- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 391 for openid (0.04 sec)
-
internal/config/identity/openid/jwks.go
// GNU Affero General Public License for more details. // // You should have received a copy of the GNU Affero General Public License // along with this program. If not, see <http://www.gnu.org/licenses/>. package openid import ( "crypto" "crypto/ecdsa" "crypto/ed25519" "crypto/elliptic" "crypto/rsa" "encoding/base64" "errors" "fmt" "math/big" ) // JWKS - https://tools.ietf.org/html/rfc7517
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Apr 02 23:02:35 UTC 2024 - 3.1K bytes - Viewed (0) -
docs/sts/client-grants.go
clientSecret string ) func init() { flag.StringVar(&stsEndpoint, "sts-ep", "http://localhost:9000", "STS endpoint") flag.StringVar(&idpEndpoint, "idp-ep", "http://localhost:8080/auth/realms/minio/protocol/openid-connect/token", "IDP token endpoint") flag.StringVar(&clientID, "cid", "", "Client ID") flag.StringVar(&clientSecret, "csec", "", "Client secret") } func getTokenExpiry() (*credentials.ClientGrantsToken, error) {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Thu Aug 19 01:35:22 UTC 2021 - 3.3K bytes - Viewed (0) -
docs/sts/client_grants/__init__.py
""" METHOD = 'assume-role-client-grants' CANONICAL_NAME = 'AssumeRoleClientGrants' def __init__(self, cid, csec, idp_ep='http://localhost:8080/auth/realms/minio/protocol/openid-connect/token', sts_ep='http://localhost:9000'): self.cid = cid self.csec = csec self.idp_ep = idp_ep self.sts_ep = sts_epRegistered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Apr 23 18:58:53 UTC 2021 - 4.6K bytes - Viewed (0) -
docs/iam/identity-management-plugin.md
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri May 27 00:58:09 UTC 2022 - 4.2K bytes - Viewed (0) -
cmd/admin-handlers-config-kv.go
"github.com/minio/minio/internal/config" "github.com/minio/minio/internal/config/etcd" xldap "github.com/minio/minio/internal/config/identity/ldap" "github.com/minio/minio/internal/config/identity/openid" idplugin "github.com/minio/minio/internal/config/identity/plugin" polplugin "github.com/minio/minio/internal/config/policy/plugin" "github.com/minio/minio/internal/config/storageclass"
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 15.8K bytes - Viewed (1) -
cmd/iam.go
TotalRefreshFailures uint64 sync.Mutex iamRefreshInterval time.Duration LDAPConfig xldap.Config // only valid if usersSysType is LDAPUsers OpenIDConfig openid.Config // only valid if OpenID is configured STSTLSConfig xtls.Config // only valid if STS TLS is configured usersSysType UsersSysType rolesMap map[arn.ARN]string // Persistence layer for IAM subsystem
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Oct 15 17:00:45 UTC 2025 - 76.5K bytes - Viewed (0) -
cmd/user-provider-utils.go
providerPrefix, _, found := strings.Cut(credentials.ParentUser, getKeySeparator()) if found { return providerPrefix // this is true for certificate and custom providers } return madmin.OpenIDProvider // openid users are already hashed, so no separator } return madmin.BuiltinProvider // default to internal } // getProviderInfoFromClaims - returns the provider info from the claims.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.1K bytes - Viewed (0) -
cmd/utils.go
} // Configure an OpenID Connect aware OAuth2 client. oauth2Config := oauth2.Config{ ClientID: pro.ClientID, ClientSecret: pro.ClientSecret, RedirectURL: pro.RedirectURL, // Discovery returns the OAuth2 endpoints. Endpoint: provider.Endpoint(), // "openid" is a required scope for OpenID Connect flows. Scopes: []string{oidc.ScopeOpenID, "groups"}, }Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 33K bytes - Viewed (0) -
docs/sts/tls.md
## Introduction MinIO provides a custom STS API that allows authentication with client X.509 / TLS certificates. A major advantage of certificate-based authentication compared to other STS authentication methods, like OpenID Connect or LDAP/AD, is that client authentication works without any additional/external component that must be constantly available. Therefore, certificate-based authentication may provide better availability / lower operational complexity.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 6K bytes - Viewed (1) -
docs/sts/client-grants.md
</AssumeRoleWithClientGrantsResponse> ``` ## Using ClientGrants API ``` export MINIO_ROOT_USER=minio export MINIO_ROOT_PASSWORD=minio123 export MINIO_IDENTITY_OPENID_CONFIG_URL=http://localhost:8080/auth/realms/demo/.well-known/openid-configuration export MINIO_IDENTITY_OPENID_CLIENT_ID="843351d4-1080-11ea-aa20-271ecba3924a" minio server /mnt/export ``` Testing with an example
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 7.2K bytes - Viewed (0)