- Sort Score
- Num 10 results
- Language All
Results 11 - 20 of 354 for accountId (0.58 seconds)
-
cmd/admin-handlers-users_test.go
c.assertSvcAccS3Access(ctx, s, cr, bucket) // 3. Check that svc account can restrict the policy, and that the // session policy can be updated. c.assertSvcAccSessionPolicyUpdate(ctx, s, s.adm, accessKey, bucket) // 4. Check that service account's secret key and account status can be // updated. c.assertSvcAccSecretKeyAndStatusUpdate(ctx, s, s.adm, accessKey, bucket)
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Wed Oct 15 17:00:45 GMT 2025 - 50.6K bytes - Click Count (0) -
internal/auth/credentials.go
AccessKey: DefaultAccessKey, SecretKey: DefaultSecretKey, } ) // claim key found in credentials which are service accounts const iamPolicyClaimNameSA = "sa-policy" const ( // AccountOn indicates that credentials are enabled AccountOn = "on" // AccountOff indicates that credentials are disabled AccountOff = "off" ) // Credentials holds access and secret keys.
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 11.8K bytes - Click Count (0) -
docs/sts/keycloak.md
- `account` client_id is a confidential client that belongs to the realm `{realm}` - `account` client_id is has **Service Accounts Enabled** option enabled. - `account` client_id has a custom "Audience" mapper, in the Mappers section. - Included Client Audience: security-admin-console #### Adding 'admin' RoleCreated: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 8.1K bytes - Click Count (0) -
cmd/iam-object-store.go
stsPolicyMappingsCount++ // If a service account's parent user is not in iamUsersMap, the // parent is an STS account. Such accounts may have a policy mapped // on the parent user, so we load them. This is not needed for the // initial server startup, however, it is needed for the case where // the STS account's policy mapping (for example in LDAP mode) may
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 26.6K bytes - Click Count (0) -
cmd/iam.go
// As the session policy exists, even if the parent is the root account, it // must be restricted by it. So, we set `.IsOwner` to false here // unconditionally. // // We also set `DenyOnly` arg to false here - this is an IMPORTANT corner // case: DenyOnly is used only for allowing an account to do actions related // to its own account (like create service accounts for itself, among
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Wed Oct 15 17:00:45 GMT 2025 - 76.5K bytes - Click Count (0) -
cmd/admin-handlers-users.go
return } // Permission checks: // // 1. Any type of account (i.e. access keys (previously/still called service // accounts), STS accounts, internal IDP accounts, etc) with the // policy.UpdateServiceAccountAdminAction permission can update any service // account. // // 2. We would like to let a user update their own access keys, however it
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 90.6K bytes - Click Count (0) -
src/main/java/jcifs/util/AuthenticationRateLimiter.java
if (username != null) { AccountAttempts account = accountAttempts.computeIfAbsent(username, k -> new AccountAttempts()); account.recordFailure(); if (account.getFailedAttempts() >= maxAttemptsPerAccount) { account.lockOut(lockoutDuration); totalAccountsLocked.incrementAndGet();
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 15.1K bytes - Click Count (0) -
cmd/admin-router.go
// Service accounts ops adminRouter.Methods(http.MethodPut).Path(adminVersion + "/add-service-account").HandlerFunc(adminMiddleware(adminAPI.AddServiceAccount)) adminRouter.Methods(http.MethodPost).Path(adminVersion+"/update-service-account").HandlerFunc(adminMiddleware(adminAPI.UpdateServiceAccount)).Queries("accessKey", "{accessKey:.*}")
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Oct 10 18:57:03 GMT 2025 - 26.7K bytes - Click Count (0) -
src/main/java/jcifs/SID.java
* been resolved and it is not a domain SID or builtin account, * the full DOMAIN\name form of the account will be * returned (e.g. MYDOM\alice or MYDOM\Domain Users). * If the SID has been resolved but it is is a domain SID, * only the domain name will be returned (e.g. MYDOM). * If the SID has been resolved but it is a builtin account, * only the name component will be returned (e.g. SYSTEM).Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 5.4K bytes - Click Count (0) -
docs/site-replication/README.md
Previously, site replication required the root credentials of peer sites to be identical. This is no longer necessary because STS tokens are now signed with the site replicator service account credentials, thus allowing flexibility in the independent management of root accounts across sites and the ability to disable root accounts eventually.
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 3.4K bytes - Click Count (0)