Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for ldapActualUser (0.22 sec)

  1. cmd/admin-handlers-idp-ldap.go

    				}
    			}
    			writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
    			return
    		}
    		targetUser = lookupResult.NormDN
    		opts.claims[ldapUser] = targetUser // DN
    		opts.claims[ldapActualUser] = lookupResult.ActualDN
    
    		// Check if this user or their groups have a policy applied.
    		ldapPolicies, err := globalIAMSys.PolicyDBGet(targetUser, targetGroups...)
    		if err != nil {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Mon Jun 03 19:58:48 UTC 2024
    - 14.1K bytes
    - Viewed (0)
  2. cmd/sts-handlers.go

    	issClaim = "iss"
    
    	// JWT claim to check the parent user
    	parentClaim = "parent"
    
    	// LDAP claim keys
    	ldapUser       = "ldapUser"       // this is a key name for a normalized DN value
    	ldapActualUser = "ldapActualUser" // this is a key name for the actual DN value
    	ldapUserN      = "ldapUsername"   // this is a key name for the short/login username
    	// Claim key-prefix for LDAP attributes
    	ldapAttribPrefix = "ldapAttrib_"
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Tue Jun 11 03:13:30 UTC 2024
    - 33.9K bytes
    - Viewed (0)
  3. cmd/ftp-server-driver.go

    			if err != nil {
    				return nil, err
    			}
    			claims := make(map[string]interface{})
    			claims[expClaim] = UTCNow().Add(expiryDur).Unix()
    
    			claims[ldapUser] = lookupResult.NormDN
    			claims[ldapActualUser] = lookupResult.ActualDN
    			claims[ldapUserN] = ctx.Sess.LoginUser()
    
    			// Add LDAP attributes that were looked up into the claims.
    			for attribKey, attribValue := range lookupResult.Attributes {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Mon Jun 03 15:45:54 UTC 2024
    - 14K bytes
    - Viewed (0)
  4. cmd/sts-handlers_test.go

    		}
    		claims, err := getClaimsFromTokenWithSecret(value.SessionToken, secret)
    		if err != nil {
    			c.Fatalf("Error getting claims from token: %v", err)
    		}
    
    		// Validate claims.
    		dnClaim := claims[ldapActualUser].(string)
    		if dnClaim != testCase.dn {
    			c.Fatalf("Test %d: unexpected dn claim: %s", i+1, dnClaim)
    		}
    	}
    }
    
    func (s *TestSuiteIAM) TestLDAPAttributesLookup(c *check) {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Mon Jun 10 18:45:50 UTC 2024
    - 90K bytes
    - Viewed (0)
  5. cmd/iam-store.go

    		}
    
    		subClaimValue := cred.ParentUser
    		if v, ok := claims[subClaim]; ok {
    			subFromToken, ok := v.(string)
    			if ok {
    				subClaimValue = subFromToken
    			}
    		}
    		if v, ok := claims[ldapActualUser]; ok {
    			subFromToken, ok := v.(string)
    			if ok {
    				subClaimValue = subFromToken
    			}
    		}
    
    		roleArn := openid.DummyRoleARN.String()
    		s, ok := claims[roleArnClaim]
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Thu Jun 13 22:26:38 UTC 2024
    - 75.8K bytes
    - Viewed (0)
  6. cmd/admin-handlers-users.go

    		if err != nil {
    			writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
    			return
    		}
    		targetUser = lookupResult.NormDN
    		opts.claims[ldapUser] = targetUser // username DN
    		opts.claims[ldapActualUser] = lookupResult.ActualDN
    
    		// Add LDAP attributes that were looked up into the claims.
    		for attribKey, attribValue := range lookupResult.Attributes {
    			opts.claims[ldapAttribPrefix+attribKey] = attribValue
    		}
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Tue May 28 17:19:04 UTC 2024
    - 78.6K bytes
    - Viewed (0)
Back to top