Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 5 of 5 for privileges (0.17 sec)

  1. docs/hotfixes.md

    Date:   Sat Jun 15 11:27:17 2019 -0700
    
        [security] Match ${aws:username} exactly instead of prefix match (#7791)
    
        This PR fixes a security issue where an IAM user based
        on his policy is granted more privileges than restricted
        by the users IAM policy.
    
        This is due to an issue of prefix based Matcher() function
        which was incorrectly matching prefix based on resource
        prefixes instead of exact match.
    ```
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Wed Feb 14 21:36:02 GMT 2024
    - 5K bytes
    - Viewed (0)
  2. cmd/warm-backend.go

    	Remove(ctx context.Context, object string, rv remoteVersionID) error
    	InUse(ctx context.Context) (bool, error)
    }
    
    const probeObject = "probeobject"
    
    // checkWarmBackend checks if tier config credentials have sufficient privileges
    // to perform all operations defined in the WarmBackend interface.
    func checkWarmBackend(ctx context.Context, w WarmBackend) error {
    	remoteVersionID, err := w.Put(ctx, probeObject, strings.NewReader("MinIO"), 5)
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sun Apr 21 11:43:18 GMT 2024
    - 3.9K bytes
    - Viewed (0)
  3. cmd/iam.go

    		if parentInClaim != parentUser {
    			return false
    		}
    	} else {
    		// This is needed so a malicious user cannot
    		// use a leaked session key of another user
    		// to widen its privileges.
    		return false
    	}
    
    	isOwnerDerived := parentUser == globalActiveCred.AccessKey
    
    	var err error
    	var svcPolicies []string
    	roleArn := args.GetRoleArn()
    
    	switch {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 25 21:28:16 GMT 2024
    - 71.1K bytes
    - Viewed (1)
  4. docs/sts/ldap.md

    - find accounts whose group memberships have changed; access policies available to a credential are updated to reflect the change, i.e. they will lose any privileges associated with a group they are removed from, and gain any privileges associated with a group they are added to.
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 18.4K bytes
    - Viewed (1)
  5. cmd/admin-handlers-users_test.go

    	}
    
    	// 3.2 check that user cannot delete the bucket
    	err = uClient.RemoveBucket(ctx, bucket)
    	if err == nil || err.Error() != "Access Denied." {
    		c.Fatalf("User was able to escalate privileges (Err=%v)!", err)
    	}
    }
    
    func (s *TestSuiteIAM) TestAddServiceAccountPerms(c *check) {
    	ctx, cancel := context.WithTimeout(context.Background(), testDefaultTimeout)
    	defer cancel()
    
    	// 1. Create a policy
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Mon Feb 12 16:36:16 GMT 2024
    - 45.7K bytes
    - Viewed (0)
Back to top