1
0
mirror of https://github.com/minio/docs.git synced 2025-07-25 21:22:11 +03:00

Correct mc admin user example, fix warnings (#969)

A few small things:

* find/replace error from https://github.com/minio/docs/pull/950
* build warnings

Thank you @bendem!
https://github.com/minio/docs/pull/950#discussion_r1303044374
This commit is contained in:
Andrea Longo
2023-08-23 16:04:32 -06:00
committed by GitHub
parent 2908b2f9ee
commit 756d9f1799
6 changed files with 8 additions and 8 deletions

View File

@ -75,7 +75,7 @@ secret key as per your organizations best practices for password generation.
wget -O - https://min.io/docs/minio/linux/examples/LifecycleManagementAdmin.json | \ wget -O - https://min.io/docs/minio/linux/examples/LifecycleManagementAdmin.json | \
mc admin policy create Alpha LifecycleAdminPolicy /dev/stdin mc admin policy create Alpha LifecycleAdminPolicy /dev/stdin
mc admin user create Alpha alphaLifecycleAdmin LongRandomSecretKey mc admin user add Alpha alphaLifecycleAdmin LongRandomSecretKey
mc admin policy attach Alpha LifecycleAdminPolicy --user=alphaLifecycleAdmin mc admin policy attach Alpha LifecycleAdminPolicy --user=alphaLifecycleAdmin
This example assumes that the specified This example assumes that the specified

View File

@ -73,7 +73,7 @@ Bucket replication requires specific permissions on the source and destination d
wget -O - https://min.io/docs/minio/linux/examples/ReplicationAdminPolicy.json | \ wget -O - https://min.io/docs/minio/linux/examples/ReplicationAdminPolicy.json | \
mc admin policy create TARGET ReplicationAdminPolicy /dev/stdin mc admin policy create TARGET ReplicationAdminPolicy /dev/stdin
mc admin user create TARGET ReplicationAdmin LongRandomSecretKey mc admin user add TARGET ReplicationAdmin LongRandomSecretKey
mc admin policy attach TARGET ReplicationAdminPolicy --user=ReplicationAdmin mc admin policy attach TARGET ReplicationAdminPolicy --user=ReplicationAdmin
MinIO deployments configured for :ref:`Active Directory/LDAP <minio-external-identity-management-ad-ldap>` or :ref:`OpenID Connect <minio-external-identity-management-openid>` user management should instead create a dedicated :ref:`access keys <minio-idp-service-account>` for bucket replication. MinIO deployments configured for :ref:`Active Directory/LDAP <minio-external-identity-management-ad-ldap>` or :ref:`OpenID Connect <minio-external-identity-management-openid>` user management should instead create a dedicated :ref:`access keys <minio-idp-service-account>` for bucket replication.
@ -100,7 +100,7 @@ Bucket replication requires specific permissions on the source and destination d
wget -O - https://min.io/docs/minio/linux/examples/ReplicationRemoteUserPolicy.json | \ wget -O - https://min.io/docs/minio/linux/examples/ReplicationRemoteUserPolicy.json | \
mc admin policy create TARGET ReplicationRemoteUserPolicy /dev/stdin mc admin policy create TARGET ReplicationRemoteUserPolicy /dev/stdin
mc admin user create TARGET ReplicationRemoteUser LongRandomSecretKey mc admin user add TARGET ReplicationRemoteUser LongRandomSecretKey
mc admin policy attach TARGET ReplicationRemoteUserPolicy --user=ReplicationRemoteUser mc admin policy attach TARGET ReplicationRemoteUserPolicy --user=ReplicationRemoteUser
MinIO deployments configured for :ref:`Active Directory/LDAP <minio-external-identity-management-ad-ldap>` or :ref:`OpenID Connect <minio-external-identity-management-openid>` user management should instead create a dedicated :ref:`access keys <minio-idp-service-account>` for bucket replication. MinIO deployments configured for :ref:`Active Directory/LDAP <minio-external-identity-management-ad-ldap>` or :ref:`OpenID Connect <minio-external-identity-management-openid>` user management should instead create a dedicated :ref:`access keys <minio-idp-service-account>` for bucket replication.

View File

@ -81,7 +81,7 @@ You must explicitly assign MinIO policies to a given user or group Distinguished
The following example assumes an existing :ref:`alias <alias>` configured for the MinIO Tenant. The following example assumes an existing :ref:`alias <alias>` configured for the MinIO Tenant.
Use the :mc-cmd:`mc idp ldap policy attach` command to assign a user or group DN to an existing MinIO Policy: Use the :mc:`mc idp ldap policy attach` command to assign a user or group DN to an existing MinIO Policy:
.. code-block:: shell .. code-block:: shell
:class: copyable :class: copyable

View File

@ -117,7 +117,7 @@ MinIO uses :ref:`Policy Based Access Control (PBAC) <minio-access-management>` t
When using an Active Directory/LDAP server for identity management (authentication), MinIO maintains control over access (authorization) through PBAC. When using an Active Directory/LDAP server for identity management (authentication), MinIO maintains control over access (authorization) through PBAC.
When a user successfully authenticates to MinIO using their AD/LDAP credentials, MinIO searches for all :ref:`policies <minio-policy>` which are explicitly associated to that user's Distinguished Name (DN). When a user successfully authenticates to MinIO using their AD/LDAP credentials, MinIO searches for all :ref:`policies <minio-policy>` which are explicitly associated to that user's Distinguished Name (DN).
Specifically, the policy must be assigned to a user with a matching DN using the :mc-cmd:`mc idp ldap policy attach` command. Specifically, the policy must be assigned to a user with a matching DN using the :mc:`mc idp ldap policy attach` command.
MinIO also supports querying for the user's AD/LDAP group membership. MinIO also supports querying for the user's AD/LDAP group membership.
MinIO attempts to match existing policies to the DN for each of the user's groups. MinIO attempts to match existing policies to the DN for each of the user's groups.

View File

@ -279,7 +279,7 @@ Disable a Configured Active Directory / LDAP Connection
You can enable and disable the configured AD/LDAP connection as needed. You can enable and disable the configured AD/LDAP connection as needed.
Use :mc-cmd:`mc idp ldap disable` to deactivate a configured connection. Use :mc:`mc idp ldap disable` to deactivate a configured connection.
Use :mc-cmd:`mc idp ldap enable` to activate a previously configured connection. Use :mc:`mc idp ldap enable` to activate a previously configured connection.
You may also enable or disable AD/LDAP from the :ref:`MinIO Console <minio-console>`. You may also enable or disable AD/LDAP from the :ref:`MinIO Console <minio-console>`.

View File

@ -171,7 +171,7 @@ Starting with :minio-release:`RELEASE.2023-05-27T05-56-19Z`, decommissioning ign
This avoids creating empty metadata on the remaining server pool(s) for objects that are effectively fully deleted. This avoids creating empty metadata on the remaining server pool(s) for objects that are effectively fully deleted.
Starting with :minio-release:`RELEASE.2023-06-23T20-26-00Z`, decommissioning also ignores object versions which have expired based on the configured :ref:`lifecycle rules <minio-lifecycle-management-expiration>` for the parent bucket. Starting with :minio-release:`RELEASE.2023-06-23T20-26-00Z`, decommissioning also ignores object versions which have expired based on the configured :ref:`lifecycle rules <minio-lifecycle-management-expiration>` for the parent bucket.
Starting with :minio-release:`RELEASE.2023-06-29T05-12-28Z`, you can monitor ignored delete markers and expired objects during the decommission process with :mc:`mc admin trace --call decommission <mc admin trace --call>`. Starting with :minio-release:`RELEASE.2023-06-29T05-12-28Z`, you can monitor ignored delete markers and expired objects during the decommission process with :mc-cmd:`mc admin trace --call decommission <mc admin trace --call>`.
Once the decommissioning process completes, you can safely shut down that pool. Once the decommissioning process completes, you can safely shut down that pool.
Since the only remaining data was scheduled for deletion *or* was only a ``DeleteMarker``, you can safely clear or destroy those drives as per your internal procedures. Since the only remaining data was scheduled for deletion *or* was only a ``DeleteMarker``, you can safely clear or destroy those drives as per your internal procedures.