Search results

  • revoke: ${CADEPS} ${item} @test -n $${item:?'usage: ${MAKE} revoke item=cert.pem'}
    12 KB (1,444 words) - 05:35, 7 July 2021
  • ...lid keys and one for the removed keys, so that the post-install script can revoke keys that may not be trusted anymore (be it for security reasons or because ...safe box). This is needed because anyone that owns the revocation key can revoke the corresponding key.
    13 KB (2,379 words) - 12:15, 3 July 2021
  • === Revoke a certificate === Over time, it may become necessary to revoke a certificate thus denying access to the affected user(s). This example rev
    12 KB (1,823 words) - 20:16, 14 December 2021
  • * Revoke git access for gerardo
    2 KB (300 words) - 09:26, 5 July 2020
  • ## Run: {{ic|gpg -o ~/.gnupg/pierre@archlinux.de-revoke.asc --gen-revoke pierre@archlinux.de}}
    3 KB (414 words) - 07:10, 28 May 2021
  • You may wish to revoke suspend and hibernate permissions using [[Polkit]].
    4 KB (645 words) - 14:41, 21 June 2021
  • ...oot password, which is an inconvenience to everyone else; you only need to revoke that user's sudo access.
    5 KB (679 words) - 05:47, 7 July 2021
  • ...legally purchased - on their computers. Although the industry was able to revoke the first leaked decryption keys, new keys are regularly published in a cat This is part of the AACS protection scheme: editors are able to revoke old software player host keys that have leaked on the Internet and distribu
    18 KB (3,070 words) - 12:05, 23 January 2022
  • session optional pam_keyinit.so force revoke
    8 KB (1,105 words) - 20:34, 2 April 2021
  • ...OK". If the dialog was never presented, try Settings > Developer Options > Revoke USB Debugging Authorizations (then "OK"), and repeat the steps in this sect
    7 KB (1,134 words) - 05:59, 5 December 2021
  • ...proves security, as it is fast and easy to respond to security threats and revoke a compromised passphrase ...n decrypts the underlying data. This approach allows the user to change or revoke these keys as required ''without'' needing to re-encrypt the data, as the m
    17 KB (2,447 words) - 12:56, 15 July 2021
  • '''session optional pam_keyinit.so force revoke'''
    7 KB (1,029 words) - 17:39, 16 November 2021
  • > revkey # revoke a key *Anybody having access to your revocation certificate can revoke your key, rendering it useless.
    32 KB (3,941 words) - 15:50, 14 July 2021
  • .../}}. The filename of the certificate is the fingerprint of the key it will revoke. $ gpg --gen-revoke --armor --output ''revcert.asc'' ''user-id''
    49 KB (7,878 words) - 09:18, 23 January 2022
  • .../}}. The filename of the certificate is the fingerprint of the key it will revoke. $ gpg --gen-revoke --armor --output ''revcert.asc'' ''user-id''
    50 KB (7,774 words) - 12:27, 22 December 2021
  • > revkey # revoke a key *Anybody having access to your revocation certificate can revoke your key, rendering it useless.
    36 KB (5,247 words) - 07:27, 6 November 2021
  • ...ew key pair]] rather than use an existing one, so that you can selectively revoke the keys should something happen:
    11 KB (1,709 words) - 19:40, 2 January 2021
  • If it is intended to use multiple keys and change or revoke them, the {{ic|--key-slot}} or {{ic|-S}} option may be used to specify the ...the LUKS-encrypted partitions' passphrases becomes compromised, you must revoke it on ''every'' copy of the cryptheader, even those you have backed up. Oth
    47 KB (7,215 words) - 01:27, 30 December 2021
  • > revkey # revoke a key
    42 KB (6,266 words) - 15:43, 5 November 2021