Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 7 of 7 for myrealm (0.15 sec)

  1. internal/config/identity/openid/provider/keycloak.go

    func WithAdminURL(url string) Option {
    	return func(p *KeycloakProvider) {
    		p.adminURL = url
    	}
    }
    
    // WithRealm provide realm configuration for Keycloak
    func WithRealm(realm string) Option {
    	return func(p *KeycloakProvider) {
    		p.realm = realm
    	}
    }
    
    // KeyCloak initializes a new keycloak provider
    func KeyCloak(opts ...Option) (Provider, error) {
    	p := &KeycloakProvider{}
    
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Apr 29 01:27:09 GMT 2022
    - 4.6K bytes
    - Viewed (0)
  2. docs/sts/web-identity.md

    MINIO_IDENTITY_OPENID_CLAIM_USERINFO        (on|off)    Enable fetching claims from UserInfo Endpoint for authenticated user
    MINIO_IDENTITY_OPENID_KEYCLOAK_REALM        (string)    Specify Keycloak 'realm' name, only honored if vendor was set to 'keycloak' as value, if no realm is specified 'master' is default
    MINIO_IDENTITY_OPENID_KEYCLOAK_ADMIN_URL    (string)    Specify Keycloak 'admin' REST API endpoint e.g. http://localhost:8080/auth/admin/
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 19.2K bytes
    - Viewed (1)
  3. internal/config/identity/openid/openid.go

    	RedirectURI        = "redirect_uri"
    	RedirectURIDynamic = "redirect_uri_dynamic"
    	Vendor             = "vendor"
    
    	// Vendor specific ENV only enabled if the Vendor matches == "vendor"
    	KeyCloakRealm    = "keycloak_realm"
    	KeyCloakAdminURL = "keycloak_admin_url"
    
    	// Removed params
    	JwksURL     = "jwks_url"
    	ClaimPrefix = "claim_prefix"
    )
    
    // DefaultKVS - default config for OpenID config
    var (
    	DefaultKVS = config.KVS{
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Nov 16 04:42:31 GMT 2023
    - 16.5K bytes
    - Viewed (0)
  4. cmd/testdata/undeleteable-object.tgz

    claim_userinfo","value":""},{"key":"role_policy","value":""},{"key":"claim_prefix","value":""},{"key":"redirect_uri","value":""},{"key":"redirect_uri_dynamic","value":"off"},{"key":"scopes","value":""},{"key":"vendor","value":""},{"key":"keycloak_realm","value":""},{"key":"keycloak_admin_url","value":""}]},"identity_plugin":{"_":[{"key":"url","value":""},{"key":"auth_token","value":""},{"key":"role_policy","value":""},{"key":"role_id","value":""}]},"identity_tls":{"_":[{"key":"skip_verify","valu...
    Others
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Apr 26 00:31:12 GMT 2024
    - 8.7M bytes
    - Viewed (0)
  5. internal/config/identity/openid/help.go

    			Optional:    true,
    			Type:        "on|off",
    		},
    		config.HelpKV{
    			Key:         KeyCloakRealm,
    			Description: `Specify Keycloak 'realm' name, only honored if vendor was set to 'keycloak' as value, if no realm is specified 'master' is default` + defaultHelpPostfix(KeyCloakRealm),
    			Optional:    true,
    			Type:        "string",
    		},
    		config.HelpKV{
    			Key:         KeyCloakAdminURL,
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Jun 23 14:45:27 GMT 2023
    - 4.3K bytes
    - Viewed (0)
  6. internal/config/identity/openid/providercfg.go

    	}
    	var err error
    	switch vendor {
    	case keyCloakVendor:
    		adminURL := cfgGet(KeyCloakAdminURL)
    		realm := cfgGet(KeyCloakRealm)
    		p.provider, err = provider.KeyCloak(
    			provider.WithAdminURL(adminURL),
    			provider.WithOpenIDConfig(provider.DiscoveryDoc(p.DiscoveryDoc)),
    			provider.WithTransport(transport),
    			provider.WithRealm(realm),
    		)
    		return err
    	default:
    		return fmt.Errorf("Unsupported vendor %s", keyCloakVendor)
    	}
    }
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 4.6K bytes
    - Viewed (0)
  7. docs/sts/keycloak.md

      - Add this Role into compositive role named `default-roles-{realm}` - `{realm}` should be replaced with whatever realm you created from `prerequisites` section. This role is automatically trusted in the 'Service Accounts' tab.
    
    - Check that `account` client_id has the role 'admin' assigned in the "Service Account Roles" tab.
    
    After that, you will be able to obtain an id_token for the Admin REST API using client_id and client_secret:
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Sep 29 04:28:45 GMT 2022
    - 8.1K bytes
    - Viewed (0)
Back to top