- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 867 for Account (0.04 sec)
-
docs/iam/access-manager-plugin.go
reqMap := make(map[string]interface{}) err = json.Unmarshal(body, &reqMap) if err != nil { writeErrorResponse(w, err) return } m := reqMap["input"].(map[string]interface{}) accountValue := m["account"].(string) actionValue := m["action"].(string) // Allow user `minio` to perform any action. var res Result if accountValue == "minio" { res.Result = true } else {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Thu Feb 08 17:15:20 UTC 2024 - 2.7K bytes - Viewed (0) -
cmd/iam-store.go
// For STS policy map, we need to merge the new cache with the existing // cache because the periodic IAM reload is partial. The periodic load // here is to account for STS policy mapping changes that should apply // for service accounts derived from such STS accounts (i.e. LDAP STS // accounts). newCache.iamSTSPolicyMap.Range(func(k string, v MappedPolicy) bool { cache.iamSTSPolicyMap.Store(k, v) return true })
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 86.7K bytes - Viewed (0) -
cmd/admin-handlers-idp-ldap.go
// account or STS account): requestorUser := cred.AccessKey requestorParentUser := cred.AccessKey requestorGroups := cred.Groups requestorIsDerivedCredential := false if cred.IsServiceAccount() || cred.IsTemp() { requestorParentUser = cred.ParentUser requestorIsDerivedCredential = true } // Check if we are creating svc account for request sender.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 08 02:46:04 UTC 2025 - 19.2K bytes - Viewed (0) -
docs/site-replication/run-multi-site-minio-idp.sh
./mc ls rootsvc if [ $? -ne 0 ]; then echo "root service account not inherited root permissions, exiting.." exit_1 fi ./mc admin user svcacct info minio1 testsvc if [ $? -ne 0 ]; then echo "svc account not mirrored, exiting.." exit_1 fi ./mc admin user svcacct info minio2 testsvc if [ $? -ne 0 ]; then echo "svc account not mirrored, exiting.." exit_1 fi
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Sep 24 08:03:58 UTC 2024 - 12.1K bytes - Viewed (0) -
src/main/java/jcifs/smb1/dcerpc/msrpc/lsarpc.idl
SID_NAME_DELETED = 6, /* deleted account: needed for c2 rating */ SID_NAME_INVALID = 7, /* invalid account */ SID_NAME_UNKNOWN = 8 /* oops. */ } LsarSidType; typedef struct { LsarSidType sid_type; uint32_t rid; uint32_t sid_index; } LsarTranslatedSid; typedef struct { [range(0,1000)] uint32_t count; [size_is(count)] LsarTranslatedSid *sids; } LsarTransSidArray;
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Fri Mar 22 20:39:42 UTC 2019 - 3.1K bytes - Viewed (0) -
src/main/java/jcifs/dcerpc/msrpc/lsarpc.idl
SID_NAME_DELETED = 6, /* deleted account: needed for c2 rating */ SID_NAME_INVALID = 7, /* invalid account */ SID_NAME_UNKNOWN = 8 /* oops. */ } LsarSidType; typedef struct { LsarSidType sid_type; uint32_t rid; uint32_t sid_index; } LsarTranslatedSid; typedef struct { [range(0,1000)] uint32_t count; [size_is(count)] LsarTranslatedSid *sids; } LsarTransSidArray;
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 3.1K bytes - Viewed (3) -
cmd/iam.go
// created before a certain (TBD) future date. // // 2. do not allow empty statement policies for service accounts. if subPolicy.Version == "" && subPolicy.Statements == nil && subPolicy.ID == "" { hasSessionPolicy = false return } // As the session policy exists, even if the parent is the root account, it // must be restricted by it. So, we set `.IsOwner` to false here
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 75.3K bytes - Viewed (0) -
schema/model_test.go
package schema_test import ( "database/sql" "time" "gorm.io/gorm" "gorm.io/gorm/utils/tests" ) type User struct { *gorm.Model Name *string Age *uint Birthday *time.Time Account *tests.Account Pets []*tests.Pet Toys []*tests.Toy `gorm:"polymorphic:Owner"` CompanyID *int Company *tests.Company ManagerID *uint Manager *User
Registered: Sun Sep 07 09:35:13 UTC 2025 - Last Modified: Thu Jan 06 07:02:53 UTC 2022 - 1.1K bytes - Viewed (0) -
cmd/admin-router.go
// Service accounts ops adminRouter.Methods(http.MethodPut).Path(adminVersion + "/add-service-account").HandlerFunc(adminMiddleware(adminAPI.AddServiceAccount)) adminRouter.Methods(http.MethodPost).Path(adminVersion+"/update-service-account").HandlerFunc(adminMiddleware(adminAPI.UpdateServiceAccount)).Queries("accessKey", "{accessKey:.*}")
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Apr 16 07:34:24 UTC 2025 - 26.7K bytes - Viewed (0) -
docs/sts/ldap.md
### Lookup-Bind A low-privilege read-only LDAP service account is configured in the MinIO server by providing the account's Distinguished Name (DN) and password. This service account is used to perform directory lookups as needed. ``` MINIO_IDENTITY_LDAP_LOOKUP_BIND_DN* (string) DN for LDAP read-only service account used to perform DN and group lookups
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 18.9K bytes - Viewed (0)