Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 9 of 9 for remember (0.29 sec)

  1. .github/ISSUE_TEMPLATE.md

    title: ''
    labels: community, triage
    assignees: ''
    
    ---
    
    ## NOTE
    All GitHub issues are addressed on a best-effort basis at MinIO's sole discretion. There are no Service Level Agreements (SLA) or Objectives (SLO). Remember our [Code of Conduct](https://github.com/minio/minio/blob/master/code_of_conduct.md) when engaging with MinIO Engineers and the larger community.
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sat Jan 29 00:04:16 GMT 2022
    - 2K bytes
    - Viewed (0)
  2. helm/minio/README.md

    for these certificates to MinIO Server by bundling these certificates into a Kubernetes secret and providing it to Helm via the `trustedCertsSecret` value. If `.Values.tls.enabled` is `true` and you're installing certificates for third party CAs, remember to include MinIO's own certificate with key `public.crt`, if it also needs to be trusted.
    
    For instance, given that TLS is enabled and you need to add trust for MinIO's own CA and for the CA of a Keycloak server, a Kubernetes secret can...
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Wed Jan 24 07:27:57 GMT 2024
    - 10.9K bytes
    - Viewed (0)
  3. SECURITY.md

    - If you receive no response: ******@****.***
    
    ### Disclosure Process
    
    MinIO uses the following disclosure process:
    
    1. Once the security report is received one member of the security team tries to verify and reproduce
       the issue and determines the impact it has.
    2. A member of the security team will respond and either confirm or reject the security report.
       If the report is rejected the response explains why.
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sat Feb 12 00:51:25 GMT 2022
    - 2.2K bytes
    - Viewed (0)
  4. VULNERABILITY_REPORT.md

       a well-established vulnerability identifier, e.g. CVE number, can be
       used instead.
    
    Based on the description mentioned above, a MinIO engineer or security team
    member investigates:
    
    - Whether the reported vulnerability exists.
    - The conditions that are required such that the vulnerability can be exploited.
    - The steps required to fix the vulnerability.
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sat Feb 12 00:51:25 GMT 2022
    - 1.5K bytes
    - Viewed (0)
  5. LICENSE

      No covered work shall be deemed part of an effective technological
    measure under any applicable law fulfilling obligations under article
    11 of the WIPO copyright treaty adopted on 20 December 1996, or
    similar laws prohibiting or restricting circumvention of such
    measures.
    
      When you convey a covered work, you waive any legal power to forbid
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Apr 23 18:58:53 GMT 2021
    - 33.7K bytes
    - Viewed (0)
  6. docs/bucket/replication/README.md

    MinIO does not support SSE-C encrypted objects on replicated buckets, any application uploading SSE-C encrypted objects will be rejected with an error on replicated buckets.
    
    #### Rationale
    
    - SSE-C requires application to remember the keys for all GET/PUT operations, any unfortunate loss of keys would automatically mean the objects cannot be accessed anymore.
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Jan 24 23:46:33 GMT 2023
    - 18.2K bytes
    - Viewed (0)
  7. docs/sts/ldap.md

    - On finding the user's info, MinIO verifies the login credentials with the AD/LDAP server.
    - MinIO optionally queries the AD/LDAP server for a list of groups that the user is a member of.
    - MinIO then checks if there are any policies [explicitly associated](#managing-usergroup-access-policy) with the user or their groups.
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 18.4K bytes
    - Viewed (1)
  8. docs/LICENSE

      d. Effective Technological Measures means those measures that, in the
         absence of proper authority, may not be circumvented under laws
         fulfilling obligations under Article 11 of the WIPO Copyright
         Treaty adopted on December 20, 1996, and/or similar international
         agreements.
    
      e. Exceptions and Limitations means fair use, fair dealing, and/or
         any other exception or limitation to Copyright and Similar Rights
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Mon May 10 16:50:06 GMT 2021
    - 18.2K bytes
    - Viewed (0)
  9. CREDITS

      No covered work shall be deemed part of an effective technological
    measure under any applicable law fulfilling obligations under article
    11 of the WIPO copyright treaty adopted on 20 December 1996, or
    similar laws prohibiting or restricting circumvention of such
    measures.
    
      When you convey a covered work, you waive any legal power to forbid
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Apr 26 06:31:35 GMT 2024
    - 1.6M bytes
    - Viewed (0)
Back to top