Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 10 of 68 for certifican (0.13 seconds)

  1. docs/es/docs/deployment/https.md

    En este caso, usaría el certificado para `someapp.example.com`.
    
    <img src="/img/deployment/https/https03.drawio.svg">
    
    El cliente ya **confía** en la entidad que generó ese certificado TLS (en este caso Let's Encrypt, pero lo veremos más adelante), por lo que puede **verificar** que el certificado sea válido.
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Tue Dec 16 16:33:45 GMT 2025
    - 15.4K bytes
    - Click Count (0)
  2. docs/fr/docs/deployment/https.md

    Maintenant, du point de vue d'un développeur, voici plusieurs choses à avoir en tête en pensant au HTTPS :
    
    * Pour le HTTPS, le serveur a besoin de "certificats" générés par une tierce partie.
        * Ces certificats sont en fait acquis auprès de la tierce partie, et non "générés".
    * Les certificats ont une durée de vie.
        * Ils expirent.
        * Puis ils doivent être renouvelés et acquis à nouveau auprès de la tierce partie.
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Tue Aug 06 04:48:30 GMT 2024
    - 4.1K bytes
    - Click Count (0)
  3. docs/pt/docs/deployment/https.md

    Nesse caso, ele usaria o certificado para `someapp.example.com`.
    
    <img src="/img/deployment/https/https03.drawio.svg">
    
    O cliente já confia na entidade que gerou o certificado TLS (nesse caso, o Let's Encrypt, mas veremos sobre isso mais tarde), então ele pode verificar que o certificado é válido.
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Wed Nov 12 16:23:57 GMT 2025
    - 14.8K bytes
    - Click Count (0)
  4. docs/tls/README.md

    ```
    
    ### 3.2 Use OpenSSL to Generate a Certificate
    
    Use one of the following methods to generate a certificate using `openssl`:
    
    * 3.2.1 [Generate a private key with ECDSA](#generate-private-key-with-ecdsa)
    * 3.2.2 [Generate a private key with RSA](#generate-private-key-with-rsa)
    * 3.2.3 [Generate a self-signed certificate](#generate-a-self-signed-certificate)
    
    #### 3.2.1 Generate a private key with ECDSA
    
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Tue Aug 12 18:20:36 GMT 2025
    - 8.6K bytes
    - Click Count (0)
  5. internal/config/certs_test.go

    		}
    		certificate, err := createTempFile(t, "public.crt", testCase.certificate)
    		if err != nil {
    			os.Remove(privateKey)
    			t.Fatalf("Test %d: failed to create tmp certificate file: %v", i, err)
    		}
    
    		if testCase.password != "" {
    			t.Setenv(EnvCertPassword, testCase.password)
    		}
    		_, err = LoadX509KeyPair(certificate, privateKey)
    		if err != nil && !testCase.shouldFail {
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Tue Feb 18 16:25:55 GMT 2025
    - 21.6K bytes
    - Click Count (0)
  6. internal/config/certs.go

    // password protected.
    const EnvCertPassword = "MINIO_CERT_PASSWD"
    
    // ParsePublicCertFile - parses public cert into its *x509.Certificate equivalent.
    func ParsePublicCertFile(certFile string) (x509Certs []*x509.Certificate, err error) {
    	// Read certificate file.
    	var data []byte
    	if data, err = os.ReadFile(certFile); err != nil {
    		return nil, err
    	}
    
    	// Trimming leading and tailing white spaces.
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Wed Aug 14 17:11:51 GMT 2024
    - 3.8K bytes
    - Click Count (0)
  7. cmd/sts-handlers.go

    	// configured expiry and the duration until the certificate itself
    	// expires.
    	// We must not issue credentials that out-live the certificate.
    	if validUntil := time.Until(certificate.NotAfter); validUntil < expiry {
    		expiry = validUntil
    	}
    
    	// Associate any service accounts to the certificate CN
    	parentUser := "tls" + getKeySeparator() + certificate.Subject.CommonName
    
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 36.6K bytes
    - Click Count (0)
  8. docs/en/docs/deployment/https.md

    In this case, it would use the certificate for `someapp.example.com`.
    
    <img src="/img/deployment/https/https03.drawio.svg">
    
    The client already **trusts** the entity that generated that TLS certificate (in this case Let's Encrypt, but we'll see about that later), so it can **verify** that the certificate is valid.
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Sun Aug 31 19:34:08 GMT 2025
    - 14.3K bytes
    - Click Count (0)
  9. internal/config/errors.go

    	)
    
    	ErrTLSReadError = newErrFn(
    		"Cannot read the TLS certificate",
    		"Please check if the certificate has the proper owner and read permissions",
    		"",
    	)
    
    	ErrTLSUnexpectedData = newErrFn(
    		"Invalid TLS certificate",
    		"Please check your certificate",
    		"",
    	)
    
    	ErrTLSNoPassword = newErrFn(
    		"Missing TLS password",
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Tue Aug 12 18:20:36 GMT 2025
    - 9.4K bytes
    - Click Count (0)
  10. docs/sts/tls.md

    credentials via the STS API. It can authenticate via a client certificate and obtain a access/secret key pair as well as a session token. These credentials are associated to an S3 policy at the MinIO server.
    
    In case of certificate-based authentication, MinIO has to map the client-provided certificate to an S3 policy. MinIO does this via the subject common name field of the X.509 certificate. So, MinIO will associate a certificate with a subject `CN = foobar` to a S3 policy named `foobar`....
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Tue Aug 12 18:20:36 GMT 2025
    - 6K bytes
    - Click Count (1)
Back to Top