus, electronic equipment and storage medium | |
US10187386B2 (en) | Native enrollment of mobile devices | |
US9280646B1 (en) | Methods, systems, and computer readable mediums for role-based access control involving one or more converged infrastructure systems | |
CN110324399B (en) | Bringing cluster awareness into a facility management portal | |
US11483199B2 (en) | Linking multiple enrollments on a client device | |
JP2017527912A (en) | Method, device and system for invoking a local service assembly by a browser | |
WO2018082487A1 (en) | Method, device and system for network slice management | |
CN110855488B (en) | Virtual machine access method and device | |
CN106330880A (en) | Management method for address book and home gateway | |
US20210099339A1 (en) | Template-based onboarding of internet-connectible devices | |
CN109446093B (en) | Method and device for testing expansion platform interface | |
CN111865662A (en) | Network equipment configuration method and system | |
CN109196891A (en) | A kind of management method, terminal and the server of subscription data collection | |
CN109409051A (en) | A kind of user information configuration method and device | |
KR20220041706A (en) | Authentication method and device, computing equipment and medium | |
CN115250234A (en) | Method, device, equipment, system and storage medium for deploying network equipment | |
CN107547217B (en) | Router service configuration method and router | |
US20180069762A1 (en) | Device asset tracking and service desk using an external network management system as a data source | |
US20220417039A1 (en) | Manufacturer usage description mud file obtaining method and device | |
CN109600267A (en) | A kind of the physical port switching method and device of network link | |
CN111858538B (en) | Method, device, equipment and medium for configuring BeeGFS quota by cluster | |
CN109408272A (en) | A kind of storage fault handling method and device | |
WO2018018459A1 (en) | Policy processing method and device | |
US10033528B2 (en) | Method of communicating between a server and a secure element |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190301 |