- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 42 for Claims (0.02 sec)
-
cmd/auth-handler.go
return token } return r.Form.Get(xhttp.AmzSecurityToken) } // Fetch claims in the security token returned by the client, doesn't return // errors - upon errors the returned claims map will be empty. func mustGetClaimsFromToken(r *http.Request) map[string]any { claims, _ := getClaimsFromToken(getSessionToken(r)) return claims } func getClaimsFromTokenWithSecret(token, secret string) (*xjwt.MapClaims, error) {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 25.4K bytes - Viewed (0) -
cmd/admin-handlers-idp-ldap.go
writeErrorResponseJSON(ctx, w, APIErr, r.URL) return } // In case of LDAP/OIDC we need to set `opts.claims` to ensure // it is associated with the LDAP/OIDC user properly. for k, v := range cred.Claims { if k == expClaim { continue } opts.claims[k] = v } } else { // We still need to ensure that the target user is a valid LDAP user. //
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 08 02:46:04 UTC 2025 - 19.2K bytes - Viewed (0) -
docs/sts/wso2.md
**We recommend setting `policy` as a custom claim for the JWT service provider follow [here](https://docs.wso2.com/display/IS550/Configuring+Claims+for+a+Service+Provider) and [here](https://docs.wso2.com/display/IS550/Handling+Custom+Claims+with+the+JWT+Bearer+Grant+Type) for relevant docs on how to configure claims for a service provider.** ### 5. Setup MinIO with OpenID configuration URL
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.7K bytes - Viewed (0) -
cmd/jwt.go
// Check if the access key is part of users credentials. u, ok := globalIAMSys.GetUser(req.Context(), claims.AccessKey) if !ok { return nil, nil, false, errInvalidAccessKeyID } ucred := u.Credentials // get embedded claims eclaims, s3Err := checkClaimsFromToken(req, ucred) if s3Err != ErrNone { return nil, nil, false, errAuthentication } maps.Copy(claims.MapClaims, eclaims)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.5K bytes - Viewed (0) -
cmd/sts-handlers.go
writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, err) return } claims[expClaim] = UTCNow().Add(expiryDur).Unix() claims[ldapUser] = ldapUserDN claims[ldapActualUser] = ldapActualUserDN claims[ldapUserN] = ldapUsername // Add lookup up LDAP attributes as claims. for attrib, value := range lookupResult.Attributes { claims[ldapAttribPrefix+attrib] = value } tokenRevokeType := r.Form.Get(stsRevokeTokenType)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 36.6K bytes - Viewed (0) -
cmd/signature-v4-utils.go
return cred, false, ErrAccessKeyDisabled } return cred, false, ErrInvalidAccessKeyID } cred = u.Credentials } claims, s3Err := checkClaimsFromToken(r, cred) if s3Err != ErrNone { return cred, false, s3Err } cred.Claims = claims owner := cred.AccessKey == globalActiveCred.AccessKey || (cred.ParentUser == globalActiveCred.AccessKey && cred.AccessKey != siteReplicatorSvcAcc)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Mon Nov 25 17:10:22 UTC 2024 - 9.1K bytes - Viewed (0) -
cmd/user-provider-utils.go
func guessUserProvider(credentials auth.Credentials) string { if !credentials.IsServiceAccount() && !credentials.IsTemp() { return madmin.BuiltinProvider // regular users are always internal } claims := credentials.Claims if _, ok := claims[ldapUser]; ok { return madmin.LDAPProvider // ldap users } if _, ok := claims[subClaim]; ok {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.1K bytes - Viewed (0) -
cmd/bucket-policy.go
// JWT specific values // // Add all string claims for k, v := range claims { vStr, ok := v.(string) if ok { // Trim any LDAP specific prefix args[strings.ToLower(strings.TrimPrefix(k, "ldap"))] = []string{vStr} } } // Add groups claim which could be a list. This will ensure that the claim // `jwt:groups` works. if grpsVal, ok := claims["groups"]; ok { if grpsIs, ok := grpsVal.([]any); ok {Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 7.9K bytes - Viewed (0) -
cmd/ftp-server-driver.go
if err != nil { return nil, err } claims := make(map[string]any) claims[expClaim] = UTCNow().Add(expiryDur).Unix() claims[ldapUser] = lookupResult.NormDN claims[ldapActualUser] = lookupResult.ActualDN claims[ldapUserN] = ctx.Sess.LoginUser() // Add LDAP attributes that were looked up into the claims. for attribKey, attribValue := range lookupResult.Attributes {Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 14.3K bytes - Viewed (0) -
cmd/metrics.go
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { tc, ok := r.Context().Value(mcontext.ContextTraceKey).(*mcontext.TraceCtxt) claims, groups, owner, authErr := metricsRequestAuthenticate(r) if authErr != nil || (claims != nil && !claims.VerifyIssuer("prometheus", true)) { if ok { tc.FuncName = "handler.MetricsAuth" tc.ResponseRecorder.LogErrBody = true }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Thu Aug 15 12:04:40 UTC 2024 - 16.6K bytes - Viewed (0)