Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 246 for claim (0.02 sec)

  1. internal/config/identity/openid/jwt.go

    	// If claim user info is enabled, get claims from userInfo
    	// and overwrite them with the claims from JWT.
    	if ok && pCfg.ClaimUserinfo {
    		if accessToken == "" {
    			return errors.New("access_token is mandatory if user_info claim is enabled")
    		}
    		uclaims, err := pCfg.UserInfo(ctx, accessToken, r.transport)
    		if err != nil {
    			return err
    		}
    		for k, v := range uclaims {
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  2. cmd/sts-handlers.go

    		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, err)
    		return
    	}
    
    	claims[expClaim] = UTCNow().Add(expiryDur).Unix()
    	claims[ldapUser] = ldapUserDN
    	claims[ldapActualUser] = ldapActualUserDN
    	claims[ldapUserN] = ldapUsername
    	// Add lookup up LDAP attributes as claims.
    	for attrib, value := range lookupResult.Attributes {
    		claims[ldapAttribPrefix+attrib] = value
    	}
    	tokenRevokeType := r.Form.Get(stsRevokeTokenType)
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 36.6K bytes
    - Viewed (0)
  3. docs/sts/web-identity.md

    temporary credentials generated in the AssumeRoleWithWebIdentity call.
    
    2. `id_token` claims: When the role policy is not configured, MinIO looks for a specific claim in the `id_token` (JWT) returned by the OpenID provider in the STS request. The default claim is `policy` and can be overridden by the `claim_name` configuration parameter or the `MINIO_IDENTITY_OPENID_CLAIM_NAME` environment variable. The claim value can be a string (comma-separated list) or an array of IAM access policy names defined...
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 18.9K bytes
    - Viewed (0)
  4. internal/config/identity/openid/openid.go

    			p.DiscoveryDoc.ScopesSupported = scopes
    		}
    
    		// Check if claim name is the non-default value and role policy is set.
    		if p.ClaimName != policy.PolicyName && p.RolePolicy != "" {
    			// In the unlikely event that the user specifies
    			// `policy.PolicyName` as the claim name explicitly and sets
    			// a role policy, this check is thwarted, but we will be using
    			// the role policy anyway.
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 17.3K bytes
    - Viewed (0)
  5. docs/sts/wso2.md

      "token_type": "Bearer",
      "expires_in": 3600
    }
    ```
    
    ### 4. JWT Claims
    
    The id_token received is a signed JSON Web Token (JWT). Use a JWT decoder to decode the id_token to access the payload of the token that includes following JWT claims:
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.7K bytes
    - Viewed (0)
  6. docs/sts/README.md

    decode the id_token to access the payload of the token that includes following JWT claims, `policy` claim is mandatory and should be present as part of your JWT claim. Without this claim the generated credentials will not have access to any resources on the server, using these credentials application would receive 'Access Denied' errors.
    
    | Claim Name | Type                                              | Claim Value                                                                           ...
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 7.8K bytes
    - Viewed (0)
  7. internal/jwt/parser_test.go

    			var err error
    
    			// Figure out correct claims type
    			switch claims := data.claims.(type) {
    			case *MapClaims:
    				if data.tokenString == "" {
    					data.tokenString = mapClaimsToken(claims)
    				}
    				err = ParseWithClaims(data.tokenString, &MapClaims{}, data.keyfunc)
    			case *StandardClaims:
    				if data.tokenString == "" {
    					data.tokenString = standardClaimsToken(claims)
    				}
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 6K bytes
    - Viewed (0)
  8. internal/config/identity/openid/help.go

    			Optional:    true,
    			Type:        "string",
    		},
    		config.HelpKV{
    			Key:         ClaimName,
    			Description: `JWT canned policy claim name` + defaultHelpPostfix(ClaimName),
    			Optional:    true,
    			Type:        "string",
    		},
    		config.HelpKV{
    			Key:         Scopes,
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Jun 23 14:45:27 UTC 2023
    - 4.3K bytes
    - Viewed (0)
  9. docs/sts/keycloak.md

      - Save
    
    - Go to Clients
      - Click on `account`
      - Mappers
      - Create
        - `Name` with any text
        - `Mapper Type` is `User Attribute`
        - `User Attribute` is `policy`
        - `Token Claim Name` is `policy`
        - `Claim JSON Type` is `string`
      - Save
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.1K bytes
    - Viewed (0)
  10. docs/sts/casdoor.md

    client_id     (string)    unique public identifier for apps e.g. "292085223830.apps.googleusercontent.com"
    claim_name    (string)    JWT canned policy claim name, defaults to "policy"
    claim_prefix  (string)    JWT claim namespace prefix e.g. "customer1/"
    scopes        (csv)       Comma separated list of OpenID scopes for server, defaults to advertised scopes from discovery document e.g. "email,admin"
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 6.6K bytes
    - Viewed (0)
Back to top