- Sort Score
- Result 10 results
- Languages All
Results 1 - 4 of 4 for Claims (0.02 sec)
-
cmd/admin-handlers-users.go
// In case of LDAP/OIDC we need to set `opts.claims` to ensure // it is associated with the LDAP/OIDC user properly. for k, v := range cred.Claims { if k == expClaim { continue } opts.claims[k] = v } } else if globalIAMSys.LDAPConfig.Enabled() { // In case of LDAP we need to resolve the targetUser to a DN and // query their groups: opts.claims[ldapUserN] = targetUser // simple usernameRegistered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 90.6K bytes - Viewed (0) -
cmd/iam.go
} // Finally, if there is no parent policy, check if a policy claim is // present in the session token. if len(policies) == 0 { // If there is no parent policy mapping, we fall back to // using policy claim from JWT. policySet, ok := args.GetPolicies(iamPolicyClaimNameOpenID()) if !ok { // When claims are set, it should have a policy claim field. return false }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 75.3K bytes - Viewed (0) -
cmd/bucket-handlers.go
Action: policy.ListBucketAction, BucketName: bucketInfo.Name, ConditionValues: getConditionValues(r, "", cred), IsOwner: owner, ObjectName: "", Claims: cred.Claims, }) { bucketsInfo[n] = bucketInfo n++ } else if globalIAMSys.IsAllowed(policy.Args{ AccountName: cred.AccessKey, Groups: cred.Groups,
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 63.9K bytes - Viewed (0) -
cmd/iam-store.go
continue } var ( err error claims *jwt.MapClaims ) if cred.IsServiceAccount() { claims, err = getClaimsFromTokenWithSecret(cred.SessionToken, cred.SecretKey) } else if cred.IsTemp() { var secretKey string secretKey, err = getTokenSigningKey() if err != nil { continue } claims, err = getClaimsFromTokenWithSecret(cred.SessionToken, secretKey) }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 86.7K bytes - Viewed (0)