- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 68 for certifican (0.13 seconds)
-
docs/es/docs/deployment/https.md
En este caso, usaría el certificado para `someapp.example.com`. <img src="/img/deployment/https/https03.drawio.svg"> El cliente ya **confía** en la entidad que generó ese certificado TLS (en este caso Let's Encrypt, pero lo veremos más adelante), por lo que puede **verificar** que el certificado sea válido.
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Tue Dec 16 16:33:45 GMT 2025 - 15.4K bytes - Click Count (0) -
docs/fr/docs/deployment/https.md
Maintenant, du point de vue d'un développeur, voici plusieurs choses à avoir en tête en pensant au HTTPS : * Pour le HTTPS, le serveur a besoin de "certificats" générés par une tierce partie. * Ces certificats sont en fait acquis auprès de la tierce partie, et non "générés". * Les certificats ont une durée de vie. * Ils expirent. * Puis ils doivent être renouvelés et acquis à nouveau auprès de la tierce partie.
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Tue Aug 06 04:48:30 GMT 2024 - 4.1K bytes - Click Count (0) -
docs/pt/docs/deployment/https.md
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Nov 12 16:23:57 GMT 2025 - 14.8K bytes - Click Count (0) -
docs/tls/README.md
``` ### 3.2 Use OpenSSL to Generate a Certificate Use one of the following methods to generate a certificate using `openssl`: * 3.2.1 [Generate a private key with ECDSA](#generate-private-key-with-ecdsa) * 3.2.2 [Generate a private key with RSA](#generate-private-key-with-rsa) * 3.2.3 [Generate a self-signed certificate](#generate-a-self-signed-certificate) #### 3.2.1 Generate a private key with ECDSA
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 8.6K bytes - Click Count (0) -
internal/config/certs_test.go
} certificate, err := createTempFile(t, "public.crt", testCase.certificate) if err != nil { os.Remove(privateKey) t.Fatalf("Test %d: failed to create tmp certificate file: %v", i, err) } if testCase.password != "" { t.Setenv(EnvCertPassword, testCase.password) } _, err = LoadX509KeyPair(certificate, privateKey) if err != nil && !testCase.shouldFail {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Feb 18 16:25:55 GMT 2025 - 21.6K bytes - Click Count (0) -
internal/config/certs.go
// password protected. const EnvCertPassword = "MINIO_CERT_PASSWD" // ParsePublicCertFile - parses public cert into its *x509.Certificate equivalent. func ParsePublicCertFile(certFile string) (x509Certs []*x509.Certificate, err error) { // Read certificate file. var data []byte if data, err = os.ReadFile(certFile); err != nil { return nil, err } // Trimming leading and tailing white spaces.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Wed Aug 14 17:11:51 GMT 2024 - 3.8K bytes - Click Count (0) -
cmd/sts-handlers.go
// configured expiry and the duration until the certificate itself // expires. // We must not issue credentials that out-live the certificate. if validUntil := time.Until(certificate.NotAfter); validUntil < expiry { expiry = validUntil } // Associate any service accounts to the certificate CN parentUser := "tls" + getKeySeparator() + certificate.Subject.CommonName
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 36.6K bytes - Click Count (0) -
docs/en/docs/deployment/https.md
In this case, it would use the certificate for `someapp.example.com`. <img src="/img/deployment/https/https03.drawio.svg"> The client already **trusts** the entity that generated that TLS certificate (in this case Let's Encrypt, but we'll see about that later), so it can **verify** that the certificate is valid.
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sun Aug 31 19:34:08 GMT 2025 - 14.3K bytes - Click Count (0) -
internal/config/errors.go
) ErrTLSReadError = newErrFn( "Cannot read the TLS certificate", "Please check if the certificate has the proper owner and read permissions", "", ) ErrTLSUnexpectedData = newErrFn( "Invalid TLS certificate", "Please check your certificate", "", ) ErrTLSNoPassword = newErrFn( "Missing TLS password",
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 9.4K bytes - Click Count (0) -
docs/sts/tls.md
credentials via the STS API. It can authenticate via a client certificate and obtain a access/secret key pair as well as a session token. These credentials are associated to an S3 policy at the MinIO server. In case of certificate-based authentication, MinIO has to map the client-provided certificate to an S3 policy. MinIO does this via the subject common name field of the X.509 certificate. So, MinIO will associate a certificate with a subject `CN = foobar` to a S3 policy named `foobar`....
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 6K bytes - Click Count (1)