Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 340 for certificats (0.17 sec)

  1. docs/fr/docs/deployment/https.md

    Maintenant, du point de vue d'un développeur, voici plusieurs choses à avoir en tête en pensant au HTTPS :
    
    * Pour le HTTPS, le serveur a besoin de "certificats" générés par une tierce partie.
        * Ces certificats sont en fait acquis auprès de la tierce partie, et non "générés".
    * Les certificats ont une durée de vie.
        * Ils expirent.
        * Puis ils doivent être renouvelés et acquis à nouveau auprès de la tierce partie.
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 4.1K bytes
    - Viewed (0)
  2. docs/fr/docs/deployment/docker.md

    Il est intégré à Let's Encrypt. Ainsi, il peut gérer toutes les parties HTTPS, y compris l'acquisition et le renouvellement des certificats.
    
    Il est également intégré à Docker. Ainsi, vous pouvez déclarer vos domaines dans les configurations de chaque application et faire en sorte qu'elles lisent ces configurations, génèrent les certificats HTTPS et servent via HTTPS à votre application automatiquement, sans nécessiter aucune modification de leurs configurations.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 7.5K bytes
    - Viewed (0)
  3. okhttp-tls/src/main/kotlin/okhttp3/tls/internal/der/Certificate.kt

        val data = CertificateAdapters.certificate.toDer(this)
        try {
          val certificateFactory = CertificateFactory.getInstance("X.509")
          val certificates = certificateFactory.generateCertificates(Buffer().write(data).inputStream())
          return certificates.single() as X509Certificate
        } catch (e: NoSuchElementException) {
          throw IllegalArgumentException("failed to decode certificate", e)
        } catch (e: IllegalArgumentException) {
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 6.4K bytes
    - Viewed (0)
  4. okhttp-tls/src/main/kotlin/okhttp3/tls/Certificates.kt

        throw IllegalArgumentException("failed to decode certificate", nsee)
      } catch (iae: IllegalArgumentException) {
        throw IllegalArgumentException("failed to decode certificate", iae)
      } catch (e: GeneralSecurityException) {
        throw IllegalArgumentException("failed to decode certificate", e)
      }
    }
    
    /**
     * Returns the certificate encoded in [PEM format][rfc_7468].
     *
     * [rfc_7468]: https://tools.ietf.org/html/rfc7468
     */
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 2.8K bytes
    - Viewed (0)
  5. istioctl/pkg/writer/ztunnel/configdump/certificates.go

    func (c *ConfigWriter) PrintSecretSummary() error {
    	if c.ztunnelDump == nil {
    		return fmt.Errorf("config writer has not been primed")
    	}
    	secretDump := c.ztunnelDump.Certificates
    	w := new(tabwriter.Writer).Init(c.Stdout, 0, 8, 5, ' ', 0)
    	fmt.Fprintln(w, "CERTIFICATE NAME\tTYPE\tSTATUS\tVALID CERT\tSERIAL NUMBER\tNOT AFTER\tNOT BEFORE")
    
    	for _, secret := range secretDump {
    		if strings.Contains(secret.State, "Unavailable") {
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Thu Apr 25 16:38:16 UTC 2024
    - 3.2K bytes
    - Viewed (0)
  6. okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt

         * certificate can sign other certificates (but those certificates cannot themselves sign
         * certificates). Set this to 1 so this certificate can sign intermediate certificates that can
         * themselves sign certificates. Add one for each additional layer of intermediates to permit.
         */
        fun certificateAuthority(maxIntermediateCas: Int) =
          apply {
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 21.6K bytes
    - Viewed (0)
  7. okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt

     *
     *  * The client's handshake certificates must have a [held certificate][HeldCertificate] (a
     *    certificate and its private key). The client must also have a (possibly-empty) chain of
     *    intermediate certificates to establish trust from a root certificate to the client's
     *    certificate. The root certificate is not included in this chain.
     *  * The server's handshake certificates must include a set of trusted root certificates. They
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 8.5K bytes
    - Viewed (0)
  8. okhttp/src/main/kotlin/okhttp3/CertificatePinner.kt

     * `api.publicobject.com` are valid if either A's or B's certificate is in the chain.
     *
     * ## Warning: Certificate Pinning is Dangerous!
     *
     * Pinning certificates limits your server team's abilities to update their TLS certificates. By
     * pinning certificates, you take on additional operational complexity and limit your ability to
     * migrate between certificate authorities. Do not use certificate pinning without the blessing of
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 14.2K bytes
    - Viewed (0)
  9. docs/pt/docs/deployment/https.md

    Agora, a partir de uma perspectiva do desenvolvedor, aqui estão algumas coisas para ter em mente ao pensar em HTTPS:
    
    * Para HTTPS, o servidor precisa ter certificados gerados por um terceiro.
        * Esses certificados são adquiridos de um terceiro, eles não são simplesmente "gerados".
    * Certificados têm um tempo de vida.
        * Eles expiram.
        * E então eles precisam ser renovados, adquirindo-os novamente de um terceiro.
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 3.9K bytes
    - Viewed (0)
  10. docs/ftp/README.md

    hmac-sha2-512
    hmac-sha1
    hmac-sha1-96
    ```
    
    ### Certificate-based authentication
    
    `--sftp=trusted-user-ca-key=...` specifies a file containing public key of certificate authority that is trusted
    to sign user certificates for authentication.
    
    Implementation is identical with "TrustedUserCAKeys" setting in OpenSSH server with exception that only one CA
    key can be defined.
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue May 07 06:41:25 UTC 2024
    - 7.8K bytes
    - Viewed (0)
Back to top