OpenShift Container Platform 4.8 CLI 工具
[https://localhost:8443]: https://openshift.example.com:6443 1 The server uses a certificate signed by an unknown authority. You can bypass the certificate check, but any data you send to the server could be intercepted oc config set-cluster[--server= ] [--certificate-authority= certificate/authority>] [--api-version= ] [--insecure-skip-tls-verify=true] 第 第 2 章 要使用的实际集群信息决定。此时,您可能没有集群信息。集群信息的每个信息根据以下流程中 的第一个匹配项构建: 以下命令行选项中的任何值: --server, --api-version --certificate-authority --insecure-skip-tls-verify 如果集群信息和属性的值存在,则使用它。 如果您没有服务器位置,则出现错误。 要使用的实际用户信息是确定的。用户使用与 0 码力 | 152 页 | 1.24 MB | 1 年前3OpenShift Container Platform 4.10 CLI 工具
[https://localhost:8443]: https://openshift.example.com:6443 1 The server uses a certificate signed by an unknown authority. You can bypass the certificate check, but any data you send to the server could be intercepted oc config set-cluster[--server= ] [--certificate-authority= certificate/authority>] [--api-version= ] [--insecure-skip-tls-verify=true] 第 第 2 章 要使用的实际集群信息决定。此时,您可能没有集群信息。集群信息的每个信息根据以下流程中 的第一个匹配项构建: 以下命令行选项中的任何值: --server, --api-version --certificate-authority --insecure-skip-tls-verify 如果集群信息和属性的值存在,则使用它。 如果您没有服务器位置,则出现错误。 要使用的实际用户信息是确定的。用户使用与 0 码力 | 120 页 | 1.04 MB | 1 年前3OpenShift Container Platform 4.13 CLI 工具
[https://localhost:8443]: https://openshift.example.com:6443 1 The server uses a certificate signed by an unknown authority. You can bypass the certificate check, but any data you send to the server could be intercepted oc config set-cluster[--server= ] [--certificate-authority= certificate/authority>] [--api-version= ] [--insecure-skip-tls-verify=true] $ oc config 要使用的实际集群信息决定。此时,您可能没有集群信息。集群信息的每个信息根据以下流程中 的第一个匹配项构建: 以下命令行选项中的任何值: --server, --api-version --certificate-authority users: - name: alice/openshift1.example.com user: token: ns7yVhuRNpDM9cgzfhhxQ7bM5s7N2ZVrkZepSRf4LC0 0 码力 | 128 页 | 1.11 MB | 1 年前3httpd 2.2.31 中文文档
message signature really was signed by the private key that belongs to Alice. If each party has a certificate which validates the other's identity, confirms the public key and is signed by a trusted agency think they are. Such a trusted agency is called a Certificate Authority and certificates are used for authentication. Certificate Contents A certificate associates a public key with the real identity of includes the identification and signature of the Certificate Authority that issued the certificate and the period of time during which the certificate is valid. It may have additional information (or extensions)0 码力 | 1860 页 | 1.48 MB | 1 年前3httpd 2.2.29 中文文档
message signature really was signed by the private key that belongs to Alice. If each party has a certificate which validates the other's identity, confirms the public key and is signed by a trusted agency think they are. Such a trusted agency is called a Certificate Authority and certificates are used for authentication. Certificate Contents A certificate associates a public key with the real identity of includes the identification and signature of the Certificate Authority that issued the certificate and the period of time during which the certificate is valid. It may have additional information (or extensions)0 码力 | 1854 页 | 1.48 MB | 1 年前3httpd 2.2.27 中文文档
message signature really was signed by the private key that belongs to Alice. If each party has a certificate which validates the other's identity, confirms the public key and is signed by a trusted agency think they are. Such a trusted agency is called a Certificate Authority and certificates are used for authentication. Certificate Contents A certificate associates a public key with the real identity of includes the identification and signature of the Certificate Authority that issued the certificate and the period of time during which the certificate is valid. It may have additional information (or extensions)0 码力 | 1849 页 | 1.47 MB | 1 年前3httpd 2.2.27.dev 中文文档
message signature really was signed by the private key that belongs to Alice. If each party has a certificate which validates the other's identity, confirms the public key and is signed by a trusted agency think they are. Such a trusted agency is called a Certificate Authority and certificates are used for authentication. Certificate Contents A certificate associates a public key with the real identity of includes the identification and signature of the Certificate Authority that issued the certificate and the period of time during which the certificate is valid. It may have additional information (or extensions)0 码力 | 1849 页 | 1.47 MB | 1 年前3httpd 2.4.33 中文文档
validation status of a client certificate. The default responder is configurable, along with the decision on whether to prefer the responder designated in the client certificate itself. mod_ssl now also supports supports OCSP stapling, where the server pro-actively obtains an OCSP verification of its certificate and transmits that to the client during the handshake. mod_ssl can now be configured to share SSL Session address matched is used for SSL connections. This is significant because the vhost determines which certificate the server will use for the connection. If the request contains a Host: header field, the list0 码力 | 2692 页 | 3.12 MB | 1 年前3httpd 2.4.23 中文文档
validation status of a client certificate. The default responder is configurable, along with the decision on whether to prefer the responder designated in the client certificate itself. mod_ssl now also supports supports OCSP stapling, where the server pro-actively obtains an OCSP verification of its certificate and transmits that to the client during the handshake. mod_ssl can now be configured to share SSL Session address matched is used for SSL connections. This is significant because the vhost determines which certificate the server will use for the connection. If the request contains a Host: header field, the list0 码力 | 2559 页 | 2.11 MB | 1 年前3httpd 2.4.25 中文文档
validation status of a client certificate. The default responder is configurable, along with the decision on whether to prefer the responder designated in the client certificate itself. mod_ssl now also supports supports OCSP stapling, where the server pro-actively obtains an OCSP verification of its certificate and transmits that to the client during the handshake. mod_ssl can now be configured to share SSL Session address matched is used for SSL connections. This is significant because the vhost determines which certificate the server will use for the connection. If the request contains a Host: header field, the list0 码力 | 2573 页 | 2.12 MB | 1 年前3
共 235 条
- 1
- 2
- 3
- 4
- 5
- 6
- 24