We had a short discussion on 10/28 (at #openlmi) about enabling more granular access controls for CIM Operations. I took a few action items to find out how similar access controls were implemented in Dell iDRAC. Here is what I have:
Essentially, all the access controls are setup in the individual providers. On top of basic authentication for an incoming request, all the providers have an extra layer of authentication enabled. All the users in the system have pre-defined roles. And the CIM operations in the providers are categorized into Privilege levels. The role of the user in the incoming request is verified against his/her privilege level following a table as show in the attachment.
As providers in question are not open source, I cannot share the code for the same. Hope this helps.
Thank you
Praveen K Paladugu
Dell Linux Engineering