- Sort Score
- Result 10 results
- Languages All
Results 131 - 140 of 164 for claim (0.02 sec)
-
cmd/admin-handlers-users.go
// In case of LDAP/OIDC we need to set `opts.claims` to ensure // it is associated with the LDAP/OIDC user properly. for k, v := range cred.Claims { if k == expClaim { continue } opts.claims[k] = v } } else if globalIAMSys.LDAPConfig.Enabled() { // In case of LDAP we need to resolve the targetUser to a DN and // query their groups: opts.claims[ldapUserN] = targetUser // simple username
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 90.6K bytes - Viewed (0) -
cmd/signature-v4-utils.go
return cred, false, ErrAccessKeyDisabled } return cred, false, ErrInvalidAccessKeyID } cred = u.Credentials } claims, s3Err := checkClaimsFromToken(r, cred) if s3Err != ErrNone { return cred, false, s3Err } cred.Claims = claims owner := cred.AccessKey == globalActiveCred.AccessKey || (cred.ParentUser == globalActiveCred.AccessKey && cred.AccessKey != siteReplicatorSvcAcc)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Mon Nov 25 17:10:22 UTC 2024 - 9.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.10.md
On the Persistent Volumes side, this release [Prevents deletion of Persistent Volume Claims that are used by a pod](https://github.com/kubernetes/enhancements/issues/498) and [Persistent Volumes that are bound to a Persistent Volume Claim](https://github.com/kubernetes/enhancements/issues/499), making it impossible to delete storage that is in use by a pod.
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu May 05 13:44:43 UTC 2022 - 341.8K bytes - Viewed (0) -
docs/distributed/samples/myminio-iam-info.zip
]}]}} iam-assets/users.json {} iam-assets/groups.json {} iam-assets/svcaccts.json {"bobfisher-svcacct-1":{"parent":"uid=bobfisher,ou=people,ou=hwengg,dc=min,dc=io","accessKey":"bobfisher-svcacct-1","secretKey":"bobfisher-svcacct-1","groups":null,"claims":{"accessKey":"bobfisher-svcacct-1","ldapActualUser":"uid=bobfisher,ou=people,ou=hwengg,dc=min,dc=io","ldapUser":"uid=bobfisher,ou=people,ou=hwengg,dc=min,dc=io","ldapUsername":"bobfisher","parent":"uid=bobfisher,ou=people,ou=hwengg,dc=min,dc=io"...
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Thu Sep 12 15:59:00 UTC 2024 - 1.9K bytes - Viewed (0) -
docs/iam/identity-management-plugin.md
| maxValiditySeconds | integer (>= 900 seconds and < 365 days) | Maximum allowed expiry duration for the credentials | | claims | key-value pairs | Claims to be associated with the requested credentials | The keys "exp", "parent" and "sub" in the `claims` object are reserved and if present are ignored by MinIO.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri May 27 00:58:09 UTC 2022 - 4.2K bytes - Viewed (0) -
cmd/jwt_test.go
xjwt "github.com/minio/minio/internal/jwt" ) func getTokenString(accessKey, secretKey string) (string, error) { claims := xjwt.NewMapClaims() claims.SetExpiry(UTCNow().Add(defaultJWTExpiry)) claims.SetAccessKey(accessKey) token := jwtgo.NewWithClaims(jwtgo.SigningMethodHS512, claims) return token.SignedString([]byte(secretKey)) } // Tests web request authenticator. func TestWebRequestAuthenticate(t *testing.T) {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.4K bytes - Viewed (0) -
docs/fr/docs/history-design-future.md
Par exemple, il était clair que l'idéal était de se baser sur les annotations de type Python standard. De plus, la meilleure approche était d'utiliser des normes déjà existantes.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Jul 29 23:35:07 UTC 2024 - 4.9K bytes - Viewed (0) -
cmd/kms-handlers.go
AccountName: cred.AccessKey, Groups: cred.Groups, Action: policy.Action(action), ConditionValues: getConditionValues(r, "", cred), IsOwner: owner, Claims: cred.Claims, BucketName: resource, // overloading BucketName as that's what the policy engine uses to assemble a Resource. })
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sun Aug 18 06:43:03 UTC 2024 - 10.1K bytes - Viewed (0) -
cmd/bucket-handlers.go
Action: policy.ListBucketAction, BucketName: bucketInfo.Name, ConditionValues: getConditionValues(r, "", cred), IsOwner: owner, ObjectName: "", Claims: cred.Claims, }) { bucketsInfo[n] = bucketInfo n++ } else if globalIAMSys.IsAllowed(policy.Args{ AccountName: cred.AccessKey, Groups: cred.Groups,
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 63.9K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.8.md
* Azure file persistent volumes can use a new `secretNamespace` field to reference a secret in a different namespace than the one containing their bound persistent volume claim. The azure file persistent volume provisioner honors a corresponding `secretNamespace` storage class parameter to determine where to place secrets containing the storage account key. ([#47660](https://github.com/kubernetes/kubernetes/pull/47660), ...
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Tue Feb 20 15:45:02 UTC 2024 - 312.2K bytes - Viewed (0)