- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 152 for users4 (0.99 sec)
-
cmd/admin-handlers-users.go
return } for user := range users { checkedUserList = append(checkedUserList, user) } checkedUserList = append(checkedUserList, globalActiveCred.AccessKey) } else { for _, user := range users { // Validate the user _, ok := globalIAMSys.GetUser(ctx, user) if !ok { continue } checkedUserList = append(checkedUserList, user) } }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 90.6K bytes - Viewed (0) -
cmd/user-provider-utils.go
// getUserWithProvider - returns the appropriate internal username based on the user provider. // if validate is true, an error is returned if the user does not exist. func getUserWithProvider(ctx context.Context, userProvider, user string, validate bool) (string, error) { switch userProvider { case madmin.BuiltinProvider: if validate { if _, ok := globalIAMSys.GetUser(ctx, user); !ok { return "", errNoSuchUser } } return user, nil
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.1K bytes - Viewed (0) -
cmd/admin-handlers-users-race_test.go
accessKey, secretKey := mustGenerateCredentials(c) err = s.adm.SetUser(ctx, accessKey, secretKey, madmin.AccountEnabled) if err != nil { c.Fatalf("Unable to set user: %v", err) } userReq := madmin.PolicyAssociationReq{ Policies: []string{policy}, User: accessKey, } if _, err := s.adm.AttachPolicy(ctx, userReq); err != nil { c.Fatalf("Unable to attach policy: %v", err) }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4K bytes - Viewed (0) -
tests/generics_test.go
} else if len(users2) != len(users) { t.Fatalf("Failed to load join users, got: %v, expect: %v", len(users2), len(users)) } sort.Slice(users2, func(i, j int) bool { return users2[i].ID > users2[j].ID }) sort.Slice(users, func(i, j int) bool { return users[i].ID > users[j].ID }) for idx, user := range users { // user CheckUser(t, user, users2[idx])
Registered: Sun Sep 07 09:35:13 UTC 2025 - Last Modified: Thu Sep 04 13:13:16 UTC 2025 - 28K bytes - Viewed (0) -
cmd/iam-etcd-store.go
users := set.NewStringSet() for _, kv := range kvs { user := extractPathPrefixAndSuffix(string(kv.Key), prefix, path.Base(string(kv.Key))) users.Add(user) } return users } // Extract path string by stripping off the `prefix` value and the suffix, // value, usually in the following form. // // s := "config/iam/users/foo/config.json" // prefix := "config/iam/users/"
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 13.9K bytes - Viewed (0) -
docs/en/docs/tutorial/security/get-current-user.md
# Get Current User { #get-current-user } In the previous chapter the security system (which is based on the dependency injection system) was giving the *path operation function* a `token` as a `str`: {* ../../docs_src/security/tutorial001_an_py39.py hl[12] *} But that is still not that useful. Let's make it give us the current user. ## Create a user model { #create-a-user-model } First, let's create a Pydantic user model.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 4K bytes - Viewed (0) -
docs/sts/ldap.md
**Please note that when AD/LDAP is configured, MinIO will not support long term users defined internally.** Only AD/LDAP users (and the root user) are allowed. In addition to this, the server will not support operations on users or groups using `mc admin user` or `mc admin group` commands except `mc admin user info` and `mc admin group info` to list set policies for users and groups. This is because users and groups are defined externally in AD/LDAP. ## Configuring AD/LDAP on MinIO
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 18.9K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
```JSON { "detail": "Not authenticated" } ``` ### Inactive user { #inactive-user } Now try with an inactive user, authenticate with: User: `alice` Password: `secret2` And try to use the operation `GET` with the path `/users/me`. You will get an "Inactive user" error, like: ```JSON { "detail": "Inactive user" } ``` ## Recap { #recap }
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 9.4K bytes - Viewed (0) -
docs/sts/keycloak.md
The following example shows how to get the details of the user with `{userid}` from `{realm}` realm: ``` curl \ -H "Authorization: Bearer eyJhbGciOiJSUz..." \ "http://localhost:8080/auth/admin/realms/{realm}/users/{userid}" ``` ### Configure MinIO ``` export MINIO_ROOT_USER=minio export MINIO_ROOT_PASSWORD=minio123 minio server /mnt/export
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.1K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
That way, you can create a token with an expiration of, let's say, 1 week. And then when the user comes back the next day with the token, you know that user is still logged in to your system.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0)