- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 264 for Account (0.18 sec)
-
docs/sts/keycloak.md
- `account` client_id is a confidential client that belongs to the realm `{realm}` - `account` client_id is has **Service Accounts Enabled** option enabled. - `account` client_id has a custom "Audience" mapper, in the Mappers section. - Included Client Audience: security-admin-console #### Adding 'admin' Role
Plain Text - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Thu Sep 29 04:28:45 GMT 2022 - 8.1K bytes - Viewed (0) -
internal/config/identity/ldap/ldap.go
} // GetNonEligibleUserDistNames - find user accounts (DNs) that are no longer // present in the LDAP server or do not meet filter criteria anymore func (l *Config) GetNonEligibleUserDistNames(userDistNames []string) ([]string, error) { conn, err := l.LDAP.Connect() if err != nil { return nil, err } defer conn.Close() // Bind to the lookup user account if err = l.LDAP.LookupBind(conn); err != nil {
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Thu Apr 18 15:15:02 GMT 2024 - 9.2K bytes - Viewed (0) -
cmd/admin-handlers-users_test.go
c.assertSvcAccS3Access(ctx, s, cr, bucket) // 3. Check that svc account can restrict the policy, and that the // session policy can be updated. c.assertSvcAccSessionPolicyUpdate(ctx, s, s.adm, accessKey, bucket) // 4. Check that service account's secret key and account status can be // updated. c.assertSvcAccSecretKeyAndStatusUpdate(ctx, s, s.adm, accessKey, bucket)
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Mon Feb 12 16:36:16 GMT 2024 - 45.7K bytes - Viewed (0) -
cmd/iam.go
// created before a certain (TBD) future date. // // 2. do not allow empty statement policies for service accounts. if subPolicy.Version == "" && subPolicy.Statements == nil && subPolicy.ID == "" { hasSessionPolicy = false return } // As the session policy exists, even if the parent is the root account, it // must be restricted by it. So, we set `.IsOwner` to false here
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Thu Apr 18 19:09:19 GMT 2024 - 69.9K bytes - Viewed (1) -
internal/arn/arn.go
package arn import ( "errors" "fmt" "regexp" "strings" ) // ARN structure: // // arn:partition:service:region:account-id:resource-type/resource-id // // In this implementation, account-id is empty. // // Reference: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html const ( arnPrefixArn = "arn" arnPartitionMinio = "minio"
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Thu Apr 04 08:31:34 GMT 2024 - 3.5K bytes - Viewed (0) -
docs/site-replication/run-multi-site-oidc.sh
STS_ACCESS_KEY=$(echo ${STS_CRED} | cut -d ':' -f 1) # Create service account for STS user ./mc admin user svcacct add minio2 $STS_ACCESS_KEY --access-key testsvc --secret-key testsvc123 if [ $? -ne 0 ]; then echo "adding svc account failed, exiting.." exit_1 fi sleep 10 ./mc admin user svcacct info minio1 testsvc if [ $? -ne 0 ]; then echo "svc account not mirrored, exiting.." exit_1 fi
Shell Script - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Mon Feb 26 21:30:28 GMT 2024 - 8.4K bytes - Viewed (0) -
docs/sts/ldap.md
### Lookup-Bind A low-privilege read-only LDAP service account is configured in the MinIO server by providing the account's Distinguished Name (DN) and password. This service account is used to perform directory lookups as needed. ``` MINIO_IDENTITY_LDAP_LOOKUP_BIND_DN* (string) DN for LDAP read-only service account used to perform DN and group lookups
Plain Text - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 18.4K bytes - Viewed (1) -
helm/minio/README.md
- `svcaccts[].accessKey` - accessKey of service account - `svcaccts[].secretKey` - secretKey of svcacctsecretRef - `svcaccts[].existingSecret` - secret name that contains the secretKey of service account - `svcaccts[].existingSecretKey` - data key in existingSecret secret containing the secretKey - `svcaccts[].user` - name of the parent user to assign to service account ## Uninstalling the Chart
Plain Text - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Wed Jan 24 07:27:57 GMT 2024 - 10.9K bytes - Viewed (0) -
cmd/sts-handlers_test.go
// ignored because the plugin allows it. c.mustListObjects(ctx, svcClient, bucket) } // 4. Check that service account's secret key and account status can be // updated. c.assertSvcAccSecretKeyAndStatusUpdate(ctx, s, userAdmClient, value.AccessKeyID, bucket) // 5. Check that service account can be deleted. c.assertSvcAccDeletion(ctx, s, userAdmClient, value.AccessKeyID, bucket)
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Thu Apr 18 19:09:19 GMT 2024 - 84.7K bytes - Viewed (0) -
cmd/iam-object-store.go
if _, ok := cache.iamUsersMap[svcParent]; !ok { // If a service account's parent user is not in iamUsersMap, the // parent is an STS account. Such accounts may have a policy mapped // on the parent user, so we load them. This is not needed for the // initial server startup, however, it is needed for the case where // the STS account's policy mapping (for example in LDAP mode) may
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Fri Apr 05 21:26:41 GMT 2024 - 19.9K bytes - Viewed (0)