- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 15 for myclientid (0.1 sec)
-
internal/config/identity/openid/openid.go
RolePolicy: provCfg.RolePolicy, ClientID: provCfg.ClientID, HashedClientSecret: hashedSecret, } } else { res.ClaimProvider = madmin.OpenIDProviderSettings{ ClaimUserinfoEnabled: provCfg.ClaimUserinfo, RolePolicy: provCfg.RolePolicy, ClientID: provCfg.ClientID, HashedClientSecret: hashedSecret, } } }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jul 10 20:16:44 UTC 2024 - 16.6K bytes - Viewed (0) -
cmd/warm-backend-azure.go
return errors.New("the account name is required") case conf.AccountKey != "" && (conf.SPAuth.TenantID != "" || conf.SPAuth.ClientID != "" || conf.SPAuth.ClientSecret != ""): return errors.New("multiple authentication mechanisms are provided") case conf.AccountKey == "" && (conf.SPAuth.TenantID == "" || conf.SPAuth.ClientID == "" || conf.SPAuth.ClientSecret == ""): return errors.New("no authentication mechanism was provided") }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 31 22:10:24 UTC 2024 - 7K bytes - Viewed (0) -
internal/config/identity/openid/jwt.go
pCfg := r.arnProviderCfgsMap[arn] if pCfg.JWKS.URL == nil || pCfg.JWKS.URL.String() == "" { return nil } // Add client secret for the client ID for HMAC based signature. r.pubKeys.add(pCfg.ClientID, []byte(pCfg.ClientSecret)) client := &http.Client{ Transport: r.transport, } resp, err := client.Get(pCfg.JWKS.URL.String()) if err != nil { return err } defer r.closeRespFn(resp.Body)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Sep 06 02:46:36 UTC 2024 - 8.4K bytes - Viewed (0) -
internal/config/identity/openid/provider/keycloak.go
return ErrNotImplemented } // LoginWithClientID is implemented by Keycloak service account support func (k *KeycloakProvider) LoginWithClientID(clientID, clientSecret string) error { values := url.Values{} values.Set("client_id", clientID) values.Set("client_secret", clientSecret) values.Set("grant_type", "client_credentials")
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Jul 14 18:12:07 UTC 2024 - 4.6K bytes - Viewed (0) -
internal/event/target/mqtt.go
args := target.args // Using hex here, to make sure we avoid 23 // character limit on client_id according to // MQTT spec. clientID := fmt.Sprintf("%x", time.Now().UnixNano()) options := mqtt.NewClientOptions(). SetClientID(clientID). SetCleanSession(true). SetUsername(args.User). SetPassword(args.Password). SetMaxReconnectInterval(args.MaxReconnectInterval).
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Sep 06 23:06:30 UTC 2024 - 8.2K bytes - Viewed (0) -
cmd/tier.go
if creds.SecretKey != "" { cfg.Azure.AccountKey = creds.SecretKey } if creds.AzSP.TenantID != "" { cfg.Azure.SPAuth.TenantID = creds.AzSP.TenantID } if creds.AzSP.ClientID != "" { cfg.Azure.SPAuth.ClientID = creds.AzSP.ClientID } if creds.AzSP.ClientSecret != "" { cfg.Azure.SPAuth.ClientSecret = creds.AzSP.ClientSecret } case madmin.GCS: if creds.CredsJSON == nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Sep 12 20:44:05 UTC 2024 - 15.7K bytes - Viewed (0) -
cmd/common-main.go
m[name] = consoleoauth2.ProviderConfig{ URL: cfg.URL.String(), DisplayName: cfg.DisplayName, ClientID: cfg.ClientID, ClientSecret: cfg.ClientSecret, HMACSalt: globalDeploymentID(), HMACPassphrase: cfg.ClientID, Scopes: strings.Join(cfg.DiscoveryDoc.ScopesSupported, ","), Userinfo: cfg.ClaimUserinfo,
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Sep 24 21:50:11 UTC 2024 - 31.7K bytes - Viewed (0) -
internal/event/target/nats.go
addressURL = scheme + "://" + n.Token + "@" + n.Address.String() } else { addressURL = scheme + "://" + n.Address.String() } u, err := uuid.NewRandom() if err != nil { return nil, err } clientID := u.String() connOpts := []stan.Option{stan.NatsURL(addressURL)} if n.Streaming.MaxPubAcksInflight > 0 { connOpts = append(connOpts, stan.MaxPubAcksInflight(n.Streaming.MaxPubAcksInflight)) }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Sep 06 23:06:30 UTC 2024 - 12.9K bytes - Viewed (0) -
helm/minio/templates/deployment.yaml
secretKeyRef: name: {{ .Values.oidc.existingClientSecretName }} key: {{ .Values.oidc.existingClientIdKey }} {{- else }} value: {{ .Values.oidc.clientId }} {{- end }} - name: MINIO_IDENTITY_OPENID_CLIENT_SECRET {{- if and .Values.oidc.existingClientSecretName .Values.oidc.existingClientSecretKey }} valueFrom:
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 10 15:48:31 UTC 2024 - 8.6K bytes - Viewed (0) -
helm/minio/values.yaml
oidc: enabled: false configUrl: "https://identity-provider-url/.well-known/openid-configuration" clientId: "minio" clientSecret: "" # Provide existing client secret from the Kubernetes Secret resource, existing secret will have priority over `clientId` and/or `clientSecret`` existingClientSecretName: "" existingClientIdKey: "" existingClientSecretKey: "" claimName: "policy"
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 10 15:48:31 UTC 2024 - 18.8K bytes - Viewed (1)