- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 184 for clientId (0.08 sec)
-
docs/sts/web-identity.go
"http://localhost:8080/auth/realms/minio/.well-known/openid-configuration", "OpenID discovery document endpoint") flag.StringVar(&clientID, "cid", "", "Client ID") flag.StringVar(&clientSec, "csec", "", "Client Secret") flag.StringVar(&clientScopes, "cscopes", "openid", "Client Scopes") flag.IntVar(&port, "port", 8080, "Port") } func implicitFlowURL(c oauth2.Config, state string) string { var buf bytes.Buffer
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 19 09:13:33 UTC 2023 - 7.8K bytes - Viewed (0) -
internal/config/identity/openid/openid.go
RolePolicy: provCfg.RolePolicy, ClientID: provCfg.ClientID, HashedClientSecret: hashedSecret, } } else { res.ClaimProvider = madmin.OpenIDProviderSettings{ ClaimUserinfoEnabled: provCfg.ClaimUserinfo, RolePolicy: provCfg.RolePolicy, ClientID: provCfg.ClientID, HashedClientSecret: hashedSecret, } } }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jul 10 20:16:44 UTC 2024 - 16.6K bytes - Viewed (0) -
internal/config/identity/openid/jwt.go
pCfg := r.arnProviderCfgsMap[arn] if pCfg.JWKS.URL == nil || pCfg.JWKS.URL.String() == "" { return nil } // Add client secret for the client ID for HMAC based signature. r.pubKeys.add(pCfg.ClientID, []byte(pCfg.ClientSecret)) client := &http.Client{ Transport: r.transport, } resp, err := client.Get(pCfg.JWKS.URL.String()) if err != nil { return err } defer r.closeRespFn(resp.Body)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Sep 06 02:46:36 UTC 2024 - 8.4K bytes - Viewed (0) -
internal/config/identity/openid/provider/keycloak.go
return ErrNotImplemented } // LoginWithClientID is implemented by Keycloak service account support func (k *KeycloakProvider) LoginWithClientID(clientID, clientSecret string) error { values := url.Values{} values.Set("client_id", clientID) values.Set("client_secret", clientSecret) values.Set("grant_type", "client_credentials")
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Jul 14 18:12:07 UTC 2024 - 4.6K bytes - Viewed (0) -
cmd/warm-backend-azure.go
return errors.New("the account name is required") case conf.AccountKey != "" && (conf.SPAuth.TenantID != "" || conf.SPAuth.ClientID != "" || conf.SPAuth.ClientSecret != ""): return errors.New("multiple authentication mechanisms are provided") case conf.AccountKey == "" && (conf.SPAuth.TenantID == "" || conf.SPAuth.ClientID == "" || conf.SPAuth.ClientSecret == ""): return errors.New("no authentication mechanism was provided") }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 31 22:10:24 UTC 2024 - 7K bytes - Viewed (0) -
internal/config/identity/openid/help.go
Type: "url", }, config.HelpKV{ Key: ClientID, Description: `unique public identifier for apps e.g. "292085223830.apps.googleusercontent.com"` + defaultHelpPostfix(ClientID), Type: "string", }, config.HelpKV{ Key: ClientSecret,
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Jun 23 14:45:27 UTC 2023 - 4.3K bytes - Viewed (0) -
internal/config/identity/openid/providercfg.go
} req.Header.Set("Content-Type", "application/x-www-form-urlencoded") if accessToken != "" { req.Header.Set("Authorization", "Bearer "+accessToken) } client := &http.Client{ Transport: transport, } resp, err := client.Do(req) if err != nil { return nil, err } defer xhttp.DrainBody(resp.Body) if resp.StatusCode != http.StatusOK { // uncomment this for debugging when needed.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 4.6K bytes - Viewed (0) -
cmd/config-versions.go
} // ConsoleLogger is introduced to workaround the dependency about logrus type ConsoleLogger struct { Enable bool `json:"enable"` } // serverConfigV33 is just like version '32', removes clientID from NATS and MQTT, and adds queueDir, queueLimit in all notification targets. type serverConfigV33 struct { quick.Config `json:"-"` // ignore interfaces Version string `json:"version"` // S3 API configuration.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 2.5K bytes - Viewed (0) -
internal/config/identity/openid/provider/provider.go
// Provider implements identity provider specific admin operations, such as // looking up users, fetching additional attributes etc. type Provider interface { LoginWithUser(username, password string) error LoginWithClientID(clientID, clientSecret string) error LookupUser(userid string) (User, error)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 2.7K bytes - Viewed (0) -
internal/event/target/mqtt.go
options := mqtt.NewClientOptions(). SetClientID(clientID). SetCleanSession(true). SetUsername(args.User). SetPassword(args.Password). SetMaxReconnectInterval(args.MaxReconnectInterval). SetKeepAlive(args.KeepAlive). SetTLSConfig(&tls.Config{RootCAs: args.RootCAs}). AddBroker(args.Broker.String()) target.client = mqtt.NewClient(options) token := target.client.Connect()
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Sep 06 23:06:30 UTC 2024 - 8.2K bytes - Viewed (0)