|
Post by josephreynolds1 on Aug 2, 2021 16:21:29 GMT
This is a one-off question about a use case for an OEM authentication scheme. What is the right URI to upload an OEM authentication token?
The OEM authentication works like this (oversimplified) workflow: 1. The user generates an "access control file" (ACF), an ASN.1 format digitally-signed file which the BMC can authenticate and which allows a specific user to authenticate.
2. The admin uploads the ACF to the BMC. 3. The service user logs into the BMC (using the password associated with the ACF).
Specifically, I want a Redfish API for step 2 (upload user login credentials). What URI should be used?
We have considered: - The ACF is per user, so can we consider using an Account URI? /redfish/v1/AccountService/Accounts/service/Oem/IBM/Certificates/ACF
|
|
|
Post by josephreynolds1 on Aug 10, 2021 19:06:43 GMT
To clarify the post above: - The ACF file is ASN.1 but not intended to be an x509 certificate. (So maybe using a CertificateCollection is not appropriate?) - The ACF implementation is open sourced (currently in github.com/ibm-openbmc/ibm-acf). - The ACF authentication design and implementation is intended only for some IBM systems and related IBM OEM systems. No widespread industry adoption is anticipated.
|
|
|
Post by mraineri on Aug 11, 2021 12:52:23 GMT
As far as I can tell, that sort of ACF file doesn't map well to the Certificate resource. Today, the Certificate resource is very X.509 aligned. Given its uniqueness to IBM, it's probably best at this time to keep this as OEM content for a ManagerAccount resource. I would recommend a URI pattern such as "/redfish/v1/AccountService/Accounts/service/Oem/IBM/AccessControlFiles/{Id}" to avoid confusion with X.509 certificates.
|
|