Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 68 for certifican (0.7 sec)

  1. docs/es/docs/deployment/https.md

    En este caso, usaría el certificado para `someapp.example.com`.
    
    <img src="/img/deployment/https/https03.drawio.svg">
    
    El cliente ya **confía** en la entidad que generó ese certificado TLS (en este caso Let's Encrypt, pero lo veremos más adelante), por lo que puede **verificar** que el certificado sea válido.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun May 11 13:37:26 UTC 2025
    - 13K bytes
    - Viewed (0)
  2. docs/pt/docs/deployment/https.md

    Nesse caso, ele usaria o certificado para `someapp.example.com`.
    
    <img src="/img/deployment/https/https03.drawio.svg">
    
    O cliente já **confia** na entidade que gerou o certificado TLS (nesse caso, o Let's Encrypt, mas veremos sobre isso mais tarde), então ele pode **verificar** que o certificado é válido.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun May 11 13:37:26 UTC 2025
    - 12.8K bytes
    - Viewed (0)
  3. okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt

        // Add a bad intermediate CA and have that issue a rogue certificate for localhost. Prepare
        // an SSL context for an attacking webserver. It includes both these rogue certificates plus the
        // trusted good certificate above. The attack is that by including the good certificate in the
        // chain, we may trick the certificate pinner into accepting the rouge certificate.
        val compromisedIntermediateCa =
          HeldCertificate
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Fri Jun 20 11:46:46 UTC 2025
    - 24.3K bytes
    - Viewed (1)
  4. okhttp-tls/README.md

        .heldCertificate(serverCertificate, intermediateCertificate.certificate())
        .build();
    ```
    
    The client only needs to know the trusted root certificate. It checks the server's certificate by
    validating the signatures within the chain.
    
    ```java
    HandshakeCertificates clientCertificates = new HandshakeCertificates.Builder()
        .addTrustedCertificate(rootCertificate.certificate())
        .build();
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Mon Jul 07 19:32:33 UTC 2025
    - 9.1K bytes
    - Viewed (0)
  5. docs/tls/README.md

    ```
    
    ### 3.2 Use OpenSSL to Generate a Certificate
    
    Use one of the following methods to generate a certificate using `openssl`:
    
    * 3.2.1 [Generate a private key with ECDSA](#generate-private-key-with-ecdsa)
    * 3.2.2 [Generate a private key with RSA](#generate-private-key-with-rsa)
    * 3.2.3 [Generate a self-signed certificate](#generate-a-self-signed-certificate)
    
    #### 3.2.1 Generate a private key with ECDSA
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.6K bytes
    - Viewed (0)
  6. okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt

     *
     *  * The server's handshake certificates must have a [held certificate][HeldCertificate] (a
     *    certificate and its private key). The certificate's subject alternative names must match the
     *    server's hostname. The server must also have is a (possibly-empty) chain of intermediate
     *    certificates to establish trust from a root certificate to the server's certificate. The root
     *    certificate is not included in this chain.
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Sat May 10 11:15:14 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  7. docs/en/docs/deployment/https.md

    In this case, it would use the certificate for `someapp.example.com`.
    
    <img src="/img/deployment/https/https03.drawio.svg">
    
    The client already **trusts** the entity that generated that TLS certificate (in this case Let's Encrypt, but we'll see about that later), so it can **verify** that the certificate is valid.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 19:34:08 UTC 2025
    - 14.3K bytes
    - Viewed (0)
  8. cmd/sts-handlers.go

    	// configured expiry and the duration until the certificate itself
    	// expires.
    	// We must not issue credentials that out-live the certificate.
    	if validUntil := time.Until(certificate.NotAfter); validUntil < expiry {
    		expiry = validUntil
    	}
    
    	// Associate any service accounts to the certificate CN
    	parentUser := "tls" + getKeySeparator() + certificate.Subject.CommonName
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 36.6K bytes
    - Viewed (0)
  9. okhttp/src/jvmTest/kotlin/okhttp3/KotlinSourceModernTest.kt

        val certificate: X509Certificate = heldCertificate.certificate
        val certificatePinner: CertificatePinner = CertificatePinner.Builder().build()
        val certificates: List<Certificate> = listOf()
        certificatePinner.check("", listOf(certificate))
        certificatePinner.check("", arrayOf<Certificate>(certificate, certificate).toList())
        val pin: String = CertificatePinner.pin(certificate)
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Sat Jun 21 20:36:35 UTC 2025
    - 46.5K bytes
    - Viewed (0)
  10. docs/sts/tls.md

    credentials via the STS API. It can authenticate via a client certificate and obtain a access/secret key pair as well as a session token. These credentials are associated to an S3 policy at the MinIO server.
    
    In case of certificate-based authentication, MinIO has to map the client-provided certificate to an S3 policy. MinIO does this via the subject common name field of the X.509 certificate. So, MinIO will associate a certificate with a subject `CN = foobar` to a S3 policy named `foobar`....
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 6K bytes
    - Viewed (1)
Back to top