The AccountService schema defines an account service. The properties are common to, and enable management of, all user accounts. The properties include the password requirements and control features, such as account lockout. Properties and actions in this service specify general behavior that should be followed for typical accounts, however implementations might override these behaviors for special accounts or situations to avoid denial of service or other deadlock situations.
Privilege: Login
Note: DMTF implementation for Redfish does not display all the assigned roles for a user. To view all the privileges, see the Users section in iDRAC GUI under iDRAC Settings.
Note: This URI has been updated to meet the latest Redfish specification based URI naming conventions. The following non-compliant URI may get deprecated in future releases. Old URI: '/redfish/v1/Managers/iDRAC.Embedded.1/AccountService'
username:passwordAuthorization: Basic *****************X-Auth-Token: ********************curl --location '/redfish/v1/AccountService' \
--header 'Authorization: Basic <encoded-value>'{
"@odata.context": "/redfish/v1/$metadata#AccountService.AccountService",
"@odata.etag": "130419587224",
"@odata.id": "/redfish/v1/AccountService",
"@odata.type": "#AccountService.v1_15_1.AccountService",
"AccountLockoutCounterResetAfter": 0,
"AccountLockoutDuration": 0,
"AccountLockoutThreshold": 0,
"Accounts": {
"@odata.id": "/redfish/v1/AccountService/Accounts"
},
"ActiveDirectory": {
"AccountProviderType": "ActiveDirectoryService",
"Authentication": {
"AuthenticationType": "UsernameAndPassword",
"KerberosKeytab": null
},
"Certificates": {
"@odata.id": "/redfish/v1/AccountService/ActiveDirectory/Certificates"
},
"RemoteRoleMapping": [
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
}
],
"RemoteRoleMapping@odata.count": 15,
"ServiceAddresses": [
"",
"",
""
],
"ServiceAddresses@odata.count": 3,
"ServiceEnabled": false
},
"AdditionalExternalAccountProviders": {
"@odata.id": "/redfish/v1/AccountService/ExternalAccountProviders"
},
"AuthFailureLoggingThreshold": 2,
"Description": "BMC User Accounts",
"Id": "RemoteAccountService",
"LDAP": {
"AccountProviderType": "LDAPService",
"Authentication": {
"AuthenticationType": "UsernameAndPassword"
},
"Certificates": {
"@odata.id": "/redfish/v1/AccountService/LDAP/Certificates"
},
"LDAPService": {
"SearchSettings": {
"BaseDistinguishedNames": [
""
],
"BaseDistinguishedNames@odata.count": 1,
"GroupNameAttribute": "",
"UsernameAttribute": ""
}
},
"RemoteRoleMapping": [
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
},
{
"LocalRole": "None",
"RemoteGroup": ""
}
],
"RemoteRoleMapping@odata.count": 15,
"ServiceAddresses": [
""
],
"ServiceAddresses@odata.count": 1,
"ServiceEnabled": false
},
"LocalAccountAuth": "Fallback",
"MaxPasswordLength": 127,
"MinPasswordLength": 1,
"Name": "Account Service",
"PasswordExpirationDays": null,
"PrivilegeMap": {
"@odata.id": "/redfish/v1/Managers/iDRAC.Embedded.1/PrivilegeRegistry"
},
"Roles": {
"@odata.id": "/redfish/v1/AccountService/Roles"
},
"ServiceEnabled": true,
"Status": {
"Health": "OK",
"State": "Enabled"
},
"SupportedAccountTypes": [
"Redfish",
"SNMP",
"OEM",
"HostConsole",
"ManagerConsole",
"IPMI",
"KVMIP",
"VirtualMedia",
"WebUI"
],
"SupportedOEMAccountTypes": [
"IPMI",
"SOL",
"WSMAN",
"UI",
"Racadm"
]
}