- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for myrealm (0.15 sec)
-
internal/config/identity/openid/provider/keycloak.go
func WithAdminURL(url string) Option { return func(p *KeycloakProvider) { p.adminURL = url } } // WithRealm provide realm configuration for Keycloak func WithRealm(realm string) Option { return func(p *KeycloakProvider) { p.realm = realm } } // KeyCloak initializes a new keycloak provider func KeyCloak(opts ...Option) (Provider, error) { p := &KeycloakProvider{}
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Apr 29 01:27:09 GMT 2022 - 4.6K bytes - Viewed (0) -
docs/sts/web-identity.md
MINIO_IDENTITY_OPENID_CLAIM_USERINFO (on|off) Enable fetching claims from UserInfo Endpoint for authenticated user MINIO_IDENTITY_OPENID_KEYCLOAK_REALM (string) Specify Keycloak 'realm' name, only honored if vendor was set to 'keycloak' as value, if no realm is specified 'master' is default MINIO_IDENTITY_OPENID_KEYCLOAK_ADMIN_URL (string) Specify Keycloak 'admin' REST API endpoint e.g. http://localhost:8080/auth/admin/
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 19.2K bytes - Viewed (1) -
internal/config/identity/openid/openid.go
RedirectURI = "redirect_uri" RedirectURIDynamic = "redirect_uri_dynamic" Vendor = "vendor" // Vendor specific ENV only enabled if the Vendor matches == "vendor" KeyCloakRealm = "keycloak_realm" KeyCloakAdminURL = "keycloak_admin_url" // Removed params JwksURL = "jwks_url" ClaimPrefix = "claim_prefix" ) // DefaultKVS - default config for OpenID config var ( DefaultKVS = config.KVS{
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Nov 16 04:42:31 GMT 2023 - 16.5K bytes - Viewed (0) -
cmd/testdata/undeleteable-object.tgz
claim_userinfo","value":""},{"key":"role_policy","value":""},{"key":"claim_prefix","value":""},{"key":"redirect_uri","value":""},{"key":"redirect_uri_dynamic","value":"off"},{"key":"scopes","value":""},{"key":"vendor","value":""},{"key":"keycloak_realm","value":""},{"key":"keycloak_admin_url","value":""}]},"identity_plugin":{"_":[{"key":"url","value":""},{"key":"auth_token","value":""},{"key":"role_policy","value":""},{"key":"role_id","value":""}]},"identity_tls":{"_":[{"key":"skip_verify","valu...
Others - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Apr 26 00:31:12 GMT 2024 - 8.7M bytes - Viewed (0) -
internal/config/identity/openid/help.go
Optional: true, Type: "on|off", }, config.HelpKV{ Key: KeyCloakRealm, Description: `Specify Keycloak 'realm' name, only honored if vendor was set to 'keycloak' as value, if no realm is specified 'master' is default` + defaultHelpPostfix(KeyCloakRealm), Optional: true, Type: "string", }, config.HelpKV{ Key: KeyCloakAdminURL,
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Jun 23 14:45:27 GMT 2023 - 4.3K bytes - Viewed (0) -
internal/config/identity/openid/providercfg.go
} var err error switch vendor { case keyCloakVendor: adminURL := cfgGet(KeyCloakAdminURL) realm := cfgGet(KeyCloakRealm) p.provider, err = provider.KeyCloak( provider.WithAdminURL(adminURL), provider.WithOpenIDConfig(provider.DiscoveryDoc(p.DiscoveryDoc)), provider.WithTransport(transport), provider.WithRealm(realm), ) return err default: return fmt.Errorf("Unsupported vendor %s", keyCloakVendor) } }
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 4.6K bytes - Viewed (0) -
docs/sts/keycloak.md
- Add this Role into compositive role named `default-roles-{realm}` - `{realm}` should be replaced with whatever realm you created from `prerequisites` section. This role is automatically trusted in the 'Service Accounts' tab. - Check that `account` client_id has the role 'admin' assigned in the "Service Account Roles" tab. After that, you will be able to obtain an id_token for the Admin REST API using client_id and client_secret:
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Sep 29 04:28:45 GMT 2022 - 8.1K bytes - Viewed (0)