- Sort Score
- Result 10 results
- Languages All
Results 211 - 220 of 273 for isSecure (0.09 sec)
-
docs/config/README.md
### Certificate Directory TLS certificates by default are expected to be stored under ``${HOME}/.minio/certs`` directory. You need to place certificates here to enable `HTTPS` based access. Read more about [How to secure access to MinIO server with TLS](https://min.io/docs/minio/linux/operations/network-encryption.html). Following is a sample directory structure for MinIO server with TLS certificates. ```sh $ mc tree --files ~/.minio
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Aug 16 08:43:49 UTC 2024 - 17.9K bytes - Viewed (1) -
cmd/sftp-server-driver.go
f.permissions.CriticalOptions["AccessKey"], f.permissions.CriticalOptions["SecretKey"], f.permissions.CriticalOptions["SessionToken"], ) return minio.New(f.endpoint, &minio.Options{ Creds: mcreds, Secure: globalIsTLS, Transport: globalRemoteFTPClientTransport, }) } func (f *sftpDriver) AccessKey() string { return f.permissions.CriticalOptions["AccessKey"] }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jun 05 07:51:13 UTC 2024 - 11.1K bytes - Viewed (0) -
cmd/admin-bucket-handlers.go
// credentials update is possible only in bucket replication. User will never // know the site replicator creds. tgt.Credentials = target.Credentials tgt.TargetBucket = target.TargetBucket tgt.Secure = target.Secure tgt.Endpoint = target.Endpoint } case madmin.SyncUpdateType: tgt.ReplicationSync = target.ReplicationSync case madmin.ProxyUpdateType: tgt.DisableProxy = target.DisableProxy
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Aug 28 15:32:18 UTC 2024 - 33.2K bytes - Viewed (0) -
cmd/perf-tests.go
if region == "" { region = "us-east-1" } clnt, err = minio.New(globalLocalNodeName, &minio.Options{ Creds: credentials.NewStaticV4(opts.creds.AccessKey, opts.creds.SecretKey, opts.creds.SessionToken), Secure: globalIsTLS, Transport: globalRemoteTargetTransport, Region: region, }) if err != nil { return res, err } } var mu sync.Mutex var uploadTimes madmin.TimeDurations
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 11.8K bytes - Viewed (0) -
docs/en/docs/tutorial/bigger-applications.md
{!../../docs_src/bigger_applications/app/internal/admin.py!} ``` But we still want to set a custom `prefix` when including the `APIRouter` so that all its *path operations* start with `/admin`, we want to secure it with the `dependencies` we already have for this project, and we want to include `tags` and `responses`.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 18.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.10.md
* The ability to use the insecure HTTP port of kube-controller-manager and cloud-controller-manager has been deprecated, and will be removed in a future release. Use `--secure-port` and `--bind-address` instead. ([#59582](https://github.com/kubernetes/kubernetes/pull/59582), [@sttts](https://github.com/sttts))
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu May 05 13:44:43 UTC 2022 - 341.8K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of * these feats has become computationally feasible, the function is deemed "broken" and should * no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i> * cryptographic hashes.) * <li><b>fast:</b> perhaps self-explanatory, but often the most important consideration. * </ul> *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0) -
guava/src/com/google/common/hash/HashFunction.java
* are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of * these feats has become computationally feasible, the function is deemed "broken" and should * no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i> * cryptographic hashes.) * <li><b>fast:</b> perhaps self-explanatory, but often the most important consideration. * </ul> *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
The most common is the implicit flow. The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow. /// note
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Oct 29 11:02:16 UTC 2024 - 13.1K bytes - Viewed (0) -
apache-maven/src/main/appended-resources/licenses/EPL-1.0.txt
for claims brought by any other entity based on infringement of intellectual property rights or otherwise. As a condition to exercising the rights and licenses granted hereunder, each Recipient hereby assumes sole responsibility to secure any other intellectual property rights needed, if any. For example, if a third party patent license is required to allow Recipient to distribute the Program, it is Recipient's responsibility to acquire that license before
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Mon Sep 17 05:50:12 UTC 2018 - 11.1K bytes - Viewed (0)