-
Updated
Jul 28, 2021 - Shell
pki
Here are 374 public repositories matching this topic...
-
Updated
Aug 13, 2021 - Go
-
Updated
Aug 11, 2021 - PowerShell
-
Updated
Jul 22, 2021 - JavaScript
-
Updated
Aug 15, 2021 - Jinja
-
Updated
Jun 30, 2020 - Go
-
Updated
Aug 14, 2021 - Go
-
Updated
Jul 27, 2021
-
Updated
May 10, 2021 - Go
-
Updated
Aug 14, 2021 - Perl
-
Updated
Jun 2, 2021 - Python
-
Updated
Aug 12, 2021 - Java
-
Updated
Aug 4, 2021 - PowerShell
-
Updated
Apr 26, 2021 - JavaScript
-
Updated
Nov 8, 2020 - C#
-
Updated
Aug 12, 2021 - C
This issue was migrated from Pagure Issue #3199. Originally filed by rcritten (@rcritten) on 2020-08-03 15:59:52:
- Assigned to nobody
IPA can be installed in a CA-less configuration with the user providing the certificates required for operation. Running ipa-healthcheck with this will generate quite a few pk
-
Updated
May 8, 2021 - Go
-
Updated
Oct 14, 2020 - Go
During our last meeting, we discussed how should the server/the client compute the commitment:
-
Main concern: server is using a static salt which would allow an attacker to test whether keys exist in the tree
=> client sends salt along with the registration
=> need secure PRNG -
How to ensure the server is using the right commitment scheme? Client should verify with the scheme specified
CertificateImport: Remove non-mandatory parameter `Ensure` from the `Get-TargetResource` function
Details of the scenario you tried and the problem that is occurring:
In the resource CertificateImport there should be no need to have the non-mandatory parameter Ensure in the Get-TargetResource function.
-
Updated
Aug 13, 2021 - Java
Improve this page
Add a description, image, and links to the pki topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the pki topic, visit your repo's landing page and select "manage topics."


What would you like to be added
I'd like to have the option to not have the HSM pin stored in a configuration file, but instead be required to be entered manually by an operator each time the CA is started.
Why this is needed
Having HSM pins sitting on the file system weakens the security in cases of hardware being stolen.
In theory if the PIN is not known then stealing a server a