Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 66 for claim (0.01 sec)

  1. cmd/user-provider-utils.go

    func guessUserProvider(credentials auth.Credentials) string {
    	if !credentials.IsServiceAccount() && !credentials.IsTemp() {
    		return madmin.BuiltinProvider // regular users are always internal
    	}
    
    	claims := credentials.Claims
    	if _, ok := claims[ldapUser]; ok {
    		return madmin.LDAPProvider // ldap users
    	}
    
    	if _, ok := claims[subClaim]; ok {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 4.1K bytes
    - Viewed (0)
  2. cmd/jwt.go

    			return nil, nil, false, errNoAuthToken
    		}
    		return nil, nil, false, err
    	}
    	claims := xjwt.NewMapClaims()
    	if err := xjwt.ParseWithClaims(token, claims, func(claims *xjwt.MapClaims) ([]byte, error) {
    		if claims.AccessKey != globalActiveCred.AccessKey {
    			u, ok := globalIAMSys.GetUser(req.Context(), claims.AccessKey)
    			if !ok {
    				// Credentials will be invalid but for disabled
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 4.5K bytes
    - Viewed (0)
  3. cmd/signature-v4-utils.go

    				return cred, false, ErrAccessKeyDisabled
    			}
    			return cred, false, ErrInvalidAccessKeyID
    		}
    		cred = u.Credentials
    	}
    
    	claims, s3Err := checkClaimsFromToken(r, cred)
    	if s3Err != ErrNone {
    		return cred, false, s3Err
    	}
    	cred.Claims = claims
    
    	owner := cred.AccessKey == globalActiveCred.AccessKey || (cred.ParentUser == globalActiveCred.AccessKey && cred.AccessKey != siteReplicatorSvcAcc)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Mon Nov 25 17:10:22 UTC 2024
    - 9.1K bytes
    - Viewed (0)
  4. docs/fr/docs/history-design-future.md

    Par exemple, il était clair que l'idéal était de se baser sur les annotations de type Python standard.
    
    De plus, la meilleure approche était d'utiliser des normes déjà existantes.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Jul 29 23:35:07 UTC 2024
    - 4.9K bytes
    - Viewed (0)
  5. cmd/ftp-server-driver.go

    			if err != nil {
    				return nil, err
    			}
    			claims := make(map[string]any)
    			claims[expClaim] = UTCNow().Add(expiryDur).Unix()
    
    			claims[ldapUser] = lookupResult.NormDN
    			claims[ldapActualUser] = lookupResult.ActualDN
    			claims[ldapUserN] = ctx.Sess.LoginUser()
    
    			// Add LDAP attributes that were looked up into the claims.
    			for attribKey, attribValue := range lookupResult.Attributes {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 14.3K bytes
    - Viewed (0)
  6. cmd/metrics.go

    	return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
    		tc, ok := r.Context().Value(mcontext.ContextTraceKey).(*mcontext.TraceCtxt)
    
    		claims, groups, owner, authErr := metricsRequestAuthenticate(r)
    		if authErr != nil || (claims != nil && !claims.VerifyIssuer("prometheus", true)) {
    			if ok {
    				tc.FuncName = "handler.MetricsAuth"
    				tc.ResponseRecorder.LogErrBody = true
    			}
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Aug 15 12:04:40 UTC 2024
    - 16.6K bytes
    - Viewed (0)
  7. cmd/sftp-server.go

    	if err != nil {
    		return nil, err
    	}
    
    	claims[expClaim] = UTCNow().Add(expiryDur).Unix()
    	claims[ldapUserN] = user
    	claims[ldapUser] = lookupResult.NormDN
    
    	cred, err := auth.GetNewCredentialsWithMetadata(claims, globalActiveCred.SecretKey)
    	if err != nil {
    		return nil, err
    	}
    
    	// Set the parent of the temporary access key, this is useful
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 16.5K bytes
    - Viewed (0)
  8. docs/distributed/samples/myminio-iam-info-openid.zip

    ject"],"Resource":["arn:aws:s3:::*"]}]}} iam-assets/users.json {} iam-assets/groups.json {} iam-assets/svcaccts.json {"dillon-service-2":{"parent":"oCnAoSQFtdVQtKwrB73j","accessKey":"dillon-service-2","secretKey":"dillon-service-2","groups":null,"claims":{"accessKey":"dillon-service-2","at_hash":"LL4jvrkBRNQhOKiC83RL","aud":"minio-client-app","c_hash":"fjGB4ldChsaf9vSFdZ1P","email":"******@****.***","email_verified":true,"groups":["projecta","projectb"],"iat":1726558680,"iss":"http://127.0.0.1...
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Sep 17 16:45:46 UTC 2024
    - 2K bytes
    - Viewed (0)
  9. docs/iam/identity-manager-plugin.go

    	Claims             map[string]interface{} `json:"claims"`
    }
    
    var tokens map[string]Resp = map[string]Resp{
    	"aaa": {
    		User:               "Alice",
    		MaxValiditySeconds: 3600,
    		Claims: map[string]interface{}{
    			"groups": []string{"data-science"},
    		},
    	},
    	"bbb": {
    		User:               "Bart",
    		MaxValiditySeconds: 3600,
    		Claims: map[string]interface{}{
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed May 01 21:31:13 UTC 2024
    - 2.1K bytes
    - Viewed (0)
  10. cmd/admin-handlers-users.go

    		// In case of LDAP/OIDC we need to set `opts.claims` to ensure
    		// it is associated with the LDAP/OIDC user properly.
    		for k, v := range cred.Claims {
    			if k == expClaim {
    				continue
    			}
    			opts.claims[k] = v
    		}
    	} else if globalIAMSys.LDAPConfig.Enabled() {
    		// In case of LDAP we need to resolve the targetUser to a DN and
    		// query their groups:
    		opts.claims[ldapUserN] = targetUser // simple username
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 90.6K bytes
    - Viewed (0)
Back to top