- Sort Score
- Result 10 results
- Languages All
Results 11 - 16 of 16 for DN (0.03 sec)
-
cmd/sts-handlers.go
issClaim = "iss" // JWT claim to check the parent user parentClaim = "parent" // LDAP claim keys ldapUser = "ldapUser" // this is a key name for a normalized DN value ldapActualUser = "ldapActualUser" // this is a key name for the actual DN value ldapUserN = "ldapUsername" // this is a key name for the short/login username // Claim key-prefix for LDAP attributes ldapAttribPrefix = "ldapAttrib_"
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 36.6K bytes - Viewed (0) -
cmd/admin-handlers-users.go
for k, v := range cred.Claims { if k == expClaim { continue } opts.claims[k] = v } } else if globalIAMSys.LDAPConfig.Enabled() { // In case of LDAP we need to resolve the targetUser to a DN and // query their groups: opts.claims[ldapUserN] = targetUser // simple username var lookupResult *xldap.DNSearchResult lookupResult, targetGroups, err = globalIAMSys.LDAPConfig.LookupUserDN(targetUser)Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 90.6K bytes - Viewed (0) -
cmd/api-errors.go
HTTPStatusCode: http.StatusNotImplemented, }, ErrAdminLDAPExpectedLoginName: { Code: "XMinioLDAPExpectedLoginName", Description: "Expected LDAP short username but was given full DN.", HTTPStatusCode: http.StatusBadRequest, }, ErrAdminInvalidGroupName: { Code: "XMinioInvalidGroupName", Description: "The group name is invalid.", HTTPStatusCode: http.StatusBadRequest,Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Apr 16 07:34:24 UTC 2025 - 93K bytes - Viewed (3) -
cmd/testdata/undeleteable-object.tgz
ÅoX¨=Z/ù•hk†*_ ¥,!ÉVž’Rî*Õ íø0 -d t•^ x½ a󽼈ó {·¤‡\áµ× þ6¥Ò îƒ ™xÍ«ù*kÈN «£ùn´X*g?NÞ gÆÈà«C \:B¯ C ù€z‡âO¤`~f KùüÒò‹l]¦ð5 „$ » ŒÕðA E ï ¢wô”L8aÜ t‰ŸŽÁ*¥Ð~ K›½púÑ |ÍVp¢ãUuç‡'lÝ£Ä(æ4Ç ° REø¼£xjá UÀ¼œ:… Ûš ˆOì}h?™ŽÜÐ¥é× ©R ’-ê É!U³ ©°X††¡.©ŒÐkŒ9†PÍB2 Ðn >²ú¬bæmHœ@¿oÏ « !ì X3=ÀÓºˆ. Ô‰ c3> ‹È~ ‹Pô ¯Ö¯tã >pZë˜{,5eä²x»2oUT®Ìô~ág™ Ú³sÜÉ×Þ³ñ6…q f‘Å &%øŒ ët™Ú)©ÄÌ wœ d”Ö(5êìázyBtí ’aYS±×jX_óÊM[&`®üÊÄécdÝ Ûà<”†¾— ±8”! ¿gVÙ· $0ƒÔ ©ÝW F[£C 7U#!z YñMƒå=y„ @*Ç ¢Ÿ× "êðÍÜ oÏÿâø/ ‰Á ¤Á{è ‘$aÃÕµO{1 ¨Û®5æ7J(hÔ ´JŽ„DŒÏ»_¦›&HÒþƒZ7Èk|...Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Apr 26 00:31:12 UTC 2024 - 8.7M bytes - Viewed (0) -
cmd/site-replication.go
// use the normalized form of the entityName (which will be an LDAP DN). userType := IAMUserType(mapping.UserType) isGroup := mapping.IsGroup entityName := mapping.UserOrGroup if globalIAMSys.GetUsersSysType() == LDAPUsersSysType && userType == stsUser { // Validate that the user or group exists in LDAP and use the normalized // form of the entityName (which will be an LDAP DN). var err error if isGroup {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 184.7K bytes - Viewed (1) -
lib/fips140/v1.0.0.zip
{ n, err := bigmod.NewModulus(N) if err != nil { return nil, err } p, err := bigmod.NewModulus(P) if err != nil { return nil, err } q, err := bigmod.NewModulus(Q) if err != nil { return nil, err } dN, err := bigmod.NewNat().SetBytes(d, n) if err != nil { return nil, err } return newPrivateKey(n, e, dN, p, q) } func newPrivateKey(n *bigmod.Modulus, e int, d *bigmod.Nat, p, q *bigmod.Modulus) (*PrivateKey, error) { pMinusOne := p.Nat().SubOne(p) pMinusOneMod, err := bigmod.NewModulus(pMinusOne.Bytes(p))...Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Wed Jan 29 15:10:35 UTC 2025 - 635K bytes - Viewed (0)