Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 18 of 18 for eclair (0.19 sec)

  1. cmd/iam-store.go

    // or service credentials, mapped to all distinct roleARNs associated with the
    // parent user. The dummy role ARN is associated with parent users from
    // policy-claim based OpenID providers.
    func (store *IAMStoreSys) GetAllParentUsers() map[string]ParentUserInfo {
    	cache := store.rlock()
    	defer store.runlock()
    
    	res := map[string]ParentUserInfo{}
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sat Apr 27 10:04:10 GMT 2024
    - 75.2K bytes
    - Viewed (2)
  2. cmd/iam.go

    		}
    
    		// Finally, if there is no parent policy, check if a policy claim is
    		// present in the session token.
    		if len(policies) == 0 {
    			// If there is no parent policy mapping, we fall back to
    			// using policy claim from JWT.
    			policySet, ok := args.GetPolicies(iamPolicyClaimNameOpenID())
    			if !ok {
    				// When claims are set, it should have a policy claim field.
    				return false
    			}
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 25 21:28:16 GMT 2024
    - 71.1K bytes
    - Viewed (1)
  3. cmd/sts-handlers_test.go

    // the i-th server in this will be applied the i-th policy in `rolePolicies`. If
    // a rolePolicies entry is an empty string, that server will be configured as
    // policy-claim based openid server. NOTE that a valid configuration can have a
    // policy claim based provider only if it is the only OpenID provider.
    func (s *TestSuiteIAM) SetUpOpenIDs(c *check, testApps []OpenIDClientAppParams, rolePolicies []string) error {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 25 15:50:16 GMT 2024
    - 85.7K bytes
    - Viewed (0)
  4. cmd/auth-handler.go

    	// secret key, temporary credentials become invalid if
    	// server admin credentials change. This is done to ensure
    	// that clients cannot decode the token using the temp
    	// secret keys and generate an entirely new claim by essentially
    	// hijacking the policies. We need to make sure that this is
    	// based on admin credential such that token cannot be decoded
    	// on the client side and is treated like an opaque value.
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 26K bytes
    - Viewed (0)
  5. cmd/sts-handlers.go

    	// JWT claim keys
    	expClaim = "exp"
    	subClaim = "sub"
    	audClaim = "aud"
    	issClaim = "iss"
    
    	// JWT claim to check the parent user
    	parentClaim = "parent"
    
    	// LDAP claim keys
    	ldapUser  = "ldapUser"     // this is a key name for a DN value
    	ldapUserN = "ldapUsername" // this is a key name for the short/login username
    
    	// Role Claim key
    	roleArnClaim = "roleArn"
    )
    
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Wed May 01 21:31:13 GMT 2024
    - 34.7K bytes
    - Viewed (2)
  6. cmd/local-locker.go

    	defer l.mutex.Unlock()
    
    	if !l.canTakeLock(args.Resources...) {
    		// Not all locks can be taken on resources,
    		// reject it completely.
    		return false, nil
    	}
    
    	// No locks held on the all resources, so claim write
    	// lock on all resources at once.
    	for i, resource := range args.Resources {
    		l.lockMap[resource] = []lockRequesterInfo{
    			{
    				Name:            resource,
    				Writer:          true,
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Mon Feb 19 22:54:46 GMT 2024
    - 10.6K bytes
    - Viewed (0)
  7. cmd/jwt.go

    		if !ok {
    			return nil, nil, false, errInvalidAccessKeyID
    		}
    		ucred := u.Credentials
    		// get embedded claims
    		eclaims, s3Err := checkClaimsFromToken(req, ucred)
    		if s3Err != ErrNone {
    			return nil, nil, false, errAuthentication
    		}
    
    		for k, v := range eclaims {
    			claims.MapClaims[k] = v
    		}
    
    		// if root access is disabled, disable all its service accounts and temporary credentials.
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Apr 19 16:45:14 GMT 2024
    - 5.4K bytes
    - Viewed (0)
  8. internal/auth/credentials.go

    	DefaultSecretKey = "minioadmin"
    )
    
    // Default access credentials
    var (
    	DefaultCredentials = Credentials{
    		AccessKey: DefaultAccessKey,
    		SecretKey: DefaultSecretKey,
    	}
    )
    
    // claim key found in credentials which are service accounts
    const iamPolicyClaimNameSA = "sa-policy"
    
    const (
    	// AccountOn indicates that credentials are enabled
    	AccountOn = "on"
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Wed May 01 12:41:13 GMT 2024
    - 11.7K bytes
    - Viewed (0)
Back to top