-
Updated
May 16, 2022 - Shell
pki
Here are 408 public repositories matching this topic...
-
Updated
May 27, 2022 - Go
-
Updated
May 25, 2022 - PowerShell
-
Updated
May 20, 2022 - TypeScript
-
Updated
May 26, 2022 - Jinja
-
Updated
Apr 28, 2022
-
Updated
Apr 21, 2022 - Go
-
Updated
May 16, 2022 - Go
-
Updated
May 17, 2022 - Perl
-
Updated
May 26, 2022 - Java
-
Updated
May 9, 2022 - Go
-
Updated
May 3, 2022 - Python
-
Updated
May 27, 2022 - C
-
Updated
Sep 3, 2021 - PowerShell
-
Updated
May 20, 2022 - TypeScript
-
Updated
Jan 21, 2022 - C#
This issue was migrated from Pagure Issue #3199. Originally filed by rcritten (@rcritten) on 2020-08-03 15:59:52:
- Assigned to nobody
IPA can be installed in a CA-less configuration with the user providing the certificates required for operation. Running ipa-healthcheck with this will generate quite a few pk
-
Updated
May 24, 2022 - Go
-
Updated
May 8, 2021 - Go
-
Updated
Dec 14, 2021 - Shell
During our last meeting, we discussed how should the server/the client compute the commitment:
-
Main concern: server is using a static salt which would allow an attacker to test whether keys exist in the tree
=> client sends salt along with the registration
=> need secure PRNG -
How to ensure the server is using the right commitment scheme? Client should verify with the scheme specified
-
Updated
May 5, 2022 - Java
Improve this page
Add a description, image, and links to the pki topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the pki topic, visit your repo's landing page and select "manage topics."
The recommendation is to set
Cache-Control: private, no-storeon any endpoint with sensitive information. Because while you can protect the traffic with TLS, you also need to keep sensitive information out of a client's (unencrypted) HTTP cache. I'm not sure how relevant this is to the API context ofstep-cathough—I've never seen an HTTP client library that caches content. But I guess the poi