mirror of
https://github.com/minio/docs.git
synced 2025-08-05 03:41:24 +03:00
Correcting mc admin policy command links (#802)
Missed some references to deprecated commands during an mc release doc update (PR #799). This fixes those references to the new commands.
This commit is contained in:
@@ -72,7 +72,7 @@ assigning a policy to a user or group depends on the configured
|
|||||||
|
|
||||||
MinIO deployments using the :ref:`MinIO Internal IDP <minio-internal-idp>`
|
MinIO deployments using the :ref:`MinIO Internal IDP <minio-internal-idp>`
|
||||||
require explicitly associating a user to a policy or policies using the
|
require explicitly associating a user to a policy or policies using the
|
||||||
:mc-cmd:`mc admin policy set` command. A user can also inherit the policies
|
:mc-cmd:`mc admin policy attach` command. A user can also inherit the policies
|
||||||
attached to the :ref:`groups <minio-groups>` in which they have membership.
|
attached to the :ref:`groups <minio-groups>` in which they have membership.
|
||||||
|
|
||||||
By default, MinIO *denies* access to actions or resources not explicitly allowed
|
By default, MinIO *denies* access to actions or resources not explicitly allowed
|
||||||
|
@@ -142,7 +142,7 @@ Specify a unique, random, and long string for both the ``ACCESSKEY`` and
|
|||||||
``SECRETKEY``. Your organization may have specific internal or regulatory
|
``SECRETKEY``. Your organization may have specific internal or regulatory
|
||||||
requirements around generating values for use with access or secret keys.
|
requirements around generating values for use with access or secret keys.
|
||||||
|
|
||||||
After creating the user, use :mc-cmd:`mc admin policy set` to associate a
|
After creating the user, use :mc-cmd:`mc admin policy attach` to associate a
|
||||||
:ref:`MinIO Policy Based Access Control <minio-policy>` to the new user.
|
:ref:`MinIO Policy Based Access Control <minio-policy>` to the new user.
|
||||||
The following command assigns the built-in :userpolicy:`readwrite` policy:
|
The following command assigns the built-in :userpolicy:`readwrite` policy:
|
||||||
|
|
||||||
|
@@ -97,7 +97,7 @@ MinIO provides the following built-in policies for assigning to
|
|||||||
location without requiring any listing.
|
location without requiring any listing.
|
||||||
Equivalent to the :policy-action:`s3:PutObject` action.
|
Equivalent to the :policy-action:`s3:PutObject` action.
|
||||||
|
|
||||||
Use :mc-cmd:`mc admin policy set` to associate a policy to a
|
Use :mc-cmd:`mc admin policy attach` to associate a policy to a
|
||||||
user or group on a MinIO deployment.
|
user or group on a MinIO deployment.
|
||||||
|
|
||||||
For example, consider the following table of users. Each user is assigned
|
For example, consider the following table of users. Each user is assigned
|
||||||
|
@@ -176,7 +176,7 @@ MinIO uses :ref:`Policy Based Access Control (PBAC) <minio-access-management>` t
|
|||||||
When using an Active Directory/LDAP server for identity management (authentication), MinIO maintains control over access (authorization) through PBAC.
|
When using an Active Directory/LDAP server for identity management (authentication), MinIO maintains control over access (authorization) through PBAC.
|
||||||
|
|
||||||
When a user successfully authenticates to MinIO using their AD/LDAP credentials, MinIO searches for all :ref:`policies <minio-policy>` which are explicitly associated to that user's Distinguished Name (DN).
|
When a user successfully authenticates to MinIO using their AD/LDAP credentials, MinIO searches for all :ref:`policies <minio-policy>` which are explicitly associated to that user's Distinguished Name (DN).
|
||||||
Specifically, the policy must be assigned to a user with a matching DN using the :mc-cmd:`mc admin policy set` command.
|
Specifically, the policy must be assigned to a user with a matching DN using the :mc-cmd:`mc admin policy attach` command.
|
||||||
|
|
||||||
MinIO also supports querying for the user's AD/LDAP group membership.
|
MinIO also supports querying for the user's AD/LDAP group membership.
|
||||||
MinIO attempts to match existing policies to the DN for each of the user's groups.
|
MinIO attempts to match existing policies to the DN for each of the user's groups.
|
||||||
|
@@ -46,7 +46,7 @@ includes their explicitly assigned policies *and* any policies inherited
|
|||||||
via group membership.
|
via group membership.
|
||||||
|
|
||||||
Newly created groups have *no* policies by default. To configure a group's
|
Newly created groups have *no* policies by default. To configure a group's
|
||||||
assigned policies, use the :mc-cmd:`mc admin policy set` command.
|
assigned policies, use the :mc-cmd:`mc admin policy attach` command.
|
||||||
|
|
||||||
For more information on MinIO users and groups, see
|
For more information on MinIO users and groups, see
|
||||||
:ref:`minio-users` and :ref:`minio-groups`. For
|
:ref:`minio-users` and :ref:`minio-groups`. For
|
||||||
|
@@ -45,8 +45,7 @@ Newly created users have *no* policies by default and therefore cannot perform
|
|||||||
any operations on the MinIO deployment. To configure a user's assigned policies,
|
any operations on the MinIO deployment. To configure a user's assigned policies,
|
||||||
you can do either or both of the following:
|
you can do either or both of the following:
|
||||||
|
|
||||||
- Use :mc-cmd:`mc admin policy set` to associate one or more policies to
|
- Use :mc-cmd:`mc admin policy attach` to associate one or more policies to the user.
|
||||||
the user.
|
|
||||||
|
|
||||||
- Use :mc-cmd:`mc admin group add` to associate the user to the group. Users
|
- Use :mc-cmd:`mc admin group add` to associate the user to the group. Users
|
||||||
inherit any policies assigned to the group.
|
inherit any policies assigned to the group.
|
||||||
|
@@ -379,8 +379,8 @@ See :mc:`mc admin user` and :mc:`mc admin policy` for more complete documentatio
|
|||||||
The ``"arn:aws:s3:::*`` resource applies the replication permissions to *any* bucket on the source deployment.
|
The ``"arn:aws:s3:::*`` resource applies the replication permissions to *any* bucket on the source deployment.
|
||||||
You can restrict the user policy to specific buckets as-needed.
|
You can restrict the user policy to specific buckets as-needed.
|
||||||
|
|
||||||
Use the :mc-cmd:`mc admin policy add` to add this policy to each deployment acting as a replication source.
|
Use the :mc-cmd:`mc admin policy create` to add this policy to each deployment acting as a replication source.
|
||||||
Use :mc-cmd:`mc admin user add` to create a user on the deployment and :mc-cmd:`mc admin policy set` to associate the policy to that new user.
|
Use :mc-cmd:`mc admin user add` to create a user on the deployment and :mc-cmd:`mc admin policy attach` to associate the policy to that new user.
|
||||||
|
|
||||||
.. tab-item:: Replication Remote User
|
.. tab-item:: Replication Remote User
|
||||||
|
|
||||||
@@ -396,8 +396,8 @@ See :mc:`mc admin user` and :mc:`mc admin policy` for more complete documentatio
|
|||||||
- The ``"EnableReplicatingDataIntoBucket"`` statement grants permission for a remote target to synchronize data into *any* bucket in the MinIO deployment.
|
- The ``"EnableReplicatingDataIntoBucket"`` statement grants permission for a remote target to synchronize data into *any* bucket in the MinIO deployment.
|
||||||
To restrict the policy to specific buckets, specify those buckets as an element in the ``Resource`` array similar to ``"arn:aws:s3:::bucketName/*"``.
|
To restrict the policy to specific buckets, specify those buckets as an element in the ``Resource`` array similar to ``"arn:aws:s3:::bucketName/*"``.
|
||||||
|
|
||||||
Use the :mc-cmd:`mc admin policy add` to add this policy to each deployment acting as a replication target.
|
Use the :mc-cmd:`mc admin policy create` to add this policy to each deployment acting as a replication target.
|
||||||
Use :mc-cmd:`mc admin user add` to create a user on the deployment and :mc-cmd:`mc admin policy set` to associate the policy to that new user.
|
Use :mc-cmd:`mc admin user add` to create a user on the deployment and :mc-cmd:`mc admin policy attach` to associate the policy to that new user.
|
||||||
|
|
||||||
Replication of Existing Objects
|
Replication of Existing Objects
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
@@ -388,9 +388,9 @@ See :mc:`mc admin user` and :mc:`mc admin policy` for more complete documentatio
|
|||||||
source deployment. You can restrict the user policy to specific buckets
|
source deployment. You can restrict the user policy to specific buckets
|
||||||
as-needed.
|
as-needed.
|
||||||
|
|
||||||
Use the :mc-cmd:`mc admin policy add` to add this policy to each
|
Use the :mc-cmd:`mc admin policy create` to add this policy to each
|
||||||
deployment acting as a replication source. Use :mc-cmd:`mc admin user add`
|
deployment acting as a replication source. Use :mc-cmd:`mc admin user add`
|
||||||
to create a user on the deployment and :mc-cmd:`mc admin policy set`
|
to create a user on the deployment and :mc-cmd:`mc admin policy attach`
|
||||||
to associate the policy to that new user.
|
to associate the policy to that new user.
|
||||||
|
|
||||||
.. tab-item:: Replication Remote User
|
.. tab-item:: Replication Remote User
|
||||||
@@ -415,9 +415,9 @@ See :mc:`mc admin user` and :mc:`mc admin policy` for more complete documentatio
|
|||||||
buckets as an element in the ``Resource`` array similar to
|
buckets as an element in the ``Resource`` array similar to
|
||||||
``"arn:aws:s3:::bucketName/*"``.
|
``"arn:aws:s3:::bucketName/*"``.
|
||||||
|
|
||||||
Use the :mc-cmd:`mc admin policy add` to add this policy to each
|
Use the :mc-cmd:`mc admin policy create` to add this policy to each
|
||||||
deployment acting as a replication target. Use :mc-cmd:`mc admin user add`
|
deployment acting as a replication target. Use :mc-cmd:`mc admin user add`
|
||||||
to create a user on the deployment and :mc-cmd:`mc admin policy set`
|
to create a user on the deployment and :mc-cmd:`mc admin policy attach`
|
||||||
to associate the policy to that new user.
|
to associate the policy to that new user.
|
||||||
|
|
||||||
S3 Compatibility
|
S3 Compatibility
|
||||||
|
Reference in New Issue
Block a user