mirror of
https://github.com/minio/docs.git
synced 2025-08-06 14:42:56 +03:00
# Summary As per a recent customer issue, our guidance on `MINIO_DOMAIN` and path/virtual bucket lookups needs some attention. There are two main areas to address: 1. We need to guide users to avoid namespace collision within the `MINIO_DOMAIN` , as this causes bucket lookup issues with certain MinIO services/features 2. We need to generally improve docs on setting `MINIO_DOMAIN` correctly There is also a side objective from Engineering to ensure we have a simple admonition to direct users to test wherever possible changes to config settings before applying to production. --------- Co-authored-by: Daryl White <53910321+djwfyi@users.noreply.github.com>
102 lines
3.2 KiB
ReStructuredText
102 lines
3.2 KiB
ReStructuredText
.. _minio-server-envvar-root:
|
|
|
|
====================
|
|
Root Access Settings
|
|
====================
|
|
|
|
.. default-domain:: minio
|
|
|
|
.. contents:: Table of Contents
|
|
:local:
|
|
:depth: 2
|
|
|
|
This page covers settings that control root (superuser) access for the MinIO process.
|
|
The root user has complete access and permissions to perform operations on the MinIO deployment.
|
|
|
|
.. include:: /includes/common-mc-admin-config.rst
|
|
:start-after: start-minio-settings-defined
|
|
:end-before: end-minio-settings-defined
|
|
|
|
.. include:: /includes/common-mc-admin-config.rst
|
|
:start-after: start-minio-settings-test-before-prod
|
|
:end-before: end-minio-settings-test-before-prod
|
|
|
|
Root User
|
|
---------
|
|
|
|
.. tab-set::
|
|
|
|
.. tab-item:: Environment Variable
|
|
:sync: envvar
|
|
|
|
.. envvar:: MINIO_ROOT_USER
|
|
|
|
The access key for the :ref:`root <minio-users-root>` user.
|
|
|
|
.. warning::
|
|
|
|
If :envvar:`MINIO_ROOT_USER` is unset, :mc:`minio` defaults to ``minioadmin``.
|
|
|
|
**NEVER** use the default credentials in production environments.
|
|
MinIO strongly recommends specifying a unique, long, and random :envvar:`MINIO_ROOT_USER` value for all environments.
|
|
|
|
.. tab-item:: Configuration Setting
|
|
:sync: config
|
|
|
|
This setting does not have a configuration variable setting.
|
|
Use the Environment Variable instead.
|
|
|
|
Root Password
|
|
-------------
|
|
|
|
.. tab-set::
|
|
|
|
.. tab-item:: Environment Variable
|
|
:selected:
|
|
|
|
.. envvar:: MINIO_ROOT_PASSWORD
|
|
|
|
The secret key for the :ref:`root <minio-users-root>` user.
|
|
|
|
.. warning::
|
|
|
|
If :envvar:`MINIO_ROOT_PASSWORD` is unset, :mc:`minio` defaults to ``minioadmin``.
|
|
|
|
**NEVER** use the default credentials in production environments.
|
|
MinIO strongly recommends specifying a unique, long, and random :envvar:`MINIO_ROOT_PASSWORD` value for all environments.
|
|
|
|
.. tab-item:: Configuration Setting
|
|
|
|
This setting does not have a configuration variable setting.
|
|
Use the Environment Variable instead.
|
|
|
|
Root Access
|
|
-----------
|
|
|
|
.. tab-set::
|
|
|
|
.. tab-item:: Environment Variable
|
|
:sync: envvar
|
|
|
|
.. envvar:: MINIO_API_ROOT_ACCESS
|
|
|
|
.. tab-item:: Configuration Setting
|
|
:sync: config
|
|
|
|
.. mc-conf:: api root-access
|
|
:delimiter: " "
|
|
|
|
.. versionadded:: MinIO Server RELEASE.2023-05-04T21-44-30Z
|
|
|
|
Specify ``on`` to enable and ``off`` to disable the :ref:`root <minio-users-root>` user account.
|
|
Disabling the root service account also disables all service accounts associated with root, excluding those used by site replication.
|
|
Defaults to ``on``.
|
|
|
|
Ensure you have at least one other admin user, such as one with the :userpolicy:`consoleAdmin` policy, before disabling the root account.
|
|
If you do not have another admin user, disabling the root account locks administrative access to the deployment.
|
|
|
|
You can use this variable to temporarily override the configuration setting and re-enable root access to the deployment.
|
|
|
|
To reset after an unintentional lock, set :envvar:`MINIO_API_ROOT_ACCESS` ``on`` to override this setting and temporarily re-enable the root account.
|
|
You can then change this setting to ``on`` *or* make the necessary user/policy changes to ensure normal administrative access through other non-root accounts.
|