欢迎来到即将发布的 MinIO 文档版本! 此页面上的内容正在积极开发中 可能随时更改。 如果找不到您要找的内容,请查看我们的 历史文档。 感谢您的耐心等待。 我们期待您贡献自己强大的力量,帮助更多的中国技术开发者![翻译]

Configure Tenant Security

Identity and Access Management

MinIO enforces authentication and authorization for all incoming requests. Administrators can use the MinIO Console or an S3-compatible command-line tool such as mc for configuring IAM on a MinIO Tenant.

Identity Management

A MinIO user is an identity that includes at minimum credentials consisting of an Access Key and Secret Key. MinIO requires all incoming requests include credentials which match an existing user.

If MinIO successfully authenticates an incoming request against either an internally-managed or externally-managed identity, MinIO then checks if the identity is authorized to make the request. See Access Management for more information on authorization.

MinIO by default supports creating and managing users directly on the MinIO Tenant. MinIO also supports configuring an External IDentity Providers (IDP), such as Active Directory or OpenID, where MinIO can look up identities managed by the external IDP as part of authentication. For more information on configuring external IDP, see External IDentity Providers (IDP).

See User Management for tutorials on using the MinIO Console for performing user management on the MinIO Tenant. The following list includes common identity management procedures:

Access Management

After MinIO authenticates a user, MinIO checks whether the specified user is authorized to perform the requested operation. MinIO uses Policy-Based Access Control (PBAC) for defining the actions and resources to which a client has access.

MinIO policies are JSON documents with IAM-compatible syntax. Each MinIO user can have one attached policy for defining its scope of access. MinIO also supports creating groups of users, where the users inherit the policy attached to the group. A group can have one attached policy for defining the scope of access of its membership.

A given user’s access therefore consists of the set of both its explicitly attached policy and all inherited policies from its group membership. MinIO only processes the requested operation if the user’s complete set of policies explicitly allow access to both the required actions and resources for that operation.

DIAGRAM: User Policy + Group Policy -> Request -> Allowed/Denied (flowchart?)

MinIO PBAC is deny-by-default, where MinIO denies access to any action or resource not explicitly allowed by the user’s attached or inherited policies. MinIO also prioritizes Deny rules if two or more policies conflict over access to a given action or resource.

See Group Management and Policy Management for tutorials on using the MinIO Console for performing group and policy management respectively. The following list includes common access management procedures:

External IDentity Providers (IDP)

MinIO performs authentication and authorization for each incoming request it receives. The client must provide credentials such as an access key and secret key to authenticate as a user on the MinIO Tenant. MinIO then authorizes access to a select set of actions and resources based on the policies associated to that user or its groups.

DIAGRAM: Groups -> Users -> Client (auth/authz)

MinIO uses Policy-Based Access Control (PBAC), where each policy describes one or more rules that outline the permissions of a user or group of users. MinIO supports a subset of IAM actions and conditions when creating policies. By default, MinIO denies access to actions or resources not explicitly referenced in a user’s assigned or inherited policies.

MinIO Tenants deploy with the MinIO Console by default, a browser-based management interface with support for configuring IAM-related settings on the Tenant such as policies, users, and groups. Administrators can also use the mc command line tool for performing IAM on the MinIO Tenant.

Encryption and Key Management

Network Encryption

MinIO supports configuring TLS for encrypting data transmitted across the network. The MinIO Operator by default deploys Tenants with auto-generated TLS certificates for each Tenant component. MinIO supports the Server Name Indication (SNI) extension and allows Administrators to specify multiple custom TLS certificates for supporting HTTPS access to the Tenant through multiple domains. You can configure custom TLS certificates during tenant creation.

Object Encryption

MinIO Tenants support Server-Side Encryption (SSE-S3) of objects using an external Key Management Service (KMS) such as Hashicorp Vault, Thales CipherTrust (formerly Gemalto Keysecure), and Amazon KMS. You can configure server-side encryption during tenant creation.