The Vitess 12.0 Documentation
./easyrsa init-pki Note: using Easy-RSA configuration from: /home/user/CA/vars init-pki complete; you may now create a CA or requests. Your newly created PKI dir is: /home/user/CA/pki $ ./easyrsa build-ca now import and sign cert requests. Your new CA certificate file for publishing is at: /home/user/CA/pki/ca.crt Your CA is now configured and you should be able to generate certs easily now. Application Generating a RSA private key ............................+++++ writing new private key to '/home/user/CA/pki/easy-rsa -178308.W6uc3G/tmp.Iqlvgf' ----- You are about to be asked to enter information that will0 码力 | 534 页 | 3.32 MB | 1 年前3Hyperledger Fabric 1.1 Documentation
509 certificates as identities, adopting a traditional Public Key Infrastructure (PKI) hierarchical model (more on PKI later). A Simple Scenario to Explain the Use of an Identity Imagine that you visit work together in the same way — a PKI provides a list of identities, and an MSP says which of these are members of a given organization that participates in the network. PKI certificate authorities and MSPs MSPs provide a similar combination of functionalities. A PKI is like a card provider — it dispenses many different types of verifiable identities. An MSP, on the other hand, is like the list of card providers0 码力 | 422 页 | 4.84 MB | 1 年前3Hyperledger Fabric 1.1 Documentation
509 certificates as identities, adopting a traditional Public Key Infrastructure (PKI) hierarchical model (more on PKI later). 2.4.2 A Simple Scenario to Explain the Use of an Identity Imagine that you work together in the same way — a PKI provides a list of identities, and an MSP says which of these are members of a given organization that participates in the network. PKI certificate authorities and MSPs MSPs provide a similar combination of functionalities. A PKI is like a card provider — it dispenses many different types of verifiable identities. An MSP, on the other hand, is like the list of card providers0 码力 | 277 页 | 3.21 MB | 1 年前3ubuntu server guide
“database” directory. Depending on the application, it can be in the following places by default: • ~/.pki/nssdb/pkcs11.txt This is where the system-provided libnss3 library will look by default. • ~/snap/firefox/common/ the system NSS libraries. For these examples, we will be using the configuration file located in ~/.pki/nssdb/pkcs11.txt. As noted before, depending on the application this file can be in another directory which has the necessary tools we will need: sudo apt install libnss3-tools If you don’t have a ~/.pki/nssdb directory yet, it will have to be created first. For that, we will use the certutil command,0 码力 | 486 页 | 3.33 MB | 1 年前3Hyperledger Fabric 1.2 Documentation
will take you through the critical role identities play in a Fabric network (using an established PKI structure and x.509 certificates). • Membership (conceptual documentation) Talks through the role 509 certificates as identities, adopting a traditional Public Key Infrastructure (PKI) hierarchical model (more on PKI later). 4.5.2 A Simple Scenario to Explain the Use of an Identity Imagine that you work together in the same way — a PKI provides a list of identities, and an MSP says which of these are members of a given organization that participates in the network. PKI certificate authorities and MSPs0 码力 | 335 页 | 4.48 MB | 1 年前3Hyperledger Fabric 1.2 Documentation
will take you through the critical role identities play in a Fabric network (using an established PKI structure and x.509 certificates). Membership (conceptual documentation) Talks through the role of 509 certificates as identities, adopting a traditional Public Key Infrastructure (PKI) hierarchical model (more on PKI later). A Simple Scenario to Explain the Use of an Identity Imagine that you visit work together in the same way — a PKI provides a list of identities, and an MSP says which of these are members of a given organization that participates in the network. PKI certificate authorities and MSPs0 码力 | 497 页 | 6.59 MB | 1 年前3Hyperledger Fabric 1.3 Documentation
will take you through the critical role identities play in a Fabric network (using an established PKI structure and x.509 certificates). Membership (conceptual documentation) Talks through the role of 509 certificates as identities, adopting a traditional Public Key Infrastructure (PKI) hierarchical model (more on PKI later). A Simple Scenario to Explain the Use of an Identity Imagine that you visit work together in the same way — a PKI provides a list of identities, and an MSP says which of these are members of a given organization that participates in the network. PKI certificate authorities and MSPs0 码力 | 528 页 | 6.85 MB | 1 年前3Hyperledger Fabric 1.3 Documentation
will take you through the critical role identities play in a Fabric network (using an established PKI structure and x.509 certificates). • Membership (conceptual documentation) Talks through the role 509 certificates as identities, adopting a traditional Public Key Infrastructure (PKI) hierarchical model (more on PKI later). 4.5.2 A Simple Scenario to Explain the Use of an Identity Imagine that you work together in the same way — a PKI provides a list of identities, and an MSP says which of these are members of a given organization that participates in the network. PKI certificate authorities and MSPs0 码力 | 367 页 | 4.95 MB | 1 年前3CIS 1.6 Benchmark - Self-Assessment Guide - Rancher v2.5.4
etcd:etcd (Automated) 1.1.19 Ensure that the Kubernetes PKI directory and file ownership is set to root:root (Automated) 1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 644 or more more restrictive (Automated) 1.1.21 Ensure that the Kubernetes PKI key file permissions are set to 600 (Automated) 1.1.1 Ensure that the API server pod specification file permissions are set to 644 or more Expected Result: 'etcd:etcd' is present Returned Value: etcd:etcd 1.1.19 Ensure that the Kubernetes PKI directory and file ownership is set to root:root (Automated) Result: pass Remediation: Run the below0 码力 | 132 页 | 1.12 MB | 1 年前3Hyperledger Fabric 1.4.8 Documentation
will take you through the critical role identities play in a Fabric network (using an established PKI structure and x.509 certificates). Membership (conceptual documentation) Talks through the role of 509 certificates as identities, adopting a traditional Public Key Infrastructure (PKI) hierarchical model (more on PKI later). A Simple Scenario to Explain the Use of an Identity Imagine that you visit work together in the same way — a PKI provides a list of identities, and an MSP says which of these are members of a given organization that participates in the network. PKI certificate authorities and MSPs0 码力 | 699 页 | 9.02 MB | 1 年前3
共 170 条
- 1
- 2
- 3
- 4
- 5
- 6
- 17