hsm
Here are 110 public repositories matching this topic...
-
Updated
Mar 26, 2021 - C++
Instead of having 3 parameters to handle HSM vs non-HSM, signed vs unsigned and testnet vs mainnet, we should we have a single parameter (which picks among 4 profiles).
The 4 profiles would be:
dev-without-hsm= no HSM, btc-testnetdev-with-hsm= HSM, unsigned, btc-testnetstaging= HSM, signed, btc-testnetprod= HSM, signed, btc-mainnet
-
Updated
Mar 28, 2021 - Java
-
Updated
Aug 12, 2019 - C#
-
Updated
Mar 22, 2021 - C
-
Updated
Apr 24, 2021 - Java
This issue was migrated from Pagure Issue #3199. Originally filed by rcritten (@rcritten) on 2020-08-03 15:59:52:
- Assigned to nobody
IPA can be installed in a CA-less configuration with the user providing the certificates required for operation. Running ipa-healthcheck with this will generate quite a few pk
-
Updated
Mar 29, 2021 - Python
-
Updated
Feb 29, 2020
-
Updated
Apr 7, 2019 - Python
-
Updated
Apr 21, 2021 - C
-
Updated
Apr 25, 2021 - Java
-
Updated
Mar 27, 2021 - C
-
Updated
Nov 3, 2020 - Python
-
Updated
Nov 5, 2018 - OCaml
-
Updated
Feb 19, 2021 - Go
-
Updated
Apr 19, 2021 - Go
-
Updated
Jul 9, 2019 - Python
-
Updated
Mar 28, 2021 - C++
-
Updated
Sep 15, 2020 - Python
Improve this page
Add a description, image, and links to the hsm topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the hsm topic, visit your repo's landing page and select "manage topics."
Is your feature request related to a problem? Please describe.
Vault has backends for AWS like dynamo and s3. However to use them you should provide credentials. AWS support 2 solutions to eliminate this. IAM roles for Service Accounts and Instance profile roles.
Due to some unknown reason vault requires more time to start when using dynamic creds than explicit definition keys in s3 block o