Documentation

mc admin user svcacct

Important

These commands have been replaced and will be deprecated in a future MinIO Client release.

As of MinIO Client RELEASE.2024-10-08T09-37-26Z, use the mc admin accesskey command and its subcommands for functions related to built-in MinIO IDP users and their access keys or STS tokens.

For access keys for AD/LDAP users, use the mc idp ldap accesskey command and its subcommands.

Description

The mc admin user svcacct command and its subcommands create and manage Access Keys on a MinIO deployment.

As of MinIO Client RELEASE.2024-10-08T09-37-26Z, these commands have been replaced by mc admin accesskey and mc idp ldap accesskey. This command and its subcommands will be deprecated in a future MinIO Client release.

Each access key is linked to a user identity and inherits the policies attached to its parent user or those groups in which the parent user has membership. Each access key also supports an optional inline policy which further restricts access to a subset of actions and resources available to the parent user.

mc admin user svcacct only supports creating access keys for MinIO-managed and Active Directory/LDAP-managed accounts.

To create access keys for OpenID Connect-managed users, log into the MinIO Console and generate the access keys through the UI.

The mc admin user svcacct command has the following subcommands:

Subcommand

Description

add

The mc admin user svcacct add command adds a new access key to an existing MinIO or AD/LDAP user.

disable

The mc admin user svcacct disable command disables an existing access key.

edit

The mc admin user svcacct edit command modifies the configuration of an access key associated to the specified user.

enable

The mc admin user svcacct enable command enables an existing access key.

info

The mc admin user svcacct info command returns a description of the specified access key.

list

The mc admin user svcacct ls command lists all access keys associated to the specified user.

rm

The mc admin user svcacct rm command removes an access key associated to a user on the deployment.