Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 107 for account2 (0.05 sec)

  1. cmd/iam-store.go

    	// The caller did not ask to update status account, do nothing
    	case "":
    	case string(madmin.AccountEnabled):
    		cr.Status = auth.AccountOn
    	case string(madmin.AccountDisabled):
    		cr.Status = auth.AccountOff
    	// Update account status
    	case auth.AccountOn, auth.AccountOff:
    		cr.Status = opts.status
    	default:
    		return updatedAt, errors.New("unknown account status value")
    	}
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 86.7K bytes
    - Viewed (0)
  2. docs/sts/ldap.md

    ### Lookup-Bind
    
    A low-privilege read-only LDAP service account is configured in the MinIO server by providing the account's Distinguished Name (DN) and password. This service account is used to perform directory lookups as needed.
    
    ```
    MINIO_IDENTITY_LDAP_LOOKUP_BIND_DN*          (string)    DN for LDAP read-only service account used to perform DN and group lookups
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 18.9K bytes
    - Viewed (0)
  3. cmd/admin-handlers-users_test.go

    	c.assertSvcAccS3Access(ctx, s, cr, bucket)
    
    	// 3. Check that svc account can restrict the policy, and that the
    	// session policy can be updated.
    	c.assertSvcAccSessionPolicyUpdate(ctx, s, s.adm, accessKey, bucket)
    
    	// 4. Check that service account's secret key and account status can be
    	// updated.
    	c.assertSvcAccSecretKeyAndStatusUpdate(ctx, s, s.adm, accessKey, bucket)
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 47.4K bytes
    - Viewed (0)
  4. cmd/admin-handlers-idp-ldap.go

    	// account or STS account):
    	requestorUser := cred.AccessKey
    	requestorParentUser := cred.AccessKey
    	requestorGroups := cred.Groups
    	requestorIsDerivedCredential := false
    	if cred.IsServiceAccount() || cred.IsTemp() {
    		requestorParentUser = cred.ParentUser
    		requestorIsDerivedCredential = true
    	}
    
    	// Check if we are creating svc account for request sender.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 08 02:46:04 UTC 2025
    - 19.2K bytes
    - Viewed (0)
  5. docs/sts/keycloak.md

    - `account` client_id is a confidential client that belongs to the realm `{realm}`
    - `account` client_id is has **Service Accounts Enabled** option enabled.
    - `account` client_id has a custom "Audience" mapper, in the Mappers section.
      - Included Client Audience: security-admin-console
    
    #### Adding 'admin' Role
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.1K bytes
    - Viewed (0)
  6. cmd/iam-object-store.go

    			stsPolicyMappingsCount++
    			// If a service account's parent user is not in iamUsersMap, the
    			// parent is an STS account. Such accounts may have a policy mapped
    			// on the parent user, so we load them. This is not needed for the
    			// initial server startup, however, it is needed for the case where
    			// the STS account's policy mapping (for example in LDAP mode) may
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 26.6K bytes
    - Viewed (0)
  7. src/main/java/jcifs/util/AuthenticationRateLimiter.java

            if (username != null) {
                AccountAttempts account = accountAttempts.computeIfAbsent(username, k -> new AccountAttempts());
                account.recordFailure();
    
                if (account.getFailedAttempts() >= maxAttemptsPerAccount) {
                    account.lockOut(lockoutDuration);
                    totalAccountsLocked.incrementAndGet();
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 15.1K bytes
    - Viewed (0)
  8. cmd/admin-handlers-users.go

    		return
    	}
    
    	// Permission checks:
    	//
    	// 1. Any type of account (i.e. access keys (previously/still called service
    	// accounts), STS accounts, internal IDP accounts, etc) with the
    	// policy.UpdateServiceAccountAdminAction permission can update any service
    	// account.
    	//
    	// 2. We would like to let a user update their own access keys, however it
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 90.6K bytes
    - Viewed (0)
  9. docs/site-replication/README.md

    Previously, site replication required the root credentials of peer sites to be identical. This is no longer necessary because STS tokens are now signed with the site replicator service account credentials, thus allowing flexibility in the independent management of root accounts across sites and the ability to disable root accounts eventually.
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 3.4K bytes
    - Viewed (0)
  10. cmd/iam.go

    	// created before a certain (TBD) future date.
    	//
    	// 2. do not allow empty statement policies for service accounts.
    	if subPolicy.Version == "" && subPolicy.Statements == nil && subPolicy.ID == "" {
    		hasSessionPolicy = false
    		return
    	}
    
    	// As the session policy exists, even if the parent is the root account, it
    	// must be restricted by it. So, we set `.IsOwner` to false here
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 75.3K bytes
    - Viewed (0)
Back to top