- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 34 for xldap (0.02 sec)
-
cmd/config-current.go
"github.com/minio/minio/internal/config/dns" "github.com/minio/minio/internal/config/drive" "github.com/minio/minio/internal/config/etcd" "github.com/minio/minio/internal/config/heal" xldap "github.com/minio/minio/internal/config/identity/ldap" "github.com/minio/minio/internal/config/identity/openid" idplugin "github.com/minio/minio/internal/config/identity/plugin" xtls "github.com/minio/minio/internal/config/identity/tls"
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 28.5K bytes - Viewed (0) -
cmd/config-migrate.go
package cmd import ( "context" "encoding/json" "errors" "path" "strings" "github.com/minio/minio/internal/config" "github.com/minio/minio/internal/config/compress" xldap "github.com/minio/minio/internal/config/identity/ldap" "github.com/minio/minio/internal/config/identity/openid" "github.com/minio/minio/internal/config/notify" "github.com/minio/minio/internal/config/policy/opa"
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 5.4K bytes - Viewed (0) -
cmd/sftp-server.go
// in obtaining service accounts by this cred. cred.ParentUser = lookupResult.NormDN // Set this value to LDAP groups, LDAP user can be part // of large number of groups cred.Groups = targetGroups // Set the newly generated credentials, policyName is empty on purpose // LDAP policies are applied automatically using their ldapUser, ldapGroups // mapping.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 16.5K bytes - Viewed (0) -
cmd/admin-handlers-users.go
if globalIAMSys.GetUsersSysType() == LDAPUsersSysType { userType = stsUser // Validate that the user or group exists in LDAP and use the normalized // form of the entityName (which will be an LDAP DN). var err error if isGroup { var foundGroupDN *xldap.DNSearchResult var underBaseDN bool if foundGroupDN, underBaseDN, err = globalIAMSys.LDAPConfig.GetValidatedGroupDN(nil, entityName); err != nil {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 90.6K bytes - Viewed (0) -
cmd/iam.go
sys.Lock() sys.OpenIDConfig = openidConfig sys.Unlock() } } if !ldapInit { // Initialize if LDAP is enabled ldapConfig, err := xldap.Lookup(s, globalRootCAs) if err != nil { iamLogIf(ctx, fmt.Errorf("Unable to load LDAP configuration (LDAP configuration will be disabled!): %w", err), logger.WarningKind) } else { ldapInit = true sys.Lock()
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 75.3K bytes - Viewed (0) -
cmd/site-replication.go
s := madmin.IDPSettings{} s.LDAP = madmin.LDAPSettings{ IsLDAPEnabled: globalIAMSys.LDAPConfig.Enabled(), LDAPUserDNSearchBase: globalIAMSys.LDAPConfig.LDAP.UserDNSearchBaseDistName, LDAPUserDNSearchFilter: globalIAMSys.LDAPConfig.LDAP.UserDNSearchFilter, LDAPGroupSearchBase: globalIAMSys.LDAPConfig.LDAP.GroupSearchBaseDistName,
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 184.7K bytes - Viewed (0) -
docs/sts/ldap.md
Many Active Directory and other LDAP services are setup with [DNS SRV Records](https://ldap.com/dns-srv-records-for-ldap/) for high-availability of the directory service. To use this to find LDAP servers to connect to, an LDAP client makes a DNS SRV record request to the DNS service on a domain that looks like `_service._proto.example.com`. For LDAP the `proto` value is always `tcp`, and `service` is usually `ldap` or `ldaps`.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 18.9K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/exception/LdapOperationExceptionTest.java
Exception innerCause = new IllegalArgumentException("Invalid LDAP parameter"); RuntimeException middleCause = new RuntimeException("LDAP configuration error", innerCause); LdapOperationException exception = new LdapOperationException("LDAP operation failed", middleCause); assertEquals("LDAP operation failed", exception.getMessage()); assertEquals(middleCause, exception.getCause());
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Tue Aug 19 14:09:36 UTC 2025 - 8.1K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/exception/LdapConfigurationExceptionTest.java
String message = "LDAP error: \"Invalid <config>\" & 'bad chars' @ #$%^&*()"; LdapConfigurationException exception = new LdapConfigurationException(message); assertEquals(message, exception.getMessage()); } public void test_unicodeCharactersInMessage() { // Test with Unicode characters in message String message = "LDAP設定エラー: 接続失敗 🚫 ñ é ü ß";
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Tue Aug 19 14:09:36 UTC 2025 - 7.5K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/auth/chain/LdapChainTest.java
* either express or implied. See the License for the specific language * governing permissions and limitations under the License. */ package org.codelibs.fess.auth.chain; import org.codelibs.fess.ldap.LdapManager; import org.codelibs.fess.mylasta.direction.FessConfig; import org.codelibs.fess.opensearch.user.exentity.User; import org.codelibs.fess.unit.UnitFessTestCase; import org.codelibs.fess.util.ComponentUtil;
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Tue Aug 19 14:09:36 UTC 2025 - 9.3K bytes - Viewed (0)