- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 107 for account2 (0.05 sec)
-
cmd/iam-store.go
// The caller did not ask to update status account, do nothing case "": case string(madmin.AccountEnabled): cr.Status = auth.AccountOn case string(madmin.AccountDisabled): cr.Status = auth.AccountOff // Update account status case auth.AccountOn, auth.AccountOff: cr.Status = opts.status default: return updatedAt, errors.New("unknown account status value") }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 86.7K bytes - Viewed (0) -
docs/sts/ldap.md
### Lookup-Bind A low-privilege read-only LDAP service account is configured in the MinIO server by providing the account's Distinguished Name (DN) and password. This service account is used to perform directory lookups as needed. ``` MINIO_IDENTITY_LDAP_LOOKUP_BIND_DN* (string) DN for LDAP read-only service account used to perform DN and group lookups
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 18.9K bytes - Viewed (0) -
cmd/admin-handlers-users_test.go
c.assertSvcAccS3Access(ctx, s, cr, bucket) // 3. Check that svc account can restrict the policy, and that the // session policy can be updated. c.assertSvcAccSessionPolicyUpdate(ctx, s, s.adm, accessKey, bucket) // 4. Check that service account's secret key and account status can be // updated. c.assertSvcAccSecretKeyAndStatusUpdate(ctx, s, s.adm, accessKey, bucket)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 47.4K bytes - Viewed (0) -
cmd/admin-handlers-idp-ldap.go
// account or STS account): requestorUser := cred.AccessKey requestorParentUser := cred.AccessKey requestorGroups := cred.Groups requestorIsDerivedCredential := false if cred.IsServiceAccount() || cred.IsTemp() { requestorParentUser = cred.ParentUser requestorIsDerivedCredential = true } // Check if we are creating svc account for request sender.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 08 02:46:04 UTC 2025 - 19.2K bytes - Viewed (0) -
docs/sts/keycloak.md
- `account` client_id is a confidential client that belongs to the realm `{realm}` - `account` client_id is has **Service Accounts Enabled** option enabled. - `account` client_id has a custom "Audience" mapper, in the Mappers section. - Included Client Audience: security-admin-console #### Adding 'admin' RoleRegistered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.1K bytes - Viewed (0) -
cmd/iam-object-store.go
stsPolicyMappingsCount++ // If a service account's parent user is not in iamUsersMap, the // parent is an STS account. Such accounts may have a policy mapped // on the parent user, so we load them. This is not needed for the // initial server startup, however, it is needed for the case where // the STS account's policy mapping (for example in LDAP mode) may
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 26.6K bytes - Viewed (0) -
src/main/java/jcifs/util/AuthenticationRateLimiter.java
if (username != null) { AccountAttempts account = accountAttempts.computeIfAbsent(username, k -> new AccountAttempts()); account.recordFailure(); if (account.getFailedAttempts() >= maxAttemptsPerAccount) { account.lockOut(lockoutDuration); totalAccountsLocked.incrementAndGet();
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 15.1K bytes - Viewed (0) -
cmd/admin-handlers-users.go
return } // Permission checks: // // 1. Any type of account (i.e. access keys (previously/still called service // accounts), STS accounts, internal IDP accounts, etc) with the // policy.UpdateServiceAccountAdminAction permission can update any service // account. // // 2. We would like to let a user update their own access keys, however it
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 90.6K bytes - Viewed (0) -
docs/site-replication/README.md
Previously, site replication required the root credentials of peer sites to be identical. This is no longer necessary because STS tokens are now signed with the site replicator service account credentials, thus allowing flexibility in the independent management of root accounts across sites and the ability to disable root accounts eventually.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 3.4K bytes - Viewed (0) -
cmd/iam.go
// created before a certain (TBD) future date. // // 2. do not allow empty statement policies for service accounts. if subPolicy.Version == "" && subPolicy.Statements == nil && subPolicy.ID == "" { hasSessionPolicy = false return } // As the session policy exists, even if the parent is the root account, it // must be restricted by it. So, we set `.IsOwner` to false here
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 75.3K bytes - Viewed (0)