Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 38 for myclientid (0.17 sec)

  1. docs/bucket/notifications/README.md

    def on_message(client, userdata, msg):
        print(msg.payload)
    
    # client_id is a randomly generated unique ID for the mqtt broker to identify the connection.
    client = mqtt.Client(client_id="myclientid",clean_session=False)
    
    client.on_connect = on_connect
    client.on_message = on_message
    
    client.connect("localhost",1883,60)
    client.loop_forever()
    ```
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Jan 18 07:03:17 UTC 2024
    - 84K bytes
    - Viewed (0)
  2. internal/config/identity/openid/openid.go

    				RolePolicy:           provCfg.RolePolicy,
    				ClientID:             provCfg.ClientID,
    				HashedClientSecret:   hashedSecret,
    			}
    		} else {
    			res.ClaimProvider = madmin.OpenIDProviderSettings{
    				ClaimUserinfoEnabled: provCfg.ClaimUserinfo,
    				RolePolicy:           provCfg.RolePolicy,
    				ClientID:             provCfg.ClientID,
    				HashedClientSecret:   hashedSecret,
    			}
    		}
    
    	}
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Jul 10 20:16:44 UTC 2024
    - 16.6K bytes
    - Viewed (0)
  3. docs/sts/web-identity.go

    	}
    
    	scopes := ddoc.ScopesSupported
    	if clientScopes != "" {
    		scopes = strings.Split(clientScopes, ",")
    	}
    
    	ctx := context.Background()
    
    	config := oauth2.Config{
    		ClientID:     clientID,
    		ClientSecret: clientSec,
    		Endpoint: oauth2.Endpoint{
    			AuthURL:  ddoc.AuthEndpoint,
    			TokenURL: ddoc.TokenEndpoint,
    		},
    		RedirectURL: fmt.Sprintf("http://10.0.0.67:%d/oauth2/callback", port),
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 19 09:13:33 UTC 2023
    - 7.8K bytes
    - Viewed (0)
  4. cmd/warm-backend-azure.go

    		return errors.New("the account name is required")
    	case conf.AccountKey != "" && (conf.SPAuth.TenantID != "" || conf.SPAuth.ClientID != "" || conf.SPAuth.ClientSecret != ""):
    		return errors.New("multiple authentication mechanisms are provided")
    	case conf.AccountKey == "" && (conf.SPAuth.TenantID == "" || conf.SPAuth.ClientID == "" || conf.SPAuth.ClientSecret == ""):
    		return errors.New("no authentication mechanism was provided")
    	}
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Oct 31 22:10:24 UTC 2024
    - 7K bytes
    - Viewed (0)
  5. internal/config/identity/openid/help.go

    			Type:        "url",
    		},
    		config.HelpKV{
    			Key:         ClientID,
    			Description: `unique public identifier for apps e.g. "292085223830.apps.googleusercontent.com"` + defaultHelpPostfix(ClientID),
    			Type:        "string",
    		},
    		config.HelpKV{
    			Key:         ClientSecret,
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Jun 23 14:45:27 UTC 2023
    - 4.3K bytes
    - Viewed (0)
  6. internal/config/identity/openid/jwt.go

    	pCfg := r.arnProviderCfgsMap[arn]
    	if pCfg.JWKS.URL == nil || pCfg.JWKS.URL.String() == "" {
    		return nil
    	}
    
    	// Add client secret for the client ID for HMAC based signature.
    	r.pubKeys.add(pCfg.ClientID, []byte(pCfg.ClientSecret))
    
    	client := &http.Client{
    		Transport: r.transport,
    	}
    
    	resp, err := client.Get(pCfg.JWKS.URL.String())
    	if err != nil {
    		return err
    	}
    	defer r.closeRespFn(resp.Body)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Sep 06 02:46:36 UTC 2024
    - 8.4K bytes
    - Viewed (0)
  7. internal/config/identity/openid/provider/keycloak.go

    	return ErrNotImplemented
    }
    
    // LoginWithClientID is implemented by Keycloak service account support
    func (k *KeycloakProvider) LoginWithClientID(clientID, clientSecret string) error {
    	values := url.Values{}
    	values.Set("client_id", clientID)
    	values.Set("client_secret", clientSecret)
    	values.Set("grant_type", "client_credentials")
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Jul 14 18:12:07 UTC 2024
    - 4.6K bytes
    - Viewed (0)
  8. internal/config/identity/openid/providercfg.go

    		ClaimPrefix:        getCfgVal(ClaimPrefix),
    		RedirectURI:        getCfgVal(RedirectURI),
    		RedirectURIDynamic: getCfgVal(RedirectURIDynamic) == config.EnableOn,
    		ClientID:           getCfgVal(ClientID),
    		ClientSecret:       getCfgVal(ClientSecret),
    		RolePolicy:         getCfgVal(RolePolicy),
    	}
    }
    
    const (
    	keyCloakVendor = "keycloak"
    )
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 4.6K bytes
    - Viewed (0)
  9. cmd/config-versions.go

    }
    
    // ConsoleLogger is introduced to workaround the dependency about logrus
    type ConsoleLogger struct {
    	Enable bool `json:"enable"`
    }
    
    // serverConfigV33 is just like version '32', removes clientID from NATS and MQTT, and adds queueDir, queueLimit in all notification targets.
    type serverConfigV33 struct {
    	quick.Config `json:"-"` // ignore interfaces
    
    	Version string `json:"version"`
    
    	// S3 API configuration.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 2.5K bytes
    - Viewed (0)
  10. internal/config/identity/openid/provider/provider.go

    // Provider implements identity provider specific admin operations, such as
    // looking up users, fetching additional attributes etc.
    type Provider interface {
    	LoginWithUser(username, password string) error
    	LoginWithClientID(clientID, clientSecret string) error
    	LookupUser(userid string) (User, error)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Jan 18 07:03:17 UTC 2024
    - 2.7K bytes
    - Viewed (0)
Back to top