mirror of
https://github.com/minio/docs.git
synced 2025-07-25 21:22:11 +03:00
Correct mc admin user example, fix warnings (#969)
A few small things: * find/replace error from https://github.com/minio/docs/pull/950 * build warnings Thank you @bendem! https://github.com/minio/docs/pull/950#discussion_r1303044374
This commit is contained in:
@ -75,7 +75,7 @@ secret key as per your organizations best practices for password generation.
|
|||||||
|
|
||||||
wget -O - https://min.io/docs/minio/linux/examples/LifecycleManagementAdmin.json | \
|
wget -O - https://min.io/docs/minio/linux/examples/LifecycleManagementAdmin.json | \
|
||||||
mc admin policy create Alpha LifecycleAdminPolicy /dev/stdin
|
mc admin policy create Alpha LifecycleAdminPolicy /dev/stdin
|
||||||
mc admin user create Alpha alphaLifecycleAdmin LongRandomSecretKey
|
mc admin user add Alpha alphaLifecycleAdmin LongRandomSecretKey
|
||||||
mc admin policy attach Alpha LifecycleAdminPolicy --user=alphaLifecycleAdmin
|
mc admin policy attach Alpha LifecycleAdminPolicy --user=alphaLifecycleAdmin
|
||||||
|
|
||||||
This example assumes that the specified
|
This example assumes that the specified
|
||||||
|
@ -73,7 +73,7 @@ Bucket replication requires specific permissions on the source and destination d
|
|||||||
|
|
||||||
wget -O - https://min.io/docs/minio/linux/examples/ReplicationAdminPolicy.json | \
|
wget -O - https://min.io/docs/minio/linux/examples/ReplicationAdminPolicy.json | \
|
||||||
mc admin policy create TARGET ReplicationAdminPolicy /dev/stdin
|
mc admin policy create TARGET ReplicationAdminPolicy /dev/stdin
|
||||||
mc admin user create TARGET ReplicationAdmin LongRandomSecretKey
|
mc admin user add TARGET ReplicationAdmin LongRandomSecretKey
|
||||||
mc admin policy attach TARGET ReplicationAdminPolicy --user=ReplicationAdmin
|
mc admin policy attach TARGET ReplicationAdminPolicy --user=ReplicationAdmin
|
||||||
|
|
||||||
MinIO deployments configured for :ref:`Active Directory/LDAP <minio-external-identity-management-ad-ldap>` or :ref:`OpenID Connect <minio-external-identity-management-openid>` user management should instead create a dedicated :ref:`access keys <minio-idp-service-account>` for bucket replication.
|
MinIO deployments configured for :ref:`Active Directory/LDAP <minio-external-identity-management-ad-ldap>` or :ref:`OpenID Connect <minio-external-identity-management-openid>` user management should instead create a dedicated :ref:`access keys <minio-idp-service-account>` for bucket replication.
|
||||||
@ -100,7 +100,7 @@ Bucket replication requires specific permissions on the source and destination d
|
|||||||
|
|
||||||
wget -O - https://min.io/docs/minio/linux/examples/ReplicationRemoteUserPolicy.json | \
|
wget -O - https://min.io/docs/minio/linux/examples/ReplicationRemoteUserPolicy.json | \
|
||||||
mc admin policy create TARGET ReplicationRemoteUserPolicy /dev/stdin
|
mc admin policy create TARGET ReplicationRemoteUserPolicy /dev/stdin
|
||||||
mc admin user create TARGET ReplicationRemoteUser LongRandomSecretKey
|
mc admin user add TARGET ReplicationRemoteUser LongRandomSecretKey
|
||||||
mc admin policy attach TARGET ReplicationRemoteUserPolicy --user=ReplicationRemoteUser
|
mc admin policy attach TARGET ReplicationRemoteUserPolicy --user=ReplicationRemoteUser
|
||||||
|
|
||||||
MinIO deployments configured for :ref:`Active Directory/LDAP <minio-external-identity-management-ad-ldap>` or :ref:`OpenID Connect <minio-external-identity-management-openid>` user management should instead create a dedicated :ref:`access keys <minio-idp-service-account>` for bucket replication.
|
MinIO deployments configured for :ref:`Active Directory/LDAP <minio-external-identity-management-ad-ldap>` or :ref:`OpenID Connect <minio-external-identity-management-openid>` user management should instead create a dedicated :ref:`access keys <minio-idp-service-account>` for bucket replication.
|
||||||
|
@ -81,7 +81,7 @@ You must explicitly assign MinIO policies to a given user or group Distinguished
|
|||||||
|
|
||||||
The following example assumes an existing :ref:`alias <alias>` configured for the MinIO Tenant.
|
The following example assumes an existing :ref:`alias <alias>` configured for the MinIO Tenant.
|
||||||
|
|
||||||
Use the :mc-cmd:`mc idp ldap policy attach` command to assign a user or group DN to an existing MinIO Policy:
|
Use the :mc:`mc idp ldap policy attach` command to assign a user or group DN to an existing MinIO Policy:
|
||||||
|
|
||||||
.. code-block:: shell
|
.. code-block:: shell
|
||||||
:class: copyable
|
:class: copyable
|
||||||
|
@ -117,7 +117,7 @@ MinIO uses :ref:`Policy Based Access Control (PBAC) <minio-access-management>` t
|
|||||||
When using an Active Directory/LDAP server for identity management (authentication), MinIO maintains control over access (authorization) through PBAC.
|
When using an Active Directory/LDAP server for identity management (authentication), MinIO maintains control over access (authorization) through PBAC.
|
||||||
|
|
||||||
When a user successfully authenticates to MinIO using their AD/LDAP credentials, MinIO searches for all :ref:`policies <minio-policy>` which are explicitly associated to that user's Distinguished Name (DN).
|
When a user successfully authenticates to MinIO using their AD/LDAP credentials, MinIO searches for all :ref:`policies <minio-policy>` which are explicitly associated to that user's Distinguished Name (DN).
|
||||||
Specifically, the policy must be assigned to a user with a matching DN using the :mc-cmd:`mc idp ldap policy attach` command.
|
Specifically, the policy must be assigned to a user with a matching DN using the :mc:`mc idp ldap policy attach` command.
|
||||||
|
|
||||||
MinIO also supports querying for the user's AD/LDAP group membership.
|
MinIO also supports querying for the user's AD/LDAP group membership.
|
||||||
MinIO attempts to match existing policies to the DN for each of the user's groups.
|
MinIO attempts to match existing policies to the DN for each of the user's groups.
|
||||||
|
@ -279,7 +279,7 @@ Disable a Configured Active Directory / LDAP Connection
|
|||||||
|
|
||||||
You can enable and disable the configured AD/LDAP connection as needed.
|
You can enable and disable the configured AD/LDAP connection as needed.
|
||||||
|
|
||||||
Use :mc-cmd:`mc idp ldap disable` to deactivate a configured connection.
|
Use :mc:`mc idp ldap disable` to deactivate a configured connection.
|
||||||
Use :mc-cmd:`mc idp ldap enable` to activate a previously configured connection.
|
Use :mc:`mc idp ldap enable` to activate a previously configured connection.
|
||||||
|
|
||||||
You may also enable or disable AD/LDAP from the :ref:`MinIO Console <minio-console>`.
|
You may also enable or disable AD/LDAP from the :ref:`MinIO Console <minio-console>`.
|
||||||
|
@ -171,7 +171,7 @@ Starting with :minio-release:`RELEASE.2023-05-27T05-56-19Z`, decommissioning ign
|
|||||||
This avoids creating empty metadata on the remaining server pool(s) for objects that are effectively fully deleted.
|
This avoids creating empty metadata on the remaining server pool(s) for objects that are effectively fully deleted.
|
||||||
|
|
||||||
Starting with :minio-release:`RELEASE.2023-06-23T20-26-00Z`, decommissioning also ignores object versions which have expired based on the configured :ref:`lifecycle rules <minio-lifecycle-management-expiration>` for the parent bucket.
|
Starting with :minio-release:`RELEASE.2023-06-23T20-26-00Z`, decommissioning also ignores object versions which have expired based on the configured :ref:`lifecycle rules <minio-lifecycle-management-expiration>` for the parent bucket.
|
||||||
Starting with :minio-release:`RELEASE.2023-06-29T05-12-28Z`, you can monitor ignored delete markers and expired objects during the decommission process with :mc:`mc admin trace --call decommission <mc admin trace --call>`.
|
Starting with :minio-release:`RELEASE.2023-06-29T05-12-28Z`, you can monitor ignored delete markers and expired objects during the decommission process with :mc-cmd:`mc admin trace --call decommission <mc admin trace --call>`.
|
||||||
|
|
||||||
Once the decommissioning process completes, you can safely shut down that pool.
|
Once the decommissioning process completes, you can safely shut down that pool.
|
||||||
Since the only remaining data was scheduled for deletion *or* was only a ``DeleteMarker``, you can safely clear or destroy those drives as per your internal procedures.
|
Since the only remaining data was scheduled for deletion *or* was only a ``DeleteMarker``, you can safely clear or destroy those drives as per your internal procedures.
|
||||||
|
Reference in New Issue
Block a user