- Sort Score
- Result 10 results
- Languages All
Results 1 - 9 of 9 for DN (0.02 sec)
-
cmd/iam.go
if policiesDiffer { return []string{}, fmt.Errorf("multiple DNs map to the same LDAP DN[%s]: %v; please remove DNs that are not needed", normKey, origKeys) } if len(origKeys[1:]) > 0 { // Log that extra DN mappings will not be imported. iamLogEvent(ctx, "import-ldap-normalize: extraneous DN mappings found for LDAP DN[%s]: %v will not be imported", origKeys[0], origKeys[1:]) }Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 75.3K bytes - Viewed (0) -
docs/sts/ldap.md
The returned user's DN and their password are then verified with the LDAP server. The user DN may also be associated with an [access policy](#managing-usergroup-access-policy). The User DN attributes configuration parameter: ``` MINIO_IDENTITY_LDAP_USER_DN_ATTRIBUTES (list) "," separated list of user DN attributes e.g. "uid,cn,mail,sshPublicKey" ```
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 18.9K bytes - Viewed (0) -
cmd/admin-handlers-idp-ldap.go
}) { writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAccessDenied), r.URL) return } } else if len(dnList) == 1 { var dn string foundResult, err := globalIAMSys.LDAPConfig.GetValidatedDNForUsername(dnList[0]) if err == nil { dn = foundResult.NormDN } if dn == cred.ParentUser || dnList[0] == cred.ParentUser { selfOnly = true } } if !globalIAMSys.IsAllowed(policy.Args{Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 08 02:46:04 UTC 2025 - 19.2K bytes - Viewed (0) -
cmd/sts-handlers_test.go
Policies: []string{"readwrite"}, } cases := []struct { username string dn string group string }{ { username: "slashuser", dn: "uid=slash/user,ou=people,ou=swengg,dc=min,dc=io", }, { username: "dillon", dn: "uid=dillon,ou=people,ou=swengg,dc=min,dc=io", group: "cn=project/d,ou=groups,ou=swengg,dc=min,dc=io", },Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 100.2K bytes - Viewed (1) -
docs/tls/README.md
Create a file called `cert.cnf` with the content below. This file contains all of the information necessary to generate a certificate using `certtool.exe`: ``` # X.509 Certificate options # # DN options # The organization of the subject. organization = "Example Inc." # The organizational unit of the subject. #unit = "sleeping dept." # The state of the certificate owner. state = "Example"
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.6K bytes - Viewed (0) -
cmd/admin-handlers-idp-openid.go
} if isAll && len(userList) > 0 { // This should be checked on client side, so return generic error writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInvalidRequest), r.URL) return } // Empty DN list and not self, list access keys for all users if isAll { if !globalIAMSys.IsAllowed(policy.Args{ AccountName: cred.AccessKey, Groups: cred.Groups, Action: policy.ListUsersAdminAction,
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sat Sep 06 17:38:46 UTC 2025 - 7.6K bytes - Viewed (0) -
cmd/sts-handlers.go
issClaim = "iss" // JWT claim to check the parent user parentClaim = "parent" // LDAP claim keys ldapUser = "ldapUser" // this is a key name for a normalized DN value ldapActualUser = "ldapActualUser" // this is a key name for the actual DN value ldapUserN = "ldapUsername" // this is a key name for the short/login username // Claim key-prefix for LDAP attributes ldapAttribPrefix = "ldapAttrib_"
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 36.6K bytes - Viewed (0) -
cmd/admin-handlers-users.go
for k, v := range cred.Claims { if k == expClaim { continue } opts.claims[k] = v } } else if globalIAMSys.LDAPConfig.Enabled() { // In case of LDAP we need to resolve the targetUser to a DN and // query their groups: opts.claims[ldapUserN] = targetUser // simple username var lookupResult *xldap.DNSearchResult lookupResult, targetGroups, err = globalIAMSys.LDAPConfig.LookupUserDN(targetUser)Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 90.6K bytes - Viewed (0) -
cmd/site-replication.go
// use the normalized form of the entityName (which will be an LDAP DN). userType := IAMUserType(mapping.UserType) isGroup := mapping.IsGroup entityName := mapping.UserOrGroup if globalIAMSys.GetUsersSysType() == LDAPUsersSysType && userType == stsUser { // Validate that the user or group exists in LDAP and use the normalized // form of the entityName (which will be an LDAP DN). var err error if isGroup {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 184.7K bytes - Viewed (1)