1
0
mirror of https://github.com/minio/docs.git synced 2025-07-30 07:03:26 +03:00

Further removal of legacy console references

This commit is contained in:
Ravind Kumar
2025-06-04 16:51:51 -04:00
parent 6090d389da
commit f08b2d67aa
30 changed files with 125 additions and 501 deletions

View File

@ -58,10 +58,8 @@ Access Keys are long-lived credentials which inherit their privileges from the p
The parent user can further restrict those privileges while creating the access keys.
Use either of the following methods to create a new access key:
- Log into the :ref:`MinIO Console <minio-console>` using the AD/LDAP-managed user credentials.
In the :guilabel:`User` section, select :guilabel:`Access Keys` followed by :guilabel:`Create access keys +`.
- Use the :mc:`mc admin user svcacct add` command to create the access keys. Specify the user Distinguished Name as the username to which to associate the access keys.
Use the :mc:`mc admin user svcacct add` command to create the access keys.
Specify the user Distinguished Name as the username to which to associate the access keys.
Mapping Policies to User DN

View File

@ -20,8 +20,7 @@ a valid access key (username) and the corresponding secret key (password) of
an existing MinIO user.
Administrators use the :mc:`mc admin user` command to create and manage
MinIO users. The :minio-git:`MinIO Console <console>` provides a graphical
interface for creating users.
MinIO users.
MinIO also supports creating :ref:`access keys
<minio-idp-service-account>`. Access Keys are child identities of an

View File

@ -56,7 +56,7 @@ A MinIO user can generate any number of access keys.
This allows application owners to generate arbitrary access keys for their applications without requiring action from the MinIO administrators.
Since the generated access keys have the same or fewer permissions as the parents, administrators can focus on managing the top-level parent users without micro-managing generated access keys.
You can create access keys using either the :ref:`MinIO Console <minio-console-user-access-keys>` *or* by using the :mc:`mc admin user svcacct add` command.
You can create access keys by using the :mc:`mc admin user svcacct add` command.
Identities created by these methods do not expire until you remove the access key or the parent account.
You can also create :ref:`security token service <minio-security-token-service>` accounts programmatically with the ``AssumeRole`` STS API endpoint.

View File

@ -102,12 +102,6 @@ credentials with a JSON Web Token Claim flow is as follows:
MinIO provides an example Go application :minio-git:`web-identity.go <minio/blob/master/docs/sts/web-identity.go>` that handles the full login flow.
OIDC users can alternatively create :ref:`access keys <minio-idp-service-account>`.
Access Keys are long-lived credentials which inherit their privileges from the parent user.
The parent user can further restrict those privileges while creating the access keys.
To create a new access key, log into the :ref:`MinIO Console <minio-console>` using the OIDC-managed user credentials.
From the :guilabel:`Identity` section of the left navigation, select :guilabel:`Access Keys` followed by the :guilabel:`Create access keys +` button.
Identifying the JWT Claim Value
+++++++++++++++++++++++++++++++
@ -124,7 +118,7 @@ Defer to the documentation for your preferred OIDC provider for instructions on
Creating Policies to Match Claims
---------------------------------
Use either the MinIO Console *or* the :mc:`mc admin policy` command to create policies that match one or more claim values.
Use the :mc:`mc admin policy` command to create policies that match one or more claim values.
OIDC Policy Variables
---------------------

View File

@ -108,4 +108,4 @@ The ``"reason"`` field should include the reason for the 403.
Creating Policies to Match Claims
---------------------------------
Use either the :ref:`MinIO Console <minio-console-admin-policies>` *or* the :mc:`mc admin policy` command to create policies that match one or more claim values.
Use the :mc:`mc admin policy` command to create policies that match one or more claim values.