Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 41 for Certificate (0.06 sec)

  1. docs/sts/tls.md

    credentials via the STS API. It can authenticate via a client certificate and obtain a access/secret key pair as well as a session token. These credentials are associated to an S3 policy at the MinIO server.
    
    In case of certificate-based authentication, MinIO has to map the client-provided certificate to an S3 policy. MinIO does this via the subject common name field of the X.509 certificate. So, MinIO will associate a certificate with a subject `CN = foobar` to a S3 policy named `foobar`....
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 6K bytes
    - Viewed (1)
  2. docs/tls/README.md

    1. [Install MinIO Server](#install-minio-server)
    2. [Use an Existing Key and Certificate with MinIO](#use-an-existing-key-and-certificate-with-minio)
    3. [Generate and use Self-signed Keys and Certificates with MinIO](#generate-use-self-signed-keys-certificates)
    4. [Install Certificates from Third-party CAs](#install-certificates-from-third-party-cas)
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.6K bytes
    - Viewed (0)
  3. docs/en/docs/deployment/https.md

    The domains are securely verified and the certificates are generated automatically. This also allows automating the renewal of these certificates.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 19:34:08 UTC 2025
    - 14.3K bytes
    - Viewed (0)
  4. cmd/sts-handlers.go

    	// configured expiry and the duration until the certificate itself
    	// expires.
    	// We must not issue credentials that out-live the certificate.
    	if validUntil := time.Until(certificate.NotAfter); validUntil < expiry {
    		expiry = validUntil
    	}
    
    	// Associate any service accounts to the certificate CN
    	parentUser := "tls" + getKeySeparator() + certificate.Subject.CommonName
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 36.6K bytes
    - Viewed (0)
  5. cmd/sftp-server.go

    	}
    
    	cert, ok := clientKey.(*ssh.Certificate)
    	if !ok {
    		return errSftpPublicKeyWithoutCert
    	}
    
    	// ssh.CheckCert called by ssh.Authenticate accepts certificates
    	// with empty principles list so we block those in here.
    	if len(cert.ValidPrincipals) == 0 {
    		return errSftpCertWithoutPrincipals
    	}
    
    	// Verify that certificate provided by user is issued by trusted CA,
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 16.5K bytes
    - Viewed (0)
  6. doc/godebug.md

    signatures on certificates that use SHA-1 based signature algorithms.
    
    Go 1.24 changes the default value of the [`x509usepolicies`
    setting.](/pkg/crypto/x509/#CreateCertificate) from `0` to `1`. When marshalling
    certificates, policies are now taken from the
    [`Certificate.Policies`](/pkg/crypto/x509/#Certificate.Policies) field rather
    than the
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Tue Jul 08 18:30:38 UTC 2025
    - 22.9K bytes
    - Viewed (0)
  7. cmd/sts-errors.go

    		Code:           "InvalidClientCertificate",
    		Description:    "The provided client certificate is invalid. Retry with a different certificate.",
    		HTTPStatusCode: http.StatusBadRequest,
    	},
    	ErrSTSTooManyIntermediateCAs: {
    		Code:           "TooManyIntermediateCAs",
    		Description:    "The provided client certificate contains too many intermediate CA certificates",
    		HTTPStatusCode: http.StatusBadRequest,
    	},
    	ErrSTSNotInitialized: {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Feb 05 00:29:41 UTC 2025
    - 6K bytes
    - Viewed (1)
  8. api/go1.24.txt

    pkg crypto/x509, type Certificate struct, InhibitAnyPolicy int #68484
    pkg crypto/x509, type Certificate struct, InhibitAnyPolicyZero bool #68484
    pkg crypto/x509, type Certificate struct, InhibitPolicyMapping int #68484
    pkg crypto/x509, type Certificate struct, InhibitPolicyMappingZero bool #68484
    pkg crypto/x509, type Certificate struct, PolicyMappings []PolicyMapping #68484
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Tue Dec 17 21:28:29 UTC 2024
    - 14.2K bytes
    - Viewed (0)
  9. cmd/typed-errors.go

    // error returned in SFTP when user used public key without certificate
    var errSftpPublicKeyWithoutCert = errors.New("public key authentication without certificate is not accepted")
    
    // error returned in SFTP when user used certificate which does not contain principal(s)
    var errSftpCertWithoutPrincipals = errors.New("certificates without principal(s) are not accepted")
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Apr 16 07:34:24 UTC 2025
    - 5.9K bytes
    - Viewed (1)
  10. docs/logging/README.md

    tls              (on|off)    set to 'on' to enable TLS
    tls_skip_verify  (on|off)    trust server TLS without verification, defaults to "on" (verify)
    client_tls_cert  (path)      path to client certificate for mTLS auth
    client_tls_key   (path)      path to client key for mTLS auth
    version          (string)    specify the version of the Kafka cluster
    comment          (sentence)  optionally add a comment to this setting
    ```
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 10.5K bytes
    - Viewed (0)
Back to top