Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 9 of 9 for DN (0.02 sec)

  1. cmd/iam.go

    			if policiesDiffer {
    				return []string{}, fmt.Errorf("multiple DNs map to the same LDAP DN[%s]: %v; please remove DNs that are not needed",
    					normKey, origKeys)
    			}
    
    			if len(origKeys[1:]) > 0 {
    				// Log that extra DN mappings will not be imported.
    				iamLogEvent(ctx, "import-ldap-normalize: extraneous DN mappings found for LDAP DN[%s]: %v will not be imported", origKeys[0], origKeys[1:])
    			}
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 75.3K bytes
    - Viewed (0)
  2. docs/sts/ldap.md

    The returned user's DN and their password are then verified with the LDAP server. The user DN may also be associated with an [access policy](#managing-usergroup-access-policy).
    
    The User DN attributes configuration parameter:
    ```
    MINIO_IDENTITY_LDAP_USER_DN_ATTRIBUTES      (list)      "," separated list of user DN attributes e.g. "uid,cn,mail,sshPublicKey"
    ```
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 18.9K bytes
    - Viewed (0)
  3. cmd/admin-handlers-idp-ldap.go

    		}) {
    			writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAccessDenied), r.URL)
    			return
    		}
    	} else if len(dnList) == 1 {
    		var dn string
    		foundResult, err := globalIAMSys.LDAPConfig.GetValidatedDNForUsername(dnList[0])
    		if err == nil {
    			dn = foundResult.NormDN
    		}
    		if dn == cred.ParentUser || dnList[0] == cred.ParentUser {
    			selfOnly = true
    		}
    	}
    
    	if !globalIAMSys.IsAllowed(policy.Args{
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 08 02:46:04 UTC 2025
    - 19.2K bytes
    - Viewed (0)
  4. cmd/sts-handlers_test.go

    		Policies: []string{"readwrite"},
    	}
    
    	cases := []struct {
    		username string
    		dn       string
    		group    string
    	}{
    		{
    			username: "slashuser",
    			dn:       "uid=slash/user,ou=people,ou=swengg,dc=min,dc=io",
    		},
    		{
    			username: "dillon",
    			dn:       "uid=dillon,ou=people,ou=swengg,dc=min,dc=io",
    			group:    "cn=project/d,ou=groups,ou=swengg,dc=min,dc=io",
    		},
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 100.2K bytes
    - Viewed (1)
  5. docs/tls/README.md

    Create a file called `cert.cnf` with the content below. This file contains all of the information necessary to generate a certificate using `certtool.exe`:
    
    ```
    # X.509 Certificate options
    #
    # DN options
    
    # The organization of the subject.
    organization = "Example Inc."
    
    # The organizational unit of the subject.
    #unit = "sleeping dept."
    
    # The state of the certificate owner.
    state = "Example"
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.6K bytes
    - Viewed (0)
  6. cmd/admin-handlers-idp-openid.go

    	}
    
    	if isAll && len(userList) > 0 {
    		// This should be checked on client side, so return generic error
    		writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInvalidRequest), r.URL)
    		return
    	}
    
    	// Empty DN list and not self, list access keys for all users
    	if isAll {
    		if !globalIAMSys.IsAllowed(policy.Args{
    			AccountName:     cred.AccessKey,
    			Groups:          cred.Groups,
    			Action:          policy.ListUsersAdminAction,
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sat Sep 06 17:38:46 UTC 2025
    - 7.6K bytes
    - Viewed (0)
  7. cmd/sts-handlers.go

    	issClaim = "iss"
    
    	// JWT claim to check the parent user
    	parentClaim = "parent"
    
    	// LDAP claim keys
    	ldapUser       = "ldapUser"       // this is a key name for a normalized DN value
    	ldapActualUser = "ldapActualUser" // this is a key name for the actual DN value
    	ldapUserN      = "ldapUsername"   // this is a key name for the short/login username
    	// Claim key-prefix for LDAP attributes
    	ldapAttribPrefix = "ldapAttrib_"
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 36.6K bytes
    - Viewed (0)
  8. cmd/admin-handlers-users.go

    		for k, v := range cred.Claims {
    			if k == expClaim {
    				continue
    			}
    			opts.claims[k] = v
    		}
    	} else if globalIAMSys.LDAPConfig.Enabled() {
    		// In case of LDAP we need to resolve the targetUser to a DN and
    		// query their groups:
    		opts.claims[ldapUserN] = targetUser // simple username
    		var lookupResult *xldap.DNSearchResult
    		lookupResult, targetGroups, err = globalIAMSys.LDAPConfig.LookupUserDN(targetUser)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 90.6K bytes
    - Viewed (0)
  9. cmd/site-replication.go

    	// use the normalized form of the entityName (which will be an LDAP DN).
    	userType := IAMUserType(mapping.UserType)
    	isGroup := mapping.IsGroup
    	entityName := mapping.UserOrGroup
    
    	if globalIAMSys.GetUsersSysType() == LDAPUsersSysType && userType == stsUser {
    		// Validate that the user or group exists in LDAP and use the normalized
    		// form of the entityName (which will be an LDAP DN).
    		var err error
    		if isGroup {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 184.7K bytes
    - Viewed (1)
Back to top