主权项 |
1. A method comprising:
receiving a first request by a user, the first request being received over a network by a light-out management (LOM) enabling unit, the first request being received while a host server hosting the LOM enabling unit is in a powered-down state; in response to receiving the first request, retrieving, by the LOM enabling unit, a LOM credential from a LOM data storage unit of the LOM enabling unit, wherein LOM credentials indicate which permissions are granted to each user from a group of users, and wherein users are added, removed, or both, from the group of users; authenticating, by the LOM enabling unit, the user based on the LOM credential from the LOM data storage unit, wherein the LOM data storage unit includes a current table of users, and wherein the current table of users is modified upon booting a host server operating system; upon authentication of the user in response to the first request, the LOM enabling unit fulfilling or enabling the user to fulfill the first request; powering up the host server hosting the LOM enabling unit after fulfilling the first request; receiving, by an application executing on the host server using a processor that is separate from the LOM enabling unit, a second request from the user to perform an operation, wherein the second request is different from the first request; in response to receiving the second request, retrieving, by the application, the LOM credential from the LOM data storage unit; authenticating, by the application, the user based on the LOM credential that is retrieved from the LOM data storage unit; and upon authentication of the user in response to the second request, the application fulfilling or enabling the user to fulfill the second request. |