Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 10 of 143 for PARTY (0.02 seconds)

  1. LICENSE

    specifically granted under this License.  You may not convey a covered
    work if you are a party to an arrangement with a third party that is
    in the business of distributing software, under which you make payment
    to the third party based on the extent of your activity of conveying
    the work, and under which the third party grants, to any of the
    parties who would receive the covered work from you, a discriminatory
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Apr 23 18:58:53 GMT 2021
    - 33.7K bytes
    - Click Count (0)
  2. apache-maven/src/main/appended-resources/licenses/CDDL+GPLv2-with-classpath-exception.txt

        on the date Contributor first distributes or otherwise makes the
        Modifications available to a third party.
    
        (d) Notwithstanding Section 2.2(b) above, no patent license is
        granted: (1) for any code that Contributor has deleted from the
        Contributor Version; (2) for infringements caused by: (i) third
        party modifications of Contributor Version, or (ii) the combination
    Created: Sun Apr 05 03:35:12 GMT 2026
    - Last Modified: Fri May 17 19:14:22 GMT 2024
    - 38.5K bytes
    - Click Count (0)
  3. apache-maven/src/main/appended-resources/licenses/EPL-1.0.txt

    this Agreement are reserved.
    
    This Agreement is governed by the laws of the State of New York and the intellectual
    property laws of the United States of America. No party to this Agreement
    will bring a legal action under this Agreement more than one year after the
    cause of action arose. Each party waives its rights to a jury trial in any
    Created: Sun Apr 05 03:35:12 GMT 2026
    - Last Modified: Mon Sep 17 05:50:12 GMT 2018
    - 11.1K bytes
    - Click Count (0)
  4. apache-maven/src/main/appended-resources/licenses/EPL-2.0.txt

      rights and licenses granted hereunder, each Recipient hereby
      assumes sole responsibility to secure any other intellectual
      property rights needed, if any. For example, if a third party
      patent license is required to allow Recipient to Distribute the
      Program, it is Recipient's responsibility to acquire that license
      before distributing the Program.
    
    Created: Sun Apr 05 03:35:12 GMT 2026
    - Last Modified: Tue Jun 04 06:45:16 GMT 2024
    - 13.9K bytes
    - Click Count (0)
  5. helm/minio/README.md

    ```
    
    Then install the chart, specifying that you want to use the TLS secret:
    
    ```bash
    helm install --set tls.enabled=true,tls.certSecret=tls-ssl-minio minio/minio
    ```
    
    ### Installing certificates from third party CAs
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue Aug 12 18:20:36 GMT 2025
    - 10.9K bytes
    - Click Count (0)
  6. docs/en/docs/tutorial/security/oauth2-jwt.md

    After a week, the token will be expired and the user will not be authorized and will have to sign in again to get a new token. And if the user (or a third party) tried to modify the token to change the expiration, you would be able to discover it, because the signatures would not match.
    
    If you want to play with JWT tokens and see how they work, check [https://jwt.io](https://jwt.io/).
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 10.7K bytes
    - Click Count (0)
  7. docs/en/docs/deployment/https.md

    * For HTTPS, **the server** needs to **have "certificates"** generated by a **third party**.
        * Those certificates are actually **acquired** from the third party, not "generated".
    * Certificates have a **lifetime**.
        * They **expire**.
        * And then they need to be **renewed**, **acquired again** from the third party.
    * The encryption of the connection happens at the **TCP level**.
        * That's one layer **below HTTP**.
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 14K bytes
    - Click Count (0)
  8. docs/en/docs/advanced/security/oauth2-scopes.md

    That's what would happen to a third party application that tried to access one of these *path operations* with a token provided by a user, depending on how many permissions the user gave the application.
    
    ## About third party integrations { #about-third-party-integrations }
    
    In this example we are using the OAuth2 "password" flow.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 13.4K bytes
    - Click Count (0)
  9. LICENSE

              documentation, if provided along with the Derivative Works; or,
              within a display generated by the Derivative Works, if and
              wherever such third-party notices normally appear. The contents
              of the NOTICE file are for informational purposes only and
              do not modify the License. You may add Your own attribution
    Created: Wed Apr 01 00:11:11 GMT 2026
    - Last Modified: Thu Feb 20 19:53:57 GMT 2020
    - 11.1K bytes
    - Click Count (0)
  10. LICENSE.txt

              documentation, if provided along with the Derivative Works; or,
              within a display generated by the Derivative Works, if and
              wherever such third-party notices normally appear. The contents
              of the NOTICE file are for informational purposes only and
              do not modify the License. You may add Your own attribution
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Mon Jul 23 14:02:28 GMT 2012
    - 11.1K bytes
    - Click Count (0)
Back to Top