Search Options

Results per page
Sort
Preferred Languages
Labels
Advance

Popular Words: test %27 [xss] テスト

Results 31 - 40 of 524 for host:docs.min.io (0.1 sec)

  1. mc idp openid accesskey info | AIStor Object St...

    The mc idp openid accesskey info outputs information about the specified access key(s). This command works against access keys created by an OIDC user after authenticating to AIStor. Authenticated users can manage their own long-term Access Keys using the AIStor Console. AIStor supports using AssumeRoleWithWebIdentity to generate temporary access keys using the Security Token Service. Example and syntax Example The following example outputs details for the access key mykey from the myaistor deployment:
    docs.min.io/enterprise/aistor-object-store/reference/cli/mc-idp-openid-accesskey/mc-idp-openid-ac...
    Registered: Mon Oct 06 03:45:31 UTC 2025
    - Last Modified: Thu Oct 02 16:46:24 UTC 2025
    - 199.1K bytes
    - Viewed (0)
  2. mc admin scanner status | AIStor Object Store D...

    The mc admin scanner status command displays a real-time summary of scanner information for an AIStor Server. This command has an alias of mc admin scanner info. Syntax Example The following example returns information about the current state of the scanner process.
    docs.min.io/enterprise/aistor-object-store/reference/cli/admin/mc-admin-scanner/mc-admin-scanner-...
    Registered: Mon Oct 06 03:44:49 UTC 2025
    - Last Modified: Thu Oct 02 16:46:24 UTC 2025
    - 201.4K bytes
    - Viewed (0)
  3. mc event remove | AIStor Object Store Documenta...

    The mc event rm command removes an event notification trigger from a bucket. The mc event remove command has equivalent functionality to mc event rm. Syntax Example The following command removes a configured event notifications for the specified bucket notification target for the mydata bucket on the myaistor AIStor deployment:
    docs.min.io/enterprise/aistor-object-store/reference/cli/mc-event/mc-event-remove/
    Registered: Mon Oct 06 03:42:51 UTC 2025
    - Last Modified: Thu Oct 02 16:46:24 UTC 2025
    - 206K bytes
    - Viewed (0)
  4. mc anonymous set | AIStor Object Store Document...

    The mc anonymous set command sets anonymous (that is, unauthenticated or public) access policies for a bucket. Buckets with anonymous policies allow clients to access the bucket contents and perform actions consistent with the specified policy without authentication. To set anonymous bucket policies using an IAM JSON policy, use the mc anonymous set-json command. Syntax Example The following command sets the anonymous access policy for the mydata bucket on the myaistor AIStor deployment:
    docs.min.io/enterprise/aistor-object-store/reference/cli/mc-anonymous/mc-anonymous-set/
    Registered: Mon Oct 06 03:40:29 UTC 2025
    - Last Modified: Thu Oct 02 16:46:24 UTC 2025
    - 199.3K bytes
    - Viewed (0)
  5. mc anonymous | AIStor Object Store Documentation

    Description The mc anonymous command supports setting or removing anonymous policies to a bucket and its contents. Buckets with anonymous policies allow public access where clients can perform any action granted by the policy without authentication. Subcommands mc anonymous includes the following subcommands:
    docs.min.io/enterprise/aistor-object-store/reference/cli/mc-anonymous/
    Registered: Mon Oct 06 03:40:48 UTC 2025
    - Last Modified: Thu Oct 02 16:46:24 UTC 2025
    - 191.7K bytes
    - Viewed (0)
  6. mc idp ldap accesskey ls | AIStor Object Store ...

    The mc idp ldap accesskey ls displays a list of LDAP access key pairs. mc idp ldap accesskey ls is also known as mc idp ldap accesskey list. This command works against access keys created by an AD/LDAP user after authenticating to AIStor. Create AD/LDAP service accounts with the mc idp ldap accesskey create command. Authenticated users can manage their own long-term Access Keys using the AIStor Console. AIStor supports using AssumeRoleWithLDAPIdentity to generate temporary access keys using the Security Token Service.
    docs.min.io/enterprise/aistor-object-store/reference/cli/mc-idp-ldap-accesskey/mc-idp-ldap-access...
    Registered: Mon Oct 06 03:46:00 UTC 2025
    - Last Modified: Thu Oct 02 16:46:24 UTC 2025
    - 210K bytes
    - Viewed (0)
  7. Root Access Settings | AIStor Object Store Docu...

    This page covers settings that control root (superuser) access for the AIStor process. The root user has complete access and permissions to perform operations on the AIStor deployment. Root User and Root Password are required even if you use the MinIO Key Encryption Service or other key management utility. You can establish or modify settings by defining: an environment variable on the host system prior to starting or restarting the AIStor Server. Refer to your operating system’s documentation for how to define an environment variable. a configuration setting using mc admin config set. If you define both an environment variable and the similar configuration setting, AIStor uses the environment variable value.
    docs.min.io/enterprise/aistor-object-store/reference/aistor-server/settings/root-credentials/
    Registered: Mon Oct 06 03:59:37 UTC 2025
    - Last Modified: Thu Oct 02 16:46:24 UTC 2025
    - 205.4K bytes
    - Viewed (0)
  8. Security Token Service | AIStor Object Store Do...

    The AIStor Security Token Service (STS) APIs allow applications to generate temporary credentials for accessing the AIStor Server. The STS API is required for AIStor Servers configured to use external identity managers, as the API allows conversion of the external IDP credentials into AWS Signature v4-compatible credentials. STS API endpoints AIStor supports the following STS API endpoints:
    docs.min.io/enterprise/aistor-object-store/developers/security-token-service/
    Registered: Mon Oct 06 03:58:14 UTC 2025
    - Last Modified: Thu Oct 02 16:46:24 UTC 2025
    - 193.1K bytes
    - Viewed (0)
  9. Scanner | AIStor Object Store Documentation

    AIStor Server uses the built-in scanner to check objects for healing and to take any scheduled object actions. Such actions may include: calculate data usage on drives evaluate and apply configured lifecycle management or object retention rules perform bucket or site replication check objects for missing or corrupted data or parity shards and perform healing The scanner performs these functions at two levels: cluster and bucket. At the cluster level, the scanner splits all buckets into groups and scans one group of buckets at a time. The scanner starts with any new buckets added since the last scan, then randomizes the scanning of other buckets. The scanner completes checks on all bucket groups before starting over with a new set of scans.
    docs.min.io/enterprise/aistor-object-store/reference/aistor-server/scanner/
    Registered: Mon Oct 06 03:59:41 UTC 2025
    - Last Modified: Thu Oct 02 16:46:24 UTC 2025
    - 198.7K bytes
    - Viewed (0)
  10. Server Side Encryption with KES | AIStor Object...

    This page explains how to deploy AIStor with KES for Server Side Encryption. For instructions on running KES, see the KES docs. Broadly, the required steps are: Create a new external key (EK) for server-side encryption (SSE). Create or modify an AIStor deployment to support SSE with KES. Configure automatic bucket-default SSE. Enabling SSE on an AIStor deployment automatically encrypts the backend data for that deployment using the default encryption key.
    docs.min.io/enterprise/aistor-object-store/installation/linux/server-side-encryption/minio-key-en...
    Registered: Mon Oct 06 03:25:19 UTC 2025
    - Last Modified: Thu Oct 02 16:46:24 UTC 2025
    - 201.1K bytes
    - Viewed (0)
Back to top