- Sort Score
- Result 10 results
- Languages All
Results 1 - 9 of 9 for role_policy (0.04 sec)
-
docs/distributed/iam-import-with-openid.sh
client_id="minio-client-app" \ client_secret="minio-client-app-secret" \ scopes="openid,groups,email,profile" \ redirect_uri="http://127.0.0.1:10000/oauth_callback" \ display_name="Login via dex1" \ role_policy="consoleAdmin" ./mc admin service restart myminio --json ./mc ready myminio ./mc admin cluster iam import myminio docs/distributed/samples/myminio-iam-info-openid.zip
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Sep 17 16:45:46 UTC 2024 - 2.3K bytes - Viewed (0) -
internal/config/identity/openid/openid.go
ClaimUserinfoEnabled: provCfg.ClaimUserinfo, RolePolicy: provCfg.RolePolicy, ClientID: provCfg.ClientID, HashedClientSecret: hashedSecret, } } else { res.ClaimProvider = madmin.OpenIDProviderSettings{ ClaimUserinfoEnabled: provCfg.ClaimUserinfo, RolePolicy: provCfg.RolePolicy, ClientID: provCfg.ClientID,Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 17.3K bytes - Viewed (0) -
internal/config/identity/plugin/config.go
} authToken := env.Get(EnvIdentityPluginAuthToken, kv.Get(AuthToken)) u, err := xnet.ParseHTTPURL(pluginURL) if err != nil { return args, err } rolePolicy := env.Get(EnvIdentityPluginRolePolicy, kv.Get(RolePolicy)) if rolePolicy == "" { return args, config.Errorf("A role policy must be specified for Identity Management Plugin") } resourceID := "idmp-"
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 13.3K bytes - Viewed (0) -
docs/sts/web-identity.md
Policy (Recommended): When specified as part of the OpenID provider configuration, all users authenticating via this provider are authorized to (only) use the specified role policy. The policy to associate with such users is specified via the `role_policy` configuration parameter or the `MINIO_IDENTITY_OPENID_ROLE_POLICY` environment variable. The value is a comma-separated list of IAM access policy names already defined in the server. In this situation, the server prints a role ARN at startup that...
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 18.9K bytes - Viewed (0) -
cmd/sts-handlers_test.go
"client_id=minio-client-app", "client_secret=minio-client-app-secret", "scopes=openid,groups", "redirect_uri=http://127.0.0.1:10000/oauth_callback", } if rolePolicy != "" { configCmds = append(configCmds, fmt.Sprintf("role_policy=%s", rolePolicy)) } else { configCmds = append(configCmds, "claim_name=groups") } _, err := s.adm.SetConfigKV(ctx, strings.Join(configCmds, " ")) if err != nil {Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Oct 15 17:00:45 UTC 2025 - 103.4K bytes - Viewed (1) -
cmd/testdata/undeleteable-object.tgz
","value":"policy"},{"key":"claim_userinfo","value":""},{"key":"role_policy","value":""},{"key":"claim_prefix","value":""},{"key":"redirect_uri","value":""},{"key":"redirect_uri_dynamic","value":"off"},{"key":"scopes","value":""},{"key":"vendor","value":""},{"key":"keycloak_realm","value":""},{"key":"keycloak_admin_url","value":""}]},"identity_plugin":{"_":[{"key":"url","value":""},{"key":"auth_token","value":""},{"key":"role_policy","value":""},{"key":"role_id","value":""}]},"identity_tls":{"_"...
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Apr 26 00:31:12 UTC 2024 - 8.7M bytes - Viewed (0) -
internal/config/identity/openid/providercfg.go
RedirectURI: getCfgVal(RedirectURI), RedirectURIDynamic: getCfgVal(RedirectURIDynamic) == config.EnableOn, ClientID: getCfgVal(ClientID), ClientSecret: getCfgVal(ClientSecret), RolePolicy: getCfgVal(RolePolicy), UserReadableClaim: getCfgVal(UserReadableClaim), UserIDClaim: getCfgVal(UserIDClaim), } } const ( keyCloakVendor = "keycloak" )
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.7K bytes - Viewed (0) -
internal/config/identity/openid/help.go
Sensitive: true, Type: "string", Secret: true, }, config.HelpKV{ Key: RolePolicy, Description: `Set the IAM access policies applicable to this client application and IDP e.g. "app-bucket-write,app-bucket-list"` + defaultHelpPostfix(RolePolicy), Optional: true, Type: "string", }, config.HelpKV{ Key: ClaimName,
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Jun 23 14:45:27 UTC 2023 - 4.3K bytes - Viewed (0) -
cmd/iam.go
roleArn, err := arn.Parse(arnStr) if err != nil { return arn.ARN{}, "", fmt.Errorf("RoleARN parse err: %v", err) } rolePolicy, ok := sys.rolesMap[roleArn] if !ok { return arn.ARN{}, "", fmt.Errorf("RoleARN %s is not defined.", arnStr) } return roleArn, rolePolicy, nil } // DeletePolicy - deletes a canned policy from backend. `notifyPeers` is true
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Oct 15 17:00:45 UTC 2025 - 76.5K bytes - Viewed (0)