Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 14 of 14 for ldapUser (0.07 sec)

  1. cmd/admin-handlers-users.go

    		// query their groups:
    		opts.claims[ldapUserN] = targetUser // simple username
    		var lookupResult *xldap.DNSearchResult
    		lookupResult, targetGroups, err = globalIAMSys.LDAPConfig.LookupUserDN(targetUser)
    		if err != nil {
    			writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
    			return
    		}
    		targetUser = lookupResult.NormDN
    		opts.claims[ldapUser] = targetUser // username DN
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Oct 03 23:11:02 UTC 2024
    - 85.1K bytes
    - Viewed (0)
  2. cmd/sts-handlers_test.go

            "groups": ["cn=project.c,ou=groups,OU=swengg,DC=min,DC=io", "cn=projecty,ou=groups,ou=hwengg,dc=min,dc=io"],
            "claims": {
                "accessKey": "u4ccRswj62HV3Ifwima7",
                "ldapUser": "uid=svc.algorithm,ou=swengg,dc=min,dc=io",
                "ldapUsername": "svc.algorithm",
                "parent": "uid=svc.algorithm,ou=swengg,dc=min,dc=io",
                "sa-policy": "inherited-policy"
            },
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Oct 10 23:40:37 UTC 2024
    - 97.1K bytes
    - Viewed (0)
  3. cmd/iam.go

    		if err != nil {
    			return nil, err
    		}
    		ldapUsers := make(map[string]madmin.UserInfo, len(stsMap))
    		for user, policy := range stsMap {
    			ldapUsers[user] = madmin.UserInfo{
    				PolicyName: policy,
    				Status:     statusEnabled,
    			}
    		}
    		return ldapUsers, nil
    	case <-ctx.Done():
    		return nil, ctx.Err()
    	}
    }
    
    type cleanEntitiesQuery struct {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Oct 29 16:01:48 UTC 2024
    - 74.6K bytes
    - Viewed (0)
  4. docs/multi-user/README.md

    	}
      ]
    }
    ```
    
    If the user is authenticating using an STS credential which was authorized from AD/LDAP we allow `ldap:*` variables.
    
    Currently supports
    
    - `ldap:username`
    - `ldap:user`
    - `ldap:groups`
    
    Following example shows LDAP users full programmatic access to a LDAP user-specific directory (their own "home directory") in MinIO.
    
    ```
    {
      "Version": "2012-10-17",
      "Statement": [
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Mar 21 06:38:06 UTC 2023
    - 8K bytes
    - Viewed (0)
Back to top