- Sort Score
- Num 10 results
- Language All
Results 1 - 9 of 9 for idToken (0.06 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
docs/sts/client-grants.go
defer resp.Body.Close() if resp.StatusCode != http.StatusOK { return nil, fmt.Errorf("%s", resp.Status) } var idpToken JWTToken if err = json.NewDecoder(resp.Body).Decode(&idpToken); err != nil { return nil, err } return &credentials.ClientGrantsToken{Token: idpToken.AccessToken, Expiry: idpToken.Expiry}, nil } func main() { flag.Parse() if clientID == "" || clientSecret == "" { flag.PrintDefaults()
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Thu Aug 19 01:35:22 GMT 2021 - 3.3K bytes - Click Count (0) -
docs/sts/wso2.md
1. The id_token is an identifier that is hard to guess. For example, a randomly generated string of sufficient length, that the server handling the protected resource can use to lookup the associated authorization information.
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 8.7K bytes - Click Count (0) -
docs/sts/web-identity.py
# we can now use the id_token as much as we want to access protected resources. tokens = json.loads(id_token_response.text) id_token = tokens['id_token'] response = sts_client.assume_role_with_web_identity( RoleArn='arn:aws:iam::123456789012:user/svc-internal-api', RoleSessionName='test', WebIdentityToken=id_token, DurationSeconds=3600 )Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Wed Jul 28 01:37:51 GMT 2021 - 2.9K bytes - Click Count (0) -
docs/sts/web-identity.go
flag.IntVar(&port, "port", 8080, "Port") } func implicitFlowURL(c oauth2.Config, state string) string { var buf bytes.Buffer buf.WriteString(c.Endpoint.AuthURL) v := url.Values{ "response_type": {"id_token"}, "response_mode": {"form_post"}, "client_id": {c.ClientID}, } if c.RedirectURL != "" { v.Set("redirect_uri", c.RedirectURL) } if len(c.Scopes) > 0 {
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri May 19 09:13:33 GMT 2023 - 7.8K bytes - Click Count (0) -
docs/sts/README.md
> > - [**AssumeRole**](https://github.com/minio/minio/blob/master/docs/sts/assume-role.md) > - [**AD/LDAP**](https://github.com/minio/minio/blob/master/docs/sts/ldap.md)
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 7.8K bytes - Click Count (0) -
docs/sts/dex.md
time="2020-07-12T20:45:50Z" level=info msg="config connector: mock" time="2020-07-12T20:45:50Z" level=info msg="config connector: local passwords enabled" time="2020-07-12T20:45:50Z" level=info msg="config response types accepted: [code token id_token]" time="2020-07-12T20:45:50Z" level=info msg="config using password grant connector: local" time="2020-07-12T20:45:50Z" level=info msg="config signing keys expire after: 3h0m0s"
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 3.8K bytes - Click Count (0) -
docs/sts/casdoor.md
``` ### Using WebIdentiy API On another terminal run `web-identity.go` a sample client application which obtains JWT id_tokens from an identity provider, in our case its Keycloak. Uses the returned id_token response to get new temporary credentials from the MinIO server using the STS API call `AssumeRoleWithWebIdentity`. ```
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 6.6K bytes - Click Count (0) -
internal/config/identity/openid/jwt.go
} claims["exp"] = time.Now().UTC().Add(defaultExpiryDuration).Unix() // update with new expiry. return nil } const ( audClaim = "aud" azpClaim = "azp" ) // Validate - validates the id_token. func (r *Config) Validate(ctx context.Context, arn arn.ARN, token, accessToken, dsecs string, claims map[string]any) error { jp := new(jwtgo.Parser) jp.ValidMethods = []string{ "RS256", "RS384", "RS512",
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 8.4K bytes - Click Count (0) -
docs/sts/keycloak.md
- Check that `account` client_id has the role 'admin' assigned in the "Service Account Roles" tab. After that, you will be able to obtain an id_token for the Admin REST API using client_id and client_secret: ``` curl \ -d "client_id=<YOUR_CLIENT_ID>" \ -d "client_secret=<YOUR_CLIENT_SECRET>" \ -d "grant_type=client_credentials" \
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 8.1K bytes - Click Count (0)