Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for myclientid (0.06 sec)

  1. cmd/tier.go

    		if creds.SecretKey != "" {
    			cfg.Azure.AccountKey = creds.SecretKey
    		}
    		if creds.AzSP.TenantID != "" {
    			cfg.Azure.SPAuth.TenantID = creds.AzSP.TenantID
    		}
    		if creds.AzSP.ClientID != "" {
    			cfg.Azure.SPAuth.ClientID = creds.AzSP.ClientID
    		}
    		if creds.AzSP.ClientSecret != "" {
    			cfg.Azure.SPAuth.ClientSecret = creds.AzSP.ClientSecret
    		}
    	case madmin.GCS:
    		if creds.CredsJSON == nil {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 15.6K bytes
    - Viewed (0)
  2. cmd/common-main.go

    		m[name] = consoleoauth2.ProviderConfig{
    			URL:                     cfg.URL.String(),
    			DisplayName:             cfg.DisplayName,
    			ClientID:                cfg.ClientID,
    			ClientSecret:            cfg.ClientSecret,
    			HMACSalt:                globalDeploymentID(),
    			HMACPassphrase:          cfg.ClientID,
    			Scopes:                  strings.Join(cfg.DiscoveryDoc.ScopesSupported, ","),
    			Userinfo:                cfg.ClaimUserinfo,
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 32.5K bytes
    - Viewed (0)
  3. cmd/utils.go

    	if err != nil {
    		return "", fmt.Errorf("unable to create provider: %v", err)
    	}
    
    	// Configure an OpenID Connect aware OAuth2 client.
    	oauth2Config := oauth2.Config{
    		ClientID:     pro.ClientID,
    		ClientSecret: pro.ClientSecret,
    		RedirectURL:  pro.RedirectURL,
    
    		// Discovery returns the OAuth2 endpoints.
    		Endpoint: provider.Endpoint(),
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 33K bytes
    - Viewed (0)
  4. cmd/sts-handlers.go

    			isRolePolicyProvider = false
    		}
    	}
    
    	if !globalIAMSys.Initialized() {
    		writeSTSErrorResponse(ctx, w, ErrSTSIAMNotInitialized, errIAMNotInitialized)
    		return
    	}
    
    	// Validate JWT; check clientID in claims matches the one associated with the roleArn
    	if err := globalIAMSys.OpenIDConfig.Validate(r.Context(), roleArn, token, accessToken, r.Form.Get(stsDurationSeconds), claims); err != nil {
    		switch err {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 36.6K bytes
    - Viewed (0)
Back to top