CIS 1.6 Benchmark - Self-Assessment Guide - Rancher v2.5.4
directory and file ownership is set to root:root (Automated) 1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 644 or more restrictive (Automated) 1.1.21 Ensure that the Kubernetes Ensure that the --kubelet-client-certificate and -- kubelet-client-key arguments are set as appropriate (Automated) 1.2.6 Ensure that the --kubelet-certificate-authority argument is set as appropriate (Automated) to true (Automated) 2.7 Ensure that a unique Certificate Authority is used for etcd (Automated) 3.1 Authentication and Authorization 3.1.1 Client certificate authentication should not be used for users0 码力 | 132 页 | 1.12 MB | 1 年前3Hyperledger Fabric 1.4.9 Documentation
trust models. For instance, when deployed within a single enterprise, or operated by a trusted authority, fully byzantine fault tolerant consensus might be considered unnecessary and an excessive drag Membership Service Provider instances allowing for crypto materials to be derived from different certificate authorities See the Ledger topic for a deeper dive on the databases, storage structure, and “query-ability transaction ordering into blocks for distribution. Each of the four organizations has a preferred Certificate Authority. Creating the Network Let’s start at the beginning by creating the basis for the network:0 码力 | 701 页 | 9.02 MB | 1 年前3Hyperledger Fabric 1.4 Documentation
trust models. For instance, when deployed within a single enterprise, or operated by a trusted authority, fully byzantine fault tolerant consensus might be considered unnecessary and an excessive drag Membership Service Provider instances allowing for crypto materials to be derived from different certificate authorities See the Ledger topic for a deeper dive on the databases, storage structure, and “query-ability transaction ordering into blocks for distribution. Each of the four organizations has a preferred Certificate Authority. Creating the Network Let’s start at the beginning by creating the basis for the network:0 码力 | 701 页 | 9.02 MB | 1 年前3Hyperledger Fabric 1.4.8 Documentation
trust models. For instance, when deployed within a single enterprise, or operated by a trusted authority, fully byzantine fault tolerant consensus might be considered unnecessary and an excessive drag Membership Service Provider instances allowing for crypto materials to be derived from different certificate authorities See the Ledger topic for a deeper dive on the databases, storage structure, and “query-ability transaction ordering into blocks for distribution. Each of the four organizations has a preferred Certificate Authority. Creating the Network Let’s start at the beginning by creating the basis for the network:0 码力 | 699 页 | 9.02 MB | 1 年前3Hyperledger Fabric 2.2.1 Documentation
trust models. For instance, when deployed within a single enterprise, or operated by a trusted authority, fully byzantine fault tolerant consensus might be considered unnecessary and an excessive drag applications and smart contracts. The network also supports the ability to deploy your network using Certificate Authorities, in addition to cryptogen. For more information about this network, check out Using Membership Service Provider instances allowing for crypto materials to be derived from different certificate authorities See the Ledger topic for a deeper dive on the databases, storage structure, and “query-ability0 码力 | 848 页 | 11.56 MB | 1 年前3Hyperledger Fabric 1.1 Documentation
com/hyperledger/fabric-sdk-rest]. Hyperledger Fabric CA Hyperledger Fabric provides an optional certificate authority service [http://hyperledger-fabric-ca.readthedocs.io/en/latest] that you may choose to use Membership Service Provider instances allowing for crypto materials to be derived from different certificate authorities See the Ledger topic for a deeper dive on the databases, storage structure, and “query-ability a network able to consume services — has a digitial identity encapsulated in an X.509 digital certificate. These identities really matter because they determine the exact permissions over resources and0 码力 | 422 页 | 4.84 MB | 1 年前3Hyperledger Fabric 2.0 Documentation
trust models. For instance, when deployed within a single enterprise, or operated by a trusted authority, fully byzantine fault tolerant consensus might be considered unnecessary and an excessive drag applications and smart contracts. The network also supports the ability to deploy your network using Certificate Authorities, in addition to cryptogen. For more information about this network, check out Using Membership Service Provider instances allowing for crypto materials to be derived from different certificate authorities See the Ledger topic for a deeper dive on the databases, storage structure, and “query-ability0 码力 | 821 页 | 10.22 MB | 1 年前3Hyperledger Fabric 1.4.9 Documentation
trust models. For instance, when deployed within a single enterprise, or operated by a trusted authority, fully byzantine fault tolerant consensus might be considered unnecessary and an excessive drag Membership Service Provider instances allowing for crypto materials to be derived from different certificate authorities See the ledger topic for a deeper dive on the databases, storage structure, and “query-ability transaction ordering into blocks for distribution. Each of the four organizations has a preferred Certificate Authority. 4.4.3 Creating the Network Let’s start at the beginning by creating the basis for the network:0 码力 | 483 页 | 7.48 MB | 1 年前3Hyperledger Fabric 1.4 Documentation
trust models. For instance, when deployed within a single enterprise, or operated by a trusted authority, fully byzantine fault tolerant consensus might be considered unnecessary and an excessive drag Membership Service Provider instances allowing for crypto materials to be derived from different certificate authorities See the ledger topic for a deeper dive on the databases, storage structure, and “query-ability transaction ordering into blocks for distribution. Each of the four organizations has a preferred Certificate Authority. 4.4.3 Creating the Network Let’s start at the beginning by creating the basis for the network:0 码力 | 483 页 | 7.48 MB | 1 年前3Hyperledger Fabric 1.4.8 Documentation
trust models. For instance, when deployed within a single enterprise, or operated by a trusted authority, fully byzantine fault tolerant consensus might be considered unnecessary and an excessive drag Membership Service Provider instances allowing for crypto materials to be derived from different certificate authorities See the ledger topic for a deeper dive on the databases, storage structure, and “query-ability transaction ordering into blocks for distribution. Each of the four organizations has a preferred Certificate Authority. 4.4.3 Creating the Network Let’s start at the beginning by creating the basis for the network:0 码力 | 483 页 | 7.48 MB | 1 年前3
共 1000 条
- 1
- 2
- 3
- 4
- 5
- 6
- 100