- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 82 for certificats (0.08 sec)
-
okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt
* * * The client's handshake certificates must have a [held certificate][HeldCertificate] (a * certificate and its private key). The client must also have a (possibly-empty) chain of * intermediate certificates to establish trust from a root certificate to the client's * certificate. The root certificate is not included in this chain. * * The server's handshake certificates must include a set of trusted root certificates. They
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sat May 10 11:15:14 UTC 2025 - 8.4K bytes - Viewed (0) -
docs/pt/docs/deployment/https.md
* Traefik (que também pode gerenciar a renovação de certificados) * Caddy (que também pode gerenciar a renovação de certificados) * Nginx * HAProxy ## Let's Encrypt Antes de Let's Encrypt, esses **certificados HTTPS** eram vendidos por terceiros confiáveis. O processo de aquisição de um desses certificados costumava ser complicado, exigia bastante papelada e os certificados eram bastante caros.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun May 11 13:37:26 UTC 2025 - 12.8K bytes - Viewed (0) -
okhttp-tls/README.md
to generate a trusted root certificate, an intermediate certificate, and a server certificate. We use `certificateAuthority(int)` to create certificates that can sign other certificates. The int specifies how many intermediate certificates are allowed beneath it in the chain. ```java HeldCertificate rootCertificate = new HeldCertificate.Builder() .certificateAuthority(1) .build();
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Mon Jul 07 19:32:33 UTC 2025 - 9.1K bytes - Viewed (0) -
docs/tls/README.md
1. [Install MinIO Server](#install-minio-server) 2. [Use an Existing Key and Certificate with MinIO](#use-an-existing-key-and-certificate-with-minio) 3. [Generate and use Self-signed Keys and Certificates with MinIO](#generate-use-self-signed-keys-certificates) 4. [Install Certificates from Third-party CAs](#install-certificates-from-third-party-cas)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.6K bytes - Viewed (0) -
docs/en/docs/deployment/https.md
The domains are securely verified and the certificates are generated automatically. This also allows automating the renewal of these certificates.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 19:34:08 UTC 2025 - 14.3K bytes - Viewed (0) -
docs/es/docs/deployment/https.md
* Traefik (que también puede manejar la renovación de certificados) * Caddy (que también puede manejar la renovación de certificados) * Nginx * HAProxy ## Let's Encrypt Antes de Let's Encrypt, estos **certificados HTTPS** eran vendidos por terceros. El proceso para adquirir uno de estos certificados solía ser complicado, requerir bastante papeleo y los certificados eran bastante costosos.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun May 11 13:37:26 UTC 2025 - 13K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
// Add a bad intermediate CA and have that issue a rogue certificate for localhost. Prepare // an SSL context for an attacking webserver. It includes both these rogue certificates plus the // trusted good certificate above. The attack is that by including the good certificate in the // chain, we may trick the certificate pinner into accepting the rouge certificate. val compromisedIntermediateCa = HeldCertificate
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Fri Jun 20 11:46:46 UTC 2025 - 24.3K bytes - Viewed (1) -
docs/tls/kubernetes/README.md
For testing purposes, here is [how to create self-signed certificates](https://github.com/minio/minio/tree/master/docs/tls#3-generate-self-signed-certificates). ## 2. Create Kubernetes secret
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 3K bytes - Viewed (0) -
docs/sts/tls.md
credentials via the STS API. It can authenticate via a client certificate and obtain a access/secret key pair as well as a session token. These credentials are associated to an S3 policy at the MinIO server. In case of certificate-based authentication, MinIO has to map the client-provided certificate to an S3 policy. MinIO does this via the subject common name field of the X.509 certificate. So, MinIO will associate a certificate with a subject `CN = foobar` to a S3 policy named `foobar`....
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 6K bytes - Viewed (1) -
cmd/sts-handlers.go
// when we don't verify that the certificate has been issued by a trusted CA. // Any client can create a certificate with arbitrary key usage settings. // // However, this check ensures that a certificate with an invalid key usage // gets rejected even when we skip certificate verification. This helps // clients detect malformed certificates during testing instead of e.g.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 36.6K bytes - Viewed (0)