Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 43 for Claim (0.58 sec)

  1. docs/sts/web-identity.md

    AssumeRoleWithWebIdentity call.
    
    2. `id_token` claims: When the role policy is not configured, MinIO looks for a specific claim in the `id_token` (JWT) returned by the OpenID provider in the STS request. The default claim is `policy` and can be overridden by the `claim_name` configuration parameter or the `MINIO_IDENTITY_OPENID_CLAIM_NAME` environment variable. The claim value can be a string (comma-separated list) or an array of IAM access policy names defined in the server. A `RoleArn` API request...
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 18.9K bytes
    - Viewed (0)
  2. cmd/sts-handlers.go

    	assumeRole          = "AssumeRole"
    
    	stsRequestBodyLimit = 10 * (1 << 20) // 10 MiB
    
    	// JWT claim keys
    	expClaim = "exp"
    	subClaim = "sub"
    	audClaim = "aud"
    	issClaim = "iss"
    
    	// JWT claim to check the parent user
    	parentClaim = "parent"
    
    	// LDAP claim keys
    	ldapUser       = "ldapUser"       // this is a key name for a normalized DN value
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 36.6K bytes
    - Viewed (0)
  3. docs/sts/keycloak.md

      - Save
    
    - Go to Clients
      - Click on `account`
      - Mappers
      - Create
        - `Name` with any text
        - `Mapper Type` is `User Attribute`
        - `User Attribute` is `policy`
        - `Token Claim Name` is `policy`
        - `Claim JSON Type` is `string`
      - Save
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.1K bytes
    - Viewed (0)
  4. docs/sts/casdoor.md

    client_id     (string)    unique public identifier for apps e.g. "292085223830.apps.googleusercontent.com"
    claim_name    (string)    JWT canned policy claim name, defaults to "policy"
    claim_prefix  (string)    JWT claim namespace prefix e.g. "customer1/"
    scopes        (csv)       Comma separated list of OpenID scopes for server, defaults to advertised scopes from discovery document e.g. "email,admin"
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 6.6K bytes
    - Viewed (0)
  5. cmd/bucket-policy.go

    		vStr, ok := v.(string)
    		if ok {
    			// Trim any LDAP specific prefix
    			args[strings.ToLower(strings.TrimPrefix(k, "ldap"))] = []string{vStr}
    		}
    	}
    
    	// Add groups claim which could be a list. This will ensure that the claim
    	// `jwt:groups` works.
    	if grpsVal, ok := claims["groups"]; ok {
    		if grpsIs, ok := grpsVal.([]any); ok {
    			grps := []string{}
    			for _, gI := range grpsIs {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 7.9K bytes
    - Viewed (0)
  6. docs/sts/README.md

    id_token to access the payload of the token that includes following JWT claims, `policy` claim is mandatory and should be present as part of your JWT claim. Without this claim the generated credentials will not have access to any resources on the server, using these credentials application would receive 'Access Denied' errors.
    
    | Claim Name | Type                                              | Claim Value                                                                                    ...
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 7.8K bytes
    - Viewed (0)
  7. docs/sts/wso2.md

    }
    ```
    
    ### 4. JWT Claims
    
    The id_token received is a signed JSON Web Token (JWT). Use a JWT decoder to decode the id_token to access the payload of the token that includes following JWT claims:
    
    | Claim Name | Type           | Claim Value                                                                                                                                                                             |
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.7K bytes
    - Viewed (0)
  8. LICENSE

    IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
    FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
    AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
    LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
    OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
    Registered: Sun Sep 07 09:35:13 UTC 2025
    - Last Modified: Sun Jan 12 10:32:39 UTC 2025
    - 1.1K bytes
    - Viewed (0)
  9. cmd/admin-handlers-idp-openid.go

    			continue // OpenID access keys must have a sub claim
    		}
    		if (!listSTSKeys && !accessKey.IsServiceAccount()) || (!listServiceAccounts && accessKey.IsServiceAccount()) {
    			continue // skip if not the type we want
    		}
    		arn, ok := accessKey.Claims[roleArnClaim].(string)
    		if !ok {
    			if _, ok := accessKey.Claims[iamPolicyClaimNameOpenID()]; !ok {
    				continue // skip if no roleArn and no policy claim
    			}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sat Sep 06 17:38:46 UTC 2025
    - 7.6K bytes
    - Viewed (0)
  10. cmd/iam.go

    		}
    
    		// Finally, if there is no parent policy, check if a policy claim is
    		// present in the session token.
    		if len(policies) == 0 {
    			// If there is no parent policy mapping, we fall back to
    			// using policy claim from JWT.
    			policySet, ok := args.GetPolicies(iamPolicyClaimNameOpenID())
    			if !ok {
    				// When claims are set, it should have a policy claim field.
    				return false
    			}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 75.3K bytes
    - Viewed (0)
Back to top