You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: v1.48/assets/js/search-data.json
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@
29
29
},"4": {
30
30
"doc": "Access Control Lists (ACLs) -Deprecated-",
31
31
"title": "Basic Auth Functionality",
32
-
"content": "New lakeFS versions will provide basic auth functionality featuring a single Admin user with a single set of credentials. Existing lakeFS installations that have a single user and a single set of credentials will migrate seamlessly to the new version. Installations that have more than one user / credentials will require to run a command and choose which set of user + credentials to migrate (more details here) . ",
32
+
"content": "New lakeFS versions will provide basic auth functionality featuring a single Admin user with a single set of credentials. Existing lakeFS installations that have a single user and a single set of credentials will migrate seamlessly to the new version. Installations that have more than one user / credentials will require to run a command and choose which set of user + credentials to migrate (more details here) . Credentials Replacement . In a single user setup, replacing credentials can be done as follows: . | Delete the existing user: lakectl auth users delete --id <user-id> . | Shut down the lakeFS server - Required for invalidating the old credentials on the server | Create a new user, with the same name and new credentials: lakefs superuser --user-name <user-id> . This will generate a new set of credentials, and will print it out to the screen: . credentials: access_key_id: *** (omitted) secret_access_key: *** (omitted) . | Re-run lakeFS server | . Calling the superuser command with pre-defined --access-key-id and --secret-access-key is possible, but should be done with caution. Make sure that --secret-access-key is not empty, as providing an access key without a secret key will trigger an ACL import flow (see Migration of existing user). In case you already deleted the user by following step (1), this import operation will fail and result in an unrecoverable state, from which a clean installation is the only way out. ",
<p>Calling the <codeclass="language-plaintext highlighter-rouge">superuser</code> command with pre-defined <codeclass="language-plaintext highlighter-rouge">--access-key-id</code> and <codeclass="language-plaintext highlighter-rouge">--secret-access-key</code> is possible,
631
+
but should be done with caution. Make sure that <codeclass="language-plaintext highlighter-rouge">--secret-access-key</code> is <strong>not empty</strong>,
632
+
as providing an access key without a secret key will trigger an ACL import flow
633
+
(see <ahref="#migration-of-existing-user">Migration of existing user</a>).
634
+
In case you already deleted the user by following step (1), this import operation will <strong>fail</strong> and result in an
635
+
<strong>unrecoverable</strong> state, from which a clean installation is the only way out.</p>
0 commit comments