- Sort Score
- Num 10 results
- Language All
Results 1 - 6 of 6 for ldapActualUser (0.09 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
cmd/admin-handlers-idp-ldap.go
} } writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL) return } targetUser = lookupResult.NormDN opts.claims[ldapUser] = targetUser // DN opts.claims[ldapActualUser] = lookupResult.ActualDN // Check if this user or their groups have a policy applied. ldapPolicies, err := globalIAMSys.PolicyDBGet(targetUser, targetGroups...) if err != nil {
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 08 02:46:04 GMT 2025 - 19.2K bytes - Click Count (0) -
cmd/sts-handlers.go
issClaim = "iss" // JWT claim to check the parent user parentClaim = "parent" // LDAP claim keys ldapUser = "ldapUser" // this is a key name for a normalized DN value ldapActualUser = "ldapActualUser" // this is a key name for the actual DN value ldapUserN = "ldapUsername" // this is a key name for the short/login username // Claim key-prefix for LDAP attributes ldapAttribPrefix = "ldapAttrib_"
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 36.6K bytes - Click Count (0) -
cmd/sts-handlers_test.go
claims, err := getClaimsFromTokenWithSecret(value.SessionToken, secret) if err != nil { c.Fatalf("Error getting claims from token: %v", err) } // Validate claims. dnClaim := claims.MapClaims[ldapActualUser].(string) if dnClaim != testCase.dn { c.Fatalf("Test %d: unexpected dn claim: %s", i+1, dnClaim) } } if _, err = s.adm.DetachPolicyLDAP(ctx, userReq); err != nil {
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Wed Oct 15 17:00:45 GMT 2025 - 103.4K bytes - Click Count (1) -
cmd/iam.go
} if err != nil { // skip this cred - session token seems invalid continue } ldapUsername, okUserN := jwtClaims.Lookup(ldapUserN) ldapActualDN, okDN := jwtClaims.Lookup(ldapActualUser) if !okUserN || !okDN { // skip this cred - we dont have the // username info needed continue } // Collect each new cred.ParentUser into parentUsersCreated: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Wed Oct 15 17:00:45 GMT 2025 - 76.5K bytes - Click Count (0) -
cmd/iam-store.go
continue } subClaimValue := cred.ParentUser if v, ok := claims.Lookup(subClaim); ok { subClaimValue = v } if v, ok := claims.Lookup(ldapActualUser); ok { subClaimValue = v } roleArn := openid.DummyRoleARN.String() s, ok := claims.Lookup(roleArnClaim) if ok { roleArn = s } v, ok := res[cred.ParentUser]
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 87.1K bytes - Click Count (0) -
cmd/admin-handlers-users.go
if err != nil { writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL) return } targetUser = lookupResult.NormDN opts.claims[ldapUser] = targetUser // username DN opts.claims[ldapActualUser] = lookupResult.ActualDN // Add LDAP attributes that were looked up into the claims. for attribKey, attribValue := range lookupResult.Attributes { opts.claims[ldapAttribPrefix+attribKey] = attribValue }Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 90.6K bytes - Click Count (0)