Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 184 for clientId (0.08 sec)

  1. docs/sts/web-identity.go

    		"http://localhost:8080/auth/realms/minio/.well-known/openid-configuration",
    		"OpenID discovery document endpoint")
    	flag.StringVar(&clientID, "cid", "", "Client ID")
    	flag.StringVar(&clientSec, "csec", "", "Client Secret")
    	flag.StringVar(&clientScopes, "cscopes", "openid", "Client Scopes")
    	flag.IntVar(&port, "port", 8080, "Port")
    }
    
    func implicitFlowURL(c oauth2.Config, state string) string {
    	var buf bytes.Buffer
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 19 09:13:33 UTC 2023
    - 7.8K bytes
    - Viewed (0)
  2. internal/config/identity/openid/openid.go

    				RolePolicy:           provCfg.RolePolicy,
    				ClientID:             provCfg.ClientID,
    				HashedClientSecret:   hashedSecret,
    			}
    		} else {
    			res.ClaimProvider = madmin.OpenIDProviderSettings{
    				ClaimUserinfoEnabled: provCfg.ClaimUserinfo,
    				RolePolicy:           provCfg.RolePolicy,
    				ClientID:             provCfg.ClientID,
    				HashedClientSecret:   hashedSecret,
    			}
    		}
    
    	}
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Jul 10 20:16:44 UTC 2024
    - 16.6K bytes
    - Viewed (0)
  3. internal/config/identity/openid/jwt.go

    	pCfg := r.arnProviderCfgsMap[arn]
    	if pCfg.JWKS.URL == nil || pCfg.JWKS.URL.String() == "" {
    		return nil
    	}
    
    	// Add client secret for the client ID for HMAC based signature.
    	r.pubKeys.add(pCfg.ClientID, []byte(pCfg.ClientSecret))
    
    	client := &http.Client{
    		Transport: r.transport,
    	}
    
    	resp, err := client.Get(pCfg.JWKS.URL.String())
    	if err != nil {
    		return err
    	}
    	defer r.closeRespFn(resp.Body)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Sep 06 02:46:36 UTC 2024
    - 8.4K bytes
    - Viewed (0)
  4. internal/config/identity/openid/provider/keycloak.go

    	return ErrNotImplemented
    }
    
    // LoginWithClientID is implemented by Keycloak service account support
    func (k *KeycloakProvider) LoginWithClientID(clientID, clientSecret string) error {
    	values := url.Values{}
    	values.Set("client_id", clientID)
    	values.Set("client_secret", clientSecret)
    	values.Set("grant_type", "client_credentials")
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Jul 14 18:12:07 UTC 2024
    - 4.6K bytes
    - Viewed (0)
  5. cmd/warm-backend-azure.go

    		return errors.New("the account name is required")
    	case conf.AccountKey != "" && (conf.SPAuth.TenantID != "" || conf.SPAuth.ClientID != "" || conf.SPAuth.ClientSecret != ""):
    		return errors.New("multiple authentication mechanisms are provided")
    	case conf.AccountKey == "" && (conf.SPAuth.TenantID == "" || conf.SPAuth.ClientID == "" || conf.SPAuth.ClientSecret == ""):
    		return errors.New("no authentication mechanism was provided")
    	}
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Oct 31 22:10:24 UTC 2024
    - 7K bytes
    - Viewed (0)
  6. internal/config/identity/openid/help.go

    			Type:        "url",
    		},
    		config.HelpKV{
    			Key:         ClientID,
    			Description: `unique public identifier for apps e.g. "292085223830.apps.googleusercontent.com"` + defaultHelpPostfix(ClientID),
    			Type:        "string",
    		},
    		config.HelpKV{
    			Key:         ClientSecret,
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Jun 23 14:45:27 UTC 2023
    - 4.3K bytes
    - Viewed (0)
  7. internal/config/identity/openid/providercfg.go

    	}
    
    	req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
    	if accessToken != "" {
    		req.Header.Set("Authorization", "Bearer "+accessToken)
    	}
    
    	client := &http.Client{
    		Transport: transport,
    	}
    
    	resp, err := client.Do(req)
    	if err != nil {
    		return nil, err
    	}
    
    	defer xhttp.DrainBody(resp.Body)
    	if resp.StatusCode != http.StatusOK {
    		// uncomment this for debugging when needed.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 4.6K bytes
    - Viewed (0)
  8. cmd/config-versions.go

    }
    
    // ConsoleLogger is introduced to workaround the dependency about logrus
    type ConsoleLogger struct {
    	Enable bool `json:"enable"`
    }
    
    // serverConfigV33 is just like version '32', removes clientID from NATS and MQTT, and adds queueDir, queueLimit in all notification targets.
    type serverConfigV33 struct {
    	quick.Config `json:"-"` // ignore interfaces
    
    	Version string `json:"version"`
    
    	// S3 API configuration.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 2.5K bytes
    - Viewed (0)
  9. internal/config/identity/openid/provider/provider.go

    // Provider implements identity provider specific admin operations, such as
    // looking up users, fetching additional attributes etc.
    type Provider interface {
    	LoginWithUser(username, password string) error
    	LoginWithClientID(clientID, clientSecret string) error
    	LookupUser(userid string) (User, error)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Jan 18 07:03:17 UTC 2024
    - 2.7K bytes
    - Viewed (0)
  10. internal/event/target/mqtt.go

    	options := mqtt.NewClientOptions().
    		SetClientID(clientID).
    		SetCleanSession(true).
    		SetUsername(args.User).
    		SetPassword(args.Password).
    		SetMaxReconnectInterval(args.MaxReconnectInterval).
    		SetKeepAlive(args.KeepAlive).
    		SetTLSConfig(&tls.Config{RootCAs: args.RootCAs}).
    		AddBroker(args.Broker.String())
    
    	target.client = mqtt.NewClient(options)
    
    	token := target.client.Connect()
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Sep 06 23:06:30 UTC 2024
    - 8.2K bytes
    - Viewed (0)
Back to top