. servervariables ["instance_meta_path"]Metadatabase path of the IIS instance that responds to the request
Request. servervariables ["http_accept_encoding"]Returned content, such as gzip and deflate
Request. servervariables ["http_accept_language"]Returned content, for example, en-US
Request. servervariables ["http_connection"]Returned content: keep-alive
Request. servervariables ["http_cookie"]
Request. servervariables ["http_user_agent"]Returned content: Mozilla/4.0 [compatible; msie
("instance_meta_path ")Metadatabase path of the IIS instance that responds to the request
Request. servervariables ("http_accept_encoding ")Returned content, such as gzip and deflate
Request. servervariables ("http_accept_language ")Returned content, for example, en-US
Request. servervariables ("http_connection ")Returned content: keep-alive
Request. servervariables ("http_cookie ")Returned content, for example, nvisit % 2 dyum = 125; aspsessionidcartqtra = bytes; aspsessionidcaqqtsulfate = lkj
authentication dialog box of the client. This variable is available only when basic authentication is used.
Auth_type
When a user accesses a protected script, the server is used to verify the user's authentication method.
Auth_user
Unauthenticated User Name.
Cert_cookie
The unique ID verified by the client, which is returned as a string. It can be used as a signature for verification by the entire client.
a string. It can be used as a signature for verification by the entire client.
CERT_FLAGS
If a client is verified, bit0 is 1.
If the authenticated by the client is invalid (not in the CA list recognized by the server), bit1 is set to 1.
CERT_ISSUER
The issuer field in user verification (O = MS, OU = IAS, CN = user name, C = USA ).
CERT_KEYSIZE
Number of digits of the Secure Socket Layer connection key
.
Although the create user can be used to create a user, it only creates a user and does not assign sub-configuration permissions to the user. Therefore, it is generally replaced by the grant command.
2, grant
Syntax:
GRANTPriv_type [(column_list)][, Priv_type [(column_list)]...ON [object_type] priv_levelTO user_specification [, user_specification]...[REQUIRE {NONE | ssl_option [[AND] ssl_option]...}][WITH with_option...]
Object_type:TABLE| FUNCTION| PROCEDURE
Priv_level:*| *.*| Db_name .*| Db_n
= '33' or user = '44'/G; // Check the user in mysql.
Although the create user can be used to create a user, it only creates a user and does not assign sub-configuration permissions to the user. Therefore, it is generally replaced by the grant command.
2, grant
Syntax:
GRANT
Priv_type [(column_list)]
[, Priv_type [(column_list)]...
ON [object_type] priv_level
TO user_specification [, user_specification]...
[REQUIRE {NONE | ssl_option [[AND] ssl_option]...}]
[WITH with_option...]
Object_typ
. note: The SSL session is based on the IP address: it cannot be implemented on an FQDN-based virtual host.
X509.3 certificate format
Certificate format version number certificate serial number Certificate Signature algorithm certificate issuer validity period Holder's Name Holder's public key ca id holder's ID other extended information basic constraints certificate policy Key Usage restrictions CA signature
PKI (Public Key
then the receiving party makes a hash calculation of the received information, and compares it with the hash value received to see if it matches.If the match is true, the information has not been modified during transmission.If the mismatch indicates that the encrypted data has been deliberately modified, interrupt the call process and do other processing immediately.The composition and principle of the certificate:Part of the composition (most of the content):1.
accessing protocol. It is based on the X.500 standard, but it is much simpler and can be customized as needed. LDAP is not a database but a protocol used to access information stored in an information directory (that is, an LDAP directory). That is, "by using LDAP, you can read (or store) data in the right place in the information directory," and LDAP is primarily optimized for data read performance. Unlike X.500, LDAP supports TCP/IP, which is necessary for accessing the Internet.Third, what f
consistent hash. Dynamo uses the quorum mechanism to manage replicas.9. The lease mechanism is the most important distributed protocol, which is widely used in various practical distributed systems. 1) lease is usually defined as an agreement by the issuer to give the holder a certain right within a certain period of time. 2) Lease expresses the issuer's commitment within a certain period of time, as long as the unexpired
It's interesting to see a piece of code in the Kite Project today.//Generatetoken Returns a JWT token string. Please see the URL for details:// http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-13#section -4.1Func Generatetoken (AUD, username, issuer, Privatekeystring) (string, error) {Tokencachemu.lock () defer tokencachemu.unlock () Uniqkey:= AUD + username + Issuer//neglect Privatekey, its alway
On the first day of work, found that the certificate on the computer prompt: "The issuer of this certificate is invalid" and Enterprise version packaging is an error, but dare not all deleted, especially the enterprise certificate is not dry deleted, afraid before the application can not be used, ask the big God to see how this is going
Workaround:1, follow your link to download, Https://developer.apple.com/certificationauthority/AppleWWDRCA.cer, a
. Certificate: server will "carry the digital certificate of its own public key information" and the entire chain to the root CA through Certificate message sent to SSL Client (entire Public key file sent past)1) The client can use the public key to verify the identity of the serverThe messages in the certificate include:In general, the client receives a certificate chain, the first one is the server's certificate, followed by the server certificate issuer
") metabase path of the IIS instance in response to the requestRequest. servervariables ("http_accept_encoding") returns content such as gzip and deflate.Request. servervariables ("http_accept_language") returns the content, for example, en-us.Request. servervariables ("http_connection") return content: keep-aliveRequest. servervariables ("http_cookie") returns content such as nvisit %2 dyum = 125; aspsessionidcartqtra = large; aspsessionidcaqqtsulfate = lkjjplabillpcogjgamkam; aspsessionidacrrs
IntroductionCommand mode, I feel "command" is the task, executed the command to complete a task. In other words, the command is a task, and we do not know from this name who the issuer and the recipient are, and for what? Because we do not care who they are, the person who issued the order, can continue to do other things, accept the order of the people to carry out the task, do not need you to give orders, but also to supervise us to complete, as lon
Just came back to work, encountered such a problem:
Describe your problemOn the first day of work, found that the certificate on the computer prompt: "The issuer of this certificate is invalid" and Enterprise version packaging is an error, but do not dare to delete, especially the Enterprise certificate does not delete, afraid before the application can not be used, ask the big God to see how this is going!
Paste the relevant code
P
authorize another certificate authority to issue a certificate, so that a certificate chain appears.IE browser in the verification of the certificate is mainly from the following three aspects, as long as any one of the unsatisfied will give a warning
Whether the issuer of the certificate is in the list of root trusted certification authorities
Whether the certificate expires
Whether the holder of the certificate is consistent with t
Certificate FormatCertificate Format version number certificate serial number Certificate Signature Algorithm Certificate Issuer validity period holder's name holder's public key ca id holder's ID other extended information basic constraints certificate policy Key Usage Restrictions CA Signature
PKI (Public Key Infrastructure)
Client entity (Applicant) Registration Institution (RC) Visa institution (CA) --> visa institution (CA) Certificate Revoca
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.