- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 16 for IDP (0.02 sec)
-
cmd/admin-handlers-idp-ldap.go
"github.com/minio/mux" xldap "github.com/minio/pkg/v3/ldap" "github.com/minio/pkg/v3/policy" ) // ListLDAPPolicyMappingEntities lists users/groups mapped to given/all policies. // // GET <admin-prefix>/idp/ldap/policy-entities?[query-params] // // Query params: // // user=... -> repeatable query parameter, specifying users to query for // policy mapping //
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 08 02:46:04 UTC 2025 - 19.2K bytes - Viewed (0) -
cmd/admin-handlers-idp-openid.go
"sort" "github.com/minio/madmin-go/v3" "github.com/minio/minio-go/v7/pkg/set" "github.com/minio/pkg/v3/policy" ) const dummyRoleARN = "dummy-internal" // ListAccessKeysOpenIDBulk - GET /minio/admin/v3/idp/openid/list-access-keys-bulk func (a adminAPIHandlers) ListAccessKeysOpenIDBulk(w http.ResponseWriter, r *http.Request) { ctx := r.Context() // Get current object layer instance. objectAPI := newObjectLayerFn()
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sat Sep 06 17:38:46 UTC 2025 - 7.6K bytes - Viewed (0) -
docs/site-replication/README.md
# Automatic Site Replication This feature allows multiple independent MinIO sites (or clusters) that are using the same external IDentity Provider (IDP) to be configured as replicas. In this situation the set of replica sites are referred to as peer sites or just sites. When site-replication is enabled on a set of sites, the following changes are replicated to all other sites: - Creation and deletion of buckets and objects
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 3.4K bytes - Viewed (0) -
docs/multi-user/admin/README.md
#### Give full admin permissions - admin:* ### 5. Using an external IDP for admin users Admin users can also be externally managed by an IDP by configuring admin policy with special permissions listed above. Follow [MinIO STS Quickstart Guide](https://docs.min.io/community/minio-object-store/developers/security-token-service.html) to manage users with an IDP. ## Explore Further
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 4.7K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/sso/saml/SamlAuthenticator.java
defaultSettings.put("onelogin.saml2.sp.privatekey", ""); defaultSettings.put("onelogin.saml2.idp.single_sign_on_service.binding", "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect"); defaultSettings.put("onelogin.saml2.idp.single_logout_service.response.url", ""); defaultSettings.put("onelogin.saml2.idp.single_logout_service.binding", "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect");
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 16.4K bytes - Viewed (1) -
docs/sts/dex.md
"SignerType": 1 } } ``` Now you have successfully configured Dex IdP with MinIO. > NOTE: Dex supports groups with external connectors so you can use `groups` as policy claim instead of `name`. ``` export MINIO_IDENTITY_OPENID_CLAIM_NAME=groups ```
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 3.8K bytes - Viewed (0) -
docs/sts/ldap.md
```sh mc idp ldap policy attach myminio mypolicy --user='uid=james,cn=accounts,dc=myldapserver,dc=com' ``` ```sh mc idp ldap policy attach myminio mypolicy ----group='cn=projectx,ou=groups,ou=hwengg,dc=min,dc=io' ``` To remove a policy association, use the similar `detach` command: ```sh
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 18.9K bytes - Viewed (0) -
cmd/sts-handlers_test.go
err := s.client.MakeBucket(ctx, bucket, minio.MakeBucketOptions{}) if err != nil { c.Fatalf("bucket create error: %v", err) } // Generate web identity STS token by interacting with OpenID IDP. token, err := MockOpenIDTestUserInteraction(ctx, testAppParams, "******@****.***", "dillon") if err != nil { c.Fatalf("mock user err: %v", err) } // fmt.Printf("TOKEN: %s\n", token)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 100.2K bytes - Viewed (1) -
docs/sts/keycloak.md
``` > NOTE: You can configure the `scopes` parameter to restrict the OpenID scopes requested by minio to the IdP, for example, `"openid,policy_role_attribute"`, being `policy_role_attribute` a client_scope / client_mapper that maps a role attribute called policy to a `policy` claim returned by Keycloak
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.1K bytes - Viewed (0) -
cmd/sts-handlers.go
// use that and validate the authentication request. If not, we assume this // is an STS request for a claim based IDP (if one is present) and set // roleArn = openid.DummyRoleARN. // // Currently, we do not support multiple claim based IDPs, as there is no // defined parameter to disambiguate the intended IDP in this STS request. roleArn := openid.DummyRoleARN roleArnStr := r.Form.Get(stsRoleArn)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 36.6K bytes - Viewed (0)