Remove tags pki
article thumbnail

Setting up K8s on AWS with Kubeadm and Manual Certificate Distribution

Scott Lowe

Assigning the correct tags to AWS resources as required by the AWS cloud provider. Before adding more control planes, it is necessary to pull down the certificates from the S3 bucket using the aws s3 cp command into the /etc/kubernetes/pki directory (if you didn’t copy them across directly using scp ).

Cloud 60
article thumbnail

Comparing X.509 Certificates with SSI

Phil Windley

But the hierarchical public key infrastructure (PKI) of X.509 DIDDocs don't have anything like PKI. 509 certificate is usually determined from the strictly hierarchical public key infrastructure (PKI). 509 pki decentralized+identifiers. Tags: ssi identity x.509 509 is meant to attest to the veracity of the the X.509

Banking 137
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Comparing X.509 Vertificates with SSI

Phil Windley

But the hierarchical public key infrastructure (PKI) of X.509 DIDDocs don't have anything like PKI. 509 certificate is usually determined from the strictly hierarchical public key infrastructure (PKI). 509 pki decentralized+identifiers. Tags: ssi identity x.509 509 is meant to attest to the veracity of the the X.509

Banking 98
article thumbnail

Kubernetes, Kubeadm, and the AWS Cloud Provider

Scott Lowe

Kubernetes-specific tags on resources needed by the cluster. etcd: external: endpoints: - [link] - [link] - [link] caFile: /etc/kubernetes/pki/etcd/ca.crt certFile: /etc/kubernetes/pki/apiserver-etcd-client.crt keyFile: /etc/kubernetes/pki/apiserver-etcd-client.key kubernetesVersion: v1.13.2 16 serviceSubnet: 10.96.0.0/12

Cloud 60
article thumbnail

The Ukrainian War, PKI, and Censorship

Phil Windley

Summary: PKI has created a global trust framework for the web. To review briefly, certificate authorities are key players in public key infrastructure (PKI) and are an example of a core internet service that is distributed and hierarchical. The war in Ukraine has made hypothetical worries about the robustness of the PKI all too real.

Internet 112
article thumbnail

Using OpenID4VC for Credential Exchange

Phil Windley

The verifiable data registry (VDR) in an OpenID4VC credential exchange might be a ledger or other decentralized data store if the presentation uses DIDs, or it might be obtained using PKI or web-pages accessible under a domain name controlled by the issuer. Tags: identity ssi openid verifiable+credentials.

article thumbnail

Identity, Sovrin, and the Internet of Things

Phil Windley

The answer, from the paper, is to use PKI and certificates to solve the problem. I wrote in Sovrin Web of Trust : PKI is good for one thing on the Web: showing the public key used to secure HTTP transmissions is correct. Tags: sovrin iot security iiw identity pki trust web+of+trust. Sovrin is provides that. Let's talk.