Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 39 for sse (0.01 sec)

  1. docs/distributed/decom-encrypted-sse-s3.sh

    ./mc admin policy attach myminio/ rw --user=minio123
    ./mc admin policy attach myminio/ lake --user=minio12345
    
    ./mc mb -l myminio/versioned
    
    ./mc encrypt set sse-s3 myminio/versioned
    
    ./mc mirror internal myminio/versioned/ --quiet >/dev/null
    
    ## Soft delete (creates delete markers)
    ./mc rm -r --force myminio/versioned >/dev/null
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Mon May 27 19:17:46 UTC 2024
    - 4.5K bytes
    - Viewed (0)
  2. docs/site-replication/run-sse-kms-object-replication.sh

    # sleep for replication to complete
    sleep 30
    
    # Create bucket in source cluster
    echo "Create bucket in source MinIO instance"
    ./mc mb minio1/test-bucket --insecure
    
    # Enable SSE KMS for the bucket
    ./mc encrypt set sse-kms minio-default-key minio1/test-bucket --insecure
    
    # Load objects to source site
    echo "Loading objects to source MinIO instance"
    ./mc cp /tmp/data/encrypted minio1/test-bucket --insecure
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Oct 10 06:49:55 UTC 2024
    - 11.5K bytes
    - Viewed (0)
  3. docs/distributed/decom-compressed-sse-s3.sh

    Harshavardhana <******@****.***> 1716837466 -0700
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Mon May 27 19:17:46 UTC 2024
    - 4.3K bytes
    - Viewed (0)
  4. docs/iam/policies/deny-non-sse-kms-objects.json

    Shubhendu <******@****.***> 1715701387 +0530
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue May 14 15:43:07 UTC 2024
    - 413 bytes
    - Viewed (0)
  5. docs/iam/policies/deny-objects-with-invalid-sse-kms-key-id.json

    Shubhendu <******@****.***> 1715701387 +0530
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue May 14 15:43:07 UTC 2024
    - 439 bytes
    - Viewed (0)
  6. docs/security/README.md

    MinIO supports two different types of server-side encryption ([SSE](#sse)):
    
    - **SSE-C**: The MinIO server en/decrypts an object with a secret key provided by the S3 client as part of the HTTP request headers. Therefore, [SSE-C](#ssec) requires TLS/HTTPS.
    - **SSE-S3**: The MinIO server en/decrypts an object with a secret key managed by a KMS. Therefore, MinIO requires a valid KMS configuration for [SSE-S3](#sses3).
    
    ### Server-Side Encryption - Preliminaries
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Feb 26 09:25:50 UTC 2025
    - 13.8K bytes
    - Viewed (0)
  7. Makefile

    	@echo "Running tests for automatic site replication of SSE-C objects"
    	@(env bash $(PWD)/docs/site-replication/run-ssec-object-replication.sh)
    	@echo "Running tests for automatic site replication of SSE-C objects with SSE-KMS enabled for bucket"
    	@(env bash $(PWD)/docs/site-replication/run-sse-kms-object-replication.sh)
    	@echo "Running tests for automatic site replication of SSE-C objects with compression enabled for site"
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Apr 27 00:44:22 UTC 2025
    - 11.2K bytes
    - Viewed (0)
  8. docs/bucket/replication/README.md

    - SSE-C is hardly adopted by most widely used applications, applications prefer server to manage the keys via SSE-KMS or SSE-S3.
    - MinIO recommends applications to use SSE-KMS, SSE-S3 for simpler, safer and robust encryption mechanism for replicated buckets.
    
    ## Explore Further
    
    - [MinIO Bucket Replication Design](https://github.com/minio/minio/blob/master/docs/bucket/replication/DESIGN.md)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 18.3K bytes
    - Viewed (0)
  9. docs/iam/policies/pbac-tests.sh

    mc admin policy create myminio/ deny-non-sse-kms-pol ./docs/iam/policies/deny-non-sse-kms-objects.json
    mc admin policy create myminio/ deny-invalid-sse-kms-pol ./docs/iam/policies/deny-objects-with-invalid-sse-kms-key-id.json
    
    mc admin policy attach myminio deny-non-sse-kms-pol --user minio123
    mc admin policy attach myminio deny-invalid-sse-kms-pol --user minio123
    mc admin policy attach myminio consoleAdmin --user minio123
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Jun 25 01:15:27 UTC 2024
    - 2.5K bytes
    - Viewed (0)
  10. cmd/encryption-v1.go

    			return objInfo.ETag
    		}
    	}
    
    	// As per AWS S3 Spec, ETag for SSE-C encrypted objects need not be MD5Sum of the data.
    	// Since server side copy with same source and dest just replaces the ETag, we save
    	// encrypted content MD5Sum as ETag for both SSE-C and SSE-KMS, we standardize the ETag
    	// encryption across SSE-C and SSE-KMS, and only return last 32 bytes for SSE-C
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 37.8K bytes
    - Viewed (0)
Back to top