Reference Guide

3 Lifecycle Controller Web Services Interface Guide for Linux
Contents
1 Introduction ..................................................................................................................................................... 13
2 References ...................................................................................................................................................... 14
3 Overview ......................................................................................................................................................... 15
3.1 Format for WS-Man CLI Examples in Document ........................................................................... 15
3.2 WS-Man Security and Time Parameters ........................................................................................ 16
3.2.1 Encryption Certificate Security .................................................................................... 16
3.2.2 Handling Invalid Responses from WS-Man Commands............................................. 16
3.2.3 Improving WS-Man Enumeration Performance .......................................................... 16
3.2.4 Specifying Time using WSMAN .................................................................................. 16
3.2.5 Return Values ............................................................................................................. 17
3.2.6 Specifying Integer values in WSMAN commands ...................................................... 17
3.2.7 Glossary ...................................................................................................................... 17
4 Discovery ........................................................................................................................................................ 18
4.1 Discovering Web Service Capability .............................................................................................. 18
4.2 Discovering what Profiles are implemented ................................................................................... 18
4.3 Discovering Implementation Namespace ....................................................................................... 19
5 Managing iDRAC Local User Accounts .......................................................................................................... 21
5.1 Description of iDRAC Attributes Versus Standard DMTF Model ................................................... 21
5.2 Account Inventory (using iDRAC Attributes) .................................................................................. 21
5.2.1 Account and Capabilities (using iDRAC Attributes) .................................................... 21
5.2.2 Privilege and Capabilities (using iDRAC Attributes) ................................................... 22
5.3 Manage Account Settings (using iDRAC Attributes) ...................................................................... 23
5.3.1 Modify User Name (using iDRAC Attributes) .............................................................. 23
5.3.2 Modify Password (using
iDRAC Attributes) ................................................................ 24
5.3.3 Modify Account State (using iDRAC Attributes) .......................................................... 24
5.3.4 Modify User Privilege (using iDRAC Attributes) .......................................................... 26
5.4 Account Inventory (using DMTF Model) ......................................................................................... 26
5.4.1 Account and Capabilities (using DMTF Model) .......................................................... 27
5.4.2 Privilege and Capabilities (using DMTF Model) .......................................................... 30
5.5 Manage Account Settings (using DMTF Model)............................................................................. 32
5.5.1 Modify User Name (using DMTF Model) .................................................................... 32
5.5.2 Modify Password (using DMTF Model) ....................................................................... 35
5.5.3 Modify Account State (using DMTF Model) ................................................................ 36
5.5.4 Modify User Privilege (using DMTF Model) ................................................................ 36
6 Firmware Inventory ......................................................................................................................................... 38
6.1 Software Inventory Profile Specification ......................................................................................... 38
6.2 Remote Inventory Method Invocation Get Software Inventory .................................................. 38