Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 264 for Account (0.18 sec)

  1. docs/sts/keycloak.md

    - `account` client_id is a confidential client that belongs to the realm `{realm}`
    - `account` client_id is has **Service Accounts Enabled** option enabled.
    - `account` client_id has a custom "Audience" mapper, in the Mappers section.
      - Included Client Audience: security-admin-console
    
    #### Adding 'admin' Role
    
    Plain Text
    - Registered: Sun Apr 21 19:28:08 GMT 2024
    - Last Modified: Thu Sep 29 04:28:45 GMT 2022
    - 8.1K bytes
    - Viewed (0)
  2. internal/config/identity/ldap/ldap.go

    }
    
    // GetNonEligibleUserDistNames - find user accounts (DNs) that are no longer
    // present in the LDAP server or do not meet filter criteria anymore
    func (l *Config) GetNonEligibleUserDistNames(userDistNames []string) ([]string, error) {
    	conn, err := l.LDAP.Connect()
    	if err != nil {
    		return nil, err
    	}
    	defer conn.Close()
    
    	// Bind to the lookup user account
    	if err = l.LDAP.LookupBind(conn); err != nil {
    Go
    - Registered: Sun Apr 21 19:28:08 GMT 2024
    - Last Modified: Thu Apr 18 15:15:02 GMT 2024
    - 9.2K bytes
    - Viewed (0)
  3. cmd/admin-handlers-users_test.go

    	c.assertSvcAccS3Access(ctx, s, cr, bucket)
    
    	// 3. Check that svc account can restrict the policy, and that the
    	// session policy can be updated.
    	c.assertSvcAccSessionPolicyUpdate(ctx, s, s.adm, accessKey, bucket)
    
    	// 4. Check that service account's secret key and account status can be
    	// updated.
    	c.assertSvcAccSecretKeyAndStatusUpdate(ctx, s, s.adm, accessKey, bucket)
    
    Go
    - Registered: Sun Apr 21 19:28:08 GMT 2024
    - Last Modified: Mon Feb 12 16:36:16 GMT 2024
    - 45.7K bytes
    - Viewed (0)
  4. cmd/iam.go

    	// created before a certain (TBD) future date.
    	//
    	// 2. do not allow empty statement policies for service accounts.
    	if subPolicy.Version == "" && subPolicy.Statements == nil && subPolicy.ID == "" {
    		hasSessionPolicy = false
    		return
    	}
    
    	// As the session policy exists, even if the parent is the root account, it
    	// must be restricted by it. So, we set `.IsOwner` to false here
    Go
    - Registered: Sun Apr 21 19:28:08 GMT 2024
    - Last Modified: Thu Apr 18 19:09:19 GMT 2024
    - 69.9K bytes
    - Viewed (1)
  5. internal/arn/arn.go

    package arn
    
    import (
    	"errors"
    	"fmt"
    	"regexp"
    	"strings"
    )
    
    // ARN structure:
    //
    // arn:partition:service:region:account-id:resource-type/resource-id
    //
    // In this implementation, account-id is empty.
    //
    // Reference: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
    
    const (
    	arnPrefixArn        = "arn"
    	arnPartitionMinio   = "minio"
    Go
    - Registered: Sun Apr 21 19:28:08 GMT 2024
    - Last Modified: Thu Apr 04 08:31:34 GMT 2024
    - 3.5K bytes
    - Viewed (0)
  6. docs/site-replication/run-multi-site-oidc.sh

    STS_ACCESS_KEY=$(echo ${STS_CRED} | cut -d ':' -f 1)
    
    # Create service account for STS user
    ./mc admin user svcacct add minio2 $STS_ACCESS_KEY --access-key testsvc --secret-key testsvc123
    if [ $? -ne 0 ]; then
    	echo "adding svc account failed, exiting.."
    	exit_1
    fi
    
    sleep 10
    
    ./mc admin user svcacct info minio1 testsvc
    if [ $? -ne 0 ]; then
    	echo "svc account not mirrored, exiting.."
    	exit_1
    fi
    
    Shell Script
    - Registered: Sun Apr 21 19:28:08 GMT 2024
    - Last Modified: Mon Feb 26 21:30:28 GMT 2024
    - 8.4K bytes
    - Viewed (0)
  7. docs/sts/ldap.md

    ### Lookup-Bind
    
    A low-privilege read-only LDAP service account is configured in the MinIO server by providing the account's Distinguished Name (DN) and password. This service account is used to perform directory lookups as needed.
    
    ```
    MINIO_IDENTITY_LDAP_LOOKUP_BIND_DN*          (string)    DN for LDAP read-only service account used to perform DN and group lookups
    Plain Text
    - Registered: Sun Apr 21 19:28:08 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 18.4K bytes
    - Viewed (1)
  8. helm/minio/README.md

    - `svcaccts[].accessKey` - accessKey of service account
    - `svcaccts[].secretKey` - secretKey of svcacctsecretRef
    - `svcaccts[].existingSecret` - secret name that contains the secretKey of service account
    - `svcaccts[].existingSecretKey` - data key in existingSecret secret containing the secretKey
    - `svcaccts[].user` - name of the parent user to assign to service account
    
    ## Uninstalling the Chart
    
    Plain Text
    - Registered: Sun Apr 21 19:28:08 GMT 2024
    - Last Modified: Wed Jan 24 07:27:57 GMT 2024
    - 10.9K bytes
    - Viewed (0)
  9. cmd/sts-handlers_test.go

    		// ignored because the plugin allows it.
    		c.mustListObjects(ctx, svcClient, bucket)
    	}
    
    	// 4. Check that service account's secret key and account status can be
    	// updated.
    	c.assertSvcAccSecretKeyAndStatusUpdate(ctx, s, userAdmClient, value.AccessKeyID, bucket)
    
    	// 5. Check that service account can be deleted.
    	c.assertSvcAccDeletion(ctx, s, userAdmClient, value.AccessKeyID, bucket)
    Go
    - Registered: Sun Apr 21 19:28:08 GMT 2024
    - Last Modified: Thu Apr 18 19:09:19 GMT 2024
    - 84.7K bytes
    - Viewed (0)
  10. cmd/iam-object-store.go

    		if _, ok := cache.iamUsersMap[svcParent]; !ok {
    			// If a service account's parent user is not in iamUsersMap, the
    			// parent is an STS account. Such accounts may have a policy mapped
    			// on the parent user, so we load them. This is not needed for the
    			// initial server startup, however, it is needed for the case where
    			// the STS account's policy mapping (for example in LDAP mode) may
    Go
    - Registered: Sun Apr 21 19:28:08 GMT 2024
    - Last Modified: Fri Apr 05 21:26:41 GMT 2024
    - 19.9K bytes
    - Viewed (0)
Back to top