MinIO Multi-user Quickstart Guide Slack

MinIO supports multiple long term users in addition to default user created during server startup. New users can be added after server starts up, and server can be configured to deny or allow access to buckets and resources to each of these users. This document explains how to add/remove users and modify their access rights.

Get started

In this document we will explain in detail on how to configure multiple users.

1. Prerequisites

2. Create a new user with canned policy

Use mc admin policy to create canned policies. Server provides a default set of canned policies namely writeonly, readonly and readwrite (these policies apply to all resources on the server). These can be overridden by custom policies using mc admin policy command.

Create new canned policy file getonly.json. This policy enables users to download all objects under my-bucketname.

cat > getonly.json << EOF
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Action": [
        "s3:GetObject"
      ],
      "Effect": "Allow",
      "Resource": [
        "arn:aws:s3:::my-bucketname/*"
      ],
      "Sid": ""
    }
  ]
}
EOF

Create new canned policy by name getonly using getonly.json policy file.

mc admin policy add myminio getonly getonly.json

Create a new user newuser on MinIO use mc admin user.

mc admin user add myminio newuser newuser123

Once the user is successfully created you can now apply the getonly policy for this user.

mc admin policy set myminio getonly user=newuser

3. Create a new group

mc admin group add myminio newgroup newuser

Once the group is successfully created you can now apply the getonly policy for this group.

mc admin policy set myminio getonly group=newgroup

4. Disable user

Disable user newuser.

mc admin user disable myminio newuser

Disable group newgroup.

mc admin group disable myminio newgroup

5. Remove user

Remove the user newuser.

mc admin user remove myminio newuser

Remove the user newuser from a group.

mc admin group remove myminio newgroup newuser

Remove the group newgroup.

mc admin group remove myminio newgroup

6. Change user or group policy

Change the policy for user newuser to putonly canned policy.

mc admin policy set myminio putonly user=newuser

Change the policy for group newgroup to putonly canned policy.

mc admin policy set myminio putonly group=newgroup

7. List all users or groups

List all enabled and disabled users.

mc admin user list myminio

List all enabled or disabled groups.

mc admin group list myminio

8. Configure mc

mc alias set myminio-newuser http://localhost:9000 newuser newuser123 --api s3v4
mc cat myminio-newuser/my-bucketname/my-objectname

Policy Variables

You can use policy variables in the Resource element and in string comparisons in the Condition element.

You can use a policy variable in the Resource element, but only in the resource portion of the ARN. This portion of the ARN appears after the 5th colon (:). You can't use a variable to replace parts of the ARN before the 5th colon, such as the service or account. The following policy might be attached to a group. It gives each of the users in the group full programmatic access to a user-specific object (their own "home directory") in MinIO.

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Action": ["s3:ListBucket"],
      "Effect": "Allow",
      "Resource": ["arn:aws:s3:::mybucket"],
      "Condition": {"StringLike": {"s3:prefix": ["${aws:username}/*"]}}
    },
    {
      "Action": [
        "s3:GetObject",
        "s3:PutObject"
      ],
      "Effect": "Allow",
      "Resource": ["arn:aws:s3:::mybucket/${aws:username}/*"]
    }
  ]
}

If the user is authenticating using an STS credential which was authorized from OpenID connect we allow all jwt:* variables specified in the JWT specification, custom jwt:* or extensions are not supported.

List of policy variables for OpenID based STS.

"jwt:sub"
"jwt:iss"
"jwt:aud"
"jwt:jti"
"jwt:upn"
"jwt:name"
"jwt:groups"
"jwt:given_name"
"jwt:family_name"
"jwt:middle_name"
"jwt:nickname"
"jwt:preferred_username"
"jwt:profile"
"jwt:picture"
"jwt:website"
"jwt:email"
"jwt:gender"
"jwt:birthdate"
"jwt:phone_number"
"jwt:address"
"jwt:scope"
"jwt:client_id"

Following example shows OpenID users with full programmatic access to a OpenID user-specific directory (their own "home directory") in MinIO.

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Action": ["s3:ListBucket"],
      "Effect": "Allow",
      "Resource": ["arn:aws:s3:::mybucket"],
      "Condition": {"StringLike": {"s3:prefix": ["${jwt:preferred_username}/*"]}}
    },
    {
      "Action": [
        "s3:GetObject",
        "s3:PutObject"
      ],
      "Effect": "Allow",
      "Resource": ["arn:aws:s3:::mybucket/${jwt:preferred_username}/*"]
    }
  ]
}

If the user is authenticating using an STS credential which was authorized from AD/LDAP we allow ldap:* variables, currently only supports ldap:username. Following example shows LDAP users full programmatic access to a LDAP user-specific directory (their own "home directory") in MinIO.

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Action": ["s3:ListBucket"],
      "Effect": "Allow",
      "Resource": ["arn:aws:s3:::mybucket"],
      "Condition": {"StringLike": {"s3:prefix": ["${ldap:username}/*"]}}
    },
    {
      "Action": [
        "s3:GetObject",
        "s3:PutObject"
      ],
      "Effect": "Allow",
      "Resource": ["arn:aws:s3:::mybucket/${ldap:username}/*"]
    }
  ]
}

Common information available in all requests

{
  "Version": "2012-10-17",
  "Statement": {
    "Effect": "Allow",
    "Action": "s3:ListBucket*",
    "Resource": "arn:aws:s3:::mybucket",
    "Condition": {"IpAddress": {"aws:SourceIp": "203.0.113.0/24"}}
  }
}

Explore Further