Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 9 of 9 for eclair (0.53 sec)

  1. cmd/iam.go

    		}
    
    		// Finally, if there is no parent policy, check if a policy claim is
    		// present in the session token.
    		if len(policies) == 0 {
    			// If there is no parent policy mapping, we fall back to
    			// using policy claim from JWT.
    			policySet, ok := args.GetPolicies(iamPolicyClaimNameOpenID())
    			if !ok {
    				// When claims are set, it should have a policy claim field.
    				return false
    			}
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 25 21:28:16 GMT 2024
    - 71.1K bytes
    - Viewed (1)
  2. cmd/sts-handlers_test.go

    // the i-th server in this will be applied the i-th policy in `rolePolicies`. If
    // a rolePolicies entry is an empty string, that server will be configured as
    // policy-claim based openid server. NOTE that a valid configuration can have a
    // policy claim based provider only if it is the only OpenID provider.
    func (s *TestSuiteIAM) SetUpOpenIDs(c *check, testApps []OpenIDClientAppParams, rolePolicies []string) error {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 25 15:50:16 GMT 2024
    - 85.7K bytes
    - Viewed (0)
  3. cmd/auth-handler.go

    	// secret key, temporary credentials become invalid if
    	// server admin credentials change. This is done to ensure
    	// that clients cannot decode the token using the temp
    	// secret keys and generate an entirely new claim by essentially
    	// hijacking the policies. We need to make sure that this is
    	// based on admin credential such that token cannot be decoded
    	// on the client side and is treated like an opaque value.
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 26K bytes
    - Viewed (0)
  4. cmd/bucket-policy.go

    		vStr, ok := v.(string)
    		if ok {
    			// Trim any LDAP specific prefix
    			args[strings.ToLower(strings.TrimPrefix(k, "ldap"))] = []string{vStr}
    		}
    	}
    
    	// Add groups claim which could be a list. This will ensure that the claim
    	// `jwt:groups` works.
    	if grpsVal, ok := claims["groups"]; ok {
    		if grpsIs, ok := grpsVal.([]interface{}); ok {
    			grps := []string{}
    			for _, gI := range grpsIs {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 8K bytes
    - Viewed (0)
  5. cmd/site-replication.go

    		return fmt.Errorf("STS credential could not be verified: %w", err)
    	}
    
    	mapClaims := claims.Map()
    	expiry, err := auth.ExpToInt64(mapClaims["exp"])
    	if err != nil {
    		return fmt.Errorf("Expiry claim was not found: %v: %w", mapClaims, err)
    	}
    
    	cred := auth.Credentials{
    		AccessKey:    stsCred.AccessKey,
    		SecretKey:    stsCred.SecretKey,
    		Expiration:   time.Unix(expiry, 0).UTC(),
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Wed May 01 01:09:56 GMT 2024
    - 184.2K bytes
    - Viewed (1)
  6. cmd/iam-store.go

    // or service credentials, mapped to all distinct roleARNs associated with the
    // parent user. The dummy role ARN is associated with parent users from
    // policy-claim based OpenID providers.
    func (store *IAMStoreSys) GetAllParentUsers() map[string]ParentUserInfo {
    	cache := store.rlock()
    	defer store.runlock()
    
    	res := map[string]ParentUserInfo{}
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sat Apr 27 10:04:10 GMT 2024
    - 75.2K bytes
    - Viewed (2)
  7. cmd/sts-handlers.go

    	// JWT claim keys
    	expClaim = "exp"
    	subClaim = "sub"
    	audClaim = "aud"
    	issClaim = "iss"
    
    	// JWT claim to check the parent user
    	parentClaim = "parent"
    
    	// LDAP claim keys
    	ldapUser  = "ldapUser"     // this is a key name for a DN value
    	ldapUserN = "ldapUsername" // this is a key name for the short/login username
    
    	// Role Claim key
    	roleArnClaim = "roleArn"
    )
    
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Wed May 01 21:31:13 GMT 2024
    - 34.7K bytes
    - Viewed (2)
  8. cmd/jwt.go

    		if !ok {
    			return nil, nil, false, errInvalidAccessKeyID
    		}
    		ucred := u.Credentials
    		// get embedded claims
    		eclaims, s3Err := checkClaimsFromToken(req, ucred)
    		if s3Err != ErrNone {
    			return nil, nil, false, errAuthentication
    		}
    
    		for k, v := range eclaims {
    			claims.MapClaims[k] = v
    		}
    
    		// if root access is disabled, disable all its service accounts and temporary credentials.
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Apr 19 16:45:14 GMT 2024
    - 5.4K bytes
    - Viewed (0)
  9. internal/auth/credentials.go

    	DefaultSecretKey = "minioadmin"
    )
    
    // Default access credentials
    var (
    	DefaultCredentials = Credentials{
    		AccessKey: DefaultAccessKey,
    		SecretKey: DefaultSecretKey,
    	}
    )
    
    // claim key found in credentials which are service accounts
    const iamPolicyClaimNameSA = "sa-policy"
    
    const (
    	// AccountOn indicates that credentials are enabled
    	AccountOn = "on"
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Wed May 01 12:41:13 GMT 2024
    - 11.7K bytes
    - Viewed (0)
Back to top