Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 173 for claim (0.02 sec)

  1. cmd/sts-handlers.go

    		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, err)
    		return
    	}
    
    	claims[expClaim] = UTCNow().Add(expiryDur).Unix()
    	claims[ldapUser] = ldapUserDN
    	claims[ldapActualUser] = ldapActualUserDN
    	claims[ldapUserN] = ldapUsername
    	// Add lookup up LDAP attributes as claims.
    	for attrib, value := range lookupResult.Attributes {
    		claims[ldapAttribPrefix+attrib] = value
    	}
    	tokenRevokeType := r.Form.Get(stsRevokeTokenType)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 36.6K bytes
    - Viewed (0)
  2. docs/sts/wso2.md

      "token_type": "Bearer",
      "expires_in": 3600
    }
    ```
    
    ### 4. JWT Claims
    
    The id_token received is a signed JSON Web Token (JWT). Use a JWT decoder to decode the id_token to access the payload of the token that includes following JWT claims:
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.7K bytes
    - Viewed (0)
  3. docs/sts/web-identity.md

    temporary credentials generated in the AssumeRoleWithWebIdentity call.
    
    2. `id_token` claims: When the role policy is not configured, MinIO looks for a specific claim in the `id_token` (JWT) returned by the OpenID provider in the STS request. The default claim is `policy` and can be overridden by the `claim_name` configuration parameter or the `MINIO_IDENTITY_OPENID_CLAIM_NAME` environment variable. The claim value can be a string (comma-separated list) or an array of IAM access policy names defined...
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 18.9K bytes
    - Viewed (0)
  4. docs/sts/README.md

    decode the id_token to access the payload of the token that includes following JWT claims, `policy` claim is mandatory and should be present as part of your JWT claim. Without this claim the generated credentials will not have access to any resources on the server, using these credentials application would receive 'Access Denied' errors.
    
    | Claim Name | Type                                              | Claim Value                                                                           ...
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 7.8K bytes
    - Viewed (0)
  5. cmd/bucket-policy.go

    	// JWT specific values
    	//
    	// Add all string claims
    	for k, v := range claims {
    		vStr, ok := v.(string)
    		if ok {
    			// Trim any LDAP specific prefix
    			args[strings.ToLower(strings.TrimPrefix(k, "ldap"))] = []string{vStr}
    		}
    	}
    
    	// Add groups claim which could be a list. This will ensure that the claim
    	// `jwt:groups` works.
    	if grpsVal, ok := claims["groups"]; ok {
    		if grpsIs, ok := grpsVal.([]any); ok {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 7.9K bytes
    - Viewed (0)
  6. docs/sts/keycloak.md

      - Save
    
    - Go to Clients
      - Click on `account`
      - Mappers
      - Create
        - `Name` with any text
        - `Mapper Type` is `User Attribute`
        - `User Attribute` is `policy`
        - `Token Claim Name` is `policy`
        - `Claim JSON Type` is `string`
      - Save
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.1K bytes
    - Viewed (0)
  7. apache-maven/src/main/appended-resources/licenses/EPL-2.0.txt

    Contributor. If that Commercial Contributor then makes performance
    claims, or offers warranties related to Product X, those performance
    claims and warranties are such Commercial Contributor's responsibility
    alone. Under this section, the Commercial Contributor would have to
    defend claims against the other Contributors related to those performance
    claims and warranties, and if a court requires any other Contributor to
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Tue Jun 04 06:45:16 UTC 2024
    - 13.9K bytes
    - Viewed (0)
  8. docs/sts/casdoor.md

    client_id     (string)    unique public identifier for apps e.g. "292085223830.apps.googleusercontent.com"
    claim_name    (string)    JWT canned policy claim name, defaults to "policy"
    claim_prefix  (string)    JWT claim namespace prefix e.g. "customer1/"
    scopes        (csv)       Comma separated list of OpenID scopes for server, defaults to advertised scopes from discovery document e.g. "email,admin"
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 6.6K bytes
    - Viewed (0)
  9. LICENSES/vendor/github.com/beorn7/perks/LICENSE

    EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
    MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
    NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
    LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
    OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
    WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
    
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Fri May 08 04:49:00 UTC 2020
    - 1.2K bytes
    - Viewed (0)
  10. LICENSE

    IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
    FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
    AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
    LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
    OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sat Dec 08 07:57:18 UTC 2018
    - 1.1K bytes
    - Viewed (0)
Back to top