1
0
mirror of https://github.com/minio/docs.git synced 2025-08-05 03:41:24 +03:00

Correcting mc admin policy command links (#802)

Missed some references to deprecated commands during an mc release doc
update (PR #799).
This fixes those references to the new commands.
This commit is contained in:
Daryl White
2023-04-05 16:46:28 -05:00
committed by GitHub
parent 840417a6f7
commit ab49b29916
8 changed files with 14 additions and 15 deletions

View File

@@ -72,7 +72,7 @@ assigning a policy to a user or group depends on the configured
MinIO deployments using the :ref:`MinIO Internal IDP <minio-internal-idp>` MinIO deployments using the :ref:`MinIO Internal IDP <minio-internal-idp>`
require explicitly associating a user to a policy or policies using the require explicitly associating a user to a policy or policies using the
:mc-cmd:`mc admin policy set` command. A user can also inherit the policies :mc-cmd:`mc admin policy attach` command. A user can also inherit the policies
attached to the :ref:`groups <minio-groups>` in which they have membership. attached to the :ref:`groups <minio-groups>` in which they have membership.
By default, MinIO *denies* access to actions or resources not explicitly allowed By default, MinIO *denies* access to actions or resources not explicitly allowed

View File

@@ -142,7 +142,7 @@ Specify a unique, random, and long string for both the ``ACCESSKEY`` and
``SECRETKEY``. Your organization may have specific internal or regulatory ``SECRETKEY``. Your organization may have specific internal or regulatory
requirements around generating values for use with access or secret keys. requirements around generating values for use with access or secret keys.
After creating the user, use :mc-cmd:`mc admin policy set` to associate a After creating the user, use :mc-cmd:`mc admin policy attach` to associate a
:ref:`MinIO Policy Based Access Control <minio-policy>` to the new user. :ref:`MinIO Policy Based Access Control <minio-policy>` to the new user.
The following command assigns the built-in :userpolicy:`readwrite` policy: The following command assigns the built-in :userpolicy:`readwrite` policy:

View File

@@ -97,7 +97,7 @@ MinIO provides the following built-in policies for assigning to
location without requiring any listing. location without requiring any listing.
Equivalent to the :policy-action:`s3:PutObject` action. Equivalent to the :policy-action:`s3:PutObject` action.
Use :mc-cmd:`mc admin policy set` to associate a policy to a Use :mc-cmd:`mc admin policy attach` to associate a policy to a
user or group on a MinIO deployment. user or group on a MinIO deployment.
For example, consider the following table of users. Each user is assigned For example, consider the following table of users. Each user is assigned

View File

@@ -176,7 +176,7 @@ MinIO uses :ref:`Policy Based Access Control (PBAC) <minio-access-management>` t
When using an Active Directory/LDAP server for identity management (authentication), MinIO maintains control over access (authorization) through PBAC. When using an Active Directory/LDAP server for identity management (authentication), MinIO maintains control over access (authorization) through PBAC.
When a user successfully authenticates to MinIO using their AD/LDAP credentials, MinIO searches for all :ref:`policies <minio-policy>` which are explicitly associated to that user's Distinguished Name (DN). When a user successfully authenticates to MinIO using their AD/LDAP credentials, MinIO searches for all :ref:`policies <minio-policy>` which are explicitly associated to that user's Distinguished Name (DN).
Specifically, the policy must be assigned to a user with a matching DN using the :mc-cmd:`mc admin policy set` command. Specifically, the policy must be assigned to a user with a matching DN using the :mc-cmd:`mc admin policy attach` command.
MinIO also supports querying for the user's AD/LDAP group membership. MinIO also supports querying for the user's AD/LDAP group membership.
MinIO attempts to match existing policies to the DN for each of the user's groups. MinIO attempts to match existing policies to the DN for each of the user's groups.

View File

@@ -46,7 +46,7 @@ includes their explicitly assigned policies *and* any policies inherited
via group membership. via group membership.
Newly created groups have *no* policies by default. To configure a group's Newly created groups have *no* policies by default. To configure a group's
assigned policies, use the :mc-cmd:`mc admin policy set` command. assigned policies, use the :mc-cmd:`mc admin policy attach` command.
For more information on MinIO users and groups, see For more information on MinIO users and groups, see
:ref:`minio-users` and :ref:`minio-groups`. For :ref:`minio-users` and :ref:`minio-groups`. For

View File

@@ -45,8 +45,7 @@ Newly created users have *no* policies by default and therefore cannot perform
any operations on the MinIO deployment. To configure a user's assigned policies, any operations on the MinIO deployment. To configure a user's assigned policies,
you can do either or both of the following: you can do either or both of the following:
- Use :mc-cmd:`mc admin policy set` to associate one or more policies to - Use :mc-cmd:`mc admin policy attach` to associate one or more policies to the user.
the user.
- Use :mc-cmd:`mc admin group add` to associate the user to the group. Users - Use :mc-cmd:`mc admin group add` to associate the user to the group. Users
inherit any policies assigned to the group. inherit any policies assigned to the group.

View File

@@ -379,8 +379,8 @@ See :mc:`mc admin user` and :mc:`mc admin policy` for more complete documentatio
The ``"arn:aws:s3:::*`` resource applies the replication permissions to *any* bucket on the source deployment. The ``"arn:aws:s3:::*`` resource applies the replication permissions to *any* bucket on the source deployment.
You can restrict the user policy to specific buckets as-needed. You can restrict the user policy to specific buckets as-needed.
Use the :mc-cmd:`mc admin policy add` to add this policy to each deployment acting as a replication source. Use the :mc-cmd:`mc admin policy create` to add this policy to each deployment acting as a replication source.
Use :mc-cmd:`mc admin user add` to create a user on the deployment and :mc-cmd:`mc admin policy set` to associate the policy to that new user. Use :mc-cmd:`mc admin user add` to create a user on the deployment and :mc-cmd:`mc admin policy attach` to associate the policy to that new user.
.. tab-item:: Replication Remote User .. tab-item:: Replication Remote User
@@ -396,8 +396,8 @@ See :mc:`mc admin user` and :mc:`mc admin policy` for more complete documentatio
- The ``"EnableReplicatingDataIntoBucket"`` statement grants permission for a remote target to synchronize data into *any* bucket in the MinIO deployment. - The ``"EnableReplicatingDataIntoBucket"`` statement grants permission for a remote target to synchronize data into *any* bucket in the MinIO deployment.
To restrict the policy to specific buckets, specify those buckets as an element in the ``Resource`` array similar to ``"arn:aws:s3:::bucketName/*"``. To restrict the policy to specific buckets, specify those buckets as an element in the ``Resource`` array similar to ``"arn:aws:s3:::bucketName/*"``.
Use the :mc-cmd:`mc admin policy add` to add this policy to each deployment acting as a replication target. Use the :mc-cmd:`mc admin policy create` to add this policy to each deployment acting as a replication target.
Use :mc-cmd:`mc admin user add` to create a user on the deployment and :mc-cmd:`mc admin policy set` to associate the policy to that new user. Use :mc-cmd:`mc admin user add` to create a user on the deployment and :mc-cmd:`mc admin policy attach` to associate the policy to that new user.
Replication of Existing Objects Replication of Existing Objects
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

View File

@@ -388,9 +388,9 @@ See :mc:`mc admin user` and :mc:`mc admin policy` for more complete documentatio
source deployment. You can restrict the user policy to specific buckets source deployment. You can restrict the user policy to specific buckets
as-needed. as-needed.
Use the :mc-cmd:`mc admin policy add` to add this policy to each Use the :mc-cmd:`mc admin policy create` to add this policy to each
deployment acting as a replication source. Use :mc-cmd:`mc admin user add` deployment acting as a replication source. Use :mc-cmd:`mc admin user add`
to create a user on the deployment and :mc-cmd:`mc admin policy set` to create a user on the deployment and :mc-cmd:`mc admin policy attach`
to associate the policy to that new user. to associate the policy to that new user.
.. tab-item:: Replication Remote User .. tab-item:: Replication Remote User
@@ -415,9 +415,9 @@ See :mc:`mc admin user` and :mc:`mc admin policy` for more complete documentatio
buckets as an element in the ``Resource`` array similar to buckets as an element in the ``Resource`` array similar to
``"arn:aws:s3:::bucketName/*"``. ``"arn:aws:s3:::bucketName/*"``.
Use the :mc-cmd:`mc admin policy add` to add this policy to each Use the :mc-cmd:`mc admin policy create` to add this policy to each
deployment acting as a replication target. Use :mc-cmd:`mc admin user add` deployment acting as a replication target. Use :mc-cmd:`mc admin user add`
to create a user on the deployment and :mc-cmd:`mc admin policy set` to create a user on the deployment and :mc-cmd:`mc admin policy attach`
to associate the policy to that new user. to associate the policy to that new user.
S3 Compatibility S3 Compatibility