- Sort Score
- Num 10 results
- Language All
Results 11 - 20 of 346 for accountId (0.06 seconds)
-
cmd/admin-handlers-users_test.go
c.assertSvcAccS3Access(ctx, s, cr, bucket) // 3. Check that svc account can restrict the policy, and that the // session policy can be updated. c.assertSvcAccSessionPolicyUpdate(ctx, s, s.adm, accessKey, bucket) // 4. Check that service account's secret key and account status can be // updated. c.assertSvcAccSecretKeyAndStatusUpdate(ctx, s, s.adm, accessKey, bucket)
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Wed Oct 15 17:00:45 GMT 2025 - 50.6K bytes - Click Count (0) -
docs/sts/keycloak.md
- `account` client_id is a confidential client that belongs to the realm `{realm}` - `account` client_id is has **Service Accounts Enabled** option enabled. - `account` client_id has a custom "Audience" mapper, in the Mappers section. - Included Client Audience: security-admin-console #### Adding 'admin' RoleCreated: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 8.1K bytes - Click Count (0) -
cmd/iam-object-store.go
stsPolicyMappingsCount++ // If a service account's parent user is not in iamUsersMap, the // parent is an STS account. Such accounts may have a policy mapped // on the parent user, so we load them. This is not needed for the // initial server startup, however, it is needed for the case where // the STS account's policy mapping (for example in LDAP mode) may
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 26.6K bytes - Click Count (0) -
internal/auth/credentials.go
AccessKey: DefaultAccessKey, SecretKey: DefaultSecretKey, } ) // claim key found in credentials which are service accounts const iamPolicyClaimNameSA = "sa-policy" const ( // AccountOn indicates that credentials are enabled AccountOn = "on" // AccountOff indicates that credentials are disabled AccountOff = "off" ) // Credentials holds access and secret keys.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 11.8K bytes - Click Count (0) -
cmd/admin-handlers-users.go
return } // Permission checks: // // 1. Any type of account (i.e. access keys (previously/still called service // accounts), STS accounts, internal IDP accounts, etc) with the // policy.UpdateServiceAccountAdminAction permission can update any service // account. // // 2. We would like to let a user update their own access keys, however it
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 90.6K bytes - Click Count (0) -
src/main/java/jcifs/util/AuthenticationRateLimiter.java
if (username != null) { AccountAttempts account = accountAttempts.computeIfAbsent(username, k -> new AccountAttempts()); account.recordFailure(); if (account.getFailedAttempts() >= maxAttemptsPerAccount) { account.lockOut(lockoutDuration); totalAccountsLocked.incrementAndGet();
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 15.1K bytes - Click Count (0) -
docs/site-replication/README.md
Previously, site replication required the root credentials of peer sites to be identical. This is no longer necessary because STS tokens are now signed with the site replicator service account credentials, thus allowing flexibility in the independent management of root accounts across sites and the ability to disable root accounts eventually.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 3.4K bytes - Click Count (0) -
tests/helper_test.go
"ManagerID", "Active") t.Run("Account", func(t *testing.T) { AssertObjEqual(t, user.Account, expect.Account, "ID", "CreatedAt", "UpdatedAt", "DeletedAt", "UserID", "Number") if user.Account.Number != "" { if !user.Account.UserID.Valid { t.Errorf("Account's foreign key should be saved") } else { var account Account db(unscoped).First(&account, "user_id = ?", user.ID)
Created: Sun Dec 28 09:35:17 GMT 2025 - Last Modified: Tue Mar 19 03:50:28 GMT 2024 - 8K bytes - Click Count (0) -
cmd/iam.go
// As the session policy exists, even if the parent is the root account, it // must be restricted by it. So, we set `.IsOwner` to false here // unconditionally. // // We also set `DenyOnly` arg to false here - this is an IMPORTANT corner // case: DenyOnly is used only for allowing an account to do actions related // to its own account (like create service accounts for itself, among
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Wed Oct 15 17:00:45 GMT 2025 - 76.5K bytes - Click Count (0) -
tests/preload_test.go
} var users2 []User DB.Preload("Account", clause.Eq{Column: "number", Value: users[0].Account.Number}).Find(&users2, "id IN ?", userIDs) sort.Slice(users2, func(i, j int) bool { return users2[i].ID < users2[j].ID }) for idx, user := range users2[1:2] { if user.Account.Number != "" { t.Errorf("No account should found for user %v but got %v", idx+2, user.Account.Number) } }
Created: Sun Dec 28 09:35:17 GMT 2025 - Last Modified: Wed Jun 12 10:00:47 GMT 2024 - 15.9K bytes - Click Count (0)