- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 29 for LDAP (0.02 sec)
-
docs/site-replication/ldap.yaml
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Dec 09 01:34:52 UTC 2021 - 325 bytes - Viewed (0) -
docs/sts/ldap.go
flag.StringVar(&ldapUsername, "u", "", "AD/LDAP Username") flag.StringVar(&ldapPassword, "p", "", "AD/LDAP Password") flag.BoolVar(&displayCreds, "d", false, "Only show generated credentials") flag.DurationVar(&expiryDuration, "e", 0, "Request a duration of validity for the generated credential") flag.StringVar(&bucketToList, "b", "", "Bucket to list (defaults to ldap username)")
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Aug 07 12:59:47 UTC 2024 - 4K bytes - Viewed (0) -
docs/sts/rw-ldap-username.json
Harshavardhana <******@****.***> 1622223187 -0700
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 28 17:33:07 UTC 2021 - 201 bytes - Viewed (0) -
buildscripts/minio-iam-ldap-upgrade-import-test.sh
group_search_filter="(&(objectclass=groupOfNames)(member=%d))" mc admin service restart old-minio mc idp ldap policy attach old-minio readwrite --user=UID=dillon,ou=people,ou=swengg,dc=min,dc=io mc idp ldap policy attach old-minio readwrite --group=CN=project.c,ou=groups,ou=swengg,dc=min,dc=io mc idp ldap policy entities old-minio mc admin cluster iam export old-minio set +x mc admin service stop old-minio }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat May 18 18:19:01 UTC 2024 - 3.4K bytes - Viewed (0) -
internal/config/identity/ldap/config.go
) // Config contains AD/LDAP server connectivity information. type Config struct { LDAP ldap.Config stsExpiryDuration time.Duration // contains converted value } // Enabled returns if LDAP is enabled. func (l *Config) Enabled() bool { return l.LDAP.Enabled } // Clone returns a cloned copy of LDAP config. func (l *Config) Clone() Config { if l == nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Aug 07 12:59:47 UTC 2024 - 8.4K bytes - Viewed (0) -
.github/workflows/iam-integrations.yaml
if: matrix.ldap == 'ldaphost:389' env: _MINIO_LDAP_TEST_SERVER: ${{ matrix.ldap }} run: | make test-iam-ldap-upgrade-import - name: Test LDAP for automatic site replication if: matrix.ldap == 'localhost:389' run: | make test-site-replication-ldap - name: Test OIDC for automatic site replication
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Sep 17 16:45:46 UTC 2024 - 5.3K bytes - Viewed (0) -
internal/config/identity/ldap/help.go
package ldap import "github.com/minio/minio/internal/config" // Help template for LDAP identity feature. var ( defaultHelpPostfix = func(key string) string { return config.DefaultHelpPostfix(DefaultKVS, key) } Help = config.HelpKVS{ config.HelpKV{ Key: ServerAddr,
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 3.8K bytes - Viewed (0) -
docs/distributed/iam-import-with-missing-entities.sh
exit 1 fi # Kill MinIO and LDAP to start afresh with missing groups/DN pkill minio docker rm -f $(docker ps -aq) rm -rf /tmp/ldap{1..4} # Deploy the LDAP config witg missing groups/DN echo "Copying docs/distributed/samples/bootstrap-partial.ldif => minio-iam-testing/ldap/50-bootstrap.ldif" cp docs/distributed/samples/bootstrap-partial.ldif minio-iam-testing/ldap/50-bootstrap.ldif || exit 1 cd ./minio-iam-testing
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Sep 12 15:59:00 UTC 2024 - 4.5K bytes - Viewed (0) -
internal/config/identity/ldap/legacy.go
// along with this program. If not, see <http://www.gnu.org/licenses/>. package ldap import ( "github.com/minio/minio/internal/config" ) // LegacyConfig contains AD/LDAP server connectivity information from old config // V33. type LegacyConfig struct { Enabled bool `json:"enabled"` // E.g. "ldap.minio.io:636" ServerAddr string `json:"serverAddr"` // User DN search parameters
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Oct 08 05:12:36 UTC 2022 - 2.2K bytes - Viewed (0) -
cmd/sftp-server_test.go
suite := testCase suite.SetUpSuite(c) suite.SFTPServiceAccountLogin(c) suite.SFTPInvalidServiceAccountPassword(c) // LDAP tests ldapServer := os.Getenv(EnvTestLDAPServer) if ldapServer == "" { c.Skipf("Skipping LDAP test as no LDAP server is provided via %s", EnvTestLDAPServer) } suite.SetUpLDAP(c, ldapServer) suite.SFTPFailedAuthDueToMissingPolicy(c)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Jun 28 09:06:25 UTC 2024 - 8.3K bytes - Viewed (0)