- Sort Score
- Result 10 results
- Languages All
Results 11 - 18 of 18 for eclair (0.19 sec)
-
cmd/iam-store.go
// or service credentials, mapped to all distinct roleARNs associated with the // parent user. The dummy role ARN is associated with parent users from // policy-claim based OpenID providers. func (store *IAMStoreSys) GetAllParentUsers() map[string]ParentUserInfo { cache := store.rlock() defer store.runlock() res := map[string]ParentUserInfo{}
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sat Apr 27 10:04:10 GMT 2024 - 75.2K bytes - Viewed (2) -
cmd/iam.go
} // Finally, if there is no parent policy, check if a policy claim is // present in the session token. if len(policies) == 0 { // If there is no parent policy mapping, we fall back to // using policy claim from JWT. policySet, ok := args.GetPolicies(iamPolicyClaimNameOpenID()) if !ok { // When claims are set, it should have a policy claim field. return false }
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 25 21:28:16 GMT 2024 - 71.1K bytes - Viewed (1) -
cmd/sts-handlers_test.go
// the i-th server in this will be applied the i-th policy in `rolePolicies`. If // a rolePolicies entry is an empty string, that server will be configured as // policy-claim based openid server. NOTE that a valid configuration can have a // policy claim based provider only if it is the only OpenID provider. func (s *TestSuiteIAM) SetUpOpenIDs(c *check, testApps []OpenIDClientAppParams, rolePolicies []string) error {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 25 15:50:16 GMT 2024 - 85.7K bytes - Viewed (0) -
cmd/auth-handler.go
// secret key, temporary credentials become invalid if // server admin credentials change. This is done to ensure // that clients cannot decode the token using the temp // secret keys and generate an entirely new claim by essentially // hijacking the policies. We need to make sure that this is // based on admin credential such that token cannot be decoded // on the client side and is treated like an opaque value.
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 26K bytes - Viewed (0) -
cmd/sts-handlers.go
// JWT claim keys expClaim = "exp" subClaim = "sub" audClaim = "aud" issClaim = "iss" // JWT claim to check the parent user parentClaim = "parent" // LDAP claim keys ldapUser = "ldapUser" // this is a key name for a DN value ldapUserN = "ldapUsername" // this is a key name for the short/login username // Role Claim key roleArnClaim = "roleArn" )
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Wed May 01 21:31:13 GMT 2024 - 34.7K bytes - Viewed (2) -
cmd/local-locker.go
defer l.mutex.Unlock() if !l.canTakeLock(args.Resources...) { // Not all locks can be taken on resources, // reject it completely. return false, nil } // No locks held on the all resources, so claim write // lock on all resources at once. for i, resource := range args.Resources { l.lockMap[resource] = []lockRequesterInfo{ { Name: resource, Writer: true,
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Feb 19 22:54:46 GMT 2024 - 10.6K bytes - Viewed (0) -
cmd/jwt.go
if !ok { return nil, nil, false, errInvalidAccessKeyID } ucred := u.Credentials // get embedded claims eclaims, s3Err := checkClaimsFromToken(req, ucred) if s3Err != ErrNone { return nil, nil, false, errAuthentication } for k, v := range eclaims { claims.MapClaims[k] = v } // if root access is disabled, disable all its service accounts and temporary credentials.
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Apr 19 16:45:14 GMT 2024 - 5.4K bytes - Viewed (0) -
internal/auth/credentials.go
DefaultSecretKey = "minioadmin" ) // Default access credentials var ( DefaultCredentials = Credentials{ AccessKey: DefaultAccessKey, SecretKey: DefaultSecretKey, } ) // claim key found in credentials which are service accounts const iamPolicyClaimNameSA = "sa-policy" const ( // AccountOn indicates that credentials are enabled AccountOn = "on"
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Wed May 01 12:41:13 GMT 2024 - 11.7K bytes - Viewed (0)