Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for Won (0.11 sec)

  1. docs/kms/README.md

    ### Verify auto-encryption
    
    > Note that auto-encryption only affects requests without S3 encryption headers. So, if a S3 client sends
    > e.g. SSE-C headers, MinIO will encrypt the object with the key sent by the client and won't reach out to
    > the configured KMS.
    
    To verify auto-encryption, use the following `mc` command:
    
    ```
    mc cp test.file myminio/bucket/
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 7.1K bytes
    - Viewed (0)
  2. docs/kms/IAM.md

    > Is this change backward compatible? Will it break my setup?
    
    This change is not backward compatible for all setups. In particular, the native
    Hashicorp Vault integration - which has been deprecated already - won't be
    supported anymore. KES is now mandatory if a third-party KMS should be used.
    
    Further, since the configuration data is encrypted with the KMS, the KMS
    configuration itself can no longer be stored in the MinIO config file and
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 5.3K bytes
    - Viewed (0)
  3. docs/distributed/README.md

    > **NOTE:** `{1...n}` shown have 3 dots! Using only 2 dots `{1..n}` will be interpreted by your shell and won't be passed to MinIO server, affecting the erasure coding order, which would impact performance and high availability. **Always use ellipses syntax `{1...n}` (3 dots!) for optimal erasure-code distribution**
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 8.8K bytes
    - Viewed (0)
Back to top