Doc updates from [mc RELEASE.2023-05-30T22-41-38Z](https://github.com/minio/docs/issues/870): [x] New --exit option for mc ping [x] Expiration date can be set when adding or editing a service account Staged: http://192.241.195.202:9000/staging/DOCS-870/linux/html/reference/minio-mc/mc-ping.html#mc.ping.-exit http://192.241.195.202:9000/staging/DOCS-870/linux/html/reference/minio-mc-admin/mc-admin-user-svcacct-add.html#mc.admin.user.svcacct.add.-expiry http://192.241.195.202:9000/staging/DOCS-870/linux/html/reference/minio-mc-admin/mc-admin-user-svcacct-edit.html#mc.admin.user.svcacct.edit.-expiry Fixes https://github.com/minio/docs/issues/870
3.4 KiB
mc admin user svcacct edit
minio
Table of Contents
mc admin user svcacct edit
Syntax
The mc admin user svcacct edit
command modifies the
configuration of an access key associated to the specified user.
EXAMPLE
The following command applies a new policy and secret key to the
myuserserviceaccount
access key on the myminio
deployment:
mc admin user svcacct edit \
--secret-key "myuserserviceaccountnewsecretkey" \
--policy "/path/to/new/policy.json" \
myminio myuserserviceaccount
SYNTAX
The command has the following syntax:
mc [GLOBALFLAGS] admin user svcacct edit \
[--secret-key] \
[--policy] \
ALIAS \
SERVICEACCOUNT
Parameters
ALIAS
The alias <mc alias>
of the MinIO deployment.
SERVICEACCOUNT
The service account to modify.
--description
RELEASE.2023-05-18T16-59-00Z
Add a description for the service account. For example, you might specify the reason the service account exists.
--expiry
RELEASE.2023-05-30T22-41-38Z
Set an expiration date for the service account. The date must be in the future, you may not set an expiration date that has already passed.
Allowed date and time formats:
2023-06-24
2023-06-24T10:00
2023-06-24T10:00:00
2023-06-24T10:00:00Z
2023-06-24T10:00:00-07:00
--name
RELEASE.2023-05-18T16-59-00Z
Add a human-readable name for the service account.
--policy
The path to a policy document <minio-policy>
to attach to the
new access key, with a maximum size of 2048 characters. The attached
policy cannot grant access to any action or resource not explicitly
allowed by the parent user's policies.
The new policy overwrites any previously attached policy.
--secret-key
The secret key to associate with the new access key. Overwrites the previous secret key. Applications using the access keys must update to use the new credentials to continue performing operations.