- Sort Score
- Num 10 results
- Language All
Results 11 - 20 of 198 for PARTY (0.03 seconds)
-
apache-maven/src/main/appended-resources/licenses/EPL-2.0.txt
rights and licenses granted hereunder, each Recipient hereby assumes sole responsibility to secure any other intellectual property rights needed, if any. For example, if a third party patent license is required to allow Recipient to Distribute the Program, it is Recipient's responsibility to acquire that license before distributing the Program.
Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Tue Jun 04 06:45:16 GMT 2024 - 13.9K bytes - Click Count (0) -
helm/minio/README.md
``` Then install the chart, specifying that you want to use the TLS secret: ```bash helm install --set tls.enabled=true,tls.certSecret=tls-ssl-minio minio/minio ``` ### Installing certificates from third party CAs
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 10.9K bytes - Click Count (0) -
VULNERABILITY_REPORT.md
of the code base. ## Scope The vulnerability management policy described in this document covers the process of investigating, assessing and resolving a vulnerability report opened by a MinIO employee or an external third party. Therefore, it lists pre-conditions and actions that should be performed to resolve and fix a reported vulnerability. ## Vulnerability Management Process
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sat Feb 12 00:51:25 GMT 2022 - 1.5K bytes - Click Count (0) -
api/maven-api-spi/src/main/java/org/apache/maven/api/spi/package-info.java
Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Tue Mar 04 14:17:18 GMT 2025 - 1K bytes - Click Count (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
After a week, the token will be expired and the user will not be authorized and will have to sign in again to get a new token. And if the user (or a third party) tried to modify the token to change the expiration, you would be able to discover it, because the signatures would not match. If you want to play with JWT tokens and see how they work, check [https://jwt.io](https://jwt.io/).
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 10.7K bytes - Click Count (0) -
docs/en/docs/deployment/https.md
* For HTTPS, **the server** needs to **have "certificates"** generated by a **third party**. * Those certificates are actually **acquired** from the third party, not "generated". * Certificates have a **lifetime**. * They **expire**. * And then they need to be **renewed**, **acquired again** from the third party. * The encryption of the connection happens at the **TCP level**. * That's one layer **below HTTP**.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 14K bytes - Click Count (0) -
.github/workflows/scorecard.yml
# This workflow uses actions that are not certified by GitHub. They are provided # by a third-party and are governed by separate terms of service, privacy # policy, and support documentation. name: Scorecard supply-chain security on: # For Branch-Protection check. Only the default branch is supported. See # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection branch_protection_rule:
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Wed Apr 01 22:02:44 GMT 2026 - 2.9K bytes - Click Count (0) -
docs/kms/IAM.md
The root credentials can now be changed easily. > Does this mean I need an enterprise KMS setup to run MinIO (securely)? No, MinIO does not depend on any third-party KMS provider. You have three options here: - Run MinIO without a KMS. In this case all IAM data will be stored in plain-text. - Run MinIO with a single secret key. MinIO supports a static cryptographic key
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 5.3K bytes - Click Count (0) -
docs/sts/dex.yaml
# path is provided, dex's HTTP service will listen at a non-root URL. issuer: http://127.0.0.1:5556/dex # The storage configuration determines where dex stores its state. Supported # options include SQL flavors and Kubernetes third party resources. # # See the storage document at Documentation/storage.md for further information. storage: type: sqlite3 config: file: examples/dex.db # Configuration for the HTTP endpoints. web:
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Wed Jul 15 11:55:55 GMT 2020 - 2.7K bytes - Click Count (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
That's what would happen to a third party application that tried to access one of these *path operations* with a token provided by a user, depending on how many permissions the user gave the application. ## About third party integrations { #about-third-party-integrations } In this example we are using the OAuth2 "password" flow.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 13.4K bytes - Click Count (0)