Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 169 for Claims (0.03 sec)

  1. cmd/auth-handler.go

    		return token
    	}
    	return r.Form.Get(xhttp.AmzSecurityToken)
    }
    
    // Fetch claims in the security token returned by the client, doesn't return
    // errors - upon errors the returned claims map will be empty.
    func mustGetClaimsFromToken(r *http.Request) map[string]any {
    	claims, _ := getClaimsFromToken(getSessionToken(r))
    	return claims
    }
    
    func getClaimsFromTokenWithSecret(token, secret string) (*xjwt.MapClaims, error) {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 25.4K bytes
    - Viewed (0)
  2. cmd/jwt.go

    		// Check if the access key is part of users credentials.
    		u, ok := globalIAMSys.GetUser(req.Context(), claims.AccessKey)
    		if !ok {
    			return nil, nil, false, errInvalidAccessKeyID
    		}
    		ucred := u.Credentials
    		// get embedded claims
    		eclaims, s3Err := checkClaimsFromToken(req, ucred)
    		if s3Err != ErrNone {
    			return nil, nil, false, errAuthentication
    		}
    
    		maps.Copy(claims.MapClaims, eclaims)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 4.5K bytes
    - Viewed (0)
  3. cmd/sts-handlers.go

    		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, err)
    		return
    	}
    
    	claims[expClaim] = UTCNow().Add(expiryDur).Unix()
    	claims[ldapUser] = ldapUserDN
    	claims[ldapActualUser] = ldapActualUserDN
    	claims[ldapUserN] = ldapUsername
    	// Add lookup up LDAP attributes as claims.
    	for attrib, value := range lookupResult.Attributes {
    		claims[ldapAttribPrefix+attrib] = value
    	}
    	tokenRevokeType := r.Form.Get(stsRevokeTokenType)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 36.6K bytes
    - Viewed (0)
  4. cmd/admin-handlers-idp-ldap.go

    			writeErrorResponseJSON(ctx, w, APIErr, r.URL)
    			return
    		}
    
    		// In case of LDAP/OIDC we need to set `opts.claims` to ensure
    		// it is associated with the LDAP/OIDC user properly.
    		for k, v := range cred.Claims {
    			if k == expClaim {
    				continue
    			}
    			opts.claims[k] = v
    		}
    	} else {
    		// We still need to ensure that the target user is a valid LDAP user.
    		//
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 08 02:46:04 UTC 2025
    - 19.2K bytes
    - Viewed (0)
  5. apache-maven/src/main/appended-resources/licenses/EPL-2.0.txt

    Contributor. If that Commercial Contributor then makes performance
    claims, or offers warranties related to Product X, those performance
    claims and warranties are such Commercial Contributor's responsibility
    alone. Under this section, the Commercial Contributor would have to
    defend claims against the other Contributors related to those performance
    claims and warranties, and if a court requires any other Contributor to
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Tue Jun 04 06:45:16 UTC 2024
    - 13.9K bytes
    - Viewed (0)
  6. cmd/user-provider-utils.go

    func guessUserProvider(credentials auth.Credentials) string {
    	if !credentials.IsServiceAccount() && !credentials.IsTemp() {
    		return madmin.BuiltinProvider // regular users are always internal
    	}
    
    	claims := credentials.Claims
    	if _, ok := claims[ldapUser]; ok {
    		return madmin.LDAPProvider // ldap users
    	}
    
    	if _, ok := claims[subClaim]; ok {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 4.1K bytes
    - Viewed (0)
  7. cmd/ftp-server-driver.go

    			if err != nil {
    				return nil, err
    			}
    			claims := make(map[string]any)
    			claims[expClaim] = UTCNow().Add(expiryDur).Unix()
    
    			claims[ldapUser] = lookupResult.NormDN
    			claims[ldapActualUser] = lookupResult.ActualDN
    			claims[ldapUserN] = ctx.Sess.LoginUser()
    
    			// Add LDAP attributes that were looked up into the claims.
    			for attribKey, attribValue := range lookupResult.Attributes {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 14.3K bytes
    - Viewed (0)
  8. docs/sts/wso2.md

    **We recommend setting `policy` as a custom claim for the JWT service provider follow [here](https://docs.wso2.com/display/IS550/Configuring+Claims+for+a+Service+Provider) and [here](https://docs.wso2.com/display/IS550/Handling+Custom+Claims+with+the+JWT+Bearer+Grant+Type) for relevant docs on how to configure claims for a service provider.**
    
    ### 5. Setup MinIO with OpenID configuration URL
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.7K bytes
    - Viewed (0)
  9. cmd/bucket-policy.go

    	// JWT specific values
    	//
    	// Add all string claims
    	for k, v := range claims {
    		vStr, ok := v.(string)
    		if ok {
    			// Trim any LDAP specific prefix
    			args[strings.ToLower(strings.TrimPrefix(k, "ldap"))] = []string{vStr}
    		}
    	}
    
    	// Add groups claim which could be a list. This will ensure that the claim
    	// `jwt:groups` works.
    	if grpsVal, ok := claims["groups"]; ok {
    		if grpsIs, ok := grpsVal.([]any); ok {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 7.9K bytes
    - Viewed (0)
  10. cmd/admin-handlers-idp-openid.go

    		_, ok := accessKey.Claims[subClaim]
    		if !ok {
    			continue // OpenID access keys must have a sub claim
    		}
    		if (!listSTSKeys && !accessKey.IsServiceAccount()) || (!listServiceAccounts && accessKey.IsServiceAccount()) {
    			continue // skip if not the type we want
    		}
    		arn, ok := accessKey.Claims[roleArnClaim].(string)
    		if !ok {
    			if _, ok := accessKey.Claims[iamPolicyClaimNameOpenID()]; !ok {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sat Sep 06 17:38:46 UTC 2025
    - 7.6K bytes
    - Viewed (0)
Back to top