Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 10 of 67 for eclaims (0.04 seconds)

The search processing time has exceeded the limit. The displayed results may be partial.

  1. internal/config/identity/openid/jwt.go

    	// and overwrite them with the claims from JWT.
    	if ok && pCfg.ClaimUserinfo {
    		if accessToken == "" {
    			return errors.New("access_token is mandatory if user_info claim is enabled")
    		}
    		uclaims, err := pCfg.UserInfo(ctx, accessToken, r.transport)
    		if err != nil {
    			return err
    		}
    		for k, v := range uclaims {
    			if _, ok := claims[k]; !ok { // only add to claims not update it.
    				claims[k] = v
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 8.4K bytes
    - Click Count (0)
  2. docs/sts/wso2.md

    **We recommend setting `policy` as a custom claim for the JWT service provider follow [here](https://docs.wso2.com/display/IS550/Configuring+Claims+for+a+Service+Provider) and [here](https://docs.wso2.com/display/IS550/Handling+Custom+Claims+with+the+JWT+Bearer+Grant+Type) for relevant docs on how to configure claims for a service provider.**
    
    ### 5. Setup MinIO with OpenID configuration URL
    
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Tue Aug 12 18:20:36 GMT 2025
    - 8.7K bytes
    - Click Count (0)
  3. internal/jwt/parser_test.go

    			var err error
    
    			// Figure out correct claims type
    			switch claims := data.claims.(type) {
    			case *MapClaims:
    				if data.tokenString == "" {
    					data.tokenString = mapClaimsToken(claims)
    				}
    				err = ParseWithClaims(data.tokenString, &MapClaims{}, data.keyfunc)
    			case *StandardClaims:
    				if data.tokenString == "" {
    					data.tokenString = standardClaimsToken(claims)
    				}
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 6K bytes
    - Click Count (0)
  4. cmd/admin-handlers-idp-openid.go

    		_, ok := accessKey.Claims[subClaim]
    		if !ok {
    			continue // OpenID access keys must have a sub claim
    		}
    		if (!listSTSKeys && !accessKey.IsServiceAccount()) || (!listServiceAccounts && accessKey.IsServiceAccount()) {
    			continue // skip if not the type we want
    		}
    		arn, ok := accessKey.Claims[roleArnClaim].(string)
    		if !ok {
    			if _, ok := accessKey.Claims[iamPolicyClaimNameOpenID()]; !ok {
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Sat Sep 06 17:38:46 GMT 2025
    - 7.6K bytes
    - Click Count (0)
  5. internal/config/identity/openid/jwt_test.go

    		{1574812326.000, "900", false},
    		{time.Duration(3) * time.Minute, "900", false},
    	}
    
    	for _, testCase := range testCases {
    		t.Run("", func(t *testing.T) {
    			claims := map[string]any{}
    			claims["exp"] = testCase.exp
    			err := updateClaimsExpiry(testCase.dsecs, claims)
    			if err != nil && !testCase.expectedFailure {
    				t.Errorf("Expected success, got failure %s", err)
    			}
    			if err == nil && testCase.expectedFailure {
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 8.2K bytes
    - Click Count (0)
  6. cmd/bucket-policy.go

    	// JWT specific values
    	//
    	// Add all string claims
    	for k, v := range claims {
    		vStr, ok := v.(string)
    		if ok {
    			// Trim any LDAP specific prefix
    			args[strings.ToLower(strings.TrimPrefix(k, "ldap"))] = []string{vStr}
    		}
    	}
    
    	// Add groups claim which could be a list. This will ensure that the claim
    	// `jwt:groups` works.
    	if grpsVal, ok := claims["groups"]; ok {
    		if grpsIs, ok := grpsVal.([]any); ok {
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 7.9K bytes
    - Click Count (0)
  7. docs/sts/README.md

    decode the id_token to access the payload of the token that includes following JWT claims, `policy` claim is mandatory and should be present as part of your JWT claim. Without this claim the generated credentials will not have access to any resources on the server, using these credentials application would receive 'Access Denied' errors.
    
    | Claim Name | Type                                              | Claim Value                                                                           ...
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Tue Aug 12 18:20:36 GMT 2025
    - 7.8K bytes
    - Click Count (0)
  8. internal/auth/credentials.go

    	return jwt.SignedString([]byte(tokenSecret))
    }
    
    // ExtractClaims extracts JWT claims from a security token using a secret key
    func ExtractClaims(token, secretKey string) (*jwt.MapClaims, error) {
    	if token == "" || secretKey == "" {
    		return nil, errors.New("invalid argument")
    	}
    
    	claims := jwt.NewMapClaims()
    	stsTokenCallback := func(claims *jwt.MapClaims) ([]byte, error) {
    		return []byte(secretKey), nil
    	}
    
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 11.8K bytes
    - Click Count (0)
  9. cmd/auth-handler.go

    		return token
    	}
    	return r.Form.Get(xhttp.AmzSecurityToken)
    }
    
    // Fetch claims in the security token returned by the client, doesn't return
    // errors - upon errors the returned claims map will be empty.
    func mustGetClaimsFromToken(r *http.Request) map[string]any {
    	claims, _ := getClaimsFromToken(getSessionToken(r))
    	return claims
    }
    
    func getClaimsFromTokenWithSecret(token, secret string) (*xjwt.MapClaims, error) {
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 25.4K bytes
    - Click Count (0)
  10. internal/jwt/parser.go

    		return jwtgo.ErrSignatureInvalid
    	}
    	borrow.ReturnAll()
    
    	if claims.AccessKey == "" && claims.Subject == "" {
    		return jwtgo.NewValidationError("accessKey/sub missing",
    			jwtgo.ValidationErrorClaimsInvalid)
    	}
    
    	// Signature is valid, lets validate the claims for
    	// other fields such as expiry etc.
    	return claims.Valid()
    }
    
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 14.1K bytes
    - Click Count (0)
Back to Top