Active Directory / LDAP Access Management
MinIO supports configuring a single Active Directory or LDAP (AD/LDAP) service for external management of user identities. Enabling AD/LDAP external identity management disables the MinIO internal IDP.
For identities managed by the external AD/LDAP provider, MinIO uses the user’s Distinguished Name and attempts to map it against an existing policy.
If the AD/LDAP configuration includes the necessary settings to query the user’s AD/LDAP group membership, MinIO also uses those group Distinguished Names and attempts to map each against an existing policy.
MinIO by default denies access to all actions or resources not explicitly allowed by a user’s assigned or inherited policies. Users managed by an AD/LDAP provider must specify the necessary policies as part of the user profile data. If no policies match either the user DN or group DNs, MinIO blocks all access to actions and resources on the deployment.
The specific AD/LDAP queries MinIO issues to authenticate the user and retrieve it’s group membership are configured as part of deploying the cluster with Active Directory / LDAP identity management. This page covers creation of MinIO policies to match the possible returned Distinguished Names.
Mapping Policies to User DN
The following commands use mc idp ldap policy attach
to associate an existing MinIO policy to an AD/LDAP User DN.
mc idp ldap policy attach myminio consoleAdmin \
--user='cn=sisko,cn=users,dc=example,dc=com'
mc idp ldap policy attach myminio readwrite,diagnostics \
--user='cn=dax,cn=users,dc=example,dc=com'
MinIO would assign an authenticated user with DN matching
cn=sisko,cn=users,dc=example,dc=com
theconsoleAdmin
policy, granting complete access to the MinIO server.MinIO would assign an authenticated user with DN matching
cn=dax,cn=users,dc=example,dc=com
both thereadwrite
anddiagnostics
policies, granting general read/write access to the MinIO server and access to diagnostic administrative operations.MinIO would assign no policies to an authenticated user with DN matching
cn=quark,cn=users,dc=example,dc=com
and deny all access to API operations.
Mapping Policies to Group DN
The following commands use mc idp ldap policy attach
to associate an existing MinIO policy to an AD/LDAP Group DN.
mc idp ldap policy attach myminio consoleAdmin \
--group='cn=ops,cn=groups,dc=example,dc=com'
mc idp ldap policy attach myminio diagnostics \
--group='cn=engineering,cn=groups,dc=example,dc=com'
MinIO would assign any authenticating user with membership in the
cn=ops,cn=groups,dc=example,dc=com
AD/LDAP group theconsoleAdmin
policy, granting complete access to the MinIO server.MinIO would assign any authenticating user with membership in the
cn=engineering,cn=groups,dc=example,dc=com
AD/LDAP group thediagnostics
policy, granting access to diagnostic administrative operations.