- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 74 for certificate (0.13 sec)
-
docs/en/docs/deployment/https.md
The TLS Termination Proxy would have access to one or more **TLS certificates** (HTTPS certificates). Using the **SNI extension** discussed above, the TLS Termination Proxy would check which of the TLS (HTTPS) certificates available it should use for this connection, using the one that matches the domain expected by the client. In this case, it would use the certificate for `someapp.example.com`. <img src="/img/deployment/https/https03.svg">
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Aug 06 04:48:30 UTC 2024 - 12K bytes - Viewed (0) -
architecture/security/istio-agent.md
CSR, certificates are written to disk and mTLS is used for future requests. If the VM restarted, it would continue to use the certificates written to disk, assuming the downtime is less than certificate expiration. This is why the certificates are persisted to disk, rather than kept in memory like in the standard Kubernetes deployment. ## Certificate Rotation
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Jul 18 23:11:18 UTC 2024 - 7.2K bytes - Viewed (0) -
cmd/sts-handlers.go
// configured expiry and the duration until the certificate itself // expires. // We must not issue credentials that out-live the certificate. if validUntil := time.Until(certificate.NotAfter); validUntil < expiry { expiry = validUntil } // Associate any service accounts to the certificate CN parentUser := "tls" + getKeySeparator() + certificate.Subject.CommonName
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Aug 15 01:29:20 UTC 2024 - 33.9K bytes - Viewed (0) -
internal/config/certs.go
// password protected. const EnvCertPassword = "MINIO_CERT_PASSWD" // ParsePublicCertFile - parses public cert into its *x509.Certificate equivalent. func ParsePublicCertFile(certFile string) (x509Certs []*x509.Certificate, err error) { // Read certificate file. var data []byte if data, err = os.ReadFile(certFile); err != nil { return nil, err } // Trimming leading and tailing white spaces.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Aug 14 17:11:51 UTC 2024 - 3.8K bytes - Viewed (0) -
internal/kms/config.go
} certificate, err := tls.X509KeyPair(certBytes, keyBytes) if err != nil { return tls.Certificate{}, fmt.Errorf("Unable to load KES client certificate as specified by the shell environment: %v", err) } return certificate, nil }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Aug 15 11:46:39 UTC 2024 - 14.2K bytes - Viewed (0) -
internal/config/errors.go
) ErrTLSReadError = newErrFn( "Cannot read the TLS certificate", "Please check if the certificate has the proper owner and read permissions", "", ) ErrTLSUnexpectedData = newErrFn( "Invalid TLS certificate", "Please check your certificate", "", ) ErrTLSNoPassword = newErrFn( "Missing TLS password",
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jul 10 16:57:01 UTC 2024 - 9.3K bytes - Viewed (0) -
internal/logger/help.go
Sensitive: true, Secret: true, }, config.HelpKV{ Key: ClientCert, Description: "mTLS certificate for webhook authentication", Optional: true, Type: "string", Sensitive: true, }, config.HelpKV{ Key: ClientKey, Description: "mTLS certificate key for webhook authentication", Optional: true, Type: "string", Sensitive: true, },
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Sep 11 22:20:42 UTC 2024 - 7.4K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/FessBoot.java
final SSLHostConfigCertificate certificate = new SSLHostConfigCertificate(sslHostConfig, SSLHostConfigCertificate.Type.UNDEFINED); doSetupServerConfig(logger, props, "certificateKeystoreFile", v -> certificate.setCertificateKeystoreFile(v)); doSetupServerConfig(logger, props, "certificateKeystorePassword", v -> certificate.setCertificateKeystorePassword(v));
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Fri Oct 11 21:20:39 UTC 2024 - 8K bytes - Viewed (0) -
istioctl/pkg/writer/compare/sds/writer.go
} // If all secrets have a trust domain, we are probably dealing with trust domain federation, so print trust domains. // Otherwise, do not do that, because we do not know how to determine that information from the certificate, // so the output would be confusing. if !hasUnknownTrustDomain { fmt.Fprintf(tw, "%s\t%s\t%s\t%t\t%s\t%s\t%s\t%s\n",
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Oct 28 19:52:53 UTC 2024 - 4.8K bytes - Viewed (0) -
cmd/sftp-server.go
} cert, ok := clientKey.(*ssh.Certificate) if !ok { return errSftpPublicKeyWithoutCert } // ssh.CheckCert called by ssh.Authenticate accepts certificates // with empty principles list so we block those in here. if len(cert.ValidPrincipals) == 0 { return errSftpCertWithoutPrincipals } // Verify that certificate provided by user is issued by trusted CA,
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Aug 20 20:00:29 UTC 2024 - 16K bytes - Viewed (0)