url
stringlengths
11
2.25k
text
stringlengths
88
50k
ts
timestamp[s]date
2026-01-13 08:47:33
2026-01-13 09:30:40
https://www.atlassian.com/fr/software/jira/service-management/product-guide/tips-and-tricks/premium-onboarding
Guide d'intégration Premium | Jira Service Management | Atlassian Close Afficher cette page dans votre langue  ? Toutes les langues Sélectionner votre langue 中文 Deutsch English Español Français Italiano 한국어 Nederlands 日本語 Português Pусский Polski Télécharger gratuitement Fonctionnalités Solutions Par cas d’usage Par capacité Par secteur Par cas d’usage Support informatique Opérations informatiques Équipes métier Service client Ressources humaines Par capacité Petites équipes Premium Enterprise Par secteur Technologie et télécommunications Services financiers Commerce Fabrication Back Tarifs Ressources Par type ITSM Guide produit Modèles Ressources supplémentaires Back Plus + Moins - Télécharger gratuitement Back Télécharger gratuitement Jira Service Management est désormais plus puissant que jamais dans le cadre de Service Collection. Offrez une expérience client exceptionnelle grâce à Rovo, Actifs et notre nouvelle application Customer Service Management. Essayer maintenant Page d'accueil des guides À propos de Jira Service Management Introduction Guide de démarrage rapide Gestion des demandes de service Gestion des incidents Gestion des problèmes Gestion des changements Gestion des services d'entreprise Gestion des connaissances Gestion des actifs et des configurations Trucs et astuces Guide des fonctionnalités d'AI Guide sur les fonctionnalités des analyses Guide sur les fonctionnalités des actifs Guide sur les fonctionnalités d'automatisation Guide sur les fonctionnalités de chat Guide sur les fonctionnalités des formulaires Guide des fonctions de l'agent de service virtuel Guide d'intégration des agents Guide d'intégration de Jira Guide d'intégration de l'offre Premium Guide des projets gérés par l'équipe Gestion des services RH Guide d'intégration Premium Présentation Ce guide est destiné à aider les administrateurs de l'édition Premium de Jira Service Management Cloud à intégrer les fonctionnalités Premium et à tirer le meilleur parti de leur licence Premium. Jira Service Management Premium est conçu pour vous aider à faire évoluer Jira Service Management dans le cloud en toute confiance grâce à des fonctionnalités avancées. Pour découvrir les points forts des fonctionnalités Premium, visionnez cette vidéo : Dans ce guide, nous allons passer en revue les fonctionnalités avancées de Premium en matière de gestion des incidents, des actifs et des configurations, des changements (ainsi que les fonctionnalité de la plateforme Premium), et comment vous pouvez les utiliser ! Gestion des incidents à grande échelle Jira Service Management Premium inclut de puissantes fonctionnalités de gestion des incidents qui vous permettent de réduire le travail manuel et de swarmer plus rapidement sur les incidents. Remarque : toutes les offres Jira Service Management Premium incluent Opsgenie. Pour pouvoir utiliser certaines de ces fonctionnalités, vous devez accéder à l'interface utilisateur d'Opsgenie, accessible via le menu produit dans le coin supérieur gauche. Création et orchestration automatisées des incidents Dans Jira Service Management Premium, vous pouvez résoudre tous les incidents majeurs en automatisant la création d'incidents majeurs, en notifiant rapidement les principales parties prenantes et en orchestrant la réponse aux incidents. Les règles d'incident vous permettent de personnaliser la façon dont les incidents sont créés et gérés en fonction d'instructions Si/Alors (If/Then) et de conditions correspondantes. Si des données d'alerte respectent des conditions spécifiées (règles d'incident), un incident est automatiquement créé et l'alerte brute est associée à l'incident. Découvrez comment créer automatiquement un incident grâce à des règles d'incident Téléconférences en cas d'incident Grâce aux téléconférences en cas d'incident, vous pouvez contrôler et coordonner la réponse aux incidents, et collaborer efficacement à l'aide du pont de vidéoconférence et d'autres outils de communication intégrés. Les appels vidéo et vocaux sont des outils essentiels qui vous permettent (à vous et à votre équipe) de réagir aux incidents majeurs et de communiquer facilement et directement avec les équipes concernées afin de résoudre les incidents majeurs le plus rapidement possible. Les principaux composants des téléconférences en cas d'incident dans Jira Service Management incluent des outils vidéo, un chat en direct avec un flux d'activité mis à jour en temps réel et des actions en cas d'incident, telles que l'ajout d'intervenants. Chat intégré Partage d'écran Ajouter des intervenants Chat intégré Bulle de discussionUtilisez le panneau de chat pour envoyer des messages aux autres utilisateurs pendant l'appel et suivre l'activité des participants. Pour ouvrir le panneau de chat, sélectionnez l'icône sous votre vidéo. Si le panneau de chat est fermé lorsqu'un nouveau message est envoyé, une notification apparaîtra sur la gauche de la page. Partage d'écran Partage d'écranLe partage d'écran vous permet de collaborer plus rapidement en cas d'incident. Pour partager un écran pendant une session, sélectionnez l'icône sous votre vidéo. Ajouter des intervenants Si vous en avez l'autorisation, vous pouvez ajouter des intervenants pendant une téléconférence. Sélectionnez Ajouter des intervenants dans l'onglet Participants du chat, et saisissez le nom de l'équipe/de l'intervenant pour ajouter un nouvel intervenant à l'incident. Le nombre maximum de participants par appel est de 50 utilisateurs. Découvrez comment définir les autorisations pour le centre de commande des incidents (ICC). Pour accéder aux téléconférences en cas d'incident, vous pouvez sélectionner « Join call » (Rejoindre un appel) ou « Start call » (Démarrer un appel) dans le champ Conference call (Téléconférence) de la section Details (Informations) à droite de la vue du ticket. Découvrez comment créer ou rejoindre une téléconférence à partir d'un incident Heartbeat Monitoring Dans Jira Service Management Premium, l'outil Heartbeats garantit que vos outils de surveillance sont entièrement connectés et fonctionnent correctement, afin que vous soyez en permanence informé de tout problème de connectivité. Heartbeats fournit une véritable alerte de bout en bout en s'assurant que les outils de surveillance sont connectés, ainsi qu'en surveillant l'achèvement des tâches et en alertant les équipes lorsque des tâches ad hoc sont incomplètes. Depuis l'interface utilisateur d'Opsgenie (accessible via le menu du produit en haut à gauche), accédez au menu des paramètres généraux. Sélectionnez ensuite Heartbeats dans le panneau de gauche. Ici, vous pouvez ajouter autant de contrôles Heartbeats que nécessaire pour surveiller les systèmes et les tâches. Découvrez comment configurer Heartbeats Alertes Intégrations d'alertes avancées Grâce à l' intégration avancée des alertes dans Jira Service Management Premium, vous pouvez connecter plus de 200 outils tiers à Jira Service Management. Cela est possible grâce à plusieurs types d'intégrations : Intégrations globales qui vous permettent d'acheminer les alertes vers différentes équipes Intégrations sortantes comme les webhooks sortants pour envoyer les alertes vers un autre outil ou terminal Intégrations bidirectionnelles qui synchronisent dans un sens comme dans l'autre Alertes à partir des intégrations à l'aide des filtres dans la vue avancée Notifications vocales En plus de vous fournir un contrôle plus précis sur les intégrations, Jira Service Management Premium vous permet de recevoir un nouveau type de notifications d'alerte (autre que les SMS et les notifications push mobiles), des notifications vocales , afin que vos agents ne passent à côté d'aucune alerte. Pour configurer vos notifications d'alerte : Dans votre projet de services, ouvrez Alerts (Alertes) dans la barre de navigation latérale. Vous serez redirigé vers Opsgenie. Depuis Opsgenie, accédez à Settings > Notifications (Paramètres > Notifications). Mettez à jour vos méthodes de contact en ajoutant un e-mail ou un numéro de téléphone. Configurez des règles de notification. En savoir plus sur les notifications vocales et par SMS Routage des appels entrants Jira Service Management Premium vous permet de vous inscrire pour distribuer les appels entrants et les connecter aux bonnes équipes au bon moment. Le routage des appels entrants gère le processus de distribution et de connexion des appels entrants en fonction de vos préférences en matière d'astreinte. Autrement dit, vous pouvez : veiller à ce que les clients reçoivent toujours une réponse, quel que soit le nombre de personnes d'astreinte, déjà engagées ou disponibles ; configurer vos plannings d'astreinte pour vous assurer que les bonnes personnes sont disponibles lorsqu'un client appelle ; localiser votre support et router les appels vers les bonnes régions (appels entrants). Le support linguistique peut lire les messages dans huit (8) langues différentes ; répondre à des appels dans votre navigateur grâce au système de réponse aux appels sur navigateur. En savoir plus sur le routage des appels entrants Plannings d'astreinte Un planning d'astreinte est utilisé pour déterminer qui est d'astreinte à un moment donné. Les plannings d'astreinte sont disponibles dans toutes les offres Jira Service Management, mais ils sont configurés depuis l'interface utilisateur d'Opsgenie, dans l'onglet Teams (Équipes) > On-call (Astreinte). Toutefois, dans Jira Service Management Premium, vous pouvez passer au niveau supérieur grâce à plusieurs règles de routage par équipe et à des étapes de remontée avancées (p. ex., avertir le prochain utilisateur d'un planning). En savoir plus sur la création d'un planning d'astreinte Vue Examen de l'incident L'identification de la cause de l'incident permet aux agents de mieux comprendre les étapes nécessaires pour résoudre cet incident, de réduire le MTTR (temps moyen de résolution) d'un incident et d'aider les agents à mieux répondre aux incidents. Grâce à la vue Examen de l'incident , vous pouvez voir tous les déploiements et commits qui ont mené à un incident, aider les agents à enquêter sur un incident, à en identifier la cause racine et à marquer le changement de code problématique comme cause potentielle de l'incident. Elle constitue également une source de référence unique pour tous les changements entre le dernier état stable du système et l'état actuel avec les perturbations. Ces changements peuvent être des déploiements de code, des changements d'infrastructure, des changements de configuration, des changements de feature flag ou des demandes de changements manuels créées dans le cadre des processus de gestion des changements. LoupePour accéder à la vue Examen de l'incident, sélectionnez un bouton « investigate » (Enquêter) lorsque vous consultez le ticket lors d'un incident majeur. Gestion flexible des actifs et de la configuration Dans Jira Service Management Premium, vous pouvez également accéder à Actifs pour aider vos équipes à suivre leurs actifs, leurs éléments de configuration et leurs ressources afin d'obtenir une visibilité sur les relations critiques entre les applications, les services, l'infrastructure sous-jacente et d'autres actifs clés. L'outil s'appuie sur Jira, offrant aux équipes un moyen simple et rapide d'associer les actifs et les éléments de configuration aux demandes de service, aux incidents, aux problèmes, aux changements et aux tickets pour obtenir un contexte utile. Pour commencer à utiliser Actifs, consultez ce guide d'intégration . Automatisation de la gestion des changements Dans Jira Service Management Premium, vous pouvez ajouter un gating de déploiement pour valider automatiquement les déploiements en fonction des risques liés au changement. Le gating (validation) du déploiement vous permet d'autoriser ou d'empêcher les déploiements à des points spécifiques du processus de gestion des changements en utilisant un outil de CI/CD préalablement connecté à Jira Service Management. Cela signifie que vous pouvez approuver automatiquement les changements à faible risque. Pour les changements à risque plus élevé, le déploiement sera interrompu, et les approbateurs seront informés qu'ils doivent réviser les enregistrements. Le simple fait d'ajouter une clé de ticket Jira Software au message du commit crée un enregistrement des changements, l'approuve automatiquement et fait passer le déploiement en production en quelques secondes. Pour utiliser le gating de déploiement, vous devez d'abord le configurer dans Jira Service Management, puis dans votre outil de CI/CD. Découvrez comment configurer le gating de déploiement Fonctionnalités de la plateforme Premium Certaines fonctionnalités concernent également les produits Atlassian en édition Premium. Dans ce guide, nous allons en citer quelques-unes qui sont les plus utiles à Jira Service Management. Analyse de l'administration Obtenez des informations sur l'utilisation des produits et les pratiques de sécurité grâce à un ensemble d'analyses effectuées dans les offres Premium de Jira Service Management, Jira Software et Confluence. Vous pouvez utiliser ces analyses pour suivre l'adoption de ces produits, prendre des décisions fondées sur les données concernant les personnes qui ont besoin d'accéder aux produits et évaluer la sécurité de votre organisation. Pour accéder à l'analyse de votre organisation : Accédez à admin.atlassian.com . Sélectionnez votre organisation si vous en avez plusieurs. Sélectionnez Sécurité > Analyse . Sandbox Une sandbox est un environnement isolé dans lequel vous pouvez tester et expérimenter avant d'apporter des modifications à la production. Une sandbox vous permet de tester et de contrôler le déploiement des mises à jour et des nouvelles applications dans une copie « sandbox » de votre environnement avant de le déployer dans toute l'entreprise. Bien que l'objectif premier d'une sandbox soit de tester les modifications, vous pouvez également en créer une afin de tester votre migration du serveur au cloud. Pour créer une sandbox : Accédez à admin.atlassian.com . Sélectionnez votre organisation si vous en avez plusieurs. Sélectionnez Produits > Sandbox. Sélectionnez Créer une sandbox (Create sandbox) . Choisissez un produit. Sélectionnez Create (Créer). Nous vous avertirons par e-mail ainsi que sur votre page Sandbox dès que votre sandbox sera prête (dans certains cas, la création de la sandbox peut prendre jusqu'à 30 minutes). Vous devez disposer des droits d'administrateur de l'organisation pour créer une sandbox. En savoir plus sur la configuration de la sandbox . Canaux de livraison Les canaux de livraison vous permettent de contrôler à quel moment et par quelles personnes les changements peuvent être déployés auprès des utilisateurs finaux. Grâce aux options permettant de contrôler les versions cloud d'Atlassian, votre gestion quotidienne de nos produits cloud est plus prévisible. Vous pouvez ainsi planifier les changements de produit à venir, vous y préparer et garantir leur succès. Il existe deux canaux de livraison différents : Continue Groupée Continue Les produits bénéficient des changements et des nouvelles fonctions dès que ceux-ci sont disponibles. Le canal de livraison par défaut des produits est celui de la livraison continue. Groupée Les produits sont modifiés de façon groupée le deuxième mardi de chaque mois. Les modifications sont intégrées à partir de 22h00 UTC. Vous ne pouvez pas modifier l'heure à laquelle vos produits seront modifiés. Pour changer de canal de livraison : Accédez à admin.atlassian.com . Sélectionnez votre organisation si vous en avez plusieurs. Sélectionnez Produits > Canaux de livraison . Trouvez votre produit dans le tableau et sélectionnez Changer de canal (Change track) . Choisissez le canal et sélectionnez Suivant . Sélectionnez Confirmer . Règles d'automatisation globales et multi-usages Grâce aux règles globales et multi-projets , les administrateurs peuvent évoluer en toute liberté. Plutôt que de devoir créer et modifier des règles projet par projet, cette fonctionnalité leur permet de créer une règle unique, qu'ils pourront exécuter dans l'ensemble des projets de leur instance (ou dans plusieurs d'entre eux). L'offre Premium de Jira Service Management vous donne accès à 1000 règles d'automatisation globales et multi-projets par mois, ce qui vous permet d'économiser du temps et de vous assurer que votre équipe reste concentrée sur ses objectifs, grâce au moteur d'automatisation sans code de Jira. Conseil de pro : avec l'offre Premium de Jira Service Management, vous pouvez automatiser vos objets dans la fonction Actifs pour économiser encore plus de temps et améliorer votre efficacité. Consultez notre guide de l'automatisation pour en savoir plus. Conclusion Outre les fonctionnalités abordées dans le présent guide, l'offre Premium de Jira Service Management comporte une assistance Atlassian Cloud 24 heures sur 24, 7 jours sur 7 , avec un temps de réponse maximal d'une heure pour les tickets critiques, un espace de stockage illimité qui permettra à votre équipe et à vos clients de télécharger des pièces jointes et des fichiers de toutes tailles, ainsi qu'un SLA de disponibilité de 99,9 % pour que vous ne subissiez jamais d'interruptions. icône d'engrenageVous pouvez essayer Premium gratuitement ! Si vous ne disposez pas encore de Jira Service Management, vous pouvez vous enregistrer sur cette page . Si vous disposez d'une autre version de Jira Service Management, vous pouvez essayer Premium en vous connectant à votre site cloud, en sélectionnant Paramètres ( ) > Facturation > Gestion des abonnements , puis sélectionnez Changer à côté du nom de votre abonnement actuel. Trucs et astuces Se lancer avec Actifs Lire le guide Entreprise Carrières Événements Blogs Relations avec les investisseurs Atlassian Foundation Kit pour la presse Nous contacter Index de l'égalité professionnelle produits Rovo Jira Jira Align Jira Service Management Confluence Loom Trello Bitbucket Voir tous les produits Ressources Support technique Achats et licences Communauté Atlassian Base de connaissances Marketplace Mon compte Créer un ticket de support Apprendre Partenaires Formation et certification Documentation Ressources développeurs Services Enterprise Découvrir toutes les ressources Copyright © 2025 Atlassian Politique de confidentialité Conditions Mentions légales Choisir la langue Deutsch English Español Français Italiano 한국어 Nederlands 日本語 Polski Português русский 中文
2026-01-13T09:29:55
https://www.telegraph.co.uk/news/investigations/contact-us/
Contact Us Jump to content UK News Website of the Year 2024 Search Icon News Sport Business Money Travel Calculators Opinion Ukraine Health Recommended Lifestyle Culture Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Search Icon Subscribe now Log in See all News UK news UK news home Scotland Wales Northern Ireland Politics Conservatives Labour Lib Dems Reform UK SNP US politics World US News Europe Middle East Asia Australasia Africa South America Donald Trump Health news Defence Science Education Environment Investigations Investigations home Signals Network Contact us Global Health Security Global Health Security home Climate & People Science & Disease Terror & Security Women & Girls Opinion & Analysis Royals King Charles III Queen Camilla Prince William Princess of Wales Prince Harry Duchess of Sussex Sections UK Edition US Edition News News home UK news Politics World Donald Trump Health news Defence Science Education Environment Investigations Global Health Security Royals Sport Sport home Football Rugby Union Cricket Golf F1 Tennis Racing Women's Sport Cycling Boxing Betting More... Business Business home Economy Companies Markets Tech Money Money home Property Tax Pensions Banking Investing Net Zero Calculators Guides Travel Travel home Europe UK Worldwide City breaks Hotels Cruise Ski Advice Calculators Opinion Opinion home Obituaries Letters to the Editor Telegraph View Our columnists Cartoons Ukraine Ukraine home Daily podcast Weekly newsletter Health Health home Diet Fitness Conditions Wellbeing Parenting Guides Tools Recommended Recommended home Home Garden Sleep Tech Health & Fitness Beauty & Grooming Travel & Outdoors Parenting Lifestyle Lifestyle home Recipes Food & Drink Fashion Beauty Luxury Cars Gardening Culture Culture home TV Film Music Books Theatre Comedy Dance Opera Classical Art Telegraph Tickets Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Subscribe now Log in Login icon Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon More from The Telegraph Download our app Help and support Newsletters Recommended Financial Solutions Events Dating Offers Travel offers Shop Garden shop Bookshop Tickets Puzzles Fantasy Football Work at The Telegraph Telegraph Corporate Announcements The Chelsea Magazine Company Voucher codes See top shops Samsung Nike ASOS eBay Currys Wayfair TUI JD Sports Travelodge Adidas Save Gift this article free Gift article Give full access to this article, free time. You have 15 articles left to gift, this month. Log in or Subscribe Copy link X Icon twitter Facebook Icon facebook WhatsApp Icon whatsapp email Share article Log in or Subscribe Copy link X Icon twitter Facebook Icon facebook WhatsApp Icon whatsapp email Save Gift this article free Gift article Give full access to this article, free time. You have 15 articles left to gift, this month. Log in or Subscribe Copy link X Icon twitter Facebook Icon facebook WhatsApp Icon whatsapp email Copy link X Icon twitter Facebook Icon facebook WhatsApp Icon whatsapp email The Telegraph Investigations team has published a series of ground-breaking scoops that have held the powerful to account. From politics to sport, to expenses and healthcare, our team have uncovered evidence that has led to criminal, parliamentary and regulatory inquiries. Our reporters rely on tip offs and information from whistle-blowers. Information provided by our readers has led to some of our biggest scoops and we are grateful for your help in uncovering wrongdoing or unethical behaviour. We are committed to protecting our sources.  If you would like to get it touch, it can be important to protect your identity and security.  There are several options available (although none are guaranteed) Email -  investigations@telegraph.co.uk O ne of the easiest ways to contact us is by email, but it is worth thinking how to protect yourself.  You might choose to set up a new email address not in your name, but it is worth bearing in mind that if you are using a public or work computer, there may be a record of information sent and received. Here are the emails addresses for the team - Claire Newell -  claire.newell@telegraph.co.uk Katherine Rushton -  katherine.rushton@telegraph.co.uk Sophie Barnes -  sophie.barnes@telegraph.co.uk Janet Eastham -  janet.eastham@telegraph.co.uk If you would like to send confidential material, one of the best ways is using PGP to encrypt the email. Claire Newell -  Click here Telephone The main number for the investigations team is 020 7931 3354.  However, if you want to discuss sensitive information, you may not want to use your home, office or mobile phone. Consider where you are making the call from, will there be a trace?  It might be worth buying a pay-as-you-go phone and thinking carefully about when and where you make the call - can you be overheard?   Pros Easy access Reasonably secure Cons Doesn’t always provide full security Can’t send large documents Difficult to provide anonymity Post Arguably, the most secure way to provide anonymous, confidential material is by post.  Our address is  - Investigations, Telegraph, 111 Buckingham Palace Road, London, SW1W 0DT.   However, before you pop something in the mail, consider where you are posting it from, is it likely to leave a trace? Pros Easy for printed documentation Cons One way communication.  It is hard for the journalist to ask follow up questions.  We would almost certainly want to speak to you. SecureDrop Telegraph  SecureDrop  address SecureDrop is a system designed to be accessed over the dark web to allow sources to anonymously and safely send information to journalists. It is only possible to access the system using Tor. When you upload files or send us messages using SecureDrop, those messages are encrypted and only members of the Investigations team are able to retrieve and decrypt them. Responses can be posted and are visible only to the original poster. SecureDrop was developed and is maintained by the Freedom of the Press Foundation and is the de facto standard for secure, anonymous communications with investigative journalists. We recommend using Tails, a secure, anonymising operating system that boots from a USB stick and provides access to to the dark web using Tor. Pros Anonymous over Tor with no email addresses associated with messages All messages and files are automatically encrypted once they are uploaded to the system Easy to use once using Tor Standard system for anonymously and securely sending files to journalists Cons Using Tor is marginally more difficult than using encrypted email Responses need to be checked for Most companies monitor for Tor traffic, so it is likely that your employer would notice your activity. Best for: Files and messages where anonymity is essential To use Secure Drop, you will need a Tor browser Accessing the SecureDrop system requires using a Tor browser, which is a special web browser that anonymises and encrypts access to the web. The Telegraph’s SecureDrop system operates as a hidden service on the dark web. It is possible to use Tor from any operating system, by downloading the bundle from here:  https://www.torproject.org/download/download-easy.html.en However, to use Tor to its full anonymising potential, you should consider using Tails, a secure operating system that boots your laptop or desktop into a secure environment, separate from your day-to-day system. It is available here:  https://tails.boum.org/index.en.html Notes: Some organisations block and monitor Tor traffic, so be wary of using Tor or Tails in your workplace Some laptops, Chromebooks in particular, won’t allow Tails to boot Using Tor as an app on your laptop or desktop will leave traces, so consider the security of your device if you are not using Tails. Signal Messenger You can reach our journalists via the encrypted app Signal at +447702676347 Signal is an encrypted instant-messaging and phone-call app. Signal stores your number, but it doesn’t store a log of who you communicate with, or who communicates with you. You can also set it to erase messages so that they no longer exist on your phone, the recipient’s phone, or in the cloud. You can  download Signal  for  Android  or  iPhone . Consider using a phone number on Signal that your employer cannot connect to you.  Understand that Signal is not designed to facilitate complete anonymity.  Using Signal is pretty easy. Here’s how: Open the Signal app and tap the pen icon (in the top-right on an iPhone, in the bottom-right on Android) to start a new message. Type our phone number in the search box,  +447702676347 . From there, you can send us an encrypted Signal message. Only written messages and documents should be sent through Signal.  No phone calls will be answered. No classic text messages will be monitored . Advertisement More stories More stories --> --> --> More from News Pupils vote to rename Samuel Pepys house over writer’s ‘abuse of women’ This spineless Government is poised to let China build a huge spy bunker in the heart of London US tells citizens to leave Iran as Trump mulls strikes The British taxpayer is being squeezed to pay for the world’s malcontents Trump slaps 25pc tariffs on countries trading with Iran Mandelson apologises ‘unequivocally’ to Epstein victims More from The Telegraph More from The Telegraph --> --> --> The Telegraph Back to top Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon Download the Telegraph App Recommended Podcasts Syndication and Commissioning Help Centre Betting Branded Content Privacy Reader Prints Theatre Tickets Careers About us Announcements Puzzles Guidelines Terms & Conditions Newsletters Crosswords Tax Strategy Advertising terms Subscribe Cryptic Crossword Modern Slavery Subscription Terms & Conditions Gift Subscriptions Plusword The Chelsea Magazine Company © Telegraph Media Group Holdings Limited 2026
2026-01-13T09:29:55
https://infisical.com/docs/integrations/platforms/certificate-agent#example-agent-configuration-files
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let's Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : "universal-auth" config : client-id : "./client-id" # Path to file containing client ID client-secret : "./client-secret" # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : "universal-auth" config : client-id : "your-client-id" client-secret : "your-client-secret" Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : "kubernetes-auth" config : identity-id : "your-kubernetes-identity-id" service-account-token-path : "/var/run/secrets/kubernetes.io/serviceaccount/token" Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : "azure-auth" config : identity-id : "your-azure-identity-id" Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : "gcp-id-token" config : identity-id : "your-gcp-identity-id" GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : "gcp-iam" config : identity-id : "your-gcp-identity-id" service-account-key : "/path/to/service-account-key.json" Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : "aws-iam" config : identity-id : "your-aws-identity-id" ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : "https://app.infisical.com" # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # Infisical authentication configuration auth : type : "universal-auth" # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : "your-client-id" client-secret : "your-client-secret" # Certificate configuration certificates : - profile-name : "prof-web-server-12345" project-slug : "my-project-slug" attributes : common-name : "api.example.com" alt-names : [ "api.example.com" , "api-v2.example.com" ] ttl : "90d" key-algorithm : "RSA_2048" signature-algorithm : "RSA-SHA256" key-usages : - "digital_signature" - "key_encipherment" extended-key-usages : - "server_auth" # Enable automatic certificate renewal lifecycle : renew-before-expiry : "30d" status-check-interval : "6h" # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : "/etc/ssl/private/web.key" permission : "0600" # Read/write for owner only certificate : path : "/etc/ssl/certs/web.crt" permission : "0644" # Read for all, write for owner chain : path : "/etc/ssl/certs/web-chain.crt" permission : "0644" # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo "Certificate issued for ${CERT_COMMON_NAME}" systemctl reload nginx timeout : 30 on-renewal : command : | echo "Certificate renewed for ${CERT_COMMON_NAME}" systemctl reload nginx timeout : 30 on-failure : command : | echo "Certificate operation failed: ${ERROR_MESSAGE}" mail -s "Certificate Alert" [email protected] < /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., ["www.example.com", "api.example.com"] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger 'Certificate renewal failed' , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo "New certificate issued for ${CERT_COMMON_NAME}" chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo "Certificate renewed for ${CERT_COMMON_NAME}" # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d "{'text': 'Certificate for ${CERT_COMMON_NAME} renewed successfully'}" timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo "Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}" # Send alert mail -s "Certificate Failure Alert" [email protected] < /dev/null # Log to syslog logger -p daemon.error "Certificate agent failure: ${ERROR_MESSAGE}" timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : "https://app.infisical.com" retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : "https://app.infisical.com" # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # Infisical authentication configuration auth : type : "universal-auth" # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : "your-client-id" client-secret : "your-client-secret" # Certificate configuration certificates : - profile-name : "prof-web-server-12345" project-slug : "my-project-slug" attributes : common-name : "api.example.com" alt-names : - "api.example.com" - "api-v2.example.com" key-algorithm : "RSA_2048" signature-algorithm : "RSA-SHA256" key-usages : - "digital_signature" - "key_encipherment" extended-key-usages : - "server_auth" ttl : "30d" file-output : private-key : path : "/etc/ssl/private/api.example.com.key" permission : "0600" certificate : path : "/etc/ssl/certs/api.example.com.crt" permission : "0644" chain : path : "/etc/ssl/certs/api.example.com.chain.crt" permission : "0644" omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : "https://app.infisical.com" # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # Infisical authentication configuration auth : type : "universal-auth" # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : "your-client-id" client-secret : "your-client-secret" # Certificate configuration certificates : - profile-name : "prof-web-server-12345" project-slug : "my-project-slug" csr-path : "/etc/ssl/requests/api.csr" file-output : certificate : path : "/etc/ssl/certs/api.example.com.crt" permission : "0644" chain : path : "/etc/ssl/certs/api.example.com.chain.crt" permission : "0644" omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : "https://app.infisical.com" # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # Infisical authentication configuration auth : type : "universal-auth" # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : "your-client-id" client-secret : "your-client-secret" # Certificate configuration certificates : - profile-name : "prof-web-server-12345" project-slug : "my-project-slug" attributes : common-name : "api.example.com" alt-names : - "api.example.com" - "api-v2.example.com" key-algorithm : "RSA_2048" signature-algorithm : "RSA-SHA256" key-usages : - "digital_signature" - "key_encipherment" extended-key-usages : - "server_auth" ttl : "30d" lifecycle : renew-before-expiry : "14d" # Renew 14 days before expiration status-check-interval : "6h" # Check certificate status every 6 hours file-output : private-key : path : "/etc/ssl/private/api.example.com.key" permission : "0600" certificate : path : "/etc/ssl/certs/api.example.com.crt" permission : "0644" chain : path : "/etc/ssl/certs/api.example.com.chain.crt" permission : "0644" post-hooks : on-issuance : command : "systemctl reload nginx" timeout : 30 on-renewal : command : "systemctl reload nginx && logger 'Certificate renewed'" timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback & Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:55
https://ai.google.dev/api/models?hl=ru
Models  |  Gemini API  |  Google AI for Developers Перейти к основному контенту / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 Как получить ключ API Кулинарная книга Сообщество Войти Документация Справочник по API Gemini API Документация Справочник по API Как получить ключ API Кулинарная книга Сообщество Обзор Версии API Возможности Модели Создание контента Живой API API живой музыки API взаимодействия Токены Файлы Пакетный API Кеширование Встраивания Поиск файлов Магазины поиска файлов Документ Все методы Поддержка прекращена ПалМ (выведен из эксплуатации) Ссылки на SDK Python Go TypeScript Java C# Эта страница переведена с помощью Cloud Translation API . Главная Gemini API Справочник по API Отправить отзыв Models Конечная точка моделей позволяет программно выводить список доступных моделей и получать расширенные метаданные, такие как поддерживаемые функции и размеры контекстного окна. Подробнее см. в руководстве по моделям . Метод: models.get Конечная точка Параметры пути Текст запроса Тело ответа Области авторизации Пример запроса Получать Получает информацию о конкретной Model такую ​​как номер версии, ограничения по токенам, параметры и другие метаданные. Подробную информацию о модели см. в руководстве по моделям Gemini . Конечная точка получить https: / /generativelanguage.googleapis.com /v1beta /{name=models /*} Параметры пути string name Обязательно. Имя ресурса модели. Это имя должно совпадать с именем модели, возвращаемым методом models.list . Формат: models/{model} Он имеет вид models/{model} . Текст запроса Тело запроса должно быть пустым. Пример запроса Питон from google import genai client = genai . Client () model_info = client . models . get ( model = "gemini-2.0-flash" ) print ( model_info ) models . py Идти ctx := context . Background () client , err := genai . NewClient ( ctx , & genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } modelInfo , err := client . Models . Get ( ctx , "gemini-2.0-flash" , nil ) if err != nil { log . Fatal ( err ) } fmt . Println ( modelInfo ) models . go Оболочка curl https://generativelanguage.googleapis.com/v1beta/models/gemini-2.0-flash?key = $GEMINI_API_KEY models .sh Тело ответа В случае успеха тело ответа содержит экземпляр Model . Метод: models.list Конечная точка Параметры запроса Текст запроса Тело ответа JSON-представление Области авторизации Пример запроса Список Перечисляет Model , доступные через API Gemini. Конечная точка получить https: / /generativelanguage.googleapis.com /v1beta /models Параметры запроса pageSize integer Максимальное количество возвращаемых Models (на страницу). Если не указано, будет возвращено 50 моделей на страницу. Этот метод возвращает не более 1000 моделей на страницу, даже если вы передадите большее значение pageSize. string pageToken Токен страницы, полученный от предыдущего вызова models.list . Предоставьте pageToken возвращенный одним запросом, в качестве аргумента следующему запросу для получения следующей страницы. При пагинации все остальные параметры, предоставленные models.list должны соответствовать вызову, который предоставил токен страницы. Текст запроса Тело запроса должно быть пустым. Пример запроса Питон from google import genai client = genai . Client () print ( "List of models that support generateContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "generateContent" : print ( m . name ) print ( "List of models that support embedContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "embedContent" : print ( m . name ) models . py Идти ctx := context . Background () client , err := genai . NewClient ( ctx , & genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } // Retrieve the list of models. models , err := client . Models . List ( ctx , & genai . ListModelsConfig {}) if err != nil { log . Fatal ( err ) } fmt . Println ( "List of models that support generateContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "generateContent" { fmt . Println ( m . Name ) break } } } fmt . Println ( "\nList of models that support embedContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "embedContent" { fmt . Println ( m . Name ) break } } } models . go Оболочка curl https://generativelanguage.googleapis.com/v1beta/models?key = $GEMINI_API_KEY models .sh Тело ответа Ответ от ListModel , содержащий постраничный список моделей. В случае успеха тело ответа содержит данные со следующей структурой: Поля models[] object ( Model ) Возвращенные модели. string nextPageToken Токен, который можно отправить как pageToken для получения следующей страницы. Если это поле пропущено, страниц больше нет. JSON-представление { "models" : [ { object ( Model ) } ] , "nextPageToken" : string } Ресурс REST: модели Ресурс: Модель JSON-представление Методы Ресурс: Модель Информация о генеративной языковой модели. Поля string name Обязательно. Имя ресурса Model . Все допустимые значения см. в разделе «Варианты модели» . Формат: models/{model} с соглашением об именовании {model} : "{baseModelId}-{version}" Примеры: models/gemini-1.5-flash-001 string baseModelId Обязательно. Имя базовой модели, передайте его в запрос на генерацию. Примеры: gemini-1.5-flash string version Обязательно. Номер версии модели. Это представляет основную версию ( 1.0 или 1.5 ) string displayName Удобочитаемое название модели. Например, «Gemini 1.5 Flash». Имя может иметь длину до 128 символов и может состоять из любых символов UTF-8. string description Краткое описание модели. inputTokenLimit integer Максимальное количество входных токенов, разрешенное для этой модели. outputTokenLimit integer Максимальное количество выходных токенов, доступных для этой модели. string supportedGenerationMethods[] Поддерживаемые моделью методы генерации. Соответствующие имена методов API определяются как строки регистра Pascal, например generateMessage и generateContent . thinking boolean Поддерживает ли модель мышление. temperature number Управляет случайностью выходных данных. Значения могут находиться в диапазоне [0.0,maxTemperature] включительно. Более высокое значение приведет к более разнообразным ответам, в то время как значение, близкое к 0.0 обычно приводит к менее неожиданным ответам модели. Это значение определяет значение по умолчанию, которое будет использоваться бэкендом при вызове модели. максимальное number maxTemperature Максимальная температура, которую может использовать эта модель. number topP Для отбора проб ядра . Ядерная выборка учитывает наименьший набор токенов, сумма вероятностей которых не менее topP . Это значение определяет значение по умолчанию, которое будет использоваться бэкендом при вызове модели. topK integer Для выборки Top-k. Выборка top-k учитывает набор наиболее вероятных токенов topK . Это значение определяет значение по умолчанию, которое будет использоваться бэкендом при вызове модели. Если значение пустое, это означает, что модель не использует выборку top-k, и topK не допускается в качестве параметра генерации. JSON-представление { "name" : string , "baseModelId" : string , "version" : string , "displayName" : string , "description" : string , "inputTokenLimit" : integer , "outputTokenLimit" : integer , "supportedGenerationMethods" : [ string ] , "thinking" : boolean , "temperature" : number , "maxTemperature" : number , "topP" : number , "topK" : integer } Метод: models.predict Конечная точка Параметры пути Текст запроса JSON-представление Тело ответа JSON-представление Области авторизации Выполняет запрос прогнозирования. Конечная точка пост https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predict Параметры пути string model Обязательно. Имя модели для прогнозирования. Формат: name=models/{model} . Имеет вид models/{model} . Текст запроса Тело запроса содержит данные со следующей структурой: Поля значение instances[] value ( Value format) Обязательно. Экземпляры, являющиеся входными данными для вызова прогнозирования. значение parameters value ( Value format) Необязательно. Параметры, управляющие вызовом прогноза. Тело ответа Ответное сообщение для [PredictionService.Predict]. В случае успеха тело ответа содержит данные со следующей структурой: Поля predictions[] value ( Value format) Результаты прогнозного вызова. JSON-представление { "predictions" : [ value ] } Метод: models.predictLongRunning Конечная точка Параметры пути Текст запроса JSON-представление Тело ответа Области авторизации То же, что и models.predict, но возвращает LRO. Конечная точка пост https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predictLongRunning Параметры пути string model Обязательно. Имя модели для прогнозирования. Формат: name=models/{model} . Текст запроса Тело запроса содержит данные со следующей структурой: Поля значение instances[] value ( Value format) Обязательно. Экземпляры, являющиеся входными данными для вызова прогнозирования. значение parameters value ( Value format) Необязательно. Параметры, управляющие вызовом прогноза. Тело ответа В случае успеха тело ответа содержит экземпляр Operation . Отправить отзыв Если не указано иное, контент на этой странице предоставляется по лицензии Creative Commons "С указанием авторства 4.0" , а примеры кода – по лицензии Apache 2.0 . Подробнее об этом написано в правилах сайта . Java – это зарегистрированный товарный знак корпорации Oracle и ее аффилированных лиц. Последнее обновление: 2025-12-16 UTC. Хотите рассказать подробнее? [[["Прост для понимания","easyToUnderstand","thumb-up"],["Помог мне решить мою проблему","solvedMyProblem","thumb-up"],["Другое","otherUp","thumb-up"]],[["Отсутствует нужная мне информация","missingTheInformationINeed","thumb-down"],["Слишком сложен/слишком много шагов","tooComplicatedTooManySteps","thumb-down"],["Устарел","outOfDate","thumb-down"],["Проблема с переводом текста","translationIssue","thumb-down"],["Проблемы образцов/кода","samplesCodeIssue","thumb-down"],["Другое","otherDown","thumb-down"]],["Последнее обновление: 2025-12-16 UTC."],[],[]] Условия использования Конфиденциальность Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:55
https://www.linkedin.com/company/google?trk=public_post_reshare_feed-actor-image
Google | LinkedIn Skip to main content LinkedIn Top Content People Learning Jobs Games Sign in Join for free Google Software Development Mountain View, CA 40,235,038 followers See jobs Follow View all 329,545 employees Report this company Overview Jobs Life About us A problem isn't truly solved until it's solved for all. Googlers build products that help create opportunities for everyone, whether down the street or across the globe. Bring your insight, imagination and a healthy disregard for the impossible. Bring everything that makes you unique. Together, we can build for everyone. Check out our career opportunities at goo.gle/3DLEokh Website https://goo.gle/3DLEokh External link for Google Industry Software Development Company size 10,001+ employees Headquarters Mountain View, CA Type Public Company Specialties search, ads, mobile, android, online video, apps, machine learning, virtual reality, cloud, hardware, artificial intelligence, youtube, and software Locations Primary 1600 Amphitheatre Parkway Mountain View, CA 94043, US Get directions 111 8th Ave New York, NY 10011, US Get directions Claude Debussylaan 34 Amsterdam, North Holland 1082 MD, NL Get directions Avenida Brigadeiro Faria Lima, 3477 Sao Paulo, SP 04538-133, BR Get directions 51 Breithaupt St Kitchener, ON N2H 5G5, CA Get directions Barrow Street Dublin, County Dublin, IE Get directions Old Madras Road Bengaluru, Karnataka 560016, IN Get directions 2590 Pearl St Boulder, CO 80302, US Get directions 601 N 34th St Seattle, WA 98103, US Get directions 48 Pirrama Rd Sydney, NSW 2009, AU Get directions 19510 Jamboree Rd Irvine, CA 92612, US Get directions 320 N Morgan St Chicago, IL 60607, US Get directions 3 Bandra Kurla Complex Road Mumbai, Maharashtra 400051, IN Get directions 5th Ave Taguig City, National Capital Region, PH Get directions 3 Pasir Panjang Rd Singapore, Singapore 118484, SG Get directions 13 Hyderabad, TS 500084, IN Get directions 90 Collins St Melbourne, VIC 3000, AU Get directions 901 Cherry Ave San Bruno, CA 94066, US Get directions Plaza Pablo Ruiz Picasso Madrid, Community of Madrid 28046, ES Get directions 25 Massachusetts Ave NW Washington, DC 20001, US Get directions 15 Gurugram, HR 122001, IN Get directions Carrera 11A 94-45 Bogota, Bogota, D.C. 110221, CO Get directions 2 Matheson St Wan Chai, Hong Kong, HK Get directions 1875 Explorer St Reston, VA 20190, US Get directions 111 Richmond St W Toronto, ON M5H 2G4, CA Get directions 345 Spear St San Francisco, CA 94105, US Get directions 355 Main St Cambridge, MA 02142, US Get directions Via Federico Confalonieri, 4 Milan, Lomb. 20124, IT Get directions St Giles High Street London, England WC2H 8AG, GB Get directions 9606 N Mopac Expy Austin, TX 78759, US Get directions 340 Main St Los Angeles, CA 90291, US Get directions Plaza Pablo Ruiz Picasso Madrid, Community of Madrid 28020, ES Get directions 2300 Traverwood Dr Ann Arbor, MI 48105, US Get directions Avenida Costanera Sur Las Condes, Santiago Metropolitan 7550000, CL Get directions 10 10th St NE Atlanta, GA 30309, US Get directions ulica Emilii Plater 53 Warsaw, MA 00-125, PL Get directions 3 Swamy Vivekananda Road Bengaluru, Karnataka 560016, IN Get directions 777 6th St S Kirkland, WA 98033, US Get directions Erika-Mann-Strasse 33 Munich, BY 80636, DE Get directions Montes Urales Miguel Hidalgo, CDMX 11000, MX Get directions Avenida Alicia Moreau de Justo 350 Buenos Aires City, Buenos Aires Autonomous City 1107, AR Get directions 8 Rue de Londres Paris, IdF 75009, FR Get directions Yigal Allon 98 Tel Aviv-Yafo, Tel Aviv 67891, IL Get directions Unter den Linden 14 Berlin, BE 10117, DE Get directions ABC-Strasse 19 Hamburg, HH 20354, DE Get directions 6175 Main St Frisco, TX 75034, US Get directions Brandschenkestrasse 110 Zurich, ZH 8002, CH Get directions Kungsbron 2 Stockholm, Stockholm County 111 22, SE Get directions Show more locations Show fewer locations Employees at Google Linus Upson Phillip Pearson Lenny T. Brentley Beerline See all employees Updates Google reposted this Sundar Pichai Sundar Pichai is an Influencer 16h Report this post Great to be at #NRF2026 yesterday in NYC! I shared some thoughts on how AI is going to transform every aspect of the shopping journey and how retail businesses are run. Incoming Walmart CEO John Furner joined me on stage to talk more about the opportunities for retailers ahead. What we’ve learned as a company from the last 27 years of working with retailers is that we only succeed together. Our goal is to build a future of retail where the opportunity space expands for everyone. That includes laying the groundwork for AI agents and systems to talk to each other across every step of the shopping journey. As a next step we introduced the Universal Commerce Protocol (UCP), available starting today. It’s built to meet the needs of retailers and customers— from the moments of discovery to decision and beyond. It’s open, agnostic, built together with industry leaders Shopify , Etsy , Wayfair , Target and Walmart , and endorsed by 20+ more. There’s a lot that UCP will enable, and we are starting with native checkout. Soon you’ll see a buy button directly on Google surfaces including AI Mode in Search and Gemini. We also introduced a new Gemini Enterprise for Customer Experience. Now in preview, this helps retailers build sophisticated agents for their own apps. That includes a shopping agent that provides personalized, proactive help, bringing the power of AI Mode right to a retailer’s app or website. Delivery is another important step that AI can help transform. Wing ’s autonomous drone deliveries, in partnership with Walmart, have shown impressive expansion - and will be coming to another 150 stores, in addition to the 120 already announced. Starting in Houston on January 15, and will reach 40M people by the end of the expansion. A big year for AI in retail, and we’re excited for this next chapter of partnership.  8,787 337 Comments Like Comment Share Google reposted this Vidhya Srinivasan 1d Report this post I spent the day at #NRF2026 and spoke with many retailers about the future of agentic commerce. There is a lot of excitement across the industry to solve for complex and disjointed shopping journeys, with shoppers juggling tabs and re-entering information, and retailers losing sales to friction. We announced new tools to create a more seamless experience for both shoppers and businesses: 🛒 It starts with a common language. The new Universal Commerce Protocol (UCP) is an open standard for agentic commerce we built alongside key retail partners to allow different shopping agents and systems to work together effortlessly across the entire shopping journey. To start, this protocol powers our new checkout feature. Shoppers soon can buy products confidently and securely right from AI Mode in Search and the Gemini app. 💬 We're also bridging the gap between discovery and purchase with Business Agent, a customizable AI chat that allows shoppers to connect with retailers on Search. Acting as a virtual sales associate, it answers product questions in a brand's unique voice during critical shopping moments to help drive sales. 🎯 Direct Offers, a new Google Ads pilot, can help connect advertisers with high-intent shoppers in AI Mode. It moves beyond traditional ads by providing exclusive deals—like a special discount—at the exact moment a shopper is ready to buy, delivering greater value for customers and closing the sale for retailers. More here 👉 https://lnkd.in/gyhuGbTR …more 1,152 49 Comments Like Comment Share Google reposted this Dieter Bohn 3d Report this post I’ve been testing some of the new Gemini for Google TV features that were announced at #CES2026 and that are coming out this year – and it’s been a lot of fun. Google TV launched Gemini on their platform in September, and are already doing a lot more to make the experience even more intuitive and interactive. With the next generation of Gemini on your Google TV, you can ask questions and get customized, visually rich answers —like content recs or even a full explainer of an educational topic. And there’s deeper integrations with Google Photos. You can find stuff easier and with Nano Banana and Veo, you can remix old personal photos and create videos from them. It introduces a sense of playfulness to TV that I think is pretty cool. 🪩🕺 Huge props to all the teams involved! Check out everything that Google TV announced → https://lnkd.in/g_7rMvgs …more 1,095 103 Comments Like Comment Share Google 40,235,038 followers 3d Report this post Gmail is entering the Gemini era. ➡️  to learn about the new features. 530 51 Comments Like Comment Share Google 40,235,038 followers 3d Report this post Okwus and Jules bust some of the most common myths we hear about the internship application process. Head to our How We Hire page to learn more about applying and interviewing at Google → https://goo.gle/3KCZhoX …more 319 21 Comments Like Comment Share Google 40,235,038 followers 4d Report this post Gmail is entering the Gemini era. Blake Barnes , VP of Product for Gmail, breaks down some of the new features coming this year, from a new AI Inbox to AI Overviews in Gmail to Help Me Write. Gmail is helping you manage your life, not just your messages. …more 473 50 Comments Like Comment Share Google 40,235,038 followers 4d Report this post Today, we’re bringing Gmail into the Gemini era to make it your personal, proactive inbox assistant. This includes: • AI Inbox, which gives you a personalized TL;DR that will catch you up on what you need to get done or be aware of (coming to trusted testers in the U.S. to start) • AI Overviews, which give you concise summaries of those loooooooong email chains, are rolling out to everyone at no cost. And for Google AI Pro and Ultra subscribers, AI Overviews will also be available when you search your inbox.  • Help Me Write, which helps you polish emails or draft them from scratch, and  Suggested Replies (an update to Smart Replies) which use the context of your conversation to offer relevant, one-click responses that match how you write. Both of these features are rolling out to everyone at no cost. These new capabilities begin rolling out today, and come with built-in security protections to keep your data private and under your control. Get all the details → https://goo.gle/4qkg53K …more 1,595 113 Comments Like Comment Share Google 40,235,038 followers 5d Report this post After earning her PhD in 2005, Ranjita built her career in industry research labs, spending years focused on long-term exploration while collaborating closely with product teams. More recently, she made a shift into product work at Google. “I wanted to get a little bit in the thick of things, and get a little more context for real world problems that are here and now,” she says. “That’s what made me switch from the research lab to the product group.” Now a Technical Lead at Google, she works on network observability — helping detect and resolve issues across Google’s global network. Her team recently launched a tool that identifies performance drops within 30 seconds, supporting engineers as they fix problems fast. Ranjita’s leadership style is shaped by learning from people across experience levels. “I have mentors in my managers, but also people who work for me or who are earlier in their careers. Very often people don’t know that they’re actually teaching me something — but they are.” She adds, “I’m always on the lookout for these nuggets of wisdom that I can get from different people.” Ranjita’s advice to future engineers focuses on one key element: “I think it’s important to be hungry to learn. Frankly, I don’t think there’s anything that is a prerequisite, especially if you’re hungry to learn.” Consider yourself a continuous learner? Explore engineering PhD roles at Google → https://goo.gle/4q7DZPx 1,276 134 Comments Like Comment Share Google 40,235,038 followers 6d Report this post Last month closed out a year of relentless shipping with the launch of Gemini 3 Flash, putting frontier intelligence to work for everyone. As we head into 2026, take a look back at our biggest AI updates from December. The latest AI news we announced in December Google on LinkedIn 2,398 156 Comments Like Comment Share Google 40,235,038 followers 1w Report this post If you want to make 2026 the year you actually stick to your resolutions — whether it be learning a language, advancing your career or creating a custom reading list — let Gemini help. We wrote 10 prompts to keep you committed and on track with your goals in the new year. Learn more and try the prompts for yourself ↓ 10 Gemini prompts to help you keep your New Year’s resolutions Google on LinkedIn 656 67 Comments Like Comment Share Join now to see what you are missing Find people you know at Google Browse recommended jobs for you View all updates, news, and articles Join now Affiliated pages Google for Developers Technology, Information and Internet Mountain View, CA Google Cloud Software Development Mountain View, California YouTube Technology, Information and Internet San Bruno, CA Think with Google Advertising Services Mountain View, California Google Ads Advertising Services Mountain View, California Google Workspace Software Development Mountain View, California Google Analytics Technology, Information and Internet Mountain View, California Google Developer Groups (GDG) Technology, Information and Internet Mountain View, CA Google Marketing Platform Advertising Services Mountain View, California Google Research Technology, Information and Internet Google for Publishers Technology, Information and Internet Grow with Google E-learning Mountain View, California Android Developers Technology, Information and Internet Mountain View, California Google Cloud Partners Internet Publishing Mountain View, California Google Small Business Internet Publishing Mountain View, California ChromeOS & Chrome Enterprise IT Services and IT Consulting Mountain View, CA Google Search Central Technology, Information and Internet Google for Health Technology, Information and Internet TensorFlow Technology, Information and Internet Flutter Dev Technology, Information and Internet Mountain View, California Google AI for Developers Technology, Information and Internet re:Work with Google Human Resources Services Google Partners Advertising Services Google News Initiative Online Audio and Video Media Mountain View, CA Google Play business community IT Services and IT Consulting Mountain View, CA Firebase Software Development Mountain View, CA Android Technology, Information and Internet CapitalG Venture Capital and Private Equity Principals San Francisco, CA Google Pay Developers Technology, Information and Internet Mountain View, California Chrome for Developers Technology, Information and Internet Android Enterprise Information Technology & Services Mountain View, CA Google User Experience Research Technology, Information and Internet Google Chrome Technology, Information and Internet Mountain View, CA Google Public Policy Technology, Information and Internet Adometry (acquired by Google) Advertising Services Mountain View, CA Google Developers North America Technology, Information and Internet Mountain View, CA Google Nest Pro Technology, Information and Internet Mountain View, California Google Public Sector Software Development Reston, VA Google Search Liaison Technology, Information and Internet Google Maps Platform Technology, Information and Internet Mineral.ai Agriculture, Construction, Mining Machinery Manufacturing Mountain View, California Google Learning & Education Technology, Information and Internet Google Antigravity Software Development Google Arabia Technology, Information and Internet Google for Business India Technology, Information and Internet Flutter Google Italia Technology, Information and Internet Firebase Show more affiliated pages Show fewer affiliated pages Similar pages Microsoft Software Development Redmond, Washington Amazon Software Development Seattle, WA Apple Computers and Electronics Manufacturing Cupertino, California Meta Software Development Menlo Park, CA Netflix Entertainment Providers Los Gatos, CA Deloitte Business Consulting and Services IBM IT Services and IT Consulting Armonk, New York, NY LinkedIn Software Development Sunnyvale, CA Spotify Musicians Stockholm, Stockholm County NVIDIA Computer Hardware Manufacturing Santa Clara, CA Show more similar pages Show fewer similar pages Browse jobs Google jobs 127,126 open jobs Analyst jobs 694,057 open jobs Engineer jobs 555,845 open jobs Manager jobs 1,880,925 open jobs Intern jobs 71,196 open jobs Project Manager jobs 253,048 open jobs Associate jobs 1,091,945 open jobs Developer jobs 258,935 open jobs Scientist jobs 48,969 open jobs Director jobs 1,220,357 open jobs Account Manager jobs 121,519 open jobs Marketing Manager jobs 106,879 open jobs Software Engineer jobs 300,699 open jobs Executive jobs 690,514 open jobs Specialist jobs 768,666 open jobs Assistant jobs 711,811 open jobs Accountant jobs 91,739 open jobs Consultant jobs 760,907 open jobs Recruiter jobs 243,016 open jobs Account Executive jobs 71,457 open jobs Show more jobs like this Show fewer jobs like this Funding Google 3 total rounds Last Round Series unknown Jul 7, 1999 External Crunchbase Link for last round of funding US$ 25.0M Investors Kleiner Perkins Sequoia Capital See more info on crunchbase More searches More searches Google jobs Engineer jobs Analyst jobs Manager jobs Intern jobs Project Manager jobs Developer jobs Associate jobs Scientist jobs Software Engineer jobs Director jobs Specialist jobs Consultant jobs Account Manager jobs Data Analyst jobs Assistant jobs Marketing Manager jobs Account Executive jobs Program Manager jobs User Experience Designer jobs Designer jobs Product Manager jobs Executive jobs Human Resources Specialist jobs Recruiter jobs Accountant jobs Marketing Specialist jobs Senior Manager jobs Writer jobs Senior Software Engineer jobs Graduate jobs Data Scientist jobs Business Development Specialist jobs Product Designer jobs Machine Learning Engineer jobs Cyber Security Specialist jobs Vice President jobs Business Analyst jobs Coordinator jobs Technician jobs Administrator jobs Head jobs President jobs Sales Manager jobs Associate Product Manager jobs Lead jobs Partner jobs Human Resources Business Partner jobs Solutions Architect jobs Assistant Manager jobs Senior Product Manager jobs Engineering Manager jobs Mechanical Engineer jobs Python Developer jobs Full Stack Engineer jobs Student jobs Team Lead jobs Marketing Intern jobs Researcher jobs Scrum Master jobs LinkedIn © 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines العربية (Arabic) বাংলা (Bangla) Čeština (Czech) Dansk (Danish) Deutsch (German) Ελληνικά (Greek) English (English) Español (Spanish) فارسی (Persian) Suomi (Finnish) Français (French) हिंदी (Hindi) Magyar (Hungarian) Bahasa Indonesia (Indonesian) Italiano (Italian) עברית (Hebrew) 日本語 (Japanese) 한국어 (Korean) मराठी (Marathi) Bahasa Malaysia (Malay) Nederlands (Dutch) Norsk (Norwegian) ਪੰਜਾਬੀ (Punjabi) Polski (Polish) Português (Portuguese) Română (Romanian) Русский (Russian) Svenska (Swedish) తెలుగు (Telugu) ภาษาไทย (Thai) Tagalog (Tagalog) Türkçe (Turkish) Українська (Ukrainian) Tiếng Việt (Vietnamese) 简体中文 (Chinese (Simplified)) 正體中文 (Chinese (Traditional)) Language Agree & Join LinkedIn By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . Sign in to see who you already know at Google Sign in Welcome back Email or phone Password Show Forgot password? Sign in or By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . New to LinkedIn? Join now or New to LinkedIn? Join now By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy .
2026-01-13T09:29:55
https://www.notion.com/ar/product/enterprise-search
برنامج البحث على مستوى المؤسسة | البحث في مساحات العمل المدعومة بالذكاء الاصطناعي – Notion Notion الميزات Notion AI إنشاء، كتابة، أتمتة الوكلاء يتعامل مع المهام اليدوية بحث المؤسسة اعثر على إجابات على الفور ملاحظات الاجتماع المدعومة بالذكاء الاصطناعي مكتوبة بشكل مثالي بواسطة الذكاء الاصطناعي المُستندات بسيط وقوي قاعدة المعرفة تجميع معرفتك في مكان واحد المشاريع إدارة أي مشروع المواقع انشر أي شيء بسرعة البدء استكشاف حالات استخدام الذكاء الاصطناعي تعرّف على قدرات Notion AI تصفح السوق قوالب لكل شيء عرض عمليات التكامل ربط تطبيقاتك مع Notion تنزيل web clipper حفظ من الويب إلى Notion جرّب تطبيق Notion لسطح المكتب للحصول على تجربة أسرع تنزيل التطبيق البريد التقويم الذكاء الاصطناعي الخطة المؤسسية التسعير استكشاف الفرق الهندسة والمنتج التصميم التسويق تقنية المعلومات حجم الفريق الشركات الناشئة الشركات الصغيرة والمتوسطة المؤسسة التعليم التعلم مركز المساعدة أكاديمية Notion قصص العملاء المدونة المجتمع برامج الشركاء الإصدار واجهة برمجة التطبيقات (API) القوالب الأمان الاستشاريون اطلب عرضاً توضيحياً تسجيل الدخول احصل على Notion مجاناً البحث على مستوى المؤسسة كل الإجابات، في بحث واحد. احصل على الإجابات في ثوانٍ، والتقارير التفصيلية خلال دقائق، مباشرة حيث يعمل فريقك بالفعل. احصل على Notion مجاناً شاهد فيديو العرض التوضيحي إيقاف مؤقت عذراً، يبدو أن أداة حظر الإعلانات تمنع تشغيل الفيديو. مصنّف رقم 1 من قِبل G2 ما الذي يميز Notion؟ اطلع على مقارنة جانبية للميزات والأمان والقيمة لتتعرف على أسباب اختيار الفرق Notion. المقارنة بين Notion وGlean ← ما كان يستغرق ساعات لتصحيح الأخطاء أصبح ممكناً حله في دقائق بمجرد سؤال Notion AI. جون ألارد فريق الهندسة، OpenAI اعثر على الإجابات، أينما كانت مخفية. شاهد البحث على مستوى المؤسسة أثناء العمل -> البحث عبر التطبيقات ادمج أدوات العمل المفضلة لديك باستخدام موصلات الذكاء الاصطناعي، ودع Notion AI يبحث خلالها جميعاً ليقدّم لك ما تحتاج إليه بالضبط. إجابات فورية احصل على إجابات حديثة مع السياق لتجاوز أي عوائق في العمل. نتائج يمكنك الوثوق بها كل إجابة تتضمن محتوى موثوقاً ومصادر موثقة، باستخدام المصادر التي تختارها فقط. يساعد Notion AI الموظفين الجدد على توفير أيام، إن لم يكن أسابيع، من فترة التأهيل، ليتمكنوا من الوصول إلى المعلومات بسرعة والتعلم منها بسهولة. سكوت إنتويستل أخصائي توظيف أول، Remote نوفر ما لا يقل عن يوم عمل كامل كل أسبوع! يعالج Notion AI المعلومات بسرعة، ويوفّر إجابات دقيقة، ويتيح لنا صياغة محتوى جديد أو تنفيذ مهام أخرى في ثوانٍ معدودة. ماتياس لامبريخت مالك المنتج، ecosio هناك قوة حقيقية عندما يكتشف Notion AI عن معلومات موجودة داخل الشركة لم أكن أعلم بها، فتحصل على إجابات لم تكن تعرف حتى أنك تبحث عنها. فيث ليرهايمر مدرّب تقني أول، dbt Labs وضع البحث: البحث الذي يقوم بالعمل نيابةً عنك. أنشئ تقارير مفصّلة في دقائق يمكنك حفظها ومشاركتها، مستفيداً من جميع مصادر بياناتك وحتى الويب. يوفّر لك أياماً من الوقت يحلّل مساحات عملك وتطبيقاتك وحتى الويب في دقائق. يفكّر بالنيابة عنك شاهد Notion AI وهو يقوم بتحليل الأسئلة إلى عملية بحث متعددة الخطوات. تقارير جاهزة للمشاركة احصل على تقارير دقيقة وشاملة يمكنك حفظها ومشاركتها فوراً دون أي جهد إضافي. لا تبدأ المستندات من الصفر أبداً. أنشئ تحديثات المشاريع من مصادر متفرقة. قم بإعداد ملخصات أسبوعية للتقدم والمعوّقات، بما في ذلك أحدث السياق من تذاكر Jira وطلبات السحب على GitHub ومناقشات الفريق في Slack أو Microsoft Teams. تقارير أبحاث العملاء في دقائق. سرّع تطوير المنتج من خلال الحصول على ملاحظات أسرع. يقوم وضع البحث بتحليل مكالمات البحث، وتذاكر Zendesk (قريباً)، ويكشف عن الملاحظات ذات الصلة عبر الويب. كن مستعداً لكل اجتماعاتك. هل لديك مكالمة مع عميل قريباً؟ يجمع وضع البحث المعلومات التنافسية من المستندات الداخلية، والويب، وSalesforce (قريباً) لتكون على استعداد بالكامل. ابحث وحلل بطريقتك. اختر نماذج الذكاء الاصطناعي الخاصة بك ابدأ الدردشة مع نماذج الذكاء الاصطناعي المفضلة لديك مباشرةً من مكان عملك. لا توجد رسوم إضافية ولن تستخدم بياناتك في التدريب. البحث في ملفات PDF التي تم تحميلها سيبحث Notion AI في أي ملفات PDF تم تحميلها في مساحة عمل Notion الخاصة بك، أو Google Drive، أو SharePoint، أو OneDrive. ابحث بأمان. اعرف المزيد عن الأمان والخصوصية ← يتبع إعدادات الأذونات يظل Notion AI آمناً من خلال عرض المعلومات التي يسمح لك بالوصول إليها فقط، بما في ذلك جميع التطبيقات المتصلة. لن تُستخدم بياناتك في التدريب لدينا اتفاقيات تعاقدية مع معالجي الذكاء الاصطناعي الفرعيين تمنعهم من استخدام بيانات العملاء لتدريب نماذجهم. تحكّم في مكان البحث أنت من يختار التطبيقات والمصادر (مثل الويب) ونماذج الذكاء الاصطناعي للبحث، مما يمنحك السيطرة الكاملة. تشفير آمن عند استخدام Notion AI، يتم تشفير بياناتك أثناء النقل باستخدام TLS 1.2 أو أعلى. مطابق لمعايير الأمان والامتثال SOC 2 (النوع 2)، وISO 27001، واللائحة العامة لحماية البيانات (GDPR)، وقانون خصوصية المستهلك في كاليفورنيا (CCPA)، وعدم الاحتفاظ بالبيانات (للمؤسسات فقط). مساحة عمل مدعومة بالذكاء الاصطناعي تؤدي جميع المهام، بسعر واحد بسيط. التجربة مجاناً ← تعدد البرمجيات Notion البحث على مستوى المؤسسة: /حوالي 35 دولاراً أمريكياً لكل مستخدم ✔️ مُضمَّن روبوت الدردشة: /حوالي 20 دولاراً أمريكياً لكل مستخدم ✔️ مُضمَّن التفريغ الصوتي للاجتماع: /حوالي 18 دولاراً أمريكياً لكل مستخدم ✔️ مُضمَّن مساعد الكتابة: /حوالي 20 دولاراً أمريكياً لكل مستخدم ✔️ مُضمَّن مساعد البريد الإلكتروني: /حوالي 30 دولاراً أمريكياً لكل مستخدم ✔️ مُضمَّن جدولة التقويم: /حوالي 15 دولاراً أمريكياً لكل مستخدم ✔️ مُضمَّن صفحة ويكي للفريق: /حوالي 10 دولارات أمريكية لكل مستخدم ✔️ مُضمَّن أداة إدارة المشاريع: 10 دولارات أمريكية لكل مستخدم ✔️ مُضمَّن الإجمالي: أكثر من 150 دولاراً أمريكياً لكل مستخدم الإجمالي: ابتداءً من 20 دولاراً أمريكياً لكل مستخدم أسئلة وأجوبة كيف يبحث Notion AI عبر التطبيقات المتعددة؟ باستخدام موصلات الذكاء الاصطناعي، يقوم Notion AI بالبحث في المعرفة الداخلية عن طريق فهرسة المحتوى من أدوات العمل الخاصة بك وفقاً لأذوناتك. عند طرح سؤال، يبحث في رسائل Slack، والملفات وملفات PDF في Google Drive، وتذاكر Jira، ومشاكل وطلبات السحب على GitHub، وغيرها من التطبيقات المتصلة لتقديم المعلومات الأكثر صلة بسرعة. ما الأدوات التي يمكن ربطها مع Notion AI؟ يمكنك دمج تطبيقات مثل Slack وGoogle Drive وGitHub وJira وMSFT Teams وSharePoint وOneDrive اليوم، مع إضافة تطبيقات أخرى قريباً مثل Linear وGmail وSalesforce وZendesk وBox والمزيد. تتيح عمليات التكامل هذه تجربة بحث موحّدة عبر جميع مصادر المعرفة الداخلية والخارجية لديك. هل Notion AI آمن؟ نعم. يعرض Notion AI فقط المعلومات التي لديك إذن للوصول إليها. ويتبع معايير أمان صارمة مثل SOC 2 (النوع 2) وISO 27001، بالإضافة إلى الامتثال للائحة العامة لحماية البيانات (GDPR) وقانون خصوصية المستهلك في كاليفورنيا (CCPA)، مع عدم الاحتفاظ بالبيانات لمستخدمي الخطة المؤسسية. يمكنك قراءة المزيد عن ممارسات الأمان والخصوصية الخاصة بالبحث على مستوى المؤسسة . هل يمكن لميزة Notion AI إنشاء تقارير من مصادر متعددة؟ بالطبع. باستخدام وضع البحث، يقوم Notion AI بتحليل البيانات من التطبيقات المتصلة بالويب لإنشاء تقارير مفصلة وجاهزة للمشاركة - موفّراً على الفرق أياماً من البحث اليدوي. هل يمكنني اختيار المصادر التي يبحث فيها Notion AI؟ نعم. يمكنك التحكم في مكان وطريقة البحث عبر Notion AI من خلال اختيار التطبيقات والمستندات ومصادر الويب التي ترغب في تضمينها - مما يمنحك السيطرة الكاملة على تجربة البحث الخاصة بك. ما الذي يميز Notion AI عن الأدوات التقليدية للبحث على مستوى المؤسسة؟ على عكس البحث التقليدي، لا يكتفي Notion AI بالعثور على الملفات فقط - بل يفهم الأسئلة، ويسترجع إجابات حديثة مدعومة بالمصادر، ويستخدم التفكير النقدي لتحليل الأسئلة المعقدة وإنشاء تقارير بحثية مفصلة في دقائق. للحصول على مقارنة شاملة مع Glean، اطلع على المقارنة الكاملة هنا العربية إعدادات ملفات تعريف الارتباط © 2026 Notion Labs, Inc. الشركة نبذة عنا الوظائف الأمان الحالة الشروط والخصوصية حقوقك المتعلقة بالخصوصية تنزيل iOS وAndroid Mac وWindows التقويم Web Clipper الموارد مركز المساعدة التسعير المدونة المجتمع عمليات التكامل القوالب برامج الشركاء Notion لأجل الخطة المؤسسية الشركات الصغيرة شخصي استكشف المزيد →
2026-01-13T09:29:55
http://news.tuxmachines.org/n/2025/12/25/Newly_discovered_Unix_V4_tape.shtml
Tux Machines — Newly discovered Unix V4 tape Tux Machines Do you waddle the waddle? Other Sites LinuxGizmos.com RAKwireless rolls out WisMesh RAK3312 Meshtastic LoRa starter kit The kit uses the RAK3312 WisBlock Core, which combines an Espressif ESP32-S3 dual-core microcontroller clocked at up to 240 MHz with Wi-Fi and Bluetooth LE connectivity, along with a Semtech SX1262 LoRa transceiver. Orbbec Gemini 305 pairs close-range stereo vision with low latency The Gemini 305 is a compact stereo 3D camera developed specifically for robotic wrist mounting. Measuring 42 × 42 × 23 mm, it supports depth and color imaging at distances as short as 4 cm, targeting close-range manipulation, grasping, and object recognition tasks. Radxa NX4 system-on-module runs RK3576 with LPDDR5 and 6 TOPS AI The Radxa NX4 integrates an octa-core CPU configuration with four Arm Cortex-A72 cores and four Cortex-A53 cores, paired with an Arm Mali-G52 MC3 GPU supporting OpenGL ES, OpenCL, and Vulkan. (ℹ) These pages are on an alpha (tesing) site. For the production/live site , please see tuxmachines.org instead. --> Home About IRC Gemini Edition Originals Archive Search --> Feed --> Open Hardware/Modding/Hacking: Raspberry Pi 5 SBC, Arduino, and More ZDNet on CachyOS vs. Nobara, 5 favorite distros of Linux past, and ZDNet's SJVN at The Register MS news Newly discovered Unix V4 tape posted by Roy Schestowitz on Dec 25, 2025, updated Jan 13, 2026 Diomidis Spinellis ☛ blog dds: 2025-12-23 — An initial analysis of the discovered Unix V4 tape The Fourth Research Edition Unix came out of the famous AT&T Bell Laboratories in November 1973. A significant development it introduced was the rewriting of large parts of the system’s kernel in a high-level language (early C) rather than PDP-11 assembly language. The tape contains a complete system dump, including both source code and the compiled binaries and kernel. For inclusion in the Unix history repository, I removed the binaries, to match what is normally put under source code version control. Tom's Hardware ☛ 52 years later, only known copy of Unix v4 recovered from randomly found tape, now up and running on a system — first OS version with kernel and core utilities written in C The only known complete copy of Unix v4 has been recovered from a tape found at the University of Utah. Followup on this: Recovered Unix v4 tape quickly yields a usable operating system — nostalgia addicts can now boot up Unix v4 in a browser window Nostalgia addicts can now get their Unix v4 fix in a browser Valnet: 52 years later, UNIX V4 has been rediscovered and digitized Linux, macOS, FreeBSD, Android, and other operating systems can trace their lineage back to the early commercial versions of Unix. One of the missing links in that chain, UNIX Fourth Edition, is now publicly available after being lost for decades. UNIX Fourth Edition, also known as UNIX V4, was first released in November 1973. It was developed by AT&T and Western Electric, and it marked the first time that C code was used in the kernel instead of primarily assembly language. Early versions of Unix were built for mainframes and 'minicomputers'—the microcomputer revolution that powered the Apple II, Commodore 64, BBC Micro, and other 8-bit personal desktops was still years away. The Linux kernel, FreeBSD project, and other Unix-like clones didn't show up until the 1990s. For decades, there were no known copies of UNIX Fourth Edition, with only some source code and manuals surviving to the present day. That changed when a nine-track tape reel containing UNIX V4 was discovered in a storage room at the University of Utah's Kahlert School of Computing. The tape was delivered to the Computer History Museum, and has now been digitized and uploaded to the Internet Archive. UNIX V4 is back: I booted into the 1973 OS and it made me weirdly happy Last year, researchers at the University of Utah found a copy of Unix lying around on a 9-track magnetic tape. It's special because that version of Unix was lost until it was recovered from that magnetic tape 52 years later. The researchers managed to successfully reconstruct it, and then they made the copy public. Anyone can download it and run it inside a virtual machine. So I did just that, and it made me so giddy to use it. What is UNIX V4, and why should you care? If you care about computer history at all, Unix lore is utterly fascinating. There was a time when operating systems were tied to their hardware. There was no way to move an operating system to hardware that it wasn't specifically programmed to run. Imagine only being able to install Android on one specific phone model or Windows on just one specific hardware configuration. We take it for granted today, but Unix V4 made 'portable' operating systems possible. Earlier versions of Unix were written in Assembly code
2026-01-13T09:29:55
https://www.telegraph.co.uk/education-news/
Education News - The Telegraph Jump to content UK News Website of the Year 2024 Search Icon News Sport Business Money Travel Calculators Opinion Ukraine Health Recommended Lifestyle Culture Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Search Icon Subscribe now Log in See all News UK news UK news home Scotland Wales Northern Ireland Politics Conservatives Labour Lib Dems Reform UK SNP US politics World US News Europe Middle East Asia Australasia Africa South America Donald Trump Health news Defence Science Education Environment Investigations Investigations home Signals Network Contact us Global Health Security Global Health Security home Climate & People Science & Disease Terror & Security Women & Girls Opinion & Analysis Royals King Charles III Queen Camilla Prince William Princess of Wales Prince Harry Duchess of Sussex Sections UK Edition US Edition News News home UK news Politics World Donald Trump Health news Defence Science Education Environment Investigations Global Health Security Royals Sport Sport home Football Rugby Union Cricket Golf F1 Tennis Racing Women's Sport Cycling Boxing Betting More... Business Business home Economy Companies Markets Tech Money Money home Property Tax Pensions Banking Investing Net Zero Calculators Guides Travel Travel home Europe UK Worldwide City breaks Hotels Cruise Ski Advice Calculators Opinion Opinion home Obituaries Letters to the Editor Telegraph View Our columnists Cartoons Ukraine Ukraine home Daily podcast Weekly newsletter Health Health home Diet Fitness Conditions Wellbeing Parenting Guides Tools Recommended Recommended home Home Garden Sleep Tech Health & Fitness Beauty & Grooming Travel & Outdoors Parenting Lifestyle Lifestyle home Recipes Food & Drink Fashion Beauty Luxury Cars Gardening Culture Culture home TV Film Music Books Theatre Comedy Dance Opera Classical Art Telegraph Tickets Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Subscribe now Log in Login icon Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon More from The Telegraph Download our app Help and support Newsletters Recommended Financial Solutions Events Dating Offers Travel offers Shop Garden shop Bookshop Tickets Puzzles Fantasy Football Work at The Telegraph Telegraph Corporate Announcements The Chelsea Magazine Company Voucher codes See top shops Samsung Nike ASOS eBay Currys Wayfair TUI JD Sports Travelodge Adidas Pupils vote to rename Samuel Pepys house over writer’s ‘abuse of women’ Save Average pay for top university chiefs passes £350k Save University worker accused of harassment after she forgot trans colleague’s pronouns Save Think you’re good at maths? Here’s why your claim may not add up Save Teachers call for social media ban to fix ‘behaviour crisis’ Save Academic ‘stripped of title’ after critiquing critical race theory Save ‘People hated that four letter word’: Middlesbrough’s anger as Labour scraps Eton-backed free school Save Education data Think you’re good at maths? Here’s why your claim may not add up Sixty per cent of adults think they are good at maths but only 40 per cent scored highly in a research test Save Hundreds of ‘Mickey Mouse’ courses offered by UK universities Save Find the best primary schools near you Save Alan Cochrane Glaswegians have never been able to master English Save Nearly one in three children in Glasgow doesn’t speak English as first language Save Find the best secondary schools near you Save Advertisement Opinion Telegraph View Phillipson’s educational vandalism Save Philip Womack As historic private schools die under Labour, so will Latin Save Emma Armstrong I am homeschooling my kids after my experience of being a teacher in our broken system Save Lawrence Goldman Cambridge’s push to take in more private school pupils is good for everyone Save Lucy Denyer Lego’s ‘smart brick’ is a stupid idea Save Letters to the Editor Schools should give pupils the tools to cope with diversity of opinion Save Michael Mosbacher Britain’s hollowed out boarding schools are yet another example of the country’s malaise Save Pagination Previous Next Education news The latest education news, data, advice and insights from The Telegraph The Telegraph Back to top Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon Download the Telegraph App Recommended Podcasts Syndication and Commissioning Help Centre Betting Branded Content Privacy Reader Prints Theatre Tickets Careers About us Announcements Puzzles Guidelines Terms & Conditions Newsletters Crosswords Tax Strategy Advertising terms Subscribe Cryptic Crossword Modern Slavery Subscription Terms & Conditions Gift Subscriptions Plusword The Chelsea Magazine Company © Telegraph Media Group Holdings Limited 2026
2026-01-13T09:29:55
https://www.cisco.com/c/da_dk/training-events.html
Cisco-ressourcer til uddannelse, events og webinarer - Cisco Skip to Main Content Spring over for at søge Skip to Footer Cisco.com Danmark Produkter og tjenester Løsninger Support Få mere at vide Se mere om Cisco Sådan køber du Partnere – start Nyt partnerprogram Support Værktøjer Find en Cisco-partner Mød vores partnere Bliv en Cisco-partner Uddannelse, events og webinarer Uddannelse og certificeringer Certificeringer Eksamener Uddannelse Kursuskatalog Uddannelsesressourcer Events Kalender over globale events Cisco Live Cisco Connect Webinarer TechWiseTV Bibliotek for teknisk viden (TKL) Influencer hub Cisco Knowledge Network UDDANNELSE Udvid din karriere med Cisco Ressourcer og træning til at udvide din forretning og karriere. EVENTS Cisco Live: Sessioner tilgængelige efter behov Optagelser fra Cisco Live-sessioner er tilgængelige i On-Demand Library. Se hovednoter, tekniske sessioner og demoer nu.. WEBINARER Cisco Webex: Tillid uden kompromis på TechWiseTV Implementer sikker, privat virksomhedskommunikation, der glæder slutbrugere. CERTIFICERINGER Cisco Certified CyberOps Professional Cisco Certified CyberOps Professional-certificering beviser dine avancerede færdigheder som senioranalytiker i et sikkerhedsdriftscenter. EVENTS Globale events: Mød Cisco-partnere og medarbejdere Deltag i verdensomspændende begivenheder og mød Cisco-partnere, medarbejdere og fageksperter.   WEBINARER Cisco Knowledge Network: On-demand webinarer til serviceudbydere Se hele vores katalog over live og on-demand webinarer til serviceudbydere. Uddannelsesressourcer Trackingsystem til certificeringer Find nærmeste Cisco Learning Cisco Learning Network Cisco Learning Partner-program Kursustjenester
2026-01-13T09:29:55
https://www.cisco.com/c/nl_be/training-events.html
Training, evenementen en webinars van Cisco – bronnen - Cisco Skip to Main Content Ga naar zoeken Skip to Footer Cisco.com België en Luxemburg Producten en services Oplossingen Ondersteuning Leren Ontdek Cisco Kopen Startpagina voor partners Nieuw partnerprogramma Ondersteuning Tools Zoek een Cisco-partner Ontmoet onze partners Word Cisco-partner Training, evenementen en webinars Training en certificeringen Certificeringen Examens Training Trainingscatalogus Trainingsbronnen Evenementen Wereldwijde evenementenagenda Cisco Live Cisco Connect Webinars TechWiseTV Technical Knowledge Library Influencer Hub Cisco Knowledge Network TRAINING Zet stappen in uw carrière met Cisco Bronnen en training ter ondersteuning van uw bedrijf en carrière. EVENEMENTEN Cisco Live: sessies op aanvraag beschikbaar Opnamen van Cisco Live-sessies zijn beschikbaar via de on-demand bibliotheek. Bekijk nu keynotes, technische sessies en demo’s. WEBINARS Cisco Webex: Vertrouw zonder concessies op TechWiseTV Implementeer veilige, vertrouwelijke zakelijke communicatie die eindgebruikers zullen waarderen. CERTIFICERINGEN Cisco Certified CyberOps Professional Met de Cisco Certified CyberOps Professional-certificering bewijst u dat u over geavanceerde vaardigheden beschikt als Senior Analyst in een Security Operations Center. EVENEMENTEN Wereldwijde evenementen: Netwerken met partners en werknemers van Cisco Neem deel aan wereldwijde evenementen en netwerk met partners, werknemers en inhoudelijke experts van Cisco. WEBINARS Cisco Knowledge Network: On-demand webinars voor serviceproviders Bekijk onze catalogus met live en on-demand webinars voor serviceproviders. Trainingsbronnen Certification Tracking System Cisco Learning Locator Cisco Learning Network Cisco Learning Partner-programma Trainingsservices
2026-01-13T09:29:55
https://careers.cisco.com/global/en/search-results
Job Openings - Cisco Careers Search results | Find available job openings at Cisco Careers Explore opportunities Find your next role    Cisco is an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, genetic information, age, disability, veteran status, or any other legally protected basis. 200 Gibraltar Road Suite 315, Horsham, PA 19044 TEL: 888-985-7755 Follow us Copyright © 2025 Cisco Systems, Inc. 728c581f94014447b5824047d0052441
2026-01-13T09:29:55
https://apps.apple.com/us/app/1607562761?see-all=reviews&platform=iphone
‎Notion Calendar - Ratings & Reviews - App Store for iPhone iPhone iPad Mac Vision Watch TV Today Games Apps Arcade Platform iPhone iPad Mac Vision Watch TV Notion Calendar Ratings & Reviews 4.7 out of 5 5.7K Ratings Lot of potential - love the design! 09/03/2024 Hikari There’s a lot of reviews that talk about the pros and cons of the app but let me just say my favorite thing is I don’t immediately create a new event if I just fat finger my phone and hit a random spot on the calendar. So much time wasted on hitting a random spot on Google calendar and I’m like no I didn’t mean to please - no event oh god! Love the design and the way information is presented it makes it feel less overwhelming. I would love a 5 day view - 3 days is great because it’s intentional but getting the work week in one viewable window would be helpful. I know Google calendar forces the whole week on you though which I don’t totally love either. Either way I’m excited to see where the app goes from here! Lot of potential - love the design! 09/03/2024 Hikari There’s a lot of reviews that talk about the pros and cons of the app but let me just say my favorite thing is I don’t immediately create a new event if I just fat finger my phone and hit a random spot on the calendar. So much time wasted on hitting a random spot on Google calendar and I’m like no I didn’t mean to please - no event oh god! Love the design and the way information is presented it makes it feel less overwhelming. I would love a 5 day view - 3 days is great because it’s intentional but getting the work week in one viewable window would be helpful. I know Google calendar forces the whole week on you though which I don’t totally love either. Either way I’m excited to see where the app goes from here! Nightmare of a time 6d ago DayOldEggs I’ve had a nightmare of a time with this app. It does not scale on iPad as it should. You have a desktop app that works great, why can’t it work the same on iPad? Furthermore on my phone it is not showing any of my events. I’ve reinstalled the app twice now, checked all my settings, and even went through trying to fix it using notion AI. Nothing has worked.When adding events through notion AI you have to specify in your AI settings that you want to use your own timezone, not the default on Notion.The views that are available have been buggy for me for weeks. I cannot scroll down all the way to midnight. Every calendar app I’ve ever used has the ability to show a full week, but this app does not. Scrolling through months is not intuitive. I’ve essentially resorted to only using my calendar on my computer, which is not practical. I’ve also had major issues getting the app to send me notifications. I’ve double checked my settings on my phone, and they are correct. I’m not sure what to do anymore. I pay for notion to use as an assistant, and at this point it only works in that manner fluidly on my laptop. Nightmare of a time 6d ago DayOldEggs I’ve had a nightmare of a time with this app. It does not scale on iPad as it should. You have a desktop app that works great, why can’t it work the same on iPad? Furthermore on my phone it is not showing any of my events. I’ve reinstalled the app twice now, checked all my settings, and even went through trying to fix it using notion AI. Nothing has worked.When adding events through notion AI you have to specify in your AI settings that you want to use your own timezone, not the default on Notion.The views that are available have been buggy for me for weeks. I cannot scroll down all the way to midnight. Every calendar app I’ve ever used has the ability to show a full week, but this app does not. Scrolling through months is not intuitive. I’ve essentially resorted to only using my calendar on my computer, which is not practical. I’ve also had major issues getting the app to send me notifications. I’ve double checked my settings on my phone, and they are correct. I’m not sure what to do anymore. I pay for notion to use as an assistant, and at this point it only works in that manner fluidly on my laptop. Best iOS Calendar 09/03/2024 beisntiskrkamfnt Notion Calendar is a game-changer for iOS users who want a calendar that's more than just a scheduling tool. Its integration with the Notion workspace is unparalleled, allowing you to link events to relevant pages, databases, and notes. This interconnectedness provides a rich context for your appointments, making it easier to stay organized and informed.The clean, intuitive interface is a joy to use, and the app's features, like customizable views and seamless syncing across devices, make it a top choice for anyone seeking a powerful and efficient calendar solution. Best iOS Calendar 09/03/2024 beisntiskrkamfnt Notion Calendar is a game-changer for iOS users who want a calendar that's more than just a scheduling tool. Its integration with the Notion workspace is unparalleled, allowing you to link events to relevant pages, databases, and notes. This interconnectedness provides a rich context for your appointments, making it easier to stay organized and informed.The clean, intuitive interface is a joy to use, and the app's features, like customizable views and seamless syncing across devices, make it a top choice for anyone seeking a powerful and efficient calendar solution. Close to Perfect 12/20/2025 Borrmu421 Overall the app is very clean and modern, much like the Notion app. The one thing I don’t understand is why there isn’t an Agenda or Monthly view for the calendar. I use the agenda view all the time in other apps and it’s a standard view in any calendar app I’ve used, so I’m not sure why it doesn’t exist within Notion’s calendar app. I’m trying to get used to the 3-day view but I typically like to see more of a schedule forecast in the days to come without scrolling all the time. Outside of adding a couple more views to enhance the user experience and appeal to everyone’s preferences, the app is great. It does exactly what you want it to. Having the ability to natively sync with my notion databases is awesome and helps me stay on task. I would certainly recommend any/all Notion products! Close to Perfect 12/20/2025 Borrmu421 Overall the app is very clean and modern, much like the Notion app. The one thing I don’t understand is why there isn’t an Agenda or Monthly view for the calendar. I use the agenda view all the time in other apps and it’s a standard view in any calendar app I’ve used, so I’m not sure why it doesn’t exist within Notion’s calendar app. I’m trying to get used to the 3-day view but I typically like to see more of a schedule forecast in the days to come without scrolling all the time. Outside of adding a couple more views to enhance the user experience and appeal to everyone’s preferences, the app is great. It does exactly what you want it to. Having the ability to natively sync with my notion databases is awesome and helps me stay on task. I would certainly recommend any/all Notion products! Helpful Tech Support 04/17/2025 The Game's a Foot I’m just starting out with Notion and Notion Calendar (NC) on iPad and iPhone and so far I like the features and functionality of the apps. I’m mainly here to talk about their tech support.I had a difficult time getting NC to sync with my Apple Calendar. I tried multiple attempts to sync, regardless of device. I carefully wrote a detailed explanation of everything I tried and the tech support guys were kind and helpful with their response, once I got past the initial response from the AI. Now it’s working and I can’t wait to get more organized and learn all the features of the app.I’m giving the app 4.5 stars rather than 5 because there are some areas for improvement I’m seeing, so far.Would prefer the app to recognize when my device is in landscape mode and automatically switch, since I rarely use portrait mode on my iPad and the tiny narrow calendar view is annoying.I would also prefer to get a real human response from tech support the first time. The AI assumes you know nothing and didn’t read the instructions or documentation before requesting help. It was a bit off-putting for someone with decades of experience working with computers. Helpful Tech Support 04/17/2025 The Game's a Foot I’m just starting out with Notion and Notion Calendar (NC) on iPad and iPhone and so far I like the features and functionality of the apps. I’m mainly here to talk about their tech support.I had a difficult time getting NC to sync with my Apple Calendar. I tried multiple attempts to sync, regardless of device. I carefully wrote a detailed explanation of everything I tried and the tech support guys were kind and helpful with their response, once I got past the initial response from the AI. Now it’s working and I can’t wait to get more organized and learn all the features of the app.I’m giving the app 4.5 stars rather than 5 because there are some areas for improvement I’m seeing, so far.Would prefer the app to recognize when my device is in landscape mode and automatically switch, since I rarely use portrait mode on my iPad and the tiny narrow calendar view is annoying.I would also prefer to get a real human response from tech support the first time. The AI assumes you know nothing and didn’t read the instructions or documentation before requesting help. It was a bit off-putting for someone with decades of experience working with computers. Fine calendar, limited Notion integration, awful widgets 03/01/2025 philobrain App works well enough as a calendar, but as a notion calendar… Could be a lot better. For example, for a page in my “Meetings” database, why can’t I see any page properties, like who’s attending, what project is it related to, etc. When another database has pages with multiple dates properties, why can’t these all appear under a single calendar? Instead I have to create multiple calendars. Very silly. As for the widgets, they are downright terrible. They don’t do anything to visualize the course of your day, merely a list of events and times. The large sizes waste all the extra space by adding useless “month” views that just show you what day of the month it is… They feel very phoned in, not thoughtful. Take a page from Apples book and get some inspiration from their calendar widgets. The point is to be useful! Fine calendar, limited Notion integration, awful widgets 03/01/2025 philobrain App works well enough as a calendar, but as a notion calendar… Could be a lot better. For example, for a page in my “Meetings” database, why can’t I see any page properties, like who’s attending, what project is it related to, etc. When another database has pages with multiple dates properties, why can’t these all appear under a single calendar? Instead I have to create multiple calendars. Very silly. As for the widgets, they are downright terrible. They don’t do anything to visualize the course of your day, merely a list of events and times. The large sizes waste all the extra space by adding useless “month” views that just show you what day of the month it is… They feel very phoned in, not thoughtful. Take a page from Apples book and get some inspiration from their calendar widgets. The point is to be useful! Widget Design & Status changes 07/12/2025 Yihe Wang I recently obsessed with using notion calendar on my laptop so I downloaded the iOS version but got a little disappointed. I really wish the design for the iOS version can get improved.1. The Widget design. I love to have a calendar view as a widget so I can get a sense of my agenda of the day, but for now the notion calendar widget is designed like a list of todos. I cannot get the sense of the actual agenda of the day. I need to know when the stuffs are scheduled and also how long they are going to take. 2. Also about the widget. Although it now looks like a todo list, but there is no way on the widget itself or even in the app to allow me change the status of the task like done, in progress, or not started. Widget Design & Status changes 07/12/2025 Yihe Wang I recently obsessed with using notion calendar on my laptop so I downloaded the iOS version but got a little disappointed. I really wish the design for the iOS version can get improved.1. The Widget design. I love to have a calendar view as a widget so I can get a sense of my agenda of the day, but for now the notion calendar widget is designed like a list of todos. I cannot get the sense of the actual agenda of the day. I need to know when the stuffs are scheduled and also how long they are going to take. 2. Also about the widget. Although it now looks like a todo list, but there is no way on the widget itself or even in the app to allow me change the status of the task like done, in progress, or not started. Good but needs Features 05/02/2025 216473629;7372 Notion Calendar is good on windows and iPhone but it has no special support for iPads. The iPad experience should be closer to the windows experience than the iPhone. The window should scale to the iPad screen and be able to show more than just a few on the screen at a time. Reminders in general should probably have a few more options that are further out from the event (3 days, 1 week, 2 weeks). Going back to the iPad support, I should be able to see the days of the month in a grid pattern with the activities listed under each day. As for the quality of the app, you can tell it’s refined and had time spent on it. It just needs more features that are standard in other calendars. Good but needs Features 05/02/2025 216473629;7372 Notion Calendar is good on windows and iPhone but it has no special support for iPads. The iPad experience should be closer to the windows experience than the iPhone. The window should scale to the iPad screen and be able to show more than just a few on the screen at a time. Reminders in general should probably have a few more options that are further out from the event (3 days, 1 week, 2 weeks). Going back to the iPad support, I should be able to see the days of the month in a grid pattern with the activities listed under each day. As for the quality of the app, you can tell it’s refined and had time spent on it. It just needs more features that are standard in other calendars. View Issue 10/24/2025 nchlsrbrts Let's say I need to check what I had scheduled a month from now at around 8pm. I would need to scroll down in groups of three days multiple times hoping to find it. There is no way, as far as I know, to see the full day on your screen. Only "all day" events show at the top. For example, something that is very helpful: on Google Calendar there is a dot in the monthly view so you can see which days you might have that event a month from now. I shouldn't have to hunt for entries so much on a calendar app, it's a productivity app, and I'm certain others are annoyed by this as well. It seems someone didn't do their homework with necessary features.Having a scroll format view with current calendar entries like Google calendar would help with this as well. I've been trying to de-Google my life as much as possible. It would be nice to have this app functional. It would be great to be able to import calendars and have them stored on Notion servers as well. Can't imagine the data storage being an issue considering how much text is stored in Notion.Probably won't see these issues being addressed for another year so back to other calendar apps for the time being. View Issue 10/24/2025 nchlsrbrts Let's say I need to check what I had scheduled a month from now at around 8pm. I would need to scroll down in groups of three days multiple times hoping to find it. There is no way, as far as I know, to see the full day on your screen. Only "all day" events show at the top. For example, something that is very helpful: on Google Calendar there is a dot in the monthly view so you can see which days you might have that event a month from now. I shouldn't have to hunt for entries so much on a calendar app, it's a productivity app, and I'm certain others are annoyed by this as well. It seems someone didn't do their homework with necessary features.Having a scroll format view with current calendar entries like Google calendar would help with this as well. I've been trying to de-Google my life as much as possible. It would be nice to have this app functional. It would be great to be able to import calendars and have them stored on Notion servers as well. Can't imagine the data storage being an issue considering how much text is stored in Notion.Probably won't see these issues being addressed for another year so back to other calendar apps for the time being. Please fix the widgets!!! 09/29/2024 lilovereducated I never leave reviews, but this is the first time I’m doing so because I feel like I see a lot of potential for this app- but something has to be fixed! I love the idea of using Notion Calendar to consolidate my task lists on notion and my other calendars. It’s nice except for the fact that the widgets don’t sync properly- you have to open the app a couple times to ensure the widget is displaying the correct day’s tasks and events. If you do not do this every day- it will not sync with the current time until you do, meaning the widget can literally show the tasks and events from weeks prior if not constantly refreshed manually. Please fix this! The events don’t even progress on the widgets as the time goes on either unless you again- open the app a couple of times to refresh it. Sure, I could check my calendar constantly- but I shouldn’t have to considering every other calendar app’s widgets (google and apple) just seamlessly syncs with the time. For that reason, I’m leaving my rating at 2 stars for now. Hope to see this addressed in a future update. Please fix the widgets!!! 09/29/2024 lilovereducated I never leave reviews, but this is the first time I’m doing so because I feel like I see a lot of potential for this app- but something has to be fixed! I love the idea of using Notion Calendar to consolidate my task lists on notion and my other calendars. It’s nice except for the fact that the widgets don’t sync properly- you have to open the app a couple times to ensure the widget is displaying the correct day’s tasks and events. If you do not do this every day- it will not sync with the current time until you do, meaning the widget can literally show the tasks and events from weeks prior if not constantly refreshed manually. Please fix this! The events don’t even progress on the widgets as the time goes on either unless you again- open the app a couple of times to refresh it. Sure, I could check my calendar constantly- but I shouldn’t have to considering every other calendar app’s widgets (google and apple) just seamlessly syncs with the time. For that reason, I’m leaving my rating at 2 stars for now. Hope to see this addressed in a future update. United States Español (México) العربية Русский 简体中文 Français (France) 한국어 Português (Brazil) Tiếng Việt 繁體中文 (台灣) Select a country or region Africa, Middle East, and India See All Algeria Angola Armenia Azerbaijan Bahrain Benin Botswana Brunei Darussalam Burkina Faso Cameroun Cape Verde Chad Côte d’Ivoire Congo, The Democratic Republic Of The Egypt Eswatini Gabon Gambia Ghana Guinea-Bissau India Iraq Israel Jordan Kenya Kuwait Lebanon Liberia Libya Madagascar Malawi Mali Mauritania Mauritius Morocco Mozambique Namibia Niger (English) Nigeria Oman Qatar Congo, Republic of Rwanda São Tomé and Príncipe Saudi Arabia Senegal Seychelles Sierra Leone South Africa Sri Lanka Tajikistan Tanzania, United Republic Of Tunisia Turkmenistan United Arab Emirates Uganda Yemen Zambia Zimbabwe Asia Pacific See All Afghanistan Australia Bhutan Cambodia 中国大陆 Fiji 香港 Indonesia (English) 日本 Kazakhstan 대한민국 Kyrgyzstan Lao People's Democratic Republic 澳門 Malaysia (English) Maldives Micronesia, Federated States of Mongolia Myanmar Nauru Nepal New Zealand Pakistan Palau Papua New Guinea Philippines Singapore Solomon Islands 台灣 Thailand Tonga Turkmenistan Uzbekistan Vanuatu Vietnam Europe See All Albania Armenia Österreich Belarus Belgium Bosnia and Herzegovina Bulgaria Croatia Cyprus Czechia Denmark Estonia Finland France (Français) Georgia Deutschland Greece Hungary Iceland Ireland Italia Kosovo Latvia Lithuania Luxembourg (English) Malta Moldova, Republic Of Montenegro Nederland North Macedonia Norway Poland Portugal (Português) Romania Россия Serbia Slovakia Slovenia España Sverige Schweiz Türkiye (English) Ukraine United Kingdom Latin America and the Caribbean See All Anguilla Antigua and Barbuda Argentina (Español) Bahamas Barbados Belize Bermuda Bolivia (Español) Brasil Virgin Islands, British Cayman Islands Chile (Español) Colombia (Español) Costa Rica (Español) Dominica República Dominicana Ecuador (Español) El Salvador (Español) Grenada Guatemala (Español) Guyana Honduras (Español) Jamaica México Montserrat Nicaragua (Español) Panamá Paraguay (Español) Perú St. Kitts and Nevis Saint Lucia St. Vincent and The Grenadines Suriname Trinidad and Tobago Turks and Caicos Uruguay (English) Venezuela (Español) The United States and Canada See All Canada (English) Canada (Français) United States Estados Unidos (Español México) الولايات المتحدة США 美国 (简体中文) États-Unis (Français France) 미국 Estados Unidos (Português Brasil) Hoa Kỳ 美國 (繁體中文台灣) Copyright © 2026 Apple Inc. All rights reserved. Internet Service Terms App Store & Privacy Cookie Warning Support
2026-01-13T09:29:55
https://www.telegraph.co.uk/all-sections#news
All Sections - The Telegraph Jump to content UK News Website of the Year 2024 Search Icon News Sport Business Money Travel Calculators Opinion Ukraine Health Recommended Lifestyle Culture Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Search Icon Subscribe now Log in Sections UK Edition US Edition News News home UK news Politics World Donald Trump Health news Defence Science Education Environment Investigations Global Health Security Royals Sport Sport home Football Rugby Union Cricket Golf F1 Tennis Racing Women's Sport Cycling Boxing Betting More... Business Business home Economy Companies Markets Tech Money Money home Property Tax Pensions Banking Investing Net Zero Calculators Guides Travel Travel home Europe UK Worldwide City breaks Hotels Cruise Ski Advice Calculators Opinion Opinion home Obituaries Letters to the Editor Telegraph View Our columnists Cartoons Ukraine Ukraine home Daily podcast Weekly newsletter Health Health home Diet Fitness Conditions Wellbeing Parenting Guides Tools Recommended Recommended home Home Garden Sleep Tech Health & Fitness Beauty & Grooming Travel & Outdoors Parenting Lifestyle Lifestyle home Recipes Food & Drink Fashion Beauty Luxury Cars Gardening Culture Culture home TV Film Music Books Theatre Comedy Dance Opera Classical Art Telegraph Tickets Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Subscribe now Log in Login icon Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon More from The Telegraph Download our app Help and support Newsletters Recommended Financial Solutions Events Dating Offers Travel offers Shop Garden shop Bookshop Tickets Puzzles Fantasy Football Work at The Telegraph Telegraph Corporate Announcements The Chelsea Magazine Company Voucher codes See top shops Samsung Nike ASOS eBay Currys Wayfair TUI JD Sports Travelodge Adidas Sections UK Edition US Edition News News home UK news Politics World Donald Trump Health news Defence Science Education Environment Investigations Global Health Security Royals Sport Sport home Football Rugby Union Cricket Golf F1 Tennis Racing Women's Sport Cycling Boxing Betting More... Business Business home Economy Companies Markets Tech Money Money home Property Tax Pensions Banking Investing Net Zero Calculators Guides Travel Travel home Europe UK Worldwide City breaks Hotels Cruise Ski Advice Calculators Opinion Opinion home Obituaries Letters to the Editor Telegraph View Our columnists Cartoons Ukraine Ukraine home Daily podcast Weekly newsletter Health Health home Diet Fitness Conditions Wellbeing Parenting Guides Tools Recommended Recommended home Home Garden Sleep Tech Health & Fitness Beauty & Grooming Travel & Outdoors Parenting Lifestyle Lifestyle home Recipes Food & Drink Fashion Beauty Luxury Cars Gardening Culture Culture home TV Film Music Books Theatre Comedy Dance Opera Classical Art Telegraph Tickets Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Subscribe now Log in Login icon Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon More from The Telegraph Download our app Help and support Newsletters Recommended Financial Solutions Events Dating Offers Travel offers Shop Garden shop Bookshop Tickets Puzzles Fantasy Football Work at The Telegraph Telegraph Corporate Announcements The Chelsea Magazine Company Voucher codes See top shops Samsung Nike ASOS eBay Currys Wayfair TUI JD Sports Travelodge Adidas The Telegraph Back to top Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon Download the Telegraph App Recommended Podcasts Syndication and Commissioning Help Centre Betting Branded Content Privacy Reader Prints Theatre Tickets Careers About us Announcements Puzzles Guidelines Terms & Conditions Newsletters Crosswords Tax Strategy Advertising terms Subscribe Cryptic Crossword Modern Slavery Subscription Terms & Conditions Gift Subscriptions Plusword The Chelsea Magazine Company © Telegraph Media Group Holdings Limited 2026
2026-01-13T09:29:55
https://www.notion.com/ar/product/mail
Notion Mail Notion الميزات Notion AI إنشاء، كتابة، أتمتة الوكلاء يتعامل مع المهام اليدوية بحث المؤسسة اعثر على إجابات على الفور ملاحظات الاجتماع المدعومة بالذكاء الاصطناعي مكتوبة بشكل مثالي بواسطة الذكاء الاصطناعي المُستندات بسيط وقوي قاعدة المعرفة تجميع معرفتك في مكان واحد المشاريع إدارة أي مشروع المواقع انشر أي شيء بسرعة البدء استكشاف حالات استخدام الذكاء الاصطناعي تعرّف على قدرات Notion AI تصفح السوق قوالب لكل شيء عرض عمليات التكامل ربط تطبيقاتك مع Notion تنزيل web clipper حفظ من الويب إلى Notion جرّب تطبيق Notion لسطح المكتب للحصول على تجربة أسرع تنزيل التطبيق البريد التقويم الذكاء الاصطناعي الخطة المؤسسية التسعير استكشاف الفرق الهندسة والمنتج التصميم التسويق تقنية المعلومات حجم الفريق الشركات الناشئة الشركات الصغيرة والمتوسطة المؤسسة التعليم التعلم مركز المساعدة أكاديمية Notion قصص العملاء المدونة المجتمع برامج الشركاء الإصدار واجهة برمجة التطبيقات (API) القوالب الأمان الاستشاريون اطلب عرضاً توضيحياً تسجيل الدخول احصل على Notion Mail مجاناً صندوق وارد يفكر مثلك تعرّف على Notion Mail، صندوق الوارد الذي ينظم نفسه، ويكتب مسودات رسائل البريد الإلكتروني، ويجدول مواعيد الاجتماعات بالطريقة التي تريدها. احصل على Notion Mail مجاناً تنظيم توظيف المرشحين المجموعة تذاكر الدعم تصفية رسائل البريد الإلكتروني غير المرغوبة Doru البحث طرق العرض صندوق الوارد التقويم التوظيف الدعم السفر النشرات الإخبارية البريد كل البريد البريد المرسَل المسودات صندوق الوارد تسمية تلقائية أندرو، جيسون الخطوات التالية التوظيف جاك ستيدمان تعذَّر العثور على زر تسجيل الخروج الدعم بود، ستيفاني وظيفة مصمم منتجات التوظيف ناتالي يبدو أن الوضع الداكن قيد الإيقاف الدعم كوستا بي مقابلة فنية التوظيف صني، فايشنافي رد: قهوة التوظيف تم تمكين Markdown وظيفة جديدة رائعة التوظيف فيكي سوارا تسريع تكنولوجيا المعلومات الخاصة بك CMYK Apparel هل هناك غداء مجاني؟ ميشاي لوتسا قيد الانتظار: مدخلاتك حول نطاق المشروع رسالة بريد إلكتروني غير مرغوب فيها قسم المالية، بيني بي حالة تقرير النفقات رسالة بريد إلكتروني غير مرغوب فيها نان إي. لوهرا في انتظار الاتفاقية الموقعة يقدّم Notion Mail أخيراً ابتكاراً جديداً إلى شيء لم يتغير لعقود. دينيز بيرليكجي denizbirlikci@ لقد أتاح لي Notion Mail إنشاء نظام مخصص للغاية للطريقة التي أعمل بها، وعلاقاتي، ونبرة صوتي لدرجة أنه لا توجد إمكانية للعودة إلى الطريقة القديمة للقيام بالأشياء. كاميل ريكيتس camillericketts@ حسناً: Notion Mail مثير للإعجاب. أليكس aleksliving@ لقد أبدعوا حقاً في Notion Mail. وخاصةً فلتر التصفية التلقائي بالذكاء الاصطناعي. ربما يمكن تحقيق صندوق وارد خالٍ من الرسائل غير المعالجة أخيراً. أريان ariancodes@ يشبه استخدام NotionMail@ إنشاء طرق عرض تمت تصفيتها لقواعد بياناتك، لكن الخصائص هي عناصر من رسائل بريدك الإلكتروني. متحمس جداً لضبط هذا الإعداد. هانتر بوهن TheHunterBohm@ يقدّم Notion Mail أخيراً ابتكاراً جديداً إلى شيء لم يتغير لعقود. دينيز بيرليكجي denizbirlikci@ لقد أتاح لي Notion Mail إنشاء نظام مخصص للغاية للطريقة التي أعمل بها، وعلاقاتي، ونبرة صوتي لدرجة أنه لا توجد إمكانية للعودة إلى الطريقة القديمة للقيام بالأشياء. كاميل ريكيتس camillericketts@ حسناً: Notion Mail مثير للإعجاب. أليكس aleksliving@ لقد أبدعوا حقاً في Notion Mail. وخاصةً فلتر التصفية التلقائي بالذكاء الاصطناعي. ربما يمكن تحقيق صندوق وارد خالٍ من الرسائل غير المعالجة أخيراً. أريان ariancodes@ يشبه استخدام NotionMail@ إنشاء طرق عرض تمت تصفيتها لقواعد بياناتك، لكن الخصائص هي عناصر من رسائل بريدك الإلكتروني. متحمس جداً لضبط هذا الإعداد. هانتر بوهن TheHunterBohm@ يستحق NotionMail@ كل جزء من الاهتمام الذي يحصل عليه. ويُعدّ الانتقال من خدمة Gmail إلى خدمة أخرى أمراً طبيعياً للمستخدمين المحترفين. مايك ماجارا mikemajara@ باستخدام الذكاء الاصطناعي لـ NotionMail@، تُوجّه رسائل البريد الإلكتروني غير الضرورية بشكل صحيح إلى مجلدات البريد العشوائي والتحديثات والعروض الترويجية ووسائل التواصل الاجتماعي وGitHub وما إلى ذلك، بينما يمكنني التركيز على رسائل البريد الإلكتروني الأساسية. روهيت غوماري ghumare64@ أحب استخدام NotionMail@، وخاصةً ميزة التسمية التلقائية بواسطة الذكاء الاصطناعي. التي تجعل من تنظيم صندوق بريدك عملية أسهل. محمد طيب tayyabgoose@ يبدو الأمر مذهلاً. لقد تخلصت أخيراً من القلق المرتبط بإدارة رسائل البريد الإلكتروني. وقد أحب NotionMail@ أكثر من Notion نفسه. كاميل روشينسكي _unable0@ يستحق NotionMail@ كل جزء من الاهتمام الذي يحصل عليه. ويُعدّ الانتقال من خدمة Gmail إلى خدمة أخرى أمراً طبيعياً للمستخدمين المحترفين. مايك ماجارا mikemajara@ باستخدام الذكاء الاصطناعي لـ NotionMail@، تُوجّه رسائل البريد الإلكتروني غير الضرورية بشكل صحيح إلى مجلدات البريد العشوائي والتحديثات والعروض الترويجية ووسائل التواصل الاجتماعي وGitHub وما إلى ذلك، بينما يمكنني التركيز على رسائل البريد الإلكتروني الأساسية. روهيت غوماري ghumare64@ أحب استخدام NotionMail@، وخاصةً ميزة التسمية التلقائية بواسطة الذكاء الاصطناعي. التي تجعل من تنظيم صندوق بريدك عملية أسهل. محمد طيب tayyabgoose@ يبدو الأمر مذهلاً. لقد تخلصت أخيراً من القلق المرتبط بإدارة رسائل البريد الإلكتروني. وقد أحب NotionMail@ أكثر من Notion نفسه. كاميل روشينسكي _unable0@ تنظيم رسائل البريد الإلكتروني بصورة مؤتمتة. ع ر و ض   ا ل ع م ل   ا ل ت ي   ت ت ط ل ب   ت و ق ي ع ا ً مقترح المستندات التي تتطلب توقيعي ملاحظات العملاء عن المنتج حجوزات السفر وتأكيداتها صندوق الوارد تسمية تلقائية كوستا بي عرض وظيفي التوقيع ريان كيه السيرة الذاتية لوظيفة المبيعات جو زي ما تاريخ البدء؟ التوقيع ناتالي أيه مقابلة مجدولة مع كريستي إم كيكي سيغال تهانينا! التوقيع أخبر Notion AI عن أنواع رسائل البريد الإلكتروني المهمة للقراءة، وسيتم تصنيفها وفرزها تلقائياً عند استلامها. Doru بحث المشاهدات صندوق الوارد التقويم التوظيف الدعم السفر النشرات الإخبارية البريد كل البريد تم الإرسال المسودات صندوق الوارد كوستا بي كوستا بي الجدول الزمني للتوظيف؟ ريان كي السيرة الذاتية لوظيفة المبيعات كيكي سيغال جو زي التقديم لوظيفة مصمم المنتجات ناتالي أي مقابلة مجدولة مع كريستي إم. كيكي سيغال أتطلع إلى المقابلة غداً! قسّم صندوق الوارد إلى طرق عرض مخصصة تتطابق مع مجالات تركيزك. تصفية حسب النطاق التقويم التصنيف شخص النطاق التقويم التصنيف شخص النطاق التقويم التصنيف شخص النطاق التقويم التصنيف شخص قم بتجميع رسائل البريد الإلكتروني وتصفيتها حسب الموضوع والمرسل والتسمية - وفقاً لاحتياجاتك. كل رد تمت صياغته، بسرعة. مقتطفات لا تكتب رسالة البريد الإلكتروني نفسها مرتين. أنشئ قوالب بريد إلكتروني يمكنك إعادة استخدامها بنقرة واحدة. الجدولة المدمجة ردود سريعة حسّن كتاباتك باستخدام الذكاء الاصطناعي ديانا إم [email protected] جاك ستيدمان شراكة مرحباً {first_name} ، أنا ديانا. أنا معجب بعملك في {الشركة} وأرى إمكانية إقامة شراكة. هل أنت متاح لإجراء محادثة سريعة؟ صُمم لسرعة بدء التشغيل. اربط Gmail وتأكّد بنفسك. ابدأ مجاناً يشبه Notion تماماً اكتب رسائل بريد إلكتروني جميلة بسرعة باستخدام محرر Notion. ديانا إم [email protected] جاك ستيدمان شراكة مرحباً أندرو، آمل أن تكون بخير. أردت فقط أن أعرّف بنفسي - أنا أليكس، أعمل مصمّماً في شركة Acme Labs. / الكتل الأساسية قائمة نقطية تنبيه العنوان 1 الجدول نص متاح في أي مكان، وحتى في وضع عدم الاتصال. أدر بريدك الإلكتروني أثناء التنقل باستخدام تطبيق iOS. نزِّل التطبيق لنظام التشغيل iOS ← بريد إلكتروني خالٍ من المشتتات. احصل على تطبيق Mac. نزِّل التطبيق لنظام التشغيل macOS ← صُمم مع وضع أمان البيانات في الاعتبار. متوافق مع GDPR وCCPA. لم تُستخدم بياناتك في التدريب. معتمد من HIPAA وSOC 2 (النوع 1). أسئلة وأجوبة ما هو مزود (مزودي) البريد الإلكتروني الذي يتوافق معه Notion Mail؟ يتكامل Notion Mail مع حسابات Google وGmail. متى سيكون Notion Mail متاحاً على الأجهزة المحمولة؟ Notion Mail متاح الآن على iOS وسيُتاح على Android قريباً جداً. ما هي اللغات التي يتوفر بها Notion Mail؟ Notion Mail متاح حالياً باللغة الإنجليزية. وسندعم ثلاث عشرة لغة إضافية (تماماً مثل Notion!) قريباً جداً. هل يمكنني إدارة حسابات بريد إلكتروني متعددة على Notion Mail؟ نعم، يمكنك استخدام حسابات Notion متعددة لإدارة رسائل البريد الإلكتروني المختلفة. لا نقدم حالياً صندوق بريد وارد موحّد يعرض رسائل البريد الإلكتروني من جميع حساباتك في مكان واحد. ما هي معايير أمان Notion Mail؟ Notion Mail معتمد من SOC2 ومتوافق مع HIPAA، تماماً مثل Notion. كما أنه يحترم نفس الشروط وسياسات الخصوصية التي تثق بها بالفعل. معرفة المزيد. العربية إعدادات ملفات تعريف الارتباط © 2026 Notion Labs, Inc. الشركة نبذة عنا الوظائف الأمان الحالة الشروط والخصوصية حقوقك المتعلقة بالخصوصية تنزيل iOS وAndroid Mac وWindows التقويم Web Clipper الموارد مركز المساعدة التسعير المدونة المجتمع عمليات التكامل القوالب برامج الشركاء Notion لأجل الخطة المؤسسية الشركات الصغيرة شخصي استكشف المزيد →
2026-01-13T09:29:55
https://www.notion.com/ar/partners
انضم كشريك في Notion | Notion Notion الميزات Notion AI إنشاء، كتابة، أتمتة الوكلاء يتعامل مع المهام اليدوية بحث المؤسسة اعثر على إجابات على الفور ملاحظات الاجتماع المدعومة بالذكاء الاصطناعي مكتوبة بشكل مثالي بواسطة الذكاء الاصطناعي المُستندات بسيط وقوي قاعدة المعرفة تجميع معرفتك في مكان واحد المشاريع إدارة أي مشروع المواقع انشر أي شيء بسرعة البدء استكشاف حالات استخدام الذكاء الاصطناعي تعرّف على قدرات Notion AI تصفح السوق قوالب لكل شيء عرض عمليات التكامل ربط تطبيقاتك مع Notion تنزيل web clipper حفظ من الويب إلى Notion جرّب تطبيق Notion لسطح المكتب للحصول على تجربة أسرع تنزيل التطبيق البريد التقويم الذكاء الاصطناعي الخطة المؤسسية التسعير استكشاف الفرق الهندسة والمنتج التصميم التسويق تقنية المعلومات حجم الفريق الشركات الناشئة الشركات الصغيرة والمتوسطة المؤسسة التعليم التعلم مركز المساعدة أكاديمية Notion قصص العملاء المدونة المجتمع برامج الشركاء الإصدار واجهة برمجة التطبيقات (API) القوالب الأمان الاستشاريون اطلب عرضاً توضيحياً تسجيل الدخول احصل على Notion مجاناً انضم كشريك في Notion. نحن في مهمة لجعل صناعة أدوات البرمجيات أمراً متاحاً للجميع، لكن لا يمكننا تحقيق ذلك بمفردنا. انضم كشريك في Notion وواصِل معنا رحلة النمو. أي برنامج شراكة هو الأنسب لك؟ اكتشف برنامج الشراكة الذي يناسبك واستمتع بمزايا العمل باستخدام Notion. برنامج الشركاء التقنيين تقدّم Notion أفضل تجربة عند الربط مع الأدوات الأخرى التي تُسهم في تسهيل عملنا. يتيح شركاؤنا التقنيون ذلك من خلال بناء عمليات تكامل تربط سير العمل، وتعزز الإنتاجية، وتُسعد مستخدمينا المشتركين. الانضمام كشريك تقني ← برنامج شركاء الحلول ساعدنا في تلبية الاحتياجات الفريدة لعملاء Notion وتنمية أعمالك. يتيح شركاء الحلول فرصاً جديدة للمبيعات والخدمات، ويحصلون على العملاء المحتملين ذوي الأولوية ويستفيدون من الدعم والموارد المخصصة. الانضمام كشريك حلول ← برنامج شركاء الأمان والامتثال انضم إلى العشرات من شركاء الأمان والامتثال في جميع أنحاء العالم وساعدنا في ضمان الأمن والامتثال لعملاء الخطة المؤسسية من Notion. الانضمام كشريك أمان وامتثال ← برنامج شركاء الشركات الناشئة قدّم لشبكة شركتك الناشئة وصولاً مجانياً إلى Notion وموارد متعددة، بما في ذلك 6 أشهر مجانية من خطة الأعمال مع Notion AI، وخصومات حصرية على البرمجيات، وتمتع بإمكانية الوصول إلى مجتمع أبطال الشركات الناشئة. الانضمام كشريك في برنامج الشركات الناشئة ← برنامج المطورين مناسب للمبدعين والمؤسسين والمبتكرين الذين يبنون المستقبل على Notion. عزّز حضورك في منظومة الشركات الناشئة مع تقديم ما يصل إلى 3 أشهر مجانية من خطة الأعمال مع Notion AI لجمهورك. الانضمام كشريك مطور ← انضم إلى منظومتنا التي تضم أكثر من 1000 شريك في Notion. توفر عمليات تكامل Figma على Notion طريقة عرض سلسة وبصرية لاستخدام أدواتنا معاً، وهو ما ينال رضى مستخدمينا المشتركين ويعزز التعاون في العمل. آنا كونن رئيسة قسم الشراكات في Figma، شريك Notion التقني يسعدنا أن نكون شركاء مع Notion. تقدم برامج Intercom وNotion للشركات الناشئة قيمة كبيرة للشركات الناشئة، مما يمكّن المؤسسين من استخدام الأدوات التي يحتاجون إليها لتوسيع نطاق أعمالهم. بيدرو مولر رئيس قسم الشركات الناشئة في Intercom، شريك Notion للشركات الناشئة أحب مشاركة الأدوات التي أبتكرها داخل Notion، ويسمح لي برنامج الشركاء التابع في Notion بكسب المال من خلال القيام بما كنت أنوي فعله. توماس فرانك مُنشئ محتوى، شريك تابع في Notion طرق إضافية للمشاركة. Marketplace انضم كمنشئ للقوالب هل أنشأت إعداداً رائعاً يستحق المشاركة؟ انشر قوالبك وحقق مبيعات على Notion Marketplace. تقديم قالب ← قواعد البيانات وظّف شريك حلول شركاء حلول Notion هم خبراء موثوقون في الإنتاجية ومصممو حلول محترفون. البدء الآن ← العربية إعدادات ملفات تعريف الارتباط © 2026 Notion Labs, Inc. الشركة نبذة عنا الوظائف الأمان الحالة الشروط والخصوصية حقوقك المتعلقة بالخصوصية تنزيل iOS وAndroid Mac وWindows التقويم Web Clipper الموارد مركز المساعدة التسعير المدونة المجتمع عمليات التكامل القوالب برامج الشركاء Notion لأجل الخطة المؤسسية الشركات الصغيرة شخصي استكشف المزيد →
2026-01-13T09:29:55
https://snyk.io/es/customer-resources/
Recursos para clientes de Snyk | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API & Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API & Web - Todos los clientes Snyk API & Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo Recursos para clientes de Snyk Consulta los recursos para clientes de Snyk, que incluyen cómo empezar a utilizar Snyk, asistencia y servicios al cliente, y sesiones y contenidos educativos. Empezar a utilizar Snyk Conoce las prácticas recomendadas para implementar Snyk en tu organización y potenciar tu programa AppSec. Puesta en marcha para administradores de Snyk Guía para completar las tareas de configuración. Mira a pedido Documentos de implementación Documentación para los administradores que configuran Snyk para sus organizaciones. Ver documentación Formación sobre productos Snyk Tutoriales a tu ritmo sobre los productos y funciones de Snyk. Iniciar las lecciones API de Snyk Integración programática con Snyk. Ver documentación Integraciones de Snyk Integra Snyk con tus herramientas y flujos de trabajo existentes. Mira todas las integraciones Preguntas frecuentes sobre la asistencia Obtén respuestas a las preguntas más frecuentes sobre la plataforma Snyk. Ver preguntas frecuentes Servicios profesionales y de asistencia Snyk puede ofrecerte asistencia técnica y experiencia para maximizar el ROI (retorno de la inversión) en seguridad. Estado de Snyk Mantente al día con las métricas, el mantenimiento y las incidencias de los sistemas. Ver el estado de Snyk Éxito y oferta de servicios Adquiere asistencia y servicios técnicos específicos. Ver ofertas Formación en seguridad para desarrolladores Mantén a tu equipo a la vanguardia de la seguridad con recursos educativos. Snyk Learn Formación sobre vulnerabilidades de seguridad diseñada para desarrolladores. Iniciar las lecciones Eventos y seminarios web Únete a nosotros en sesiones educativas, reuniones y conferencias. Ver los próximos eventos Blog de Snyk Mantente al día sobre temas de seguridad para desarrolladores y los últimos resultados de las investigaciones sobre seguridad. Ver blog Introducción a Snyk para desarrolladores Sesión de formación para desarrolladores nuevos en Snyk para aprender a integrar Snyk en su flujo de trabajo de desarrollo. Mirar ahora Comunícate con nosotros Comunícate con tu equipo de cuentas si tienes alguna pregunta. Contáctanos Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:55
https://infisical.com/docs/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal
Certificates - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Certificates Certificates Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Overview Profiles Templates Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let's Encrypt DigiCert Microsoft AD CS On this page Concept Guide to Issuing Certificates Guide to Renewing Certificates Client-Driven Certificate Renewal Server-Driven Certificate Renewal Guide to Downloading Certificates Download Latest Profile Certificate Download Specific Certificate Guide to Revoking Certificates Certificates Certificates PKI architecture is a complex topic and there are many ways to orchestrate certificate management including renewal operations. For specific guidance and access to enterprise features, we recommend reaching out to [email protected] to schedule a demo. ​ Concept A certificate is the (X.509) leaf certificate issued for a certificate profile. Once issued, a certificate is kept track of in the certificate inventory where you can manage various aspects of its lifecycle including deployment to cloud key stores, server-side auto-renewal behavior, revocation, and more. ​ Guide to Issuing Certificates To issue a certificate , you must first create a certificate profile and a certificate template to go along with it. Self-Signed Certificates: To issue a self-signed certificate , you must configure the certificate profile to use the Self-Signed issuer type. You can then use the API enrollment method to request a self-signed certificate against it. CA-Issued Certificates: To issue a certificate from a certificate authority, you must configure the certificate profile to use the Certificate Authority issuer type and select the issuing CA to use. You can then use one of the enrollment methods to request a certificate against it. Refer to the documentation for each enrollment method to learn more about how to issue certificates using it. ​ Guide to Renewing Certificates To renew a certificate , you can either request a new certificate from a certificate profile or have the platform automatically request a new one for you to be delivered downstream to a target destination. Whether you pursue a client-driven or server-driven approach is totally dependent on the enrollment method configured on your certificate profile as well as your infrastructure use-case. ​ Client-Driven Certificate Renewal Client-driven certificate renewal is when renewal is initiated client-side by the end-entity consuming the certificate. More specifically, the client (e.g. Infisical Agent , ACME client , etc.) monitors the certificate and makes a request for Infisical to issue a new certificate back to it when the existing certificate is nearing expiration. This is the most common approach to certificate renewal and is suitable for most use-cases. ​ Server-Driven Certificate Renewal Server-driven certificate renewal is when renewal is initiated server-side by Infisical rather than by the end-entity consuming the certificate. When a certificate considered for auto-renewal meets a specified renewal days before expiration threshold, Infisical reaches out to the issuing CA bound to the certificate profile of the expiring certificate to request for a new one. The resulting renewed certificate is stored in the platform and made available to be fetched back or pushed downstream to end-entities or external systems such as cloud key stores. Note that server-driven certificate renewal is only available for certificates issued via the API enrollment method where key pairs are generated server-side. A certificate can be considered for auto-renewal at time of issuance if the Enable Auto-Renewal By Default option is selected on its certificate profile or after issuance by toggling this option manually. For server-driven certificate renewal workflows, you can programmatically fetch the latest active certificate bundle for a certificate profile using the Get Latest Active Certificate Bundle API endpoint. This ensures you always retrieve the most current valid certificate, including any that have been automatically renewed, making it particularly useful for deployment pipelines and automation workflows where you don’t want to track individual serial numbers. The following examples demonstrate different approaches to certificate renewal: Using the ACME enrollment method , you may connect an ACME client like certbot to fetch back and renew certificates for Apache , Nginx , or other server. The ACME client will pursue a client-driven approach and submit certificate requests upon certificate expiration for you, saving renewed certificates back to the server’s configuration. Using the ACME enrollment method , you may use cert-manager with Infisical to issue and renew certificates for Kubernetes workloads; cert-manager will pursue a client-driven approach and submit certificate requests upon certificate expiration for you, saving renewed certificates back to Kubernetes secrets. Using the API enrollment method , you may push and auto-renew certificates to AWS and Azure using certificate syncs . Certificates issued over the API enrollment method, where key pairs are generated server-side, are also eligible for server-side auto-renewal; once renewed, certificates are automatically pushed back to their sync destination. ​ Guide to Downloading Certificates In the following steps, we explore different options for exporting already-issued certificates from Infisical in different formats for use in your applications and infrastructure. ​ Download Latest Profile Certificate You can download the latest certificate issued against a certificate profile using the latest certificate bundle endpoint. ​ Download Specific Certificate To export a specific certificate, first navigate to your project’s certificate inventory and locate the certificate you want to export. Click on the Export Certificate option from the certificate’s action menu. PEM Format PKCS12 Format 1 Exporting in PEM Format In the export modal, choose PEM as the format and click Export . The PEM export modal will display the certificate details including: Serial Number : The unique identifier for the certificate Certificate Body : The X.509 certificate in PEM format Certificate Chain : The intermediate and root CA certificates Private Key : The private key associated with the certificate (if available) You can copy each component individually or use the Copy All button to copy the complete certificate bundle. 2 Using PEM Certificates PEM format certificates can be used directly with most web servers and applications: Apache HTTP Server : Configure SSL certificates in your virtual host Nginx : Use the certificate and private key files in your server configuration Docker containers : Mount certificate files for TLS-enabled applications Load balancers : Upload PEM certificates to AWS ALB, Azure Application Gateway, etc. Example Nginx configuration: Copy Ask AI server { listen 443 ssl; server_name example.com; ssl_certificate /path/to/certificate.pem; ssl_certificate_key /path/to/private-key.pem; } 1 Exporting in PKCS12 Format In the export modal, choose PKCS12 as the format and provide the required configuration: Password : A secure password to protect the PKCS12 keystore Alias : A friendly name for the certificate within the keystore Click Export to generate and download the .p12 file containing the certificate, certificate chain, and private key. 2 Using PKCS12 Certificates PKCS12 files ( .p12 extension) are binary keystore files that contain the certificate, certificate chain, and private key in a single encrypted file: Java applications : Import directly into Java KeyStore (JKS) or use with SSL/TLS Windows IIS : Import the PKCS12 file for web server SSL configuration Browser certificates : Install client certificates for authentication Mobile applications : Deploy certificates to iOS and Android applications To verify the contents of a PKCS12 file: Copy Ask AI openssl pkcs12 -in certificate.p12 -nokeys -clcerts To extract the private key: Copy Ask AI openssl pkcs12 -in certificate.p12 -nocerts -out private-key.pem If you need to convert the PKCS12 file to Java KeyStore (JKS) format for applications running on Java 8 or earlier, use the following keytool command: Copy Ask AI keytool -importkeystore \ -srckeystore certificate.p12 \ -srcstoretype PKCS12 \ -srcstorepass < p12-passwor d> \ -destkeystore certificate.jks \ -deststoretype JKS \ -deststorepass < jks-passwor d> Replace <p12-password> with the password you used when exporting the PKCS12 file, and <jks-password> with your desired JKS keystore password. The resulting .jks file can then be used with Java applications that require JKS format keystores. ​ Guide to Revoking Certificates In the following steps, we explore how to revoke a X.509 certificate and obtain a Certificate Revocation List (CRL) for a CA. Infisical UI API 1 Revoking a Certificate Assuming that you’ve issued a certificate under a CA, you can revoke it by selecting the Revoke Certificate option for it and specifying the reason for revocation. 2 Obtaining a CRL In order to check the revocation status of a certificate, you can check it against the CRL of a CA by heading to its Issuing CA and downloading the CRL. To verify a certificate against the downloaded CRL with OpenSSL, you can use the following command: Copy Ask AI openssl verify -crl_check -CAfile chain.pem -CRLfile crl.pem cert.pem Note that you can also obtain the CRL from the certificate itself by referencing the CRL distribution point extension on the certificate. To check a certificate against the CRL distribution point specified within it with OpenSSL, you can use the following command: Copy Ask AI openssl verify -verbose -crl_check -crl_download -CAfile chain.pem cert.pem 1 Revoking a certificate Assuming that you’ve issued a certificate under a CA, you can revoke it by making an API request to the Revoke Certificate API endpoint, specifying the serial number of the certificate and the reason for revocation. ​ Sample request Request Copy Ask AI curl --location --request POST 'https://app.infisical.com/api/v1/cert-manager/certificates/<cert-id>/revoke' \ --header 'Authorization: Bearer <access-token>' \ --header 'Content-Type: application/json' \ --data-raw '{ "revocationReason": "UNSPECIFIED" }' ​ Sample response Response Copy Ask AI { message: "Successfully revoked certificate", serialNumber: "...", revokedAt: "..." } 2 Obtaining a CRL In order to check the revocation status of a certificate, you can check it against the CRL of the issuing CA. To obtain the CRLs of the CA, make an API request to the List CRLs API endpoint. ​ Sample request Request Copy Ask AI curl --location --request GET 'https://app.infisical.com/api/v1/cert-manager/ca/internal/<ca-id>/crls' \ --header 'Authorization: Bearer <access-token>' ​ Sample response Response Copy Ask AI [ { id: "..." , crl: "..." }, ... ] To verify a certificate against the CRL with OpenSSL, you can use the following command: Copy Ask AI openssl verify -crl_check -CAfile chain.pem -CRLfile crl.pem cert.pem Was this page helpful? Yes No Suggest edits Raise issue Templates Overview ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback & Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n em: \"em\",\n li: \"li\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {CodeBlock, Heading, Info, Note, OptimizedImage, Step, Steps, Tab, Tabs} = _components;\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Info) _missingMdxReference(\"Info\", true);\n if (!Note) _missingMdxReference(\"Note\", true);\n if (!OptimizedImage) _missingMdxReference(\"OptimizedImage\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Note, {\n children: _jsxs(_components.p, {\n children: [\"PKI architecture is a complex topic and there are many ways to orchestrate\\ncertificate management including renewal operations. For specific guidance and\\naccess to enterprise features, we recommend reaching out to\\n\", _jsx(_components.a, {\n href: \"mailto:sales@infisical.com\",\n children: \"sales@infisical.com\"\n }), \" to schedule a demo.\"]\n })\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A certificate is the (X.509) leaf certificate issued for a certificate profile.\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"Once issued, a certificate is kept track of in the certificate inventory\\nwhere you can manage various aspects of its lifecycle including deployment to cloud key stores, server-side auto-renewal behavior, revocation, and more.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"guide-to-issuing-certificates\",\n children: \"Guide to Issuing Certificates\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"To \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/concepts/certificate-lifecycle#enrollment-request-%2F-issuance\",\n children: \"issue a certificate\"\n }), \", you must first create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" and a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/templates\",\n children: \"certificate template\"\n }), \" to go along with it.\"]\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Self-Signed Certificates: To issue a \", _jsx(_components.a, {\n href: \"https://en.wikipedia.org/wiki/Self-signed_certificate\",\n children: \"self-signed certificate\"\n }), \", you must configure the certificate profile to use the \", _jsx(_components.code, {\n children: \"Self-Signed\"\n }), \" issuer type. You can then use the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" to request a self-signed certificate against it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"CA-Issued Certificates: To issue a certificate from a certificate authority, you must configure the certificate profile to use the \", _jsx(_components.code, {\n children: \"Certificate Authority\"\n }), \" issuer type and select the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/ca/overview\",\n children: \"issuing CA\"\n }), \" to use. You can then use one of the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/overview\",\n children: \"enrollment methods\"\n }), \" to request a certificate against it.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Refer to the documentation for each \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/overview\",\n children: \"enrollment method\"\n }), \" to learn more about how to issue certificates using it.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"guide-to-renewing-certificates\",\n children: \"Guide to Renewing Certificates\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"To \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/concepts/certificate-lifecycle#renewal\",\n children: \"renew a certificate\"\n }), \", you can either request a new certificate from a certificate profile or have the platform\\nautomatically request a new one for you to be delivered downstream to a target destination. Whether you pursue a client-driven or server-driven approach is totally dependent on the enrollment method configured on your certificate\\nprofile as well as your infrastructure use-case.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"client-driven-certificate-renewal\",\n children: \"Client-Driven Certificate Renewal\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Client-driven certificate renewal is when renewal is initiated client-side by the end-entity consuming the certificate.\\nMore specifically, the client (e.g. \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent\",\n children: \"Infisical Agent\"\n }), \", \", _jsx(_components.a, {\n href: \"https://letsencrypt.org/docs/client-options/\",\n children: \"ACME client\"\n }), \", etc.) monitors the certificate and makes a request for Infisical to issue a new certificate back to it when the existing certificate is nearing expiration. This is the most common approach to certificate renewal and is suitable for most use-cases.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"server-driven-certificate-renewal\",\n children: \"Server-Driven Certificate Renewal\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Server-driven certificate renewal is when renewal is initiated server-side by Infisical rather than by the end-entity consuming the certificate.\\nWhen a certificate considered for auto-renewal meets a specified \", _jsx(_components.em, {\n children: \"renewal days before expiration\"\n }), \" threshold, Infisical reaches out to the issuing CA bound to the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" of the expiring certificate\\nto request for a new one.\\nThe resulting renewed certificate is stored in the platform and made available to be fetched back or pushed downstream to end-entities or external systems such as cloud key stores.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Note that server-driven certificate renewal is only available for certificates issued via the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" where key pairs are generated server-side.\\nA certificate can be considered for auto-renewal at time of issuance if the \", _jsx(_components.strong, {\n children: \"Enable Auto-Renewal By Default\"\n }), \" option is selected on its \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" or after issuance by toggling this option manually.\"]\n }), \"\\n\", _jsx(Info, {\n children: _jsxs(_components.p, {\n children: [\"For server-driven certificate renewal workflows, you can programmatically\\nfetch the latest active certificate bundle for a certificate profile using the\\n\", _jsx(_components.a, {\n href: \"/api-reference/endpoints/certificate-profiles/get-latest-active-bundle\",\n children: \"Get Latest Active Certificate\\nBundle\"\n }), \"\\nAPI endpoint. This ensures you always retrieve the most current valid\\ncertificate, including any that have been automatically renewed, making it\\nparticularly useful for deployment pipelines and automation workflows where\\nyou don’t want to track individual serial numbers.\"]\n })\n }), \"\\n\", _jsx(_components.p, {\n children: \"The following examples demonstrate different approaches to certificate renewal:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/acme\",\n children: \"ACME enrollment method\"\n }), \", you may connect an ACME client like \", _jsx(_components.a, {\n href: \"https://certbot.eff.org/\",\n children: \"certbot\"\n }), \" to fetch back and renew certificates for \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/integration-guides/apache-certbot\",\n children: \"Apache\"\n }), \", \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/integration-guides/nginx-certbot\",\n children: \"Nginx\"\n }), \", or other server. The ACME client will pursue a client-driven approach and submit certificate requests upon certificate expiration for you, saving renewed certificates back to the server’s configuration.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/acme\",\n children: \"ACME enrollment method\"\n }), \", you may use \", _jsx(_components.a, {\n href: \"https://cert-manager.io/\",\n children: \"cert-manager\"\n }), \" with Infisical to issue and renew certificates for Kubernetes workloads; cert-manager will pursue a client-driven approach and submit certificate requests upon certificate expiration for you, saving renewed certificates back to Kubernetes secrets.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \", you may push and auto-renew certificates to AWS and Azure using \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificate-syncs/overview\",\n children: \"certificate syncs\"\n }), \". Certificates issued over the API enrollment method, where key pairs are generated server-side, are also eligible for server-side auto-renewal; once renewed, certificates are automatically pushed back to their sync destination.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"guide-to-downloading-certificates\",\n children: \"Guide to Downloading Certificates\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"In the following steps, we explore different options for exporting already-issued certificates from Infisical in different formats for use in your applications and infrastructure.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"download-latest-profile-certificate\",\n children: \"Download Latest Profile Certificate\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"You can download the latest certificate issued against a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" using the \", _jsx(_components.a, {\n href: \"/api-reference/endpoints/certificate-profiles/get-latest-active-bundle\",\n children: \"latest certificate bundle\"\n }), \" endpoint.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"download-specific-certificate\",\n children: \"Download Specific Certificate\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"To export a specific certificate, first navigate to your project’s certificate inventory and locate the certificate you want to export. Click on the \", _jsx(_components.strong, {\n children: \"Export Certificate\"\n }), \" option from the certificate’s action menu.\"]\n }), \"\\n\", _jsx(OptimizedImage, {\n src: \"https://mintlify.s3.us-west-1.amazonaws.com/infisical/images/platform/pki/certificate/cert-export-option.png\",\n alt: \"pki export certificate option\"\n }), \"\\n\", _jsxs(Tabs, {\n children: [_jsx(Tab, {\n title: \"PEM Format\",\n id: \"pem-format\",\n children: _jsxs(Steps, {\n children: [_jsxs(Step, {\n title: \"Exporting in PEM Format\",\n children: [_jsxs(_components.p, {\n children: [\"In the export modal, choose \", _jsx(_components.strong, {\n children: \"PEM\"\n }), \" as the format and click \", _jsx(_components.strong, {\n children: \"Export\"\n }), \".\"]\n }), _jsx(OptimizedImage, {\n src: \"https://mintlify.s3.us-west-1.amazonaws.com/infisical/images/platform/pki/certificate/cert-export-pem.png\",\n alt: \"pki export certificate pem\"\n }), _jsx(_components.p, {\n children: \"The PEM export modal will display the certificate details including:\"\n }), _jsxs(_components.ul, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"\\n\", _jsxs(_components.p, {\n children: [_jsx(_components.strong, {\n children: \"Serial Number\"\n }), \": The unique identifier for the certificate\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"\\n\", _jsxs(_components.p, {\n children: [_jsx(_components.strong, {\n children: \"Certificate Body\"\n }), \": The X.509 certificate in PEM format\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"\\n\", _jsxs(_components.p, {\n children: [_jsx(_components.strong, {\n children: \"Certificate Chain\"\n }), \": The intermediate and root CA certificates\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"\\n\", _jsxs(_components.p, {\n children: [_jsx(_components.strong, {\n children: \"Private Key\"\n }), \": The private key associated with the certificate (if available)\"]\n }), \"\\n\", _jsx(OptimizedImage, {\n src: \"https://mintlify.s3.us-west-1.amazonaws.com/infisical/images/platform/pki/certificate/cert-export-pem-modal.png\",\n alt: \"pki export certificate pem modal\"\n }), \"\\n\"]\n }), \"\\n\"]\n }), _jsxs(_components.p, {\n children: [\"You can copy each component individually or use the \", _jsx(_components.strong, {\n children: \"Copy All\"\n }), \" button to copy the complete certificate bundle.\"]\n })]\n }), _jsxs(Step, {\n title: \"Using PEM Certificates\",\n children: [_jsx(_components.p, {\n children: \"PEM format certificates can be used directly with most web servers and applications:\"\n }), _jsxs(_components.ul, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [_jsx(_components.strong, {\n children: \"Apache HTTP Server\"\n }), \": Configure SSL certificates in your virtual host\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [_jsx(_components.strong, {\n children: \"Nginx\"\n }), \": Use the certificate and private key files in your server configuration\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [_jsx(_components.strong, {\n children: \"Docker containers\"\n }), \": Mount certificate files for TLS-enabled applications\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [_jsx(_components.strong, {\n children: \"Load balancers\"\n }), \": Upload PEM certificates to AWS ALB, Azure Application Gateway, etc.\"]\n }), \"\\n\"]\n }), _jsx(_components.p, {\n children: \"Example Nginx configuration:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"7\",\n language: \"nginx\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"nginx\",\n children: _jsxs(_components.code, {\n language: \"nginx\",\n numberOfLines: \"7\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"server\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" {\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" listen \"\n }), _jsx(_components.span, {\n style: {\n color: \"#B5CEA8\",\n \"--shiki-dark\": \"#B5CEA8\"\n },\n children: \"443\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" ssl;\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" server_name \"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \"example.com;\"\n })]\n }), \"\\n\", _jsx(_components.span, {\n className: \"line\"\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" ssl_certificate \"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \"/path/to/certificate.pem;\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" ssl_certificate_key \"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \"/path/to/private-key.pem;\"\n })]\n }), \"\\n\", _jsx(_components.span, {\n className: \"line\",\n children: _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \"}\"\n })\n }), \"\\n\"]\n })\n })\n })]\n })]\n })\n }), _jsx(Tab, {\n title: \"PKCS12 Format\",\n id: \"pkcs12-format\",\n children: _jsxs(Steps, {\n children: [_jsxs(Step, {\n title: \"Exporting in PKCS12 Format\",\n children: [_jsxs(_components.p, {\n children: [\"In the export modal, choose \", _jsx(_components.strong, {\n children: \"PKCS12\"\n }), \" as the format and provide the required configuration:\"]\n }), _jsx(OptimizedImage, {\n src: \"https://mintlify.s3.us-west-1.amazonaws.com/infisical/images/platform/pki/certificate/cert-export-pkcs12.png\",\n alt: \"pki export certificate pkcs12\"\n }), _jsxs(_components.ul, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [_jsx(_components.strong, {\n children: \"Password\"\n }), \": A secure password to protect the PKCS12 keystore\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [_jsx(_components.strong, {\n children: \"Alias\"\n }), \": A friendly name for the certificate within the keystore\"]\n }), \"\\n\"]\n }), _jsxs(_components.p, {\n children: [\"Click \", _jsx(_components.strong, {\n children: \"Export\"\n }), \" to generate and download the \", _jsx(_components.code, {\n children: \".p12\"\n }), \" file containing the certificate, certificate chain, and private key.\"]\n })]\n }), _jsxs(Step, {\n title: \"Using PKCS12 Certificates\",\n children: [_jsxs(_components.p, {\n children: [\"PKCS12 files (\", _jsx(_components.code, {\n children: \".p12\"\n }), \" extension) are binary keystore files that contain the certificate, certificate chain, and private key in a single encrypted file:\"]\n }), _jsxs(_components.ul, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [_jsx(_components.strong, {\n children: \"Java applications\"\n }), \": Import directly into Java KeyStore (JKS) or use with SSL/TLS\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [_jsx(_components.strong, {\n children: \"Windows IIS\"\n }), \": Import the PKCS12 file for web server SSL configuration\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [_jsx(_components.strong, {\n children: \"Browser certificates\"\n }), \": Install client certificates for authentication\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [_jsx(_components.strong, {\n children: \"Mobile applications\"\n }), \": Deploy certificates to iOS and Android applications\"]\n }), \"\\n\"]\n }), _jsx(_components.p, {\n children: \"To verify the contents of a PKCS12 file:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"1\",\n language: \"shellscript\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"shellscript\",\n children: _jsxs(_components.code, {\n language: \"shellscript\",\n numberOfLines: \"1\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#DCDCAA\",\n \"--shiki-dark\": \"#DCDCAA\"\n },\n children: \"openssl\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \" pkcs12\"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" -in\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \" certificate.p12\"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" -nokeys\"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" -clcerts\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"To extract the private key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"1\",\n language: \"shellscript\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"shellscript\",\n children: _jsxs(_components.code, {\n language: \"shellscript\",\n numberOfLines: \"1\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#DCDCAA\",\n \"--shiki-dark\": \"#DCDCAA\"\n },\n children: \"openssl\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \" pkcs12\"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" -in\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \" certificate.p12\"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" -nocerts\"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" -out\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \" private-key.pem\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsxs(Info, {\n children: [_jsx(_components.p, {\n children: \"If you need to convert the PKCS12 file to Java KeyStore (JKS) format for applications running on Java 8 or earlier, use the following keytool command:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"7\",\n language: \"shellscript\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"shellscript\",\n children: _jsxs(_components.code, {\n language: \"shellscript\",\n numberOfLines: \"7\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#DCDCAA\",\n \"--shiki-dark\": \"#DCDCAA\"\n },\n children: \"keytool\"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" -importkeystore\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D7BA7D\",\n \"--shiki-dark\": \"#D7BA7D\"\n },\n children: \" \\\\\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" -srckeystore\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \" certificate.p12\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D7BA7D\",\n \"--shiki-dark\": \"#D7BA7D\"\n },\n children: \" \\\\\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" -srcstoretype\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \" PKCS12\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D7BA7D\",\n \"--shiki-dark\": \"#D7BA7D\"\n },\n children: \" \\\\\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" -srcstorepass\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" \u003c\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"p12-passwor\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \"d\u003e \"\n }), _jsx(_components.span, {\n style: {\n color: \"#D7BA7D\",\n \"--shiki-dark\": \"#D7BA7D\"\n },\n children: \"\\\\\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" -destkeystore\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \" certificate.jks\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D7BA7D\",\n \"--shiki-dark\": \"#D7BA7D\"\n },\n children: \" \\\\\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" -deststoretype\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \" JKS\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D7BA7D\",\n \"--shiki-dark\": \"#D7BA7D\"\n },\n children: \" \\\\\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" -deststorepass\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" \u003c\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"jks-passwor\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \"d\u003e\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsxs(_components.p, {\n children: [\"Replace \", _jsx(_components.code, {\n children: \"\u003cp12-password\u003e\"\n }), \" with the password you used when exporting the PKCS12 file, and \", _jsx(_components.code, {\n children: \"\u003cjks-password\u003e\"\n }), \" with your desired JKS keystore password.\"]\n }), _jsxs(_components.p, {\n children: [\"The resulting \", _jsx(_components.code, {\n children: \".jks\"\n }), \" file can then be used with Java applications that require JKS format keystores.\"]\n })]\n })]\n })]\n })\n })]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"guide-to-revoking-certificates\",\n children: \"Guide to Revoking Certificates\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"In the following steps, we explore how to revoke a X.509 certificate and obtain a Certificate Revocation List (CRL) for a CA.\"\n }), \"\\n\", _jsxs(Tabs, {\n children: [_jsx(Tab, {\n title: \"Infisical UI\",\n id: \"infisical-ui\",\n children: _jsxs(Steps, {\n children: [_jsxs(Step, {\n title: \"Revoking a Certificate\",\n children: [_jsxs(_components.p, {\n children: [\"Assuming that you’ve issued a certificate under a CA, you can revoke it by\\nselecting the \", _jsx(_components.strong, {\n children: \"Revoke Certificate\"\n }), \" option for it and specifying the reason\\nfor revocation.\"]\n }), _jsx(OptimizedImage, {\n src: \"https://mintlify.s3.us-west-1.amazonaws.com/infisical/images/platform/pki/certificate/cert-revoke.png\",\n alt: \"pki revoke certificate\"\n }), _jsx(OptimizedImage, {\n src: \"https://mintlify.s3.us-west-1.amazonaws.com/infisical/images/platform/pki/certificate/cert-revoke-modal.png\",\n alt: \"pki revoke certificate modal\"\n })]\n }), _jsxs(Step, {\n title: \"Obtaining a CRL\",\n children: [_jsx(_components.p, {\n children: \"In order to check the revocation status of a certificate, you can check it\\nagainst the CRL of a CA by heading to its Issuing CA and downloading the CRL.\"\n }), _jsx(OptimizedImage, {\n src: \"https://mintlify.s3.us-west-1.amazonaws.com/infisical/images/platform/pki/ca/ca-crl.png\",\n alt: \"pki view crl\"\n }), _jsx(_components.p, {\n children: \"To verify a certificate against the\\ndownloaded CRL with OpenSSL, you can use the following command:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"1\",\n language: \"shellscript\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"shellscript\",\n children: _jsxs(_components.code, {\n language: \"shellscript\",\n numberOfLines: \"1\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#DCDCAA\",\n \"--shiki-dark\": \"#DCDCAA\"\n },\n children: \"openssl\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \" verify\"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" -crl_check\"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" -CAfile\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \" chain.pem\"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" -CRLfile\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \" crl.pem\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \" cert.pem\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"Note that you can also obtain the CRL from the certificate itself by\\nreferencing the CRL distribution point extension on the certificate.\"\n
2026-01-13T09:29:55
https://www.telegraph.co.uk/us-politics/
US Politics - Latest news, comment and analysis - The Telegraph Jump to content UK News Website of the Year 2024 Search Icon News Sport Business Money Travel Calculators Opinion Ukraine Health Recommended Lifestyle Culture Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Search Icon Subscribe now Log in See all News UK news UK news home Scotland Wales Northern Ireland Politics Conservatives Labour Lib Dems Reform UK SNP US politics World US News Europe Middle East Asia Australasia Africa South America Donald Trump Health news Defence Science Education Environment Investigations Investigations home Signals Network Contact us Global Health Security Global Health Security home Climate & People Science & Disease Terror & Security Women & Girls Opinion & Analysis Royals King Charles III Queen Camilla Prince William Princess of Wales Prince Harry Duchess of Sussex Sections UK Edition US Edition News News home UK news Politics World Donald Trump Health news Defence Science Education Environment Investigations Global Health Security Royals Sport Sport home Football Rugby Union Cricket Golf F1 Tennis Racing Women's Sport Cycling Boxing Betting More... Business Business home Economy Companies Markets Tech Money Money home Property Tax Pensions Banking Investing Net Zero Calculators Guides Travel Travel home Europe UK Worldwide City breaks Hotels Cruise Ski Advice Calculators Opinion Opinion home Obituaries Letters to the Editor Telegraph View Our columnists Cartoons Ukraine Ukraine home Daily podcast Weekly newsletter Health Health home Diet Fitness Conditions Wellbeing Parenting Guides Tools Recommended Recommended home Home Garden Sleep Tech Health & Fitness Beauty & Grooming Travel & Outdoors Parenting Lifestyle Lifestyle home Recipes Food & Drink Fashion Beauty Luxury Cars Gardening Culture Culture home TV Film Music Books Theatre Comedy Dance Opera Classical Art Telegraph Tickets Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Subscribe now Log in Login icon Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon More from The Telegraph Download our app Help and support Newsletters Recommended Financial Solutions Events Dating Offers Travel offers Shop Garden shop Bookshop Tickets Puzzles Fantasy Football Work at The Telegraph Telegraph Corporate Announcements The Chelsea Magazine Company Voucher codes See top shops Samsung Nike ASOS eBay Currys Wayfair TUI JD Sports Travelodge Adidas US Politics Iran threatens Trump with ‘unforgettable lesson’ if US attacks With protests raging and deaths rising, Tehran hardens stance while US keeps force on table Iona Cleave 12 Jan 2026, 10:50pm Federal Reserve chief under criminal investigation Jerome Powell says legal action is a result of his central bank not ‘following the preferences of the president’ Melissa Lawford 12 Jan 2026, 2:26am ‘Make a deal before it’s too late,’ Trump tells Cuba US president threatens to halt crucial oil flows to country if it does not comply with his demands Connor Stringer 11 Jan 2026, 4:53pm John Healey: Britain won’t let US use its bases to attack Greenland Tom Cotterill 9 Jan 2026, 7:54pm Iran shuts down internet as biggest protests yet grip Islamic Republic Kieran Kelly 8 Jan 2026, 9:48pm The one organisation Trump should never have left Paul Nuki 8 Jan 2026, 7:44pm The baseball bat-wielding heir to Maduro’s throne Susie Coen 8 Jan 2026, 6:23pm Advertisement Kai Trump: I would never go into politics US president’s granddaughter says people ‘get too extreme’ Benedict Smith 7 Jan 2026, 4:37pm ‘Viceroy of Venezuela’: The assassination plot that made Marco Rubio Maduro’s extradition marks the climax of US secretary of state’s ambition to restore democracy to Central America Cameron Henderson 5 Jan 2026, 6:03am The Labour apologists for Maduro trying to turn Starmer against the US Raid on Venezuela leaves PM squeezed between Trump, international law and the Labour Left Amy Gibbons 4 Jan 2026, 3:27pm Zohran Mamdani: I’ll show the world whether the Left can govern Newly inaugurated New York mayor tells his supporters he will ‘audaciously’ work on ‘big government’ plans Benedict Smith 1 Jan 2026, 10:31pm Trump defends Clinton over Epstein hot tub photos Current president says release of images of Democrat with Ghislaine Maxwell and others is ‘terrible’ Susie Coen 23 Dec 2025, 7:34am Maga’s next civil war is brewing JD Vance may be the only one who can stop Nick Fuentes’ white supremacist, anti-Semitic Groypers infecting the Republicans Benedict Smith 21 Dec 2025, 11:22pm Trump’s uncharacteristically wooden address to the nation revealed a panicked president US president stumbles over words and mixes up figures in rambling ‘anniversary’ speech that falls flat Benedict Smith 18 Dec 2025, 4:43am Miami elects first Democrat mayor in three decades Eileen Higgins beats Republican backed by Donald Trump to become city’s first ever female mayor Susie Coen 10 Dec 2025, 4:55pm Trump: Sadiq Khan only gets elected because of mass migration US president says Mayor of London has ‘totally different ideology to what he’s supposed to have’ Tony Diver 9 Dec 2025, 2:21pm ‘Trumpism is here to stay. We’re never returning to old Republicanism’ Kevin Roberts, the man shaping Trump’s agenda, says the president’s successor will have no option but to continue his Maga politics Ed Cumming 8 Dec 2025, 5:29pm Moment Biden stumbles over word ‘America’ in speech Former president makes mistake during speech defending support for transgender rights Memphis Barker 6 Dec 2025, 2:13pm No one can pretend the Atlantic alliance is still alive A major new document lays out America’s priorities across the globe – and it makes uncomfortable reading for both Ukraine and Nato Roland Oliphant 5 Dec 2025, 6:22pm Ukraine strikes Chechen special forces unit ahead of Putin-Witkoff talks Drones rock FSB building and base of elite paramilitary force linked to warlord Ramzan Kadyrov Kieran Kelly 2 Dec 2025, 11:50am Advertisement Trump claims ally is victim of fraud in stalled Honduras election Election on a knife-edge as Right-wing candidate Nasry “Tito” Asfura and centrist Salvador Nasralla deadlocked in latest vote count Andrew Buncombe 2 Dec 2025, 8:36am Trump: All Biden’s autopen orders are cancelled Any document signed by predecessor using electronic device ‘is hereby terminated’, declares president David Millward 28 Nov 2025, 11:18pm The Senate ‘Fight Club’ squaring up to Chuck Schumer Democratic figures thought to be circling a perch at the top of the party as its current Senate leader loses confidence Benedict Smith 27 Nov 2025, 11:02pm Trump at loggerheads with White House architect over size of $300m ballroom US president unimpressed by designer’s suggestion that ballroom would dwarf main mansion Susie Coen 26 Nov 2025, 10:08pm The Kennedy clan war transfixing America A sordid love triangle and controversial Congressional bid have escalated infighting within the US’s ‘royal family’ Ed Cumming 26 Nov 2025, 11:00am Marjorie Taylor Greene’s boyfriend reveals how bombshell resignation unfolded How Brian Glenn, a White House correspondent and Trump ally, found himself at the centre of a story he never expected to cover Rob Crilly 26 Nov 2025, 10:30am Marjorie Taylor Greene denies presidential ambitions Former Trump ally signals end of political career after public fallout with US president Benedict Smith 24 Nov 2025, 8:30pm RFK Jr’s erotic poetry published in act of revenge Salacious verses written for Olivia Nuzzi, 32, by Robert F Kennedy Jr, 71, revealed by her ex-fiance Nick Squires 23 Nov 2025, 6:20pm Marjorie Taylor Greene quits Congress after bitter fallout with Trump US president calls resignation ‘great news’ as Ms Greene blasts him in scathing video exit Emily Blumenthal 22 Nov 2025, 2:42pm Donald Trump and JD Vance not invited to Dick Cheney’s funeral Joe Biden and Kamala Harris among those in attendance at former vice-president’s memorial service in Washington Our Foreign Staff 20 Nov 2025, 9:52pm How Trump can still censor the Epstein files Two legal loopholes could lead to thousands of crucial pictures, emails and flight logs being redacted Kieran Kelly 20 Nov 2025, 1:58pm Trump has signed the bill to release the Epstein files. What happens next? Trump signs bill to release tranche of documents, which will be made public within 30 days Kieran Kelly 20 Nov 2025, 10:47am What will be in the Epstein files? Everything we know Trump signs bill to release tranche of documents, which will be made public within 30 days Kieran Kelly 20 Nov 2025, 5:50am Pagination Previous Next The Telegraph Back to top Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon Download the Telegraph App Recommended Podcasts Syndication and Commissioning Help Centre Betting Branded Content Privacy Reader Prints Theatre Tickets Careers About us Announcements Puzzles Guidelines Terms & Conditions Newsletters Crosswords Tax Strategy Advertising terms Subscribe Cryptic Crossword Modern Slavery Subscription Terms & Conditions Gift Subscriptions Plusword The Chelsea Magazine Company © Telegraph Media Group Holdings Limited 2026
2026-01-13T09:29:55
http://l.facebook.com/l.php?u=http%3A%2F%2Feur-lex.europa.eu%2Flegal-content%2FEN%2FTXT%2FPDF%2F%3Furi%3DCELEX%3A32010D0087&h=AT0D86lZcu84TofjW_zuheedXJfovg5itPMRxVs30QVQlpCkYPrZ3tMZ0BVSxPuJK37sVUjExQ2BCWqVBsCq85-3k2Tw4Qunx1EBblWSf9t2TuoIi7WhQeu-s9wB5RaDMk7HtmzaKKtchl1c
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:55
https://www.cnn.com/privacy
b2c | WBD Privacy Center b2c – WBD Privacy Center b2c --> Processing Error × Close Privacy Center Our Privacy Approach Privacy Policy Terms of Use Cookie Settings TM & © 2026 All rights reserved.
2026-01-13T09:29:55
https://www.x.com/gundotio
JavaScript is not available. We’ve detected that JavaScript is disabled in this browser. Please enable JavaScript or switch to a supported browser to continue using x.com. You can see a list of supported browsers in our Help Center. Help Center Terms of Service Privacy Policy Cookie Policy Imprint Ads info © 2026 X Corp. Something went wrong, but don’t fret — let’s give it another shot. Try again Some privacy related extensions may cause issues on x.com. Please disable them and try again.
2026-01-13T09:29:55
https://pages.awscloud.com/generative-AI-interest-learn.html
Generative AI on AWS Toggle navigation Click here to return to Amazon Web Services homepage Contact Us Support AWS Support Information Support Center Trusted Advisor Technical FAQs Forums Service Health Dashboard My Account AWS Management Console Account Settings Billing & Cost Management Security Credentials Generative AI on AWS More support for foundational models is coming soon! Amazon SageMaker Generative AI on AWS Thanks for your interest in generative AI on AWS. Please submit the information below to sign up for the AWS generative AI newsletter which includes educational resources, blogs, and service updates. Thank you. Please enable Javascript to view this form.
2026-01-13T09:29:55
https://infisical.com/docs/documentation/platform/identities/machine-identities
Machine Identities - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Identities Machine Identities Platform Products CLI Reference API Reference SDKs Changelog Getting Started Overview What is Infisical? Concepts Guides Platform Reference Organizations Projects Identities Overview User Identities Machine Identities Access Control Audit Logs App Connections Events Workflow Integrations External Migrations Server Admin Console Secret Sharing Connectivity Networking Gateway Authentication Methods User Authentication Machine Identities Machine Identity Auth Templates Service Token MFA GitHub Team Sync Self-host Infisical Introduction Installation methods Linux Package Replication Upgrade Infisical Instance Environment Variables Release Channels Hardware requirements Guides Reference architectures Infisical Enterprise FAQ Internals Overview Permissions Architecture Security Service tokens Contributing Getting Started Contributing to platform On this page Concept Scopes Workflow Authentication Methods Identity Lockout FAQ Identities Machine Identities Learn how to use Machine Identities to programmatically interact with Infisical. ​ Concept An Infisical machine identity is an entity that represents a workload or application that require access to various resources in Infisical. This is conceptually similar to an IAM user in AWS or service account in Google Cloud Platform (GCP). Each identity must authenticate with the Infisical API using a supported authentication method like Token Auth , Universal Auth , Kubernetes Auth , AWS Auth , Azure Auth , or GCP Auth to get back a short-lived access token to be used in subsequent requests. Key Features: Role Assignment: Identities must be assigned roles . These roles determine the scope of access to resources, either at the organization level or project level. Auth/Token Configuration: Identities must be configured with corresponding authentication methods and access token properties to securely interact with the Infisical API. ​ Scopes Identities can be created either at the organization-level or the project-level. Outside of identity management and scope of operation, organization and project identities are functionally identical. Project identities are managed at the project-level and can only operate within their respective project. Project-level identities are useful for organizations that delegate responsibility to autonomous teams via projects. Organization identities are managed at the organization-level and can be assigned to one or more projects, as well as perform organization-level operations. Organization-level identities are useful for organizations that have cross-project operations. ​ Workflow Project Identities Organization Identities A typical workflow for using project identities consists of three steps: Creating the identity with a name and role in Project > Access Control > Machine Identities. This step also involves configuring an authentication method for it. Authenticating the identity with the Infisical API based on the configured authentication method on it and receiving a short-lived access token back. Authenticating subsequent requests with the Infisical API using the short-lived access token. A typical workflow for using organization identities consists of four steps: Creating the identity with a name and role in Organization > Access Control > Machine Identities. This step also involves configuring an authentication method for it. Adding the identity to the project(s) you want it to have access to. Authenticating the identity with the Infisical API based on the configured authentication method on it and receiving a short-lived access token back. Authenticating subsequent requests with the Infisical API using the short-lived access token. ​ Authentication Methods To interact with various resources in Infisical, Machine Identities can authenticate with the Infisical API using: Token Auth : A platform-agnostic, simple authentication method suitable to authenticate with Infisical using a token. Universal Auth : A platform-agnostic authentication method suitable to authenticate with Infisical using a Client ID and Client Secret. Kubernetes Auth : A Kubernetes-native authentication method for applications (e.g. pods). AWS Auth : An AWS-native authentication method for AWS services (e.g. EC2, Lambda functions, etc.). Azure Auth : An Azure-native authentication method for Azure resources (e.g. Azure VMs, Azure App Services, Azure Functions, Azure Kubernetes Service, etc.). GCP Auth : A GCP-native authentication method for GCP resources (e.g. Compute Engine, App Engine, Cloud Run, Google Kubernetes Engine, IAM service accounts, etc.). OIDC Auth : A platform-agnostic, JWT-based authentication method for workloads using an OpenID Connect identity provider. ​ Identity Lockout Lockout is a feature that prevents brute-force attacks on identity login endpoints. Auth methods that support lockout include: Universal Auth , LDAP Auth . Supported auth methods have lockout enabled by default. If triggered, lockout temporarily disables the login endpoint for 5 minutes after 3 consecutive failed login attempts within a 30-second window. Lockout can be configured and disabled in the identity auth method settings. ​ FAQ Can I use machine identities with the CLI? Yes - Identities can be used with the CLI. You can learn more about how to do this in the CLI quickstart here . What is the difference between an identity and service token? A service token is a project-level authentication method that is being deprecated in favor of identities. The service token method will be removed in the future in accordance with the deprecation notice and timeline stated here . Amongst many differences, identities provide broader access over the Infisical API, utilizes the same permission system as user identities, and come with a significantly larger number of configurable authentication and security features. If you’re looking for a simple authentication method, similar to service tokens, that can be bound onto an identity, we recommend checking out Token Auth . Why can I not create, read, update, or delete an identity? There are a few reasons for why this might happen: You have insufficient organization permissions to create, read, update, delete identities. The identity you are trying to read, update, or delete is more privileged than yourself. The role you are trying to create an identity for or update an identity to is more privileged than yours. Was this page helpful? Yes No Suggest edits Raise issue User Identities Overview ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback & Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by
2026-01-13T09:29:55
https://www.notion.com/ar/careers
الوظائف في Notion | نبحث عن موظفين! Notion الميزات Notion AI إنشاء، كتابة، أتمتة الوكلاء يتعامل مع المهام اليدوية بحث المؤسسة اعثر على إجابات على الفور ملاحظات الاجتماع المدعومة بالذكاء الاصطناعي مكتوبة بشكل مثالي بواسطة الذكاء الاصطناعي المُستندات بسيط وقوي قاعدة المعرفة تجميع معرفتك في مكان واحد المشاريع إدارة أي مشروع المواقع انشر أي شيء بسرعة البدء استكشاف حالات استخدام الذكاء الاصطناعي تعرّف على قدرات Notion AI تصفح السوق قوالب لكل شيء عرض عمليات التكامل ربط تطبيقاتك مع Notion تنزيل web clipper حفظ من الويب إلى Notion جرّب تطبيق Notion لسطح المكتب للحصول على تجربة أسرع تنزيل التطبيق البريد التقويم الذكاء الاصطناعي الخطة المؤسسية التسعير استكشاف الفرق الهندسة والمنتج التصميم التسويق تقنية المعلومات حجم الفريق الشركات الناشئة الشركات الصغيرة والمتوسطة المؤسسة التعليم التعلم مركز المساعدة أكاديمية Notion قصص العملاء المدونة المجتمع برامج الشركاء الإصدار واجهة برمجة التطبيقات (API) القوالب الأمان الاستشاريون اطلب عرضاً توضيحياً تسجيل الدخول احصل على Notion مجاناً Careers at Notion If every person and business can tailor software to their problems, the world will be better at solving its problems. Our mission is to make that a ubiquitous reality. Browse full-time openings تشغيل عذراً، يبدو أن أداة حظر الإعلانات تمنع تشغيل الفيديو. Our story Early computing pioneers envisioned a future where machines on our desks could amplify our imagination, extend our intellect, and help us model information in ways never before seen. This is the type of tool we want to build together at Notion — one that gives you the software you can mold and shape like clay to solve your problems your way. We’ve heard Notion described many ways. It can be as simple as a blank piece of paper, making writing feel light and delightful. It can be as complex as a relational database that stores huge amounts of data. We sometimes compare it to a set of Legos (if Legos were designed by The New York Times). But at its core, Notion is a toolbox of software building blocks that let you manage your life and work however you find most useful. To make this possible, we’ve brought together a diverse team of individuals passionate about computing, history, art, alternative programming languages, music, skateboarding, and craft. Today, we’re growing faster than ever across offices in San Francisco, New York, Dublin, Hyderabad, Tokyo, Seoul and Sydney 🇺🇸 🇮🇪 🇮🇳 🇯🇵 🇰🇷 🇦🇺 Browse open positions ↓ Open Positions Filter by Location All locations Brazil (Remote) Denver, Colorado Dublin, Ireland Hyderabad, India London, United Kingdom Munich, Germany New York, New York Paris, France Remote San Francisco, California Seoul, South Korea Singapore Spain Sydney, Australia Tokyo, Japan Department All departments Business Development Business Technology Customer Experience Customer Success Data Science Engineering Engineering - Early Career Finance General Leadership Legal Marketing People Product Design Product Management Revenue Operations & Strategy Sales Security Storytelling University User Research and Product Operations Reset filters Business Development Business Development Representative, EMEA Dublin, Ireland Business Technology Business Systems Analyst, Finance Systems San Francisco, California; New York, New York Business Systems Architect San Francisco, California; New York, New York Business Systems Engineer San Francisco, California GTM Engineer San Francisco, California Customer Experience Billing Support Specialist (CX) San Francisco, California Digital Strategy Lead New York, New York; San Francisco, California Enterprise Technical Support, France Dublin, Ireland Enterprise Technical Support Specialist Hyderabad, India Enterprise Technical Support Specialist, Japan Tokyo, Japan Global Vendor Manager Dublin, Ireland Head of Support, AMER San Francisco, California Head of Support, APAC Sydney, Australia Customer Success Customer Success Manager, Enterprise, DACH Munich, Germany Enterprise Customer Success Manager, AMER San Francisco, California; New York, New York Scaled Customer Success Manager New York, New York Data Science Data Scientist, Growth San Francisco, California Engineering AI Applications Engineer San Francisco, California Data Engineer, Finance San Francisco, California Data Engineer, Go-To-Market San Francisco, California Engineering Manager, AI Search San Francisco, California; New York, New York Engineering Manager, Developer Platform San Francisco, California QA Engineer Hyderabad, India Software Engineer, Cloud Infrastructure San Francisco, California; New York, New York Software Engineer, Datastore San Francisco, California; New York, New York Software Engineer, Developer Experience San Francisco, California Software Engineer, Enterprise Data Platform San Francisco, California Software Engineer, Fullstack, Early Career San Francisco, California; New York, New York Software Engineer, Infrastructure Hyderabad, India Software Engineer, Primitive Foundations San Francisco, California Software Engineer, Product Infrastructure San Francisco, California; New York, New York Software Engineer, Product Platform San Francisco, California Software Engineer, Product Security San Francisco, California; New York, New York Software Engineer, Search Platform New York, New York; San Francisco, California Software Engineer, Search Quality and Ranking New York, New York; San Francisco, California Finance Corporate Finance San Francisco, California Head of Business Partnership Finance San Francisco, California Head of Internal Audit San Francisco, California International Payroll Manager San Francisco, California; New York, New York Revenue Accountant San Francisco, California Senior Procurement Operations Manager San Francisco, California Strategic Finance, Revenue San Francisco, California Legal Commercial Counsel San Francisco, California; New York, New York Employment Counsel, EMEA Dublin, Ireland Marketing Creative Studio Operations Manager New York, New York Enterprise Product Marketing, GTM San Francisco, California; New York, New York Event Marketing, EMEA (Contract) Dublin, Ireland Lifecycle Marketing Manager San Francisco, California Product Marketing Manager, IT Solutions New York, New York People Business Recruiter - Foundation (G&A) San Francisco, California Early Career People Projects San Francisco, California Global Head of GTM Recruiting San Francisco, California; New York, New York GTM People Partner Lead San Francisco, California; New York, New York GTM Recruiter, AMER San Francisco, California; New York, New York Head of Notino Experience San Francisco, California Head of People Analytics and Operations San Francisco, California; New York, New York Program Specialist, Talent Management San Francisco, California Recruiting Coordinator, Tokyo Tokyo, Japan Talent Sourcer, APAC Tokyo, Japan Workplace Coordinator San Francisco, California Workplace Lead San Francisco, California Revenue Operations & Strategy Customer Experience Strategy & Operations Manager (NY) New York, New York; San Francisco, California Customer Experience Strategy & Operations Manager (SF) San Francisco, California; New York, New York Deal Desk Workflows Manager San Francisco, California Revenue Enablement Program Manager, EMEA Dublin, Ireland Sales Compensation Analyst New York, New York; San Francisco, California Sales Strategy & Operations Manager, EMEA Dublin, Ireland Sales Account Executive, Commercial New York, New York Account Executive, Commercial San Francisco, California Account Executive, Commercial, Benelux Dublin, Ireland Account Executive, Commercial, DACH Dublin, Ireland Account Executive, Commercial, France Dublin, Ireland Account Executive - Commercial, Japan Tokyo, Japan Account Executive - Commercial, Sydney Sydney, Australia Account Executive, Commerical, Nordics Dublin, Ireland Account Executive, Enterprise, DACH Munich, Germany Account Executive, Enterprise, France Paris, France Account Executive - Enterprise, Japan Tokyo, Japan Account Executive, Enterprise, Singapore Singapore Account Executive, Enterprise, UK London, United Kingdom Account Executive, Korea Seoul, South Korea Account Executive, Mid-Market San Francisco, California Account Executive, Mid-Market New York, New York Account Executive, Mid-Market, DACH Dublin, Ireland Account Executive - Mid Market, Japan Tokyo, Japan Account Executive, Mid-Market, Nordics Dublin, Ireland AI Solutions Specialist Dublin, Ireland Commercial Sales Manager, Japan Tokyo, Japan Enterprise Account Executive, New York New York, New York Enterprise Account Executive, San Francisco San Francisco, California Manager, Commercial Sales San Francisco, California; New York, New York Manager, Enterprise Sales New York, New York Manager, Mid-Market Sales New York, New York Manager, Mid-Market Sales San Francisco, California Outbound Business Development Representative - AMER New York, New York Outbound Business Development Representative - AMER San Francisco, California Relationship Manager New York, New York Relationship Manager, APACx Sydney, Australia Sales Development Representative (AMER) San Francisco, California Sales Development Representative, Japan Tokyo, Japan Sales Manager, Asia Singapore Sales Manager, Commercial, EMEA Dublin, Ireland Solutions Engineer, EMEA Dublin, Ireland Solutions Engineer, EMEA Dublin, Ireland Solutions Engineer - Enterprise - AMER San Francisco, California Solutions Engineering Manager, Japan Tokyo, Japan Solutions Engineering Manager - Mid-Market San Francisco, California; New York, New York Solutions Engineer - Mid-Market - AMER San Francisco, California Solutions Engineer, Tokyo Tokyo, Japan Technical Architect San Francisco, California; New York, New York Security Corporate Infrastructure Engineer San Francisco, California Security Engineer, Infrastructure Security San Francisco, California; New York, New York Security Operations Engineer, Detection and Response Team Hyderabad, India Storytelling Head of Internal Communications San Francisco, California University Software Engineer Intern (Summer 2026) San Francisco, California; New York, New York UX Research Intern (Summer 2026) San Francisco, California User Research and Product Operations Research Ops Coordinator (Contractor) Remote; New York, New York; San Francisco, California We believe the best companies bring together diversity in race, age, physical and mental ability, sexuality, gender identity, ethnicity, perspectives and ideas. And people do their best work when they feel like they belong — included, valued, and equal. This is the Notion we want to build, where everyone brings their full selves to work knowing that they’ll be heard, championed, and supported to succeed. We hope you’ll join us. ☕ Office culture Notion is an in-person company, and currently requires its employees to come to the office for two Anchor Days (Mondays & Thursdays) and requests that employees spend the majority of the week in the office (including a third day). Being an in-office-focused company enables us to capitalize on the energy that comes from us being in the same place. This is a great opportunity to build relationships, work with your teammates, and collaborate on projects. Teams have started adding a third in-office day for team-based work for things such as group maker time, brainstorm sessions, team bonding, and more! This way, Notinos spend the majority of the week in the office. Life at Notion When it comes to our culture, we’d rather show than tell. Here are some videos to give you a sense of the day-to-day on every team. تشغيل عذراً، يبدو أن أداة حظر الإعلانات تمنع تشغيل الفيديو. How Notion Works Dive into the 3 organizations that make up our team at Notion - EPD (Engineering, Product, Design), Go-to-Market, and Foundation (G&A) and how we work together. تشغيل عذراً، يبدو أن أداة حظر الإعلانات تمنع تشغيل الفيديو. Life in Dublin Peek inside our EMEA headquarters and how this office plays a crucial part in our Go-To-Market strategy. تشغيل عذراً، يبدو أن أداة حظر الإعلانات تمنع تشغيل الفيديو. Life In Hyderabad Take a closer look into our Engineering hub in the booming HITEC City district. Our values We are drivers of our mission. We’re driven by our commitment to empower every person on the planet to use software exactly the way they want. Be a pace setter. We move with urgency so we can set the cadence for our market, cover more ground, and ship more great products and programs for our users, faster. Be a truth seeker. We pursue the best data, ideas, and solutions with rigor and open-mindedness, always guided by our users’ most pressing needs. Be kind and direct. We deliver feedback in the spirit of helping our colleagues improve, balancing sensitivity with caring honesty. We’re in this together. Perks & benefits Notion is committed to providing highly competitive, innovative, and inclusive benefits offering that attracts the best talent from diverse backgrounds. We aim for all our programs to promote overall employee health.* Medical, dental & vision We offer competitive medical, dental, vision insurance for employees and dependents. This includes medical, dental, and vision premiums. Time off We want you to take time off to rest and rejuvenate. Notion offers flexible paid vacation as well as 10+ observed holidays by country. Mental health & wellbeing You and your dependents will have access to providers that create personalized treatment plans, including therapy, coaching, medication management, and EAP services. Parental leave We offer biological, adoptive, and foster parents paid time off to spend quality time with family. Fertility coverage Our fertility benefit gives you employer-sponsored funds you can use to pay for fertility treatments and family-forming services. Retirement matching Notion makes it easy to save money for retirement. There’s also employer matching! Commuter benefits We offer a generous monthly subsidy for your commute. Monthly stipend We offer everyone a monthly stipend to use toward services that fit their personal needs. This gives you the opportunity to choose your own adventure and use the funds for whatever matters most to you. Our values in action Affinity groups Notion is home to a number of employee-led groups that foster a diverse and inclusive workplace. So far, these include: Accessibility at Notion, All Asians and Pacific Islanders at Notion, Black Thought at Notion, Gente (LatinX) at Notion, Immigrants at Notion, Queers & Allies at Notion, Parents at Notion, Women at Notion. Notion for Nonprofits It's vital that we also support our beliefs with the Notion product itself. That's why we give 501(c)3 organizations working to solve the world's toughest problems 50% off our team plan. Social impact We run several programs and partnerships dedicated to inclusion, diversity, equity, and antiracism. Here are just a few of the organizations we support: Volunteering at 826 Valencia We help students from under-resourced backgrounds find their voices as writers and artists. BreakLine We reach more veterans, women, and people of color looking to pivot into careers in the tech industry. Urban Tech Connect We support tech events focused on networking and development opportunities for communities of color. Fast Forward We donate paid Notion plans to entrepreneurs accelerating social missions that support refugees, undocumented students, and veterans, among others. Civic Alliance We support safe, accessible, and trusted elections, and inspire our employees and customers to support civic engagement. Pledge LA We support Black and Latinx entrepreneurs from South LA in partnership with the Annenberg Foundation, the Weingart Foundation, and others. Tech for Black Founders We provide Notion workspaces and other support to early-stage startups led by Black founders. In the news $10 Billion Productivity Startup Notion Wants To Build Your AI Everything App forbes.com The most innovative workplace companies of 2024 fastcompany.com Okta's 8th 'Businesses at Work' cloud usage report techcrunch.com Global community We're also lucky to have a vibrant community of enthusiasts talking about Notion, making content, and sharing inspiration across many channels: Check out our blog where we share company news, inspirations, stories from our community, and more about our technical approach. تشغيل عذراً، يبدو أن أداة حظر الإعلانات تمنع تشغيل الفيديو. يمكنك رؤيته على YouTube Andy Hertzfeld on building the Macintosh A core member of the Apple Macintosh development team in the 1980s, Andy designed and architected the original Macintosh software system. تشغيل عذراً، يبدو أن أداة حظر الإعلانات تمنع تشغيل الفيديو. يمكنك رؤيته على YouTube May-Li Khoe on pulling inspiration from the physical world in digital design Former Apple and Khan Academy designer-artist-technologist, May-Li Khoe pioneers new ways for humans to interact with machines. “We shape our tools, thereafter our tools shape us.” Marshall McLuhan العربية إعدادات ملفات تعريف الارتباط © 2026 Notion Labs, Inc. الشركة نبذة عنا الوظائف الأمان الحالة الشروط والخصوصية حقوقك المتعلقة بالخصوصية تنزيل iOS وAndroid Mac وWindows التقويم Web Clipper الموارد مركز المساعدة التسعير المدونة المجتمع عمليات التكامل القوالب برامج الشركاء Notion لأجل الخطة المؤسسية الشركات الصغيرة شخصي استكشف المزيد →
2026-01-13T09:29:55
https://www.telegraph.co.uk/northern-ireland/
Northern Ireland - The Telegraph Jump to content UK News Website of the Year 2024 Search Icon News Sport Business Money Travel Calculators Opinion Ukraine Health Recommended Lifestyle Culture Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Search Icon Subscribe now Log in See all News UK news UK news home Scotland Wales Northern Ireland Politics Conservatives Labour Lib Dems Reform UK SNP US politics World US News Europe Middle East Asia Australasia Africa South America Donald Trump Health news Defence Science Education Environment Investigations Investigations home Signals Network Contact us Global Health Security Global Health Security home Climate & People Science & Disease Terror & Security Women & Girls Opinion & Analysis Royals King Charles III Queen Camilla Prince William Princess of Wales Prince Harry Duchess of Sussex Sections UK Edition US Edition News News home UK news Politics World Donald Trump Health news Defence Science Education Environment Investigations Global Health Security Royals Sport Sport home Football Rugby Union Cricket Golf F1 Tennis Racing Women's Sport Cycling Boxing Betting More... Business Business home Economy Companies Markets Tech Money Money home Property Tax Pensions Banking Investing Net Zero Calculators Guides Travel Travel home Europe UK Worldwide City breaks Hotels Cruise Ski Advice Calculators Opinion Opinion home Obituaries Letters to the Editor Telegraph View Our columnists Cartoons Ukraine Ukraine home Daily podcast Weekly newsletter Health Health home Diet Fitness Conditions Wellbeing Parenting Guides Tools Recommended Recommended home Home Garden Sleep Tech Health & Fitness Beauty & Grooming Travel & Outdoors Parenting Lifestyle Lifestyle home Recipes Food & Drink Fashion Beauty Luxury Cars Gardening Culture Culture home TV Film Music Books Theatre Comedy Dance Opera Classical Art Telegraph Tickets Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Subscribe now Log in Login icon Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon More from The Telegraph Download our app Help and support Newsletters Recommended Financial Solutions Events Dating Offers Travel offers Shop Garden shop Bookshop Tickets Puzzles Fantasy Football Work at The Telegraph Telegraph Corporate Announcements The Chelsea Magazine Company Voucher codes See top shops Samsung Nike ASOS eBay Currys Wayfair TUI JD Sports Travelodge Adidas Northern Ireland Ireland to force e-scooter riders to wear helmets Taoiseach determined to strengthen rules following three fatalities James Crisp 12 Jan 2026, 11:48am James Nesbitt ‘angry’ people think Northern Ireland was troubled Actor says he grew up ‘at a distance’ from conflict that scarred province for three decades Telegraph Reporters 11 Jan 2026, 5:03pm We should mourn the decline of that great British tradition: the maverick MP Today, politicians are generally more reluctant to take stances that are unpopular with their colleagues and party members Richard Johnson 5 Jan 2026, 5:30pm Badenoch: Starmer’s persecution of veterans is a ‘national disgrace’ Ben Riley-Smith 4 Jan 2026, 8:00pm Female IRA commander ‘behind Enniskillen bomb’ Martin Evans 1 Jan 2026, 11:10pm Veterans treated more harshly than terrorists, says Starmer’s Troubles aide Gwyn Wright 1 Jan 2026, 10:54pm Labour will destroy special forces, warn ex-SAS chiefs Tom Cotterill 30 Dec 2025, 9:06pm Advertisement The Protestants at war with Irish language ‘evangelism’ Nearly £2m is being spent on bilingual street signs in Belfast, but some see it as linguistic ‘greening’ of the region Colin Freeman 30 Dec 2025, 9:30am Irish wanted to exploit Edward VIII abdication crisis Newly released documents reveal officials’ fears that the Wallis Simpson crisis could be used against Britain Hannah Furness 30 Dec 2025, 12:00am Irish phone companies refused to block IRA signals that set off bombs Newly released papers reveal service providers’ concerns over the legality and cost of ‘denying service to their customers’ Telegraph Reporters 28 Dec 2025, 8:00am Serving in Northern Ireland broke me, but skiing helped put me back together again After ex-Marine Danny White was diagnosed with PTSD he thought he’d never take to the slopes again – until he found The Not Forgotten Claire Coleman 27 Dec 2025, 6:00am We served together in Northern Ireland. Three decades later a chance encounter reunited us Annette Chesterman and Irene Geere recall the nerves at a veterans’ lunch before their friendship as young army recruits was rekindled Emily Retter 21 Dec 2025, 6:00am Margaretta D’Arcy, playwright and activist who worked closely with her husband John Arden She had several spells in prison, campaigned at Greenham Common and once tried to perform a citizen’s arrest on the judge hearing her case Telegraph Obituaries 14 Dec 2025, 12:06pm We needed Stakeknife – the war against the IRA wasn’t fought in peacetime Surrey To treat this report as evidence of state malfeasance is to ignore the context in which these files were created Dean Godson 10 Dec 2025, 1:02pm British agent inside IRA ‘saved more lives than he took’, defence officials claim Military officials challenge conclusions of Stakeknife probe and say it is impossible to quantify benefits of his intelligence Neil Johnston 9 Dec 2025, 9:44pm Without subterfuge in war, we are defenceless If we continue holding inquiries into conduct during war after the fact, it will have a chilling effect on Britain’s security Telegraph View 9 Dec 2025, 3:49pm I saw how important informants were in Northern Ireland Running agents inside the IRA prevented slaughter on a vastly greater scale Tim Collins 9 Dec 2025, 2:51pm Britain does not have to justify fighting IRA terror It is grotesque to excavate every last action by the state and leave terrorists unmolested Eliot Wilson 9 Dec 2025, 1:30pm Identity of British agent inside IRA to be kept secret Final report of eight-year £50m Stakeknife investigation will not name Freddie Scappaticci as MI5’s mole Rozina Sabur 9 Dec 2025, 7:00am Keith McDowall, Daily Mail journalist turned PR man for James Callaghan and Willie Whitelaw He also persuaded Reginald Maudling to visit Ulster. The Home Secretary said: ‘Bring me a large scotch – what a bloody awful country!’ Telegraph Obituaries 8 Dec 2025, 12:44pm Advertisement The mad smoking ban cannot apply in Northern Ireland. But the Government isn’t listening The Windsor Framework strikes again, but Lord Hermer for once isn’t keen to step in Kate Hoey 7 Dec 2025, 5:21pm Death of the plug-in hybrid: why drivers face a triple tax for every mile they drive ‘Crackers and unfair’ mileage charges spark fears of a fire sale Joe Wright 7 Dec 2025, 6:00am Head teacher says 170 pupils called in sick in one day Children and staff struck down with flu and other illnesses at primary school in Northern Ireland Tom McArdle 5 Dec 2025, 6:32pm Gerry Adams fights to name anonymous IRA bombing witnesses Ex-Sinn Féin president is being sued by three men injured in terrorist attacks Tom Cotterill 5 Dec 2025, 5:03pm Sir John Stanley, Thatcher’s PPS and Housing Minister who devised and piloted Right to Buy He was the first colleague to reach Airey Neave as he lay dying from a bomb; reduced to tears, he had to break the news to Margaret Thatcher Telegraph Obituaries 3 Dec 2025, 11:13am Belfast City Hall under fire for flying Palestinian flag Officials raise flag after council narrowly votes in favour of showing solidarity with Gaza James Crisp 2 Dec 2025, 3:35pm Say Nothing, review: superb drama captures both the tragedy – and the thrills – of the Troubles 5/5 This sensational series sketches a complex and devastating portrait of Northern Ireland and the lives ruined by conflict Benji Wilson 1 Dec 2025, 12:00pm Teenagers accused of attempted rape that led to Ballymena riots have charges dropped Case against Romanians withdrawn after ‘significant’ new evidence comes to light Will Bolton 28 Nov 2025, 2:19pm Prince Andrew Way to be renamed after council vote Street in Carrickfergus, Northern Ireland, was given name to mark the now Andrew Mountbatten-Windsor’s marriage to Sarah Ferguson Tom McArdle 25 Nov 2025, 8:24am SAS insiders: Labour risks being ‘apologist for terrorists’ with Troubles law Bill will scrap effective immunity granted to British soldiers who served during conflict Dominic Nicholls 23 Nov 2025, 7:49pm EU judges could fine Britain for smoking ban Plan to raise smoking age one year, every year might fall foul of European rules because of Irish border James Crisp 22 Nov 2025, 4:16pm Lord Rathcavan, adventurous Northern Irish businessman who started Brasserie St Quentin in London When Princess Margaret asked to see the kitchen, the French chefs froze with wooden spoons and whisks in the ‘present arms’ position Telegraph Obituaries 21 Nov 2025, 12:08pm I was proud to serve in the Army and the SAS. They are now in a pitiable condition Despite the positive talk on defence, there is no new money and there will not be for years Tim Collins 20 Nov 2025, 6:31am Pagination Previous Next The Telegraph Back to top Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon Download the Telegraph App Recommended Podcasts Syndication and Commissioning Help Centre Betting Branded Content Privacy Reader Prints Theatre Tickets Careers About us Announcements Puzzles Guidelines Terms & Conditions Newsletters Crosswords Tax Strategy Advertising terms Subscribe Cryptic Crossword Modern Slavery Subscription Terms & Conditions Gift Subscriptions Plusword The Chelsea Magazine Company © Telegraph Media Group Holdings Limited 2026
2026-01-13T09:29:55
https://l.facebook.com/l.php?u=https%3A%2F%2Fhelp.instagram.com%2F581066165581870%3Fref%3Ddp&h=AT26Dm5lXEfrMvo327d1s--jKtZSQ14uFs5tQjRK5rwzhquXGniSl6_AjhOWvAUndGum_8XizAyaHiNEjFPeCtPzjDXcKnJT9WCneHCxM0hx2fnSb8DDrrilSxDVk8KmEA2wHeGFmZzZRY42
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:55
https://www.cisco.com/site/us/en/solutions/industries/mining/index.html
Cisco Mining: Digital Mining Solutions - Cisco Skip to main content Skip to search Skip to footer Cisco.com Worldwide Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Trials and demos How to buy Partners EN US Profile Log in Trials and demos MENU CLOSE How to buy Partners Profile Log in EN US Close Close Close Close Close Solutions Industries Cisco in mining Connecting and protecting mining organizations in the AI era. Watch video (02:12) Why Cisco for mining Why Cisco for energy See why Cisco has been a trusted technology advisor for 40 years in energy—including the key sectors of power and utilities, oil and gas, and mining. Why Cisco What can we help you solve today? Our mining solutions can help solve today's challenges - from AI and infrastructure to digital resilience to future-proofed workplaces. Explore use cases and architectures in this interactive tool. Portfolio explorer tool Customer Stories By working with mining organizations around the world, Cisco is helping mining teams achieve remarkable results and drive innovation during extraordinary times. A Global Mining Company A leading mining company is driving digital transformation and operational efficiency with Cisco, unifying its network for safer, more reliable mining operations worldwide. Watch now (02:42) NHM Mining NHM Mining is modernizing mining operations with Cisco, unifying its network to boost safety, efficiency, and connectivity across all sites. Read more Show more See more customer stories Get started now Security IoT security Partners Digital mining partners Design guides Mining Cisco Validated Designs Contact sales Get started Show more Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms & Conditions Privacy Cookies / Do not sell or share my personal data Accessibility Trademarks Supply Chain Transparency Newsroom Sitemap © Cisco Systems, Inc.
2026-01-13T09:29:55
https://apps.apple.com/us/app/notion-calendar/id1607562761
‎Notion Calendar App - App Store for iPhone iPhone iPad Mac Vision Watch TV Today Games Apps Arcade Platform iPhone iPad Mac Vision Watch TV Notion Calendar For your work and life Only for iPhone Free Share 5.7K Ratings 4.7 Ages 4+ Years Category Productivity Developer Notion Labs, Incorporated Language EN + 16 More Size 40.4 MB iPhone Notion Calendar lets you schedule meetings and control your time like never before. It deeply integrates with Google Calendar accounts so that all your events are synced. Along with speed, beauty, and light/dark modes, Notion Calendar includes powerful features: - CONNECTED TO NOTION — add Notion docs, projects, and timelines. - MULTIPLE TIME ZONES — pull the time zone column to the right to “travel to any city” and add more time zones. - ALL IN ONE PLACE — see one unified view across multiple calendars and auto-sync events between them. - WIDGETS — select from 6 Home Screen Widgets featuring rich previews of upcoming events, month overviews, quick-add event buttons, and more! The Lock Screen Widget lets you see what’s coming at a glance when picking up your phone. - AVAILABLE IN 12 LANGUAGES — Japanese, Korean, French, German, Spanish, Portuguese, Danish, Dutch, Finnish, Norwegian, and Swedish. It’s time. more Ratings & Reviews 4.7 out of 5 5.7K Ratings Lot of potential - love the design! 09/03/2024 Hikari There’s a lot of reviews that talk about the pros and cons of the app but let me just say my favorite thing is I don’t immediately create a new event if I just fat finger my phone and hit a random spot on the calendar. So much time wasted on hitting a random spot on Google calendar and I’m like no I didn’t mean to please - no event oh god! Love the design and the way information is presented it makes it feel less overwhelming. I would love a 5 day view - 3 days is great because it’s intentional but getting the work week in one viewable window would be helpful. I know Google calendar forces the whole week on you though which I don’t totally love either. Either way I’m excited to see where the app goes from here! Lot of potential - love the design! 09/03/2024 Hikari There’s a lot of reviews that talk about the pros and cons of the app but let me just say my favorite thing is I don’t immediately create a new event if I just fat finger my phone and hit a random spot on the calendar. So much time wasted on hitting a random spot on Google calendar and I’m like no I didn’t mean to please - no event oh god! Love the design and the way information is presented it makes it feel less overwhelming. I would love a 5 day view - 3 days is great because it’s intentional but getting the work week in one viewable window would be helpful. I know Google calendar forces the whole week on you though which I don’t totally love either. Either way I’m excited to see where the app goes from here! Nightmare of a time 6d ago DayOldEggs I’ve had a nightmare of a time with this app. It does not scale on iPad as it should. You have a desktop app that works great, why can’t it work the same on iPad? Furthermore on my phone it is not showing any of my events. I’ve reinstalled the app twice now, checked all my settings, and even went through trying to fix it using notion AI. Nothing has worked.When adding events through notion AI you have to specify in your AI settings that you want to use your own timezone, not the default on Notion.The views that are available have been buggy for me for weeks. I cannot scroll down all the way to midnight. Every calendar app I’ve ever used has the ability to show a full week, but this app does not. Scrolling through months is not intuitive. I’ve essentially resorted to only using my calendar on my computer, which is not practical. I’ve also had major issues getting the app to send me notifications. I’ve double checked my settings on my phone, and they are correct. I’m not sure what to do anymore. I pay for notion to use as an assistant, and at this point it only works in that manner fluidly on my laptop. Nightmare of a time 6d ago DayOldEggs I’ve had a nightmare of a time with this app. It does not scale on iPad as it should. You have a desktop app that works great, why can’t it work the same on iPad? Furthermore on my phone it is not showing any of my events. I’ve reinstalled the app twice now, checked all my settings, and even went through trying to fix it using notion AI. Nothing has worked.When adding events through notion AI you have to specify in your AI settings that you want to use your own timezone, not the default on Notion.The views that are available have been buggy for me for weeks. I cannot scroll down all the way to midnight. Every calendar app I’ve ever used has the ability to show a full week, but this app does not. Scrolling through months is not intuitive. I’ve essentially resorted to only using my calendar on my computer, which is not practical. I’ve also had major issues getting the app to send me notifications. I’ve double checked my settings on my phone, and they are correct. I’m not sure what to do anymore. I pay for notion to use as an assistant, and at this point it only works in that manner fluidly on my laptop. Close to Perfect 12/20/2025 Borrmu421 Overall the app is very clean and modern, much like the Notion app. The one thing I don’t understand is why there isn’t an Agenda or Monthly view for the calendar. I use the agenda view all the time in other apps and it’s a standard view in any calendar app I’ve used, so I’m not sure why it doesn’t exist within Notion’s calendar app. I’m trying to get used to the 3-day view but I typically like to see more of a schedule forecast in the days to come without scrolling all the time. Outside of adding a couple more views to enhance the user experience and appeal to everyone’s preferences, the app is great. It does exactly what you want it to. Having the ability to natively sync with my notion databases is awesome and helps me stay on task. I would certainly recommend any/all Notion products! Close to Perfect 12/20/2025 Borrmu421 Overall the app is very clean and modern, much like the Notion app. The one thing I don’t understand is why there isn’t an Agenda or Monthly view for the calendar. I use the agenda view all the time in other apps and it’s a standard view in any calendar app I’ve used, so I’m not sure why it doesn’t exist within Notion’s calendar app. I’m trying to get used to the 3-day view but I typically like to see more of a schedule forecast in the days to come without scrolling all the time. Outside of adding a couple more views to enhance the user experience and appeal to everyone’s preferences, the app is great. It does exactly what you want it to. Having the ability to natively sync with my notion databases is awesome and helps me stay on task. I would certainly recommend any/all Notion products! Helpful Tech Support 04/17/2025 The Game's a Foot I’m just starting out with Notion and Notion Calendar (NC) on iPad and iPhone and so far I like the features and functionality of the apps. I’m mainly here to talk about their tech support.I had a difficult time getting NC to sync with my Apple Calendar. I tried multiple attempts to sync, regardless of device. I carefully wrote a detailed explanation of everything I tried and the tech support guys were kind and helpful with their response, once I got past the initial response from the AI. Now it’s working and I can’t wait to get more organized and learn all the features of the app.I’m giving the app 4.5 stars rather than 5 because there are some areas for improvement I’m seeing, so far.Would prefer the app to recognize when my device is in landscape mode and automatically switch, since I rarely use portrait mode on my iPad and the tiny narrow calendar view is annoying.I would also prefer to get a real human response from tech support the first time. The AI assumes you know nothing and didn’t read the instructions or documentation before requesting help. It was a bit off-putting for someone with decades of experience working with computers. Helpful Tech Support 04/17/2025 The Game's a Foot I’m just starting out with Notion and Notion Calendar (NC) on iPad and iPhone and so far I like the features and functionality of the apps. I’m mainly here to talk about their tech support.I had a difficult time getting NC to sync with my Apple Calendar. I tried multiple attempts to sync, regardless of device. I carefully wrote a detailed explanation of everything I tried and the tech support guys were kind and helpful with their response, once I got past the initial response from the AI. Now it’s working and I can’t wait to get more organized and learn all the features of the app.I’m giving the app 4.5 stars rather than 5 because there are some areas for improvement I’m seeing, so far.Would prefer the app to recognize when my device is in landscape mode and automatically switch, since I rarely use portrait mode on my iPad and the tiny narrow calendar view is annoying.I would also prefer to get a real human response from tech support the first time. The AI assumes you know nothing and didn’t read the instructions or documentation before requesting help. It was a bit off-putting for someone with decades of experience working with computers. What’s New Version History Bug fixes and performance improvements 1.86.0 11/22/2025 Bug fixes and performance improvements 1.85.0 11/13/2025 Bug fixes and performance improvements 1.83.0 07/13/2025 Bug fixes and performance improvements 1.82.0 07/08/2025 Bug fixes and performance improvements 1.81.0 06/23/2025 Bug fixes and performance improvements. 1.80.0 06/05/2025 Bug fixes and performance improvements. 1.79.0 06/03/2025 Bug fixes and performance improvements. 1.78.0 06/01/2025 Bug fixes and performance improvements. 1.77.0 05/21/2025 Bug fixes and performance improvements. 1.76.0 05/15/2025 Bug fixes and performance improvements. 1.75.0 05/09/2025 Bug fixes and performance improvements. 1.74.0 05/07/2025 Bug fixes and performance improvements. 1.73.0 04/02/2025 Bug fixes and performance improvements. 1.72.0 03/18/2025 Bug fixes and performance improvements. 1.71.0 03/13/2025 Bug fixes and performance improvements. 1.70.0 03/04/2025 Bug fixes and performance improvements. 1.69.0 02/07/2025 Bug fixes and performance improvements. 1.68.0 01/31/2025 Bug fixes and performance improvements. 1.67.0 01/09/2025 Bug fixes and performance improvements. 1.66.0 12/16/2024 Bug fixes and performance improvements. 1.65.0 12/12/2024 Bug fixes and performance improvements. 1.64.0 12/11/2024 Bug fixes and performance improvements. 1.63.0 12/02/2024 Bug fixes and performance improvements. 1.62 11/25/2024 Bug fixes and performance improvements. 1.61.0 11/18/2024 Bug fixes and performance improvements more Version 1.86.0 11/22/2025 App Privacy App Privacy The developer, Notion Labs, Incorporated , indicated that the app’s privacy practices may include handling of data as described below. This information has not been verified by Apple. For more information, see the developer’s privacy policy . To help you better understand the developer’s responses, see Privacy Definitions and Examples . Privacy practices may vary, for example, based on the features you use or your age. Learn More Data Linked to You The following data, which may be collected and linked to your identity, may be used for the following purposes: Analytics Contact Info Email Address Name Identifiers User ID Device ID Usage Data Product Interaction App Functionality Contact Info Email Address Name Identifiers User ID Device ID Data Not Linked to You The following data, which may be collected but is not linked to your identity, may be used for the following purposes: App Functionality Diagnostics Crash Data Performance Data The developer, Notion Labs, Incorporated , indicated that the app’s privacy practices may include handling of data as described below. For more information, see the developer’s privacy policy . Data Linked to You The following data may be collected and linked to your identity: Contact Info Identifiers Usage Data Data Not Linked to You The following data may be collected but it is not linked to your identity: Diagnostics Privacy practices may vary, for example, based on the features you use or your age. Learn More Accessibility The developer has not yet indicated which accessibility features this app supports. Learn More Information Seller Notion Labs, Incorporated Size 40.4 MB Category Productivity Compatibility Requires iOS 15.0 or later. iPhone Requires iOS 15.0 or later. iPod touch Requires iOS 15.0 or later. Apple Vision Requires visionOS 1.0 or later. Languages English and 16 more English, Danish, Dutch, Finnish, French, German, Indonesian, Japanese, Korean, Norwegian Bokmål, Portuguese, Simplified Chinese, Spanish, Swedish, Thai, Traditional Chinese, Vietnamese Age Rating 4+ 4+ Learn More Copyright ©2025 Notion Labs, Incorporated Developer Website Privacy Policy More by Notion Labs, Incorporated Notion: Notes, Tasks, AI Plan, organize, track projects View Notion Mail Productivity View You Might Also Like To-Do List & Tasks for Notion Calendar, Planner & Reminders View Notion Widget Quick access to Notion. View TickTick:To-Do List & Calendar Task remind, planner,countdown View Structured - Daily Planner Calendar, Reminder & To Do View Todoist: To Do List & Calendar Task manager & Reminders View Tasks for Notion - To-Do List Calendar Planner & Reminders View SyncTasks To-do list, syncs with Notion View Calendars: Schedule Planner 2026 Daily Organizer・Reminder View Fantastical Calendar Reminders & Todo List View Tiimo: AI Planner & To-do ADHD Task & Planning assistant View United States Español (México) العربية Русский 简体中文 Français (France) 한국어 Português (Brazil) Tiếng Việt 繁體中文 (台灣) Select a country or region Africa, Middle East, and India See All Algeria Angola Armenia Azerbaijan Bahrain Benin Botswana Brunei Darussalam Burkina Faso Cameroun Cape Verde Chad Côte d’Ivoire Congo, The Democratic Republic Of The Egypt Eswatini Gabon Gambia Ghana Guinea-Bissau India Iraq Israel Jordan Kenya Kuwait Lebanon Liberia Libya Madagascar Malawi Mali Mauritania Mauritius Morocco Mozambique Namibia Niger (English) Nigeria Oman Qatar Congo, Republic of Rwanda São Tomé and Príncipe Saudi Arabia Senegal Seychelles Sierra Leone South Africa Sri Lanka Tajikistan Tanzania, United Republic Of Tunisia Turkmenistan United Arab Emirates Uganda Yemen Zambia Zimbabwe Asia Pacific See All Afghanistan Australia Bhutan Cambodia 中国大陆 Fiji 香港 Indonesia (English) 日本 Kazakhstan 대한민국 Kyrgyzstan Lao People's Democratic Republic 澳門 Malaysia (English) Maldives Micronesia, Federated States of Mongolia Myanmar Nauru Nepal New Zealand Pakistan Palau Papua New Guinea Philippines Singapore Solomon Islands 台灣 Thailand Tonga Turkmenistan Uzbekistan Vanuatu Vietnam Europe See All Albania Armenia Österreich Belarus Belgium Bosnia and Herzegovina Bulgaria Croatia Cyprus Czechia Denmark Estonia Finland France (Français) Georgia Deutschland Greece Hungary Iceland Ireland Italia Kosovo Latvia Lithuania Luxembourg (English) Malta Moldova, Republic Of Montenegro Nederland North Macedonia Norway Poland Portugal (Português) Romania Россия Serbia Slovakia Slovenia España Sverige Schweiz Türkiye (English) Ukraine United Kingdom Latin America and the Caribbean See All Anguilla Antigua and Barbuda Argentina (Español) Bahamas Barbados Belize Bermuda Bolivia (Español) Brasil Virgin Islands, British Cayman Islands Chile (Español) Colombia (Español) Costa Rica (Español) Dominica República Dominicana Ecuador (Español) El Salvador (Español) Grenada Guatemala (Español) Guyana Honduras (Español) Jamaica México Montserrat Nicaragua (Español) Panamá Paraguay (Español) Perú St. Kitts and Nevis Saint Lucia St. Vincent and The Grenadines Suriname Trinidad and Tobago Turks and Caicos Uruguay (English) Venezuela (Español) The United States and Canada See All Canada (English) Canada (Français) United States Estados Unidos (Español México) الولايات المتحدة США 美国 (简体中文) États-Unis (Français France) 미국 Estados Unidos (Português Brasil) Hoa Kỳ 美國 (繁體中文台灣) Copyright © 2026 Apple Inc. All rights reserved. Internet Service Terms App Store & Privacy Cookie Warning Support
2026-01-13T09:29:55
https://learn.deeplearning.ai/specializations/pytorch-for-deep-learning-professional-certificate
PyTorch for Deep Learning - DeepLearning.AI close Quick Guide & Tips 💻   Accessing Utils File and Helper Functions In each notebook on the top menu: 1:   Click on "File" 2:   Then, click on "Open" You will be able to see all the notebook files for the lesson, including any helper functions used in the notebook on the left sidebar. See the following image for the steps above. 🔄   Reset User Workspace If you need to reset your workspace to its original state, follow these quick steps: 1:   Access the Menu: Look for the three-dot menu (⋮) in the top-right corner of the notebook toolbar. 2:   Restore Original Version: Click on "Restore Original Version" from the dropdown menu. For more detailed instructions, please visit our Reset Workspace Guide . 💻   Downloading Notebooks In each notebook on the top menu: 1:   Click on "File" 2:   Then, click on "Download as" 3:   Then, click on "Notebook (.ipynb)" 💻   Uploading Your Files After following the steps shown in the previous section ("File" => "Open"), then click on "Upload" button to upload your files. 📗   See Your Progress Once you enroll in this course—or any other short course on the DeepLearning.AI platform—and open it, you can click on 'My Learning' at the top right corner of the desktop view. There, you will be able to see all the short courses you have enrolled in and your progress in each one. Additionally, your progress in each short course is displayed at the bottom-left corner of the learning page for each course (desktop view). 📱   Features to Use 🎞   Adjust Video Speed: Click on the gear icon (⚙) on the video and then from the Speed option, choose your desired video speed. 🗣   Captions (English and Spanish): Click on the gear icon (⚙) on the video and then from the Captions option, choose to see the captions either in English or Spanish. 🔅   Video Quality: If you do not have access to high-speed internet, click on the gear icon (⚙) on the video and then from Quality , choose the quality that works the best for your Internet speed. 🖥   Picture in Picture (PiP): This feature allows you to continue watching the video when you switch to another browser tab or window. Click on the small rectangle shape on the video to go to PiP mode. √   Hide and Unhide Lesson Navigation Menu: If you do not have a large screen, you may click on the small hamburger icon beside the title of the course to hide the left-side navigation menu. You can then unhide it by clicking on the same icon again. 🧑   Efficient Learning Tips The following tips can help you have an efficient learning experience with this short course and other courses. 🧑   Create a Dedicated Study Space: Establish a quiet, organized workspace free from distractions. A dedicated learning environment can significantly improve concentration and overall learning efficiency. 📅   Develop a Consistent Learning Schedule: Consistency is key to learning. Set out specific times in your day for study and make it a routine. Consistent study times help build a habit and improve information retention. Tip: Set a recurring event and reminder in your calendar, with clear action items, to get regular notifications about your study plans and goals. ☕   Take Regular Breaks: Include short breaks in your study sessions. The Pomodoro Technique, which involves studying for 25 minutes followed by a 5-minute break, can be particularly effective. 💬   Engage with the Community: Participate in forums, discussions, and group activities. Engaging with peers can provide additional insights, create a sense of community, and make learning more enjoyable. ✍   Practice Active Learning: Don't just read or run notebooks or watch the material. Engage actively by taking notes, summarizing what you learn, teaching the concept to someone else, or applying the knowledge in your practical projects. 📚   Enroll in Other Short Courses Keep learning by enrolling in other short courses. We add new short courses regularly. Visit DeepLearning.AI Short Courses page to see our latest courses and begin learning new topics. 👇 👉👉 🔗 DeepLearning.AI – All Short Courses [+] 🙂   Let Us Know What You Think Your feedback helps us know what you liked and didn't like about the course. We read all your feedback and use them to improve this course and future courses. Please submit your feedback by clicking on "Course Feedback" option at the bottom of the lessons list menu (desktop view). Also, you are more than welcome to join our community 👉👉 🔗 DeepLearning.AI Forum close Sign in Continue with Google Continue with LinkedIn Or, sign in with your email Email Password Sign in Forgot password? Don't have an account? Create account By signing up, you agree to our Terms Of Use and Privacy Policy close Create Your Account Continue with Google Continue with LinkedIn Or, sign up with your email Email Address Sign up Already have an account? Sign in here! By signing up, you agree to our Terms Of Use and Privacy Policy close Choose Your Plan Monthly Yearly Change Your Plan Your subscription plan will change at the end of your current billing period. You'll continue to have access to your current plan until then. Manage Subscription close Learn More Keep Current Plan close Welcome back! Hi , We'd like to know you better so we can create more relevant courses. What do you do for work? Subscribe to receive AI news, events and course updates from DeepLearning.AI ! Start Your Course You have successfully joined undefined You now have access to all Pro features. Click below to start learning! Start Learning close Course Syllabus close Explore Courses Membership Community Forum Events Ambassadors Ambassador Spotlight My Learning Elevate Your Career with Full Learning Experience Unlock Plus AI learning and gain exclusive insights from industry leaders Access exclusive features like graded notebooks and quizzes Earn unlimited certificates to enhance your resume Starting at $1 USD/mo after a free trial – cancel anytime Start 7-day Free Trial Access as Audit Sign In Welcome to PyTorch Fundamentals, the first course in the PyTorch for Deep Learning Professional Certificate. PyTorch has become one of the most widely used frameworks in AI and is a tool that researchers rely on, engineers build with, and students and professionals everywhere want to learn. In fact, a large part of the recent generative AI revolution is powered by PyTorch, but the path to learning it isn't always clear. There are tutorials everywhere, and it can be hard to know what's relevant and what's high quality when you're just starting out. That's why we put together this clear, structured path for learning PyTorch. You start at the fundamentals and then build up to more advanced architectures step by step. And I'm excited to introduce Lawrence Moroney, whose courses and books have helped millions of people get started with AI and deep learning. Lawrence has been working with PyTorch extensively for many years and seen how it's changing the way we build models. So Lawrence, what got you excited about teaching PyTorch? I think one of the things that, when I first really started looking at PyTorch, is that, remember way back you and I, we did some TensorFlow specializations and TensorFlow courses, and one of the most beloved ones was we did something called the Keras Functional API. And what the Keras Functional API did was it changed everything for me in that you weren't designing your models to be linear. You could start thinking about more exotic models with Siamese networks and skip level and stuff like that. And when I started then looking into PyTorch, PyTorch just did that natively. How you design your network and how you design your forward pass in code, it just made it simple and it was like the default experience rather than an add-on experience. And that got me really, really excited about, like, wow, I can start really building much more advanced models much more simply. That's what I love about this first course, is that we're going to start building right away. We're going to just look at our first PyTorch model. We'll write the code, we'll run it, we'll watch it learn from data. But by the end, we'll actually have an image classifier that can label, like, objects in an image. One of the things that Keras did well back then, and now PyTorch, is let you put together building blocks that could more easily be put together to form more complex architectures. I'm just really excited about that, how we can just help learners on that journey to go from zero all the way up to the most advanced architectures by that block-based approach that you mentioned. I know a lot of us prompt large language models, it lets you get a lot done. But beyond a certain point, a lot of my teams do very advanced things with cutting-edge models, be it fine-tuning cutting-edge generative AI models, to tuning very high- performance on visual AI models. So I think in today's world, with a lot of work going on in AI, this is a particularly important skill set. I also want to help you to understand that even if you're just getting started on your journey, by starting with code, by starting with understanding the fundamentals and using a powerful framework like PyTorch, it's really setting you up for success in this world. One other thing that I find delightful about PyTorch is the ease of use actually makes it more fun. Because when you're playing around, downloading an open-source PyTorch package, the relative ease with which you could, you know, get the Transformers library from Hugging Face and fine-tune them, it actually makes it more fun. So in addition to, you know, finding jobs, which is absolutely important, I find that the speed also just makes this work more enjoyable. Absolutely agree. And I think that ease of use, not just for building, but also, like, when things go wrong, to be able to find and fix problems and debug them, you know, allows you to be more successful quickly. So with this Professional Certificate, started the first course on the fundamentals, but eventually going up to the Professional Certificate, I think it'll make learners much more job-ready. I hope you enjoy learning PyTorch. Let's go on to the next video and get started. specialization detail PyTorch for Deep Learning PyTorch: Fundamentals PyTorch: Fundamentals Course 1 PyTorch: Techniques and Ecosystem Tools Course 2 PyTorch: Advanced Architectures and Deployment Course 3 View All Courses Module 1 Module 1: Getting Started with PyTorch Module 2: The PyTorch Workflow Module 3: Data Management in PyTorch Module 4: Core Neural Network Components Next Lesson Course Syllabus Module 1: Getting Started with PyTorch Welcome Conversation between Laurence Moroney and Andrew Ng Video ・ 3 mins Professional Certificate Overview Reading ・ 10 mins Why PyTorch? Video ・ 4 mins Getting Started with PyTorch The Building Blocks of Neural Networks Video ・ 5 mins The ML Pipeline Video ・ 5 mins Quiz 1 Practice Quiz ・ 10 mins Building a Simple Neural Network Video ・ 5 mins Building a Simple Neural Network Code Example ・ 1 hour Activation Functions Video ・ 6 mins Modeling Non-Linear Patterns with Activation Functions Code Example ・ 1 hour Tensors Video ・ 5 mins Tensor Math and Broadcasting Video ・ 4 mins Tensors: The Core of PyTorch Code Example ・ 1 hour Join the DeepLearning.AI Forum to ask questions, get support, or share amazing ideas! Reading ・ 2 mins Graded Quiz Quiz 2 Graded ・Quiz ・ 20 mins Programming Assignment Refreshing your Workspace Reading ・ 2 mins Deeper Regression, Smarter Features Graded ・Code Assignment ・ 3 hours Resources Module 1 Resources Reading ・ 10 mins Next Module 2: The PyTorch Workflow Certificate Course Info
2026-01-13T09:29:55
https://www.deeplearning.ai/courses/generative-ai-with-llms/
Generative AI with LLMs - DeepLearning.AI ✨ New course! Enroll in Build with Andrew! Explore Courses AI Newsletter The Batch Andrew's Letter Data Points ML Research Blog ✨ AI Dev x SF 26 Community Forum Events Ambassadors Ambassador Spotlight Resources Membership Start Learning Courses Generative AI with LLMs Overview Instructors FAQs Enroll Now Learn the fundamentals of generative AI for real-world applications In Generative AI with Large Language Models (LLMs), created in partnership with AWS, you’ll learn the fundamentals of how generative AI works, and how to deploy it in real-world applications. Enroll now Also available on Coursera IN COLLABORATION WITH Learn the fundamentals of developing with LLMs What you’ll get from Generative AI with LLMs Gain foundational knowledge, practical skills, and a functional understanding of how generative AI works Dive into the latest research on Gen AI to understand how companies are creating value with cutting-edge technology Instruction from expert AWS AI practitioners who actively build and deploy AI in business use-cases today What you’ll do in Generative AI with LLMs Deeply understand generative AI, describing the key steps in a typical LLM-based generative AI lifecycle, from data gathering and model selection, to performance evaluation and deployment Describe in detail the transformer architecture that powers LLMs, how they’re trained, and how fine-tuning enables LLMs to be adapted to a variety of specific use cases Use empirical scaling laws to optimize the model’s objective function across dataset size, compute budget, and inference requirements Apply state-of-the art training, tuning, inference, tools, and deployment methods to maximize the performance of models within the specific constraints of your project Discuss the challenges and opportunities that generative AI creates for businesses after hearing stories from industry researchers and practitioners Receive a Coursera certificate demonstrating your skills upon completion of the course Enroll Now In partnership with We worked with AWS to develop a world-class AI course on large language models. Our instructors, with their extensive expertise in AI and machine learning, offer practical knowledge drawn from real-world experience that can be applied to your projects and career. Who should join? For data scientists: Gain deeper knowledge into the underlying structure and mechanisms of generative AI and explore avenues for further innovations in this field. For machine learning engineers: Learn how to better train, optimize and fine tune generative models while learning about different use cases and applications. For prompt engineers: Explore advanced prompting techniques and learn how to control your output using generative configuration parameters. For research engineers: Explore the state of art generative models and architectures in depth to build on top of with your own advanced techniques in generative AI. For anyone interested in generative AI: Get an extensive introduction to developing with generative AI and its fundamentals. Instructors Antje Barth Instructor Principal Developer Advocate, Generative AI, Amazon Web Services (AWS) Chris Fregly Instructor Principal Solutions Architect, Generative AI, Amazon Web Services (AWS) Shelbee Eigenbrode Instructor Principal Solutions Architect, Generative AI, Amazon Web Services (AWS) Mike Chambers Instructor Developer Advocate for Generative AI at AWS, Co-instructor of Generative AI with Large Language Models What do I need to succeed in this course? This is an intermediate course, so you should have some experience coding in Python to get the most out of it. You should also be familiar with the basics of machine learning, such as supervised and unsupervised learning, loss functions, and splitting data into training, validation, and test sets. If you have taken the Machine Learning Specialization or Deep Learning Specialization , you’ll be ready to take this course and dive deeper into the fundamentals of generative AI. What Learners From Previous Courses Say About DeepLearning.AI “Within a few minutes and a couple slides, I had the feeling that I could learn any concept. I felt like a superhero after this course. I didn’t know much about deep learning before, but I felt like I gained a strong foothold afterward.” Jan Zawadzki Data Scientist at Carmeq “The whole specialization was like a one-stop-shop for me to decode neural networks and understand the math and logic behind every variation of it. I can say neural networks are less of a black box for a lot of us after taking the course.” Kritika Jalan Data Scientist at Corecompete Pvt. Ltd. “During my Amazon interview, I was able to describe, in detail, how a prediction model works, how to select the data, how to train the model, and the use cases in which this model could add value to the customer.” Chris Morrow Sr. Product Manager at Amazon Enroll now Frequently Asked Questions Why should I take this course? I don’t have any programming experience, can I take this course? I already have Python experience, is this course for me? I have questions about my subscription of this course, whom can I ask? How much does the course cost? Can I apply for financial aid? Can I preview the course? Will I receive a certificate at the end of the course? I want to purchase this course for my employees. How can I do that? How do I get a receipt to get this reimbursed by my employer? Join today and be on the forefront of the next generation of AI! Enroll Now Want to learn more about Generative AI? Keep learning with updates on curated AI news, courses, events, as well as Andrew’s thoughts from DeepLearning.AI! Courses The Batch Community Careers About Contact Help
2026-01-13T09:29:55
https://www.cisco.com/c/en_au/solutions/industries/smart-connected-communities.html
Cisco Smart Cities - Connected Communities - Cisco Skip to content Skip to search Skip to footer Cisco.com Australia / New Zealand Products and Services Solutions Support Learn Explore Cisco How to Buy Partners Home Partner Program Support Tools Find a Cisco Partner Meet our Partners Become a Cisco Partner Solutions Industries Cities and Communities Powering an inclusive future for all. Watch video (1:16) Size matters Simple, flexible, secure network connections for small governments to make a big impact. Watch video (1:07) Contact Cisco Get a call from Sales Contact Sales via Email Call Sales: 1800 134349 (AU) 0800 291129 (NZ) Webex 1800 493239 AU 0508 555607 NZ 8:30 AM to 5:00 PM AEDT Product / Technical Support How to start your digital journey Build the foundation Traditional network architectures can't scale in the digital era. Optimise your network with Cisco DNA for Cities. Explore Cisco DNA for Cities Boost urban innovation Deploy new city services by leveraging Cisco solutions, third-party software, or your own application development. Get started with DevNet Blueprint for cities and communities Bridge the digital and physical divide to benefit your community. See the blueprint See our solutions for… Lighting Lower energy consumption, cut costs, and simplify maintenance. Environment Protect lives and infrastructure from environmental damage through hyperlocalised monitoring and predictive modeling. Parking Generate revenue with demand-based parking while reducing the search time for citizens. Safety and Security Accurately detect incidents and protect against crime through digital monitoring. Urban Mobility View live street conditions to gain insight on how to improve traffic management. Waste Management Manage, collect, and track waste bins to avoid overflow and health hazards. Case studies Carbon-neutral Copenhagen Copenhagen reduces carbon footprint and enriches citizen experiences through digital solutions. Kansas City: Connected city Kansas City fosters innovation and entrepreneurship through digital transformation. Innovation in North Carolina The Town of Cary partners with Cisco on smart lighting and parking solutions to enhance citizen services See more customer stories Digital value for cities Discover how digital cities can generate $2.3 trillion globally through 2024. See infographic Meraki for state and local governments Implement smart initiatives that positively impact communities’ quality of life, security, and the local economy with simple IT. Learn more Explore ways to pay Finance your smart city technology upgrade and make the most out of your IT budget. See the options News and events Join us at Cisco Live Imagine the future with intuitive IT that informs, connects, predicts, and enables. Discover what's possible at Cisco Live. The future of smart cities Chuck Robbins and the Wall Street Journal's Jason Anders discuss the digital transformation of smart cities. Cybersecurity report: Impacts on government Threats to government are on the rise. Learn what those threats are, how colleagues are fighting back, and how you can stay secure. You may also like: Education Energy Financial Services Government Healthcare Manufacturing Retail Sports & Entertainment Transportation Follow Us
2026-01-13T09:29:55
https://www.cisco.com/c/en_dz/training-events.html
Cisco Training, Events, and Webinar Resources - Cisco Skip to content Skip to search Skip to footer Cisco.com Africa Products and Services Solutions Support Learn Explore Cisco How to Buy Partners Home Partner Program Support Tools Find a Cisco Partner Meet our Partners Become a Cisco Partner Training, Events, and Webinars Training and Certifications Certifications Exams Training Training catalog Training resources Events Global events calendar Cisco Live Cisco Connect Webinars TechWiseTV Technical Knowledge Library Influencer hub Cisco Knowledge Network TRAINING Advance your career with Cisco Resources and training to empower your business and career. EVENTS Cisco Live: Sessions available on demand Cisco Live sessions recordings are available on the On-Demand Library. View keynotes, technical sessions, and demos now. WEBINARS Cisco Webex: Trust Without Compromise on TechWiseTV Deploy secure, private enterprise communications that delight end users. CERTIFICATIONS Cisco Certified CyberOps Professional Achieving Cisco Certified CyberOps Professional certification proves your advanced skills as a senior analyst, in a security operation center. EVENTS Global Events: Network with Cisco partners and employees Join us at global events worldwide and network with Cisco partners, employees and subject-matter experts. WEBINARS Cisco Knowledge Network: On-demand webinars for service providers Explore our full catalog of live and on-demand webinars for service providers. Training resources Certification tracking system Cisco Learning Locator Cisco Learning network Cisco Learning Partner program Training services
2026-01-13T09:29:55
https://www.telegraph.co.uk/royal-family/
Royal family: Latest news, features, comment and insight - The Telegraph Jump to content UK News Website of the Year 2024 Search Icon News Sport Business Money Travel Calculators Opinion Ukraine Health Recommended Lifestyle Culture Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Search Icon Subscribe now Log in See all News UK news UK news home Scotland Wales Northern Ireland Politics Conservatives Labour Lib Dems Reform UK SNP US politics World US News Europe Middle East Asia Australasia Africa South America Donald Trump Health news Defence Science Education Environment Investigations Investigations home Signals Network Contact us Global Health Security Global Health Security home Climate & People Science & Disease Terror & Security Women & Girls Opinion & Analysis Royals King Charles III Queen Camilla Prince William Princess of Wales Prince Harry Duchess of Sussex Sections UK Edition US Edition News News home UK news Politics World Donald Trump Health news Defence Science Education Environment Investigations Global Health Security Royals Sport Sport home Football Rugby Union Cricket Golf F1 Tennis Racing Women's Sport Cycling Boxing Betting More... Business Business home Economy Companies Markets Tech Money Money home Property Tax Pensions Banking Investing Net Zero Calculators Guides Travel Travel home Europe UK Worldwide City breaks Hotels Cruise Ski Advice Calculators Opinion Opinion home Obituaries Letters to the Editor Telegraph View Our columnists Cartoons Ukraine Ukraine home Daily podcast Weekly newsletter Health Health home Diet Fitness Conditions Wellbeing Parenting Guides Tools Recommended Recommended home Home Garden Sleep Tech Health & Fitness Beauty & Grooming Travel & Outdoors Parenting Lifestyle Lifestyle home Recipes Food & Drink Fashion Beauty Luxury Cars Gardening Culture Culture home TV Film Music Books Theatre Comedy Dance Opera Classical Art Telegraph Tickets Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Subscribe now Log in Login icon Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon More from The Telegraph Download our app Help and support Newsletters Recommended Financial Solutions Events Dating Offers Travel offers Shop Garden shop Bookshop Tickets Puzzles Fantasy Football Work at The Telegraph Telegraph Corporate Announcements The Chelsea Magazine Company Voucher codes See top shops Samsung Nike ASOS eBay Currys Wayfair TUI JD Sports Travelodge Adidas The Andrew superfans who still believe in their prince Save Meghan plans first visit to Britain in four years Save Prince Harry in push to reunite with King at Invictus Games Save Princess of Wales: The rivers within us cleanse and purify Save Princess of Wales reflects on chemotherapy treatment with volunteers Save Queen: Reading is ‘more urgent than ever’ Save Advertisement King Charles III John Wallace, trumpeter who accompanied Kiri te Kanawa at the wedding of Prince Charles and Diana Save The Andrew superfans who still believe in their prince Save Prince Harry in push to reunite with King at Invictus Games Save King faces having to use Portaloo during White House visit Save King to host ‘luxury weddings’ at stately home for £5,000 Save Prince Harry has no plans to see King during UK trip Save Anne Frank’s stepsister who danced with the King dies aged 96 Save Queen Camilla Queen follows Remembrance Service on TV from home Save How the King and Queen revamped their wardrobes for their Australia and Samoa tour Save King begins having light lunch - with just one ingredient Save Advertisement Prince William Princess of Wales reflects on chemotherapy treatment with volunteers Save Royals fly equivalent of twice around the world in helicopters Save Intruder twice got into grounds of Prince and Princess of Wales’s London home Save Prince and Princess of Wales reveal favourite moments of 2025 Save Andrew spends Christmas hundreds of miles from Royal family Save In or out: 2025 was the year the Royal family split once and for all Save Prince George’s early royal life: ‘William is happy for him to have a taste, but not the full meal’ Save Princess of Wales Princess of Wales: The rivers within us cleanse and purify Save The Princess of Wales’s most stylish looks of last year Save Princess of Wales reflects on chemotherapy treatment with volunteers Save Musk threatened with investigation of AI that undressed Princess of Wales Save Intruder twice got into grounds of Prince and Princess of Wales’s London home Save King and Princess of Wales’s ancestors worked together to cure cancer Save Prince and Princess of Wales reveal favourite moments of 2025 Save Advertisement Prince Harry and the Duchess of Sussex Meghan plans first visit to Britain in four years Save Prince Harry in push to reunite with King at Invictus Games Save Prince Harry has no plans to see King during UK trip Save Prince Harry confident of winning back royal protection Save Harry and Meghan are desperate to downplay Archewell staff exodus Save Prince Harry and Meghan’s closest aide quits Save Sussexes lose 11th publicist in five years Save Advertisement Opinion Celia Walden Harry should get his royal protection back Save William Sitwell Radicals who want to change our national anthem couldn’t be more wrong Save Eleanor Mills Hooray for Queen Camilla – our most relatable Royal Save Pagination Previous Next Royal family Find the latest stories on the Royal Family including news, upcoming engagements, pictures, video and more. From King Charles III to Meghan Markle and the royal household. The Telegraph Back to top Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon Download the Telegraph App Recommended Podcasts Syndication and Commissioning Help Centre Betting Branded Content Privacy Reader Prints Theatre Tickets Careers About us Announcements Puzzles Guidelines Terms & Conditions Newsletters Crosswords Tax Strategy Advertising terms Subscribe Cryptic Crossword Modern Slavery Subscription Terms & Conditions Gift Subscriptions Plusword The Chelsea Magazine Company © Telegraph Media Group Holdings Limited 2026
2026-01-13T09:29:55
https://infisical.com/docs/integrations/platforms/certificate-agent#content-area
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let's Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : "universal-auth" config : client-id : "./client-id" # Path to file containing client ID client-secret : "./client-secret" # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : "universal-auth" config : client-id : "your-client-id" client-secret : "your-client-secret" Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : "kubernetes-auth" config : identity-id : "your-kubernetes-identity-id" service-account-token-path : "/var/run/secrets/kubernetes.io/serviceaccount/token" Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : "azure-auth" config : identity-id : "your-azure-identity-id" Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : "gcp-id-token" config : identity-id : "your-gcp-identity-id" GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : "gcp-iam" config : identity-id : "your-gcp-identity-id" service-account-key : "/path/to/service-account-key.json" Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : "aws-iam" config : identity-id : "your-aws-identity-id" ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : "https://app.infisical.com" # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # Infisical authentication configuration auth : type : "universal-auth" # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : "your-client-id" client-secret : "your-client-secret" # Certificate configuration certificates : - profile-name : "prof-web-server-12345" project-slug : "my-project-slug" attributes : common-name : "api.example.com" alt-names : [ "api.example.com" , "api-v2.example.com" ] ttl : "90d" key-algorithm : "RSA_2048" signature-algorithm : "RSA-SHA256" key-usages : - "digital_signature" - "key_encipherment" extended-key-usages : - "server_auth" # Enable automatic certificate renewal lifecycle : renew-before-expiry : "30d" status-check-interval : "6h" # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : "/etc/ssl/private/web.key" permission : "0600" # Read/write for owner only certificate : path : "/etc/ssl/certs/web.crt" permission : "0644" # Read for all, write for owner chain : path : "/etc/ssl/certs/web-chain.crt" permission : "0644" # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo "Certificate issued for ${CERT_COMMON_NAME}" systemctl reload nginx timeout : 30 on-renewal : command : | echo "Certificate renewed for ${CERT_COMMON_NAME}" systemctl reload nginx timeout : 30 on-failure : command : | echo "Certificate operation failed: ${ERROR_MESSAGE}" mail -s "Certificate Alert" [email protected] < /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., ["www.example.com", "api.example.com"] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger 'Certificate renewal failed' , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo "New certificate issued for ${CERT_COMMON_NAME}" chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo "Certificate renewed for ${CERT_COMMON_NAME}" # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d "{'text': 'Certificate for ${CERT_COMMON_NAME} renewed successfully'}" timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo "Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}" # Send alert mail -s "Certificate Failure Alert" [email protected] < /dev/null # Log to syslog logger -p daemon.error "Certificate agent failure: ${ERROR_MESSAGE}" timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : "https://app.infisical.com" retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : "https://app.infisical.com" # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # Infisical authentication configuration auth : type : "universal-auth" # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : "your-client-id" client-secret : "your-client-secret" # Certificate configuration certificates : - profile-name : "prof-web-server-12345" project-slug : "my-project-slug" attributes : common-name : "api.example.com" alt-names : - "api.example.com" - "api-v2.example.com" key-algorithm : "RSA_2048" signature-algorithm : "RSA-SHA256" key-usages : - "digital_signature" - "key_encipherment" extended-key-usages : - "server_auth" ttl : "30d" file-output : private-key : path : "/etc/ssl/private/api.example.com.key" permission : "0600" certificate : path : "/etc/ssl/certs/api.example.com.crt" permission : "0644" chain : path : "/etc/ssl/certs/api.example.com.chain.crt" permission : "0644" omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : "https://app.infisical.com" # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # Infisical authentication configuration auth : type : "universal-auth" # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : "your-client-id" client-secret : "your-client-secret" # Certificate configuration certificates : - profile-name : "prof-web-server-12345" project-slug : "my-project-slug" csr-path : "/etc/ssl/requests/api.csr" file-output : certificate : path : "/etc/ssl/certs/api.example.com.crt" permission : "0644" chain : path : "/etc/ssl/certs/api.example.com.chain.crt" permission : "0644" omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : "https://app.infisical.com" # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # Infisical authentication configuration auth : type : "universal-auth" # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : "your-client-id" client-secret : "your-client-secret" # Certificate configuration certificates : - profile-name : "prof-web-server-12345" project-slug : "my-project-slug" attributes : common-name : "api.example.com" alt-names : - "api.example.com" - "api-v2.example.com" key-algorithm : "RSA_2048" signature-algorithm : "RSA-SHA256" key-usages : - "digital_signature" - "key_encipherment" extended-key-usages : - "server_auth" ttl : "30d" lifecycle : renew-before-expiry : "14d" # Renew 14 days before expiration status-check-interval : "6h" # Check certificate status every 6 hours file-output : private-key : path : "/etc/ssl/private/api.example.com.key" permission : "0600" certificate : path : "/etc/ssl/certs/api.example.com.crt" permission : "0644" chain : path : "/etc/ssl/certs/api.example.com.chain.crt" permission : "0644" post-hooks : on-issuance : command : "systemctl reload nginx" timeout : 30 on-renewal : command : "systemctl reload nginx && logger 'Certificate renewed'" timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback & Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:55
https://www.facebook.com/reg/?entry_point=login&next=https%3A%2F%2Fwww.facebook.com%2Fshare_channel%2F%3Ftype%3Dreshare%26link%3Dhttps%253A%252F%252Fdev.to%252Fgianlucam76%252Fsveltos-automate-configuration-updates-for-kubernetes-applications-4o7d%26app_id%3D966242223397117%26source_surface%3Dexternal_reshare%26display%26hashtag#sharing-partner-information
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:55
https://infisical.com/docs/integrations/platforms/certificate-agent#agent-configuration
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let's Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : "universal-auth" config : client-id : "./client-id" # Path to file containing client ID client-secret : "./client-secret" # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : "universal-auth" config : client-id : "your-client-id" client-secret : "your-client-secret" Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : "kubernetes-auth" config : identity-id : "your-kubernetes-identity-id" service-account-token-path : "/var/run/secrets/kubernetes.io/serviceaccount/token" Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : "azure-auth" config : identity-id : "your-azure-identity-id" Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : "gcp-id-token" config : identity-id : "your-gcp-identity-id" GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : "gcp-iam" config : identity-id : "your-gcp-identity-id" service-account-key : "/path/to/service-account-key.json" Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : "aws-iam" config : identity-id : "your-aws-identity-id" ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : "https://app.infisical.com" # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # Infisical authentication configuration auth : type : "universal-auth" # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : "your-client-id" client-secret : "your-client-secret" # Certificate configuration certificates : - profile-name : "prof-web-server-12345" project-slug : "my-project-slug" attributes : common-name : "api.example.com" alt-names : [ "api.example.com" , "api-v2.example.com" ] ttl : "90d" key-algorithm : "RSA_2048" signature-algorithm : "RSA-SHA256" key-usages : - "digital_signature" - "key_encipherment" extended-key-usages : - "server_auth" # Enable automatic certificate renewal lifecycle : renew-before-expiry : "30d" status-check-interval : "6h" # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : "/etc/ssl/private/web.key" permission : "0600" # Read/write for owner only certificate : path : "/etc/ssl/certs/web.crt" permission : "0644" # Read for all, write for owner chain : path : "/etc/ssl/certs/web-chain.crt" permission : "0644" # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo "Certificate issued for ${CERT_COMMON_NAME}" systemctl reload nginx timeout : 30 on-renewal : command : | echo "Certificate renewed for ${CERT_COMMON_NAME}" systemctl reload nginx timeout : 30 on-failure : command : | echo "Certificate operation failed: ${ERROR_MESSAGE}" mail -s "Certificate Alert" [email protected] < /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., ["www.example.com", "api.example.com"] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger 'Certificate renewal failed' , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo "New certificate issued for ${CERT_COMMON_NAME}" chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo "Certificate renewed for ${CERT_COMMON_NAME}" # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d "{'text': 'Certificate for ${CERT_COMMON_NAME} renewed successfully'}" timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo "Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}" # Send alert mail -s "Certificate Failure Alert" [email protected] < /dev/null # Log to syslog logger -p daemon.error "Certificate agent failure: ${ERROR_MESSAGE}" timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : "https://app.infisical.com" retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : "https://app.infisical.com" # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # Infisical authentication configuration auth : type : "universal-auth" # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : "your-client-id" client-secret : "your-client-secret" # Certificate configuration certificates : - profile-name : "prof-web-server-12345" project-slug : "my-project-slug" attributes : common-name : "api.example.com" alt-names : - "api.example.com" - "api-v2.example.com" key-algorithm : "RSA_2048" signature-algorithm : "RSA-SHA256" key-usages : - "digital_signature" - "key_encipherment" extended-key-usages : - "server_auth" ttl : "30d" file-output : private-key : path : "/etc/ssl/private/api.example.com.key" permission : "0600" certificate : path : "/etc/ssl/certs/api.example.com.crt" permission : "0644" chain : path : "/etc/ssl/certs/api.example.com.chain.crt" permission : "0644" omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : "https://app.infisical.com" # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # Infisical authentication configuration auth : type : "universal-auth" # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : "your-client-id" client-secret : "your-client-secret" # Certificate configuration certificates : - profile-name : "prof-web-server-12345" project-slug : "my-project-slug" csr-path : "/etc/ssl/requests/api.csr" file-output : certificate : path : "/etc/ssl/certs/api.example.com.crt" permission : "0644" chain : path : "/etc/ssl/certs/api.example.com.chain.crt" permission : "0644" omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : "https://app.infisical.com" # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # Infisical authentication configuration auth : type : "universal-auth" # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : "your-client-id" client-secret : "your-client-secret" # Certificate configuration certificates : - profile-name : "prof-web-server-12345" project-slug : "my-project-slug" attributes : common-name : "api.example.com" alt-names : - "api.example.com" - "api-v2.example.com" key-algorithm : "RSA_2048" signature-algorithm : "RSA-SHA256" key-usages : - "digital_signature" - "key_encipherment" extended-key-usages : - "server_auth" ttl : "30d" lifecycle : renew-before-expiry : "14d" # Renew 14 days before expiration status-check-interval : "6h" # Check certificate status every 6 hours file-output : private-key : path : "/etc/ssl/private/api.example.com.key" permission : "0600" certificate : path : "/etc/ssl/certs/api.example.com.crt" permission : "0644" chain : path : "/etc/ssl/certs/api.example.com.chain.crt" permission : "0644" post-hooks : on-issuance : command : "systemctl reload nginx" timeout : 30 on-renewal : command : "systemctl reload nginx && logger 'Certificate renewed'" timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback & Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:55
https://www.notion.com/ar/templates
اختيار من بين أكثر من 30000 قالب Notion | متجر Notion Notion الميزات Notion AI إنشاء، كتابة، أتمتة الوكلاء يتعامل مع المهام اليدوية بحث المؤسسة اعثر على إجابات على الفور ملاحظات الاجتماع المدعومة بالذكاء الاصطناعي مكتوبة بشكل مثالي بواسطة الذكاء الاصطناعي المُستندات بسيط وقوي قاعدة المعرفة تجميع معرفتك في مكان واحد المشاريع إدارة أي مشروع المواقع انشر أي شيء بسرعة البدء استكشاف حالات استخدام الذكاء الاصطناعي تعرّف على قدرات Notion AI تصفح السوق قوالب لكل شيء عرض عمليات التكامل ربط تطبيقاتك مع Notion تنزيل web clipper حفظ من الويب إلى Notion جرّب تطبيق Notion لسطح المكتب للحصول على تجربة أسرع تنزيل التطبيق البريد التقويم الذكاء الاصطناعي الخطة المؤسسية التسعير استكشاف الفرق الهندسة والمنتج التصميم التسويق تقنية المعلومات حجم الفريق الشركات الناشئة الشركات الصغيرة والمتوسطة المؤسسة التعليم التعلم مركز المساعدة أكاديمية Notion قصص العملاء المدونة المجتمع برامج الشركاء الإصدار واجهة برمجة التطبيقات (API) القوالب الأمان الاستشاريون اطلب عرضاً توضيحياً تسجيل الدخول احصل على Notion مجاناً السوق العمل المدرسة الحياة مسح البحث في معرض القوالب القوالب -3 من القوالب لا توجد نتائج لـ مسح البحث في معرض القوالب القوالب -3 من القوالب لا توجد نتائج لـ العمل المدرسة الحياة اكتشف اكتشف أفضل القوالب والإعدادات التي أنشأها مجتمع Notion مسح البحث في معرض القوالب القوالب -3 من القوالب لا توجد نتائج لـ New Year Build your 2026 Choose a pack to build your year around what matters most. استكشاف → Top creator Maro Creations Simplifying life and boosting productivity through thoughtfully designed Notion templates. استكشاف → تقرير الحادث ٢٤ من القوالب ميثاق المشروع ٨١ من القوالب البحث عن منزل ٦٧ من القوالب تخطيط الانتقال ٢٨ من القوالب تحليل نقاط القوة والضعف والفرص والتهديدات (SWOT) ٥١ من القوالب الفيديو والأفلام ٢٣٢ من القوالب القوالب المميّزة مختارة بعناية من فريق التحرير Sarah مجاني Nika Erculj مجاني Jithin Rajiv مجاني siddh مجاني DiaryOfAHotGirl مجاني Katia Creates مجاني المجموعات المميّزة قوالب متناسقة مع بعضها تصفّح ٣ من المجموعات العمل كل ما تحتاجه لبدء عملك ابدأ مشروعك الريادي باستخدام قوالب Notion المتخصّصة في مجالك استكشاف → النماذج أخبار نموذجية جمع البيانات وتنظيمها باستخدام قوالب نموذج Notion متعددة الاستخدامات استكشاف → أفضل الفئات اكتشف طرق جديدة لاستخدام Notion تصفّح ٣٣٥ من الفئات تتبّع العادات ٢٬٧٨٠ من القوالب أداة التخطيط الشخصي ٨٬٠٧٧ من القوالب السنوات الجديدة ٥٬٤٦٧ من القوالب أداة تخطيط الدراسة ٤٬١٤٠ من القوالب دفتر يومية التداول ١٦٣ من القوالب لوحة الأهداف ١٥٦ من القوالب التمويل الشخصي ٣٬٤٧٤ من القوالب السفر ١٬٣٥١ من القوالب منشئو المحتوى المميّزون تعرّف على أفضل منشئي القوالب عرض جميع منشئي المحتوى البالغ عددهم ١٧٬٨٩٧ Nika Erculj Sharing everything you need to change your life for the better✨ ٣ من القوالب She Notions I specialize in crafting aesthetically pleasing Notion templates that enhance productivity and organization. With a focus on simplicity and functionality, my designs aim to empower users to achieve their goals and streamline their daily lives. ١٦ من القوالب MindBlocks The Operating System for your mind > MoodOS! Understand yourself through data, journaling and exercises built for growth. 🚀 ٤٨ من القوالب Ben I love building things, and am trying my hand at creating beautifully designed Notion templates that really solve problems. I live in Edinburgh Scotland with my wife & a small scruffy dog, called Mabel. Official Notion Ambassador and Notion Creator. "Love what you build!" ٩ من القوالب انضم كمنشئ محتوى أرسل قالبك إلى معرض قوالب Notion، واحصل على فرصة لعرضه بشكل مميّز، وحتى تحقيق دخل مادي – كل ذلك ببضع نقرات فقط. البدء → العربية إعدادات ملفات تعريف الارتباط © 2026 Notion Labs, Inc. الشركة نبذة عنا الوظائف الأمان الحالة الشروط والخصوصية حقوقك المتعلقة بالخصوصية تنزيل iOS وAndroid Mac وWindows التقويم Web Clipper الموارد مركز المساعدة التسعير المدونة المجتمع عمليات التكامل القوالب برامج الشركاء Notion لأجل الخطة المؤسسية الشركات الصغيرة شخصي استكشف المزيد →
2026-01-13T09:29:55
https://play.google.com/store/apps/details?id=notion.id&hl=fr_CA
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M12 17.27L18.18
2026-01-13T09:29:55
https://www.cisco.com/c/it_it/solutions/index.html
Soluzioni - Cisco Vai al contenuto principale Vai alla ricerca Vai a piè di pagina Cisco.com Italia Prodotti e servizi Soluzioni Supporto Scopri di più Scopri Cisco Come acquistare Partner: pagina principale Programma per i partner Supporto Strumenti Trova un partner Cisco Scopri i nostri partner Diventa un partner Cisco Soluzioni Dal networking e i data center alla collaborazione e alla sicurezza, disponiamo delle soluzioni IT per rispondere alle esigenze della tua organizzazione. Scopri come possiamo aiutarti. Contattaci Richiedi una chiamata Chiama il team di vendita: 00800 33 43 6866 Supporto tecnico Soluzioni in evidenza Lavoro ibrido Secure Access Service Edge (SASE) Full-Stack Observability Cloud Ibrido Soluzioni per tecnologia Analisi e automazione Artificial Intelligence Cloud Collaboration Infrastruttura di rete critica Internet of Things Wireless e mobilità Sicurezza Architettura di rete Networking basato sugli intenti Software Software-Defined Networking Indice prodotti Design Zone: guide alla progettazione di Cisco Soluzioni per tipo di business Piccole e medie imprese Provider di servizi CIO Insights e leadership digitale Settore pubblico Soluzioni per settore Città e comunità Istruzione Energia Servizi finanziari Pubblica amministrazione Sanità Assicurazioni Settore manifatturiero Petrolio e gas Commercio al dettaglio Sport e intrattenimento Trasporti Utilità Settore pubblico Cisco on Cisco: condividiamo le nostre storie IT Attraverso la condivisione dell'esperienza IT di Cisco, Cisco on Cisco può aiutare i clienti e i partner a sfruttare la tecnologia per realizzare i risultati business. Dai uno sguardo approfondito alle operazioni interne di Cisco IT. Scopri in che modo aiutiamo le organizzazioni a trasformarsi attraverso la tecnologia.&nbsp; I nostri metodi Centri di co-innovazione di Cisco I centri di co-innovazione di Cisco operano con partner regionali e globali al fine di creare nuove soluzioni tecnologiche, di risolvere i punti critici del settore e apportare contributi al business, alla società e al pianeta. Esplora le soluzioni I partner di Cisco fanno la differenza Ricevi una guida esperta prima, durante e dopo le distribuzioni tecnologiche.  Fai il primo passo Il nostro ecosistema di partner affidabili può facilitare la concretizzazione della tua trasformazione digitale.  Visualizza i partner globali La sua vittoria deriva dall'agevolare le aziende nella realizzazione dei loro obiettivi. Offriamo questo e altro.&nbsp; Diventa un partner Semplifichiamo il marketing dei partner per le piccole imprese.  Promozione della domanda delle piccole imprese (accesso richiesto) Contatta il reparto vendite Prove gratuite, demo e offerte Servizi
2026-01-13T09:29:55
https://shows.acast.com/frontier/episodes
Frontier Podcast by Gun.io - Hosted by Faith Benson Follow Frontier Podcast by Gun.io All Episodes 46. Ep. 46: Matt Genovese, CEO and Founder of Planorama 54:36 | Thursday, April 11, 2024 | Season 4 , Ep. 46 This week, Teja sits down with Matt Genovese, CEO and Founder of Planorama, a company that designs UX/UI flows for products with complete enablement for software teams. They discuss the intricacies of living abroad, the importance of incorporating design, and how de-risking early on in the life of a new product can make it more successful in the long run.https://planorama.design/matthttps://aiproducthive.com Play 45. Ep. 45: Brian Pontarelli, CEO and Founder of FusionAuth 44:05 | Thursday, March 28, 2024 | Season 4 , Ep. 45 On this week's episode, Teja sits down with Brian Pontarelli, Founder and CEO of both FusionAuth and Cleanspeak. They discuss the complexities of growing two businesses at the same time, making progress without using AI, and the subtle clues in an interview process that let you know someone's a great culture fit.https://fusionauth.io/https://cleanspeak.com/ Play 44. Ep. 44: Sabber Ahamed, Founder of xoolooloo 28:31 | Thursday, February 29, 2024 | Season 4 , Ep. 44 This week, Teja talks with Sabber Ahamed, Founder of Xoolooloo and Data Scientist at Bridgestone. They discuss the proliferation of data science, the joys of working on your own projects outside of the 9-5, and the different things career goals of a computational geophysicist can really shake up. Play 43. Ep. 43: Harpreet Singh, CEO and Co-Founder at Launchable 39:22 | Thursday, February 15, 2024 | Season 4 , Ep. 43 This week, Teja talks with Harpreet Singh, Co-CEO and Co-Founder of Launchable, a company that's on a mission to make software testing faster and smarter. They discuss the DACI framework and the importance of intentionality in decision-making, what it's like to bring a behemoth like Jenkins to life, and the power of slowing down to meditate.https://www.launchableinc.com/ Play 42. Ep. 42: Brian Douglas, CEO and Founder at OpenSauced 36:55 | Thursday, February 1, 2024 | Season 4 , Ep. 42 In this week's episode, Teja talks with Brian Douglas, CEO and Founder at OpeSauced. They talk about how a good open source portfolio is more than just getting your name on big projects, the natural progression from developer advocacy to building an open source marketplace, and the trials and tribulations of learning to lead as you grow.opensauced.pizza Play 41. Ep. 41: Ian Villa, COO and Co-founder at Whisper Aero 37:33 | Thursday, January 18, 2024 | Season 4 , Ep. 41 Joining Teja on this week's episode is Ian Villa, COO and Co-founder of Whisper Aero, a company that is developing cleaner, quieter, and more efficient propulsion solutions. They discuss the pros and cons of a campus with on-site housing, the burgeoning Nashville tech scene, and how a 5 am trip to Kinko's can, in hindsight, be a lesson in entrepreneurship.whisper.aero Play 40. Ep. 40: Kate O&#x27;Neil, CEO and Co-founder at Teaming 58:40 | Thursday, January 11, 2024 | Season 4 , Ep. 40 This week, Teja sits down for round two with Kate O'Neil, who has moved into the CEO position at Teaming since the last time they talked. They discuss the differences that come with the transition to becoming a CEO, the importance of incorporating movement into your life, and why getting the best sleep comes down to the perfect sheets.teaming.com Play 39. Ep. 39: Jeremy Snyder, CEO and Founder at FireTail 50:32 | Thursday, January 4, 2024 | Season 4 , Ep. 39 After a brief holiday hiatus, Teja is back this week with Jeremy Snyder, the Founder and CEO of FireTail, an API security platform that provides application layer visibility, real-time, inline inspection, and blocking of malicious API calls. They talk about being a less technical founder, how being a polyglot helps you understand more than language, and the importance of taking the time to find your own adventure.https://www.firetail.io/ Play 38. Ep. 38: Stefan Avram, Head of Growth and Co-Founder at WunderGraph 34:16 | Thursday, December 21, 2023 | Season 4 , Ep. 38 Teja sits down with Stefan Avram, Head of Growth and Co-founder at WunderGraph, an open-source GraphQL federation. They discuss how injuries can change your life trajectory, the complexities of working with distributed teams, and how sometimes getting fired can be the best thing that's ever happened to you. www.wundergraph.com Play loading... Instagram X.com TikTok Copyright Gun.io Hosted with ❤️ by Acast
2026-01-13T09:29:55
https://www.notion.com/id/partners/solutions-partner-program
Bergabung dalam Program Mitra Solusi Notion | Notion Notion Fitur Notion AI Buat, tulis, otomatiskan Agent Menangani tugas manual Enterprise Search Temukan jawaban secara cepat AI Meeting Notes Ditulis dengan sempurna oleh AI Docs Sederhana &amp; berdaya guna Basis Pengetahuan Pusatkan pengetahuan Anda Projects Kelola proyek Sites Publikasikan apa saja, dengan cepat Memulai Jelajahi kasus penggunaan AI Lihat apa saja yang bisa dilakukan Notion AI Telusuri marketplace Templat untuk semua hal Lihat integrasi Hubungkan aplikasi Anda dengan Notion Unduh web clipper Simpan dari web ke Notion Coba aplikasi desktop Notion untuk pengalaman yang lebih cepat Unduh aplikasi Mail Kalender AI Perusahaan Harga Jelajahi Tim Teknik &amp; Produk Desain Pemasaran TI Ukuran tim Startup UKM Perusahaan Pendidikan Pelajari Pusat bantuan Notion Academy Cerita pelanggan Blog Komunitas Program mitra Buat API Templat Keamanan Konsultan Minta demo Masuk Dapatkan Notion gratis Jadilah Mitra Solusi. Bangun peluang. Wujudkan hasil. Berikan nilai. Semua bersama Notion. Menjadi mitra Temukan mitra Satu program. Dua cara untuk berkolaborasi. Pilih jalur kolaborasi yang paling cocok dengan cara kerja Anda—atau coba keduanya sekaligus. Jual Anda membantu pelanggan memilih Notion dan membeli dengan mantap. Program ini dirancang untuk reseller, VAR, dan konsultan berbasis penjualan yang berfokus pada transaksi baru maupun ekspansi pelanggan. Tugas Anda: Menemukan peluang klien baru Membantu pelanggan menemukan penawaran Notion yang tepat Berkolaborasi dengan tim Notion dalam penjualan bersama Mengawal transaksi hingga tuntas Jadilah Mitra Penjualan → Layanan Anda membantu pelanggan memaksimalkan potensi Notion—mulai dari awal hingga akhir. Program ini dirancang untuk integrator sistem, agensi, dan konsultan independen. Tugas Anda: Melakukan sesi analisis kebutuhan dan perencanaan desain Menjalankan implementasi serta migrasi data Membangun integrasi dan otomatisasi alur kerja Memberikan pelatihan dan dukungan manajemen perubahan Jadilah Mitra Konsultasi → Gunakan sumber daya yang mendukung kesuksesan Anda. Pendapatan Margin mitra berulang dari penjualan lisensi, proyek yang disediakan Notion, dan subkontrak Dukungan Dukungan prioritas, akses beta ke fitur baru, serta dokumentasi API lengkap untuk integrasi kustom Pemberdayaan Pelatihan lengkap, alat bantu penjualan, dan manajer keberhasilan mitra khusus Paket Solusi Templat siap pakai, panduan implementasi, serta aset demo dan ruang kerja Komunitas Dewan penasihat mitra, forum umpan balik produk, dan akses awal Pemasaran Kampanye bersama, studi kasus, dan pencantuman di direktori mitra Notion Dengan dukungan Mitra Solusi, kami bisa lebih efektif menyederhanakan alat, menghilangkan redundansi, dan membuat setiap tim bisa bergerak lebih cepat. Nora Grasham Direktur Senior, Engineering TI Perusahaan terdepan mencapai hasil bisnis lebih cepat bersama mitra ahli. Mulai dari startup hingga korporasi besar, berbagai perusahaan di seluruh dunia telah menjadikan Notion sebagai sistem kerja yang dapat berkembang dengan bimbingan para ahli bersertifikat. Lihat caranya → Tanya &amp; jawab Bagaimana proses menjadi Mitra Solusi? Langkah pertama adalah membuat profil mitra Anda, menyetujui Perjanjian Mitra Solusi, dan mengirimkan aplikasi Anda. Tim kami akan meninjaunya, dan setelah disetujui, Anda akan memenuhi syarat untuk menyelesaikan sertifikasi yang diperlukan agar dapat menjadi Mitra Solusi. Mulai di sini. Aplikasi saya sudah disetujui, lalu apa langkah berikutnya? Setelah disetujui, langkah berikutnya tinggal menyelesaikan sertifikasi yang dibutuhkan. Begitu lulus, Anda akan dapat lencana dan kredensial resmi sebagai Mitra Solusi. Setelah itu, cukup lengkapi profil Anda supaya bisa tampil di direktori. Apa saja yang membuat seorang mitra bisa sukses? Mitra yang sukses biasanya fokus membangun bisnis berbasis Notion sesuai keahliannya. Mereka ikut sertifikasi, menyiapkan penawaran yang bisa diulang, memberikan hasil nyata, dan konsisten menjalankannya. Jelajahi kisah para mitra di sini untuk mendapatkan inspirasi. Saya perusahaan yang ingin bekerja sama dengan Mitra Solusi. Bagaimana cara memulainya? Mulailah dengan menelusuri direktori mitra . Cari mitra yang beroperasi di wilayah dan bahasa Anda, serta menyediakan jenis layanan yang Anda butuhkan. Setelah menemukan kecocokan, jadwalkan panggilan analisis kebutuhan untuk membahas langkah selanjutnya. Apa perbedaan antara Mitra Penjualan dan Mitra Konsultasi? Dalam program Mitra Solusi, terdapat dua jenis mitra: Mitra Penjualan dan Mitra Konsultasi. Mitra Penjualan berfokus pada pertumbuhan pendapatan melalui aktivitas seperti mencari pelanggan baru, mendukung ekspansi, mengelola perpanjangan kontrak, serta memberikan pengawasan akun. Mitra Konsultasi membantu pelanggan mengadopsi dan mengembangkan Notion dengan layanan seperti konsultasi, implementasi, integrasi, pelatihan, hingga dukungan berkelanjutan. Seorang mitra dapat memilih salah satu peran atau menjalankan keduanya. Masing-masing memiliki tingkatan sendiri dengan manfaat dan persyaratan yang berbeda. Bahasa Indonesia Pengaturan cookie © 2026 Notion Labs, Inc. Perusahaan Tentang kami Karier Keamanan Status Ketentuan &amp; privasi Hak privasi Anda Unduh iOS &amp; Android Mac &amp; Windows Kalender Web Clipper Sumber Daya Pusat bantuan Harga Blog Komunitas Integrasi Templat Program mitra Notion untuk Perusahaan Usaha kecil Personal Telusuri lebih lanjut →
2026-01-13T09:29:55
https://ko-kr.facebook.com/login/?next=https%3A%2F%2Fl.facebook.com%2Fl.php%3Fu%3Dhttps%253A%252F%252Fwww.meta.com%252F%26amp%253Bh%3DAT3GHcxzy3_hwgabrQGILAdFg5-sY2UF3NnqPPcszvftFRFkOTEfGUk-rwMDXeNUDholnd7i3yKnlJRQZJRlzh6bTHGOy_AwXAON6FXI3F9Ps5p79OpOuIqxrhg60Qd00lf219tJ000sSHdA
Facebook 취향 저격 콘텐츠를 만나는 곳 Facebook에 로그인 이메일 또는 휴대폰 번호 비밀번호 로그인 비밀번호를 잊으셨나요? 새 계정 만들기 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 언어 더 보기... 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 약관 고객 센터 연락처 업로드 및 비사용자 Meta © 2026
2026-01-13T09:29:55
https://aws.amazon.com/opensearch-service/
Managed Open Source Search and Log Analytics – Amazon OpenSearch Service – AWS Skip to main content Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account Amazon OpenSearch Service Overview Features Pricing Getting Started Resources More Products › Analytics › Amazon OpenSearch Service Amazon OpenSearch Service Simplify AI-powered search, observability, and vector database operations with a secure, cost-effective managed service. Get started with OpenSearch Service Build AI-powered search in three steps Introduction to OpenSearch Service Amazon OpenSearch Service is an AWS-managed service that lets you run and scale OpenSearch clusters without having to worry about managing, monitoring, and maintaining your infrastructure, or having OpenSearch clusters operation expertise. OpenSearch is a distributed, community-driven, Apache 2.0-licensed, open-source search and analytics suite. OpenSearch Service reduces operational overhead, provides enterprise-grade security, high availability, and scalability, and enables you to quickly deploy real-time search, analytics, and generative AI applications. This helps organizations accelerate innovation and improve operational efficiency rather than managing infrastructure. You can choose between precise control with fully managed OpenSearch Service clusters or automatic resource optimization with&nbsp; Amazon OpenSearch Serverless &nbsp;to efficiently scale your vector workloads without incurring unnecessary costs. Play Benefits of Amazon OpenSearch Service Improve search experiences Balance search quality, performance, and cost through flexible search options including traditional, vector-driven, and hybrid approaches. Users find relevant content through precise keyword matching or natural language queries, while administrators can tune search configurations to match specific use case requirements. Zero-ETL integrations with Amazon DynamoDB, Amazon DocumentDB, and Amazon S3, along with connections to other AWS services and databases, enable faster search implementation across your data sources while reducing storage costs and management overhead Accelerate generative AI deployments Simplify generative AI implementation with an integrated vector database that manages billions of vectors efficiently. Rapidly develop generative AI applications through native integrations with Amazon Bedrock, Amazon SageMaker, Amazon Titan, and third-party models like OpenAI, Cohere, DeepSeek, and others through pre-built connectors. Learn more Advanced operational observability Analyze logs, traces, and metrics through unified dashboards. Direct query capabilities for Amazon S3, Amazon CloudWatch, and Amazon Security Lake eliminate data movement and reduce storage costs. Built-in machine learning detects anomalies and automates alerting for faster issue resolution. Learn more Deploy and operate with confidence Choose between fully managed OpenSearch Service clusters for maximum control or OpenSearch Serverless collections for automated scaling. Managed clusters support up to 10PB hot data and an additional 15PB of warm data operations with custom configurations, while serverless eliminates operational complexity through automatic resource management. Both managed clusters and serverless options provide comprehensive security through encryption, index-level access controls, and Multi-AZ deployments for high availability, with managed clusters offering additional document-level security controls. Features AWS manages software installation, upgrades, and patching with 24x7 monitoring and automated self-healing, while supporting workloads that can scale up to 25 PB, 1,000 data nodes, and an additional 200 coordinator nodes. OpenSearch Service provides a single, proven technology that powers diverse workloads from search to analytics to vector database operations. The modern UI delivers comprehensive operational analytics through unified data analysis across multiple sources, with natural language queries and purpose-built workspaces for different use cases. OpenSearch is an Apache 2.0-licensed open-source solution, member of the Linux Foundation, and supported by AWS and a growing community to foster innovation and help organizations build advanced search experiences, implement AI capabilities, and derive operational insights with greater efficiency. Managed OpenSearch Run search workloads simply without the hassle of configuring, managing, and scaling OpenSearch clusters. OpenSearch Service provides the power of open-source search with interactive millisecond response times. Additionally, Amazon OpenSearch Serverless enables search and log analytics without provisioning and adjusting resources, automatically scaling resources based on your application's needs. Learn more about Amazon OpenSearch Serverless Price performant and highly scalable vector database for generative AI applications AWS recommends Amazon OpenSearch Service as the vector database for Amazon Bedrock. The integrated vector database powers modern generative AI applications through scalable vector storage and efficient search capabilities, enabling organizations to store and query billions of high-dimensional vector embeddings with millisecond response times. Organizations can integrate with foundation models on Amazon Bedrock, Amazon SageMaker, and third-party model providers like OpenAI, Cohere, and DeepSeek, combining vector search with traditional keyword queries to deliver more accurate, contextually relevant results. The solution supports Retrieval-Augmented Generation (RAG) applications and near real-time embedding updates, helping organizations build sophisticated generative AI experiences like semantic search, intelligent chatbots, and personalized recommendations while maintaining data accuracy. OpenSearch Serverless is also the default vector database for Amazon Bedrock Knowledge Bases . OpenSearch Serverless offers an auto-scaled, high-performing vector database that you can use to build with Amazon Bedrock for RAG and AI agents, without having to manage the vector database infrastructure. Learn more about OpenSearch Service as a vector database Fully managed data ingestion and transformation Amazon OpenSearch Ingestion enables ingesting, transforming, and routing data at scale to OpenSearch domains and OpenSearch Serverless collections. OpenSearch Ingestion automatically scales to handle demanding workloads, reduces storage costs through deduplication and sampling, enforces data quality with built-in processors and schemas, protects sensitive data through redaction, and routes data based on compliance requirements. Learn more about data ingestion Comprehensive security for search and log analytics Use robust security capabilities to audit and secure search and log analytics data, meeting requirements for authentication, authorization, encryption, audit trails, and regulatory compliance. OpenSearch Service offers granular access control, network isolation, secure programmatic access, compliance enablement across industry standards, and security analytics through log collection, normalization, and comparison. Learn more about security Integration with other AWS services Simply integrate with other AWS services to deliver expanded search and analytics functionality. This includes seamless integration with Amazon DynamoDB and Amazon DocumentDB databases for advanced search on stored data, as well as frictionless search across Amazon Simple Storage Service (Amazon S3) to reduce the need for separate data indexing. You can now directly query and visualize Amazon CloudWatch Logs data in near real-time using Amazon OpenSearch Service without complex data pipelines or having to export or transform the data first. This zero ETL integration centralizes log data collection and storage, leveraging the scalable ingestion and storage of CloudWatch Logs along with the advanced analytics capabilities of OpenSearch Service. Zero ETL integration between Amazon Security Lake and Amazon OpenSearch Service, allows you to efficiently search and analyze voluminous security data that were previously cost-prohibitive to analyze without data integration challenges, streamlining security investigations and providing comprehensive visibility of your security landscape. The service further integrates with AWS model hosting services like Amazon Bedrock and Amazon SageMaker, enabling vector embeddings generation and storage, and AWS CloudTrail and AWS CloudWatch for enhanced cluster management and security auditing. Download the solution brief Visit our&nbsp; Features page &nbsp;for a full list of OpenSearch Service features and benefits. Use cases Real-time log analytics and observability Centralize and analyze security and observability data for real-time threat detection, incident management, and improved application health, enhancing system visibility and customer experiences. Learn more about log analytics Seamless and personalized search Boost user engagement and conversions with the OpenSearch Service fast, personalized search. Quickly deliver relevant data across applications, websites, and data lake catalogs for an enhanced user experience. Vector database for semantic and multimodal search Store and search billions of high-dimensional vectors efficiently for vector-driven search capabilities. Support generative AI applications with more accurate and contextually relevant results across multi-modal (text, image, audio, and video) data. Integrate with foundation models on Amazon Bedrock, Amazon SageMaker, and third-party model providers like OpenAI, Cohere, and DeepSeek to power sophisticated use cases like intelligent search, chatbots, personalized recommendations, anomaly detection, and AI-assisted analytics. Retrieval Augmented Generation (RAG) for generative AI applications Enhance the accuracy and relevance of responses from large language models (LLMs) by incorporating Retrieval Augmented Generation (RAG) with OpenSearch Service as an external knowledge base. Get started with OpenSearch Service Learn What is OpenSearch? Learn more Features page Learn more about OpenSearch Service Visit the features page Create an AWS account Learn What Is AWS? What Is Cloud Computing? What Is Agentic AI? Cloud Computing Concepts Hub AWS Cloud Security What's New Blogs Press Releases Resources Getting Started Training AWS Trust Center AWS Solutions Library Architecture Center Product and Technical FAQs Analyst Reports AWS Partners Developers Builder Center SDKs &amp; Tools .NET on AWS Python on AWS Java on AWS PHP on AWS JavaScript on AWS Help Contact Us File a Support Ticket AWS re:Post Knowledge Center AWS Support Overview Get Expert Help AWS Accessibility Legal English Back to top Amazon is an Equal Opportunity Employer: Minority / Women / Disability / Veteran / Gender Identity / Sexual Orientation / Age. x facebook linkedin instagram twitch youtube podcasts email Privacy Site terms Cookie Preferences © 2026, Amazon Web Services, Inc. or its affiliates. All rights reserved.
2026-01-13T09:29:55
https://ko-kr.facebook.com/login/?next=https%3A%2F%2Fwww.facebook.com%2Fshare_channel%2F%3Ftype%3Dreshare%26link%3Dhttps%253A%252F%252Fdev.to%252Farvindsundararajan%252Fharmonic-flows-guiding-robots-with-imperfect-precision-by-arvind-sundararajan-3406%26app_id%3D966242223397117%26source_surface%3Dexternal_reshare%26display%26hashtag
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:55
https://www.notion.com/id/product/wikis
Ruang kerja terhubung Anda untuk wiki, dokumen &amp; proyek | Notion Notion Fitur Notion AI Buat, tulis, otomatiskan Agent Menangani tugas manual Enterprise Search Temukan jawaban secara cepat AI Meeting Notes Ditulis dengan sempurna oleh AI Docs Sederhana &amp; berdaya guna Basis Pengetahuan Pusatkan pengetahuan Anda Projects Kelola proyek Sites Publikasikan apa saja, dengan cepat Memulai Jelajahi kasus penggunaan AI Lihat apa saja yang bisa dilakukan Notion AI Telusuri marketplace Templat untuk semua hal Lihat integrasi Hubungkan aplikasi Anda dengan Notion Unduh web clipper Simpan dari web ke Notion Coba aplikasi desktop Notion untuk pengalaman yang lebih cepat Unduh aplikasi Mail Kalender AI Perusahaan Harga Jelajahi Tim Teknik &amp; Produk Desain Pemasaran TI Ukuran tim Startup UKM Perusahaan Pendidikan Pelajari Pusat bantuan Notion Academy Cerita pelanggan Blog Komunitas Program mitra Buat API Templat Keamanan Konsultan Minta demo Masuk Dapatkan Notion gratis Wiki Wiki dengan sentuhan baru. Ruang kerja yang berantakan menghambat efisiensi pekerjaan. Pusatkan semua informasi Anda di Notion. Dapatkan Notion gratis Minta demo Beranda Perusahaan Pedoman merek Hub TI Orientasi Karyawan Beranda Perusahaan Orientasi Hub TI Orientasi Cara baru menyatukan pengetahuan dan dokumentasi Dipercaya startup dan perusahaan Fortune 500 di seluruh dunia. Dinilai terbaik di G2 Notion konsisten menempati peringkat teratas di G2, berkat ratusan ulasan pelanggan. Namun, jangan hanya percaya kata-kata kami. Lihat langsung ulasan G2 untuk info lebih lanjut. Mulai -&gt; Notion fleksibel mengikuti kebutuhan Anda. Bisa sepraktis atau secanggih fitur yang Anda butuhkan. Rahim Makani Direktur Produk, Match Group Temukan, edit, telusuri. Kami merancang pengalaman yang akan Anda sukai. Ringkasan semua dokumen Sidebar Notion menjaga ruang kerja Anda tetap teratur, seiring perkembangan tim yang makin cepat. Pencarian yang efektif Filter canggih yang membantu siapa pun menemukan data dan keputusan di seluruh tim hanya dalam hitungan detik. Menarik sejak awal Pilih emoji dan gambar sampul yang tepat untuk setiap halaman agar sesuai dengan identitas merek perusahaan Anda. Seret dan lepas untuk mengatur Semua orang bisa menambah pengetahuan tim. Tak perlu jago teknis untuk sekadar memperbarui halaman. Tautkan halaman lain dengan mudah Semuanya terhubung di ruang kerja Anda—cukup ketik @ untuk menautkan catatan atau roadmap ke dalam dokumen. Hemat waktu untuk menjawab pertanyaan &amp; memperbarui dokumen. Perkenalkan Blok Sinkron—Konten selalu terbaru, otomatis. Punya konten yang sama di banyak tempat? Cukup edit sekali, dan fitur Blok Sinkron akan menerapkan perubahannya ke semua tempat lain. Verifikasi Tidak perlu lagi bertanya-tanya, “Apakah ini versi terbaru?” Percayalah bahwa info yang Anda temukan akurat dan selalu terbaru. Notion mengurangi waktu orientasi karyawan baru hingga berhari-hari, bahkan berminggu-minggu, dengan mempercepat mereka menemukan informasi dan belajar dari situ. Scott Entwistle Senior Recruiter, Remote Selamat datang di ruang kerja Anda Semua dokumen, catatan, dan tugas Anda yang paling relevan terkumpul di satu tempat. Rapi, teratur, dan otomatis terbaru. Bagikan info dengan mudah dari Slack, Figma, dan Jira. Lihat semua integrasi -&gt; Figma Bagikan desain terbaru kepada tim Anda. Coba sekarang -&gt; Amplitude Pantau metrik rilis, hasil eksperimen, dan lainnya. Coba sekarang -&gt; GitHub Masukkan pull request, issue, dan repositori langsung ke dalam Notion. Coba sekarang -&gt; Slack Cukup masukkan tautan untuk melihat pesan lengkapnya tanpa berpindah aplikasi. Coba sekarang -&gt; Jira Lihat pembaruan bug atau ubah seluruh proyek menjadi database. Coba sekarang -&gt; Lihat semua integrasi Buka galeri -&gt; Bertumbuh bersama perusahaan terbesar. Bicara dengan tim penjualan -&gt; Analitik untuk langkah berikutnya Dengan Paket Perusahaan Notion, admin mendapatkan alat lengkap untuk memahami cara karyawan berinteraksi dengan konten. Keamanan &amp; kendali admin Jaga ruang kerja Anda tetap aman dengan alat keamanan, kepatuhan, dan audit. Peran admin terperinci Delegasikan pengguna tingkat admin untuk mengelola keanggotaan ruang kerja. Izin tingkat lanjut Tentukan siapa yang dapat melakukan dan membuat apa, dengan sangat terperinci. SSO berbasis SAML Beri karyawan akses ke Notion lewat penyedia identitas Anda menggunakan SSO berbasis SAML. Pengelolaan pengguna otomatis dengan SCIM Buat, hapus, tambahkan, perbarui, atau ambil pengguna maupun grup dengan mudah. Alat manajemen domain Klaim domain Anda dan atur siapa yang bisa membuat ruang kerja dengan domain tersebut, sehingga kendali tetap di tangan Anda. Dirancang untuk disukai semua jenis tim. Engineering Luncurkan fitur dengan cepat di satu platform terpusat, mulai dari sprint, panduan kode, perbaikan bug, dan lainnya. Lihat cara engineer menggunakan Notion → Produk Satukan roadmap dan tujuan, agar semua tahu jadwal peluncuran produk. Lihat cara PM menggunakan Notion → Desain Peninjauan makin lancar, permintaan terprioritaskan, semua proyek kreatif selesai tepat waktu. Lihat cara desainer menggunakan Notion → Proyek dan dokumen langsung tersedia, tanpa biaya tambahan. Proyek Kelola semua jenis proyek, untuk semua jenis dan ukuran tim. Selengkapnya -&gt; Dokumen Mudah. Efektif. Elegan. Jalin komunikasi yang lebih efisien dengan blok penyusun fleksibel. Selengkapnya -&gt; Cukup sekali klik untuk mulai. Impor atau gunakan templat. Jelajahi galeri templat -&gt; Cukup sekali klik untuk mulai. Impor atau gunakan templat. Buat lembaran baru dengan alat yang dipakai tim modern untuk bekerja lebih cepat. Semua pekerjaan Anda langsung tersusun rapi. Selengkapnya → OKR Buffer Coba sekarang → Daftar periksa orientasi Pitch Coba sekarang → Wiki rekrutmen Blinkist Coba sekarang → Jalankan wiki Anda sekarang juga. Coba dulu sepuasnya. Bayar dan undang tim Anda belakangan. Dapatkan Notion gratis Minta demo Bahasa Indonesia Pengaturan cookie © 2026 Notion Labs, Inc. Perusahaan Tentang kami Karier Keamanan Status Ketentuan &amp; privasi Hak privasi Anda Unduh iOS &amp; Android Mac &amp; Windows Kalender Web Clipper Sumber Daya Pusat bantuan Harga Blog Komunitas Integrasi Templat Program mitra Notion untuk Perusahaan Usaha kecil Personal Telusuri lebih lanjut →
2026-01-13T09:29:55
https://www.linkedin.com/company/google?trk=public_post_reshare_feed-actor-name
Google | LinkedIn Skip to main content LinkedIn Top Content People Learning Jobs Games Sign in Join for free Google Software Development Mountain View, CA 40,235,038 followers See jobs Follow View all 329,545 employees Report this company Overview Jobs Life About us A problem isn't truly solved until it's solved for all. Googlers build products that help create opportunities for everyone, whether down the street or across the globe. Bring your insight, imagination and a healthy disregard for the impossible. Bring everything that makes you unique. Together, we can build for everyone. Check out our career opportunities at goo.gle/3DLEokh Website https://goo.gle/3DLEokh External link for Google Industry Software Development Company size 10,001+ employees Headquarters Mountain View, CA Type Public Company Specialties search, ads, mobile, android, online video, apps, machine learning, virtual reality, cloud, hardware, artificial intelligence, youtube, and software Locations Primary 1600 Amphitheatre Parkway Mountain View, CA 94043, US Get directions 111 8th Ave New York, NY 10011, US Get directions Claude Debussylaan 34 Amsterdam, North Holland 1082 MD, NL Get directions Avenida Brigadeiro Faria Lima, 3477 Sao Paulo, SP 04538-133, BR Get directions 51 Breithaupt St Kitchener, ON N2H 5G5, CA Get directions Barrow Street Dublin, County Dublin, IE Get directions Old Madras Road Bengaluru, Karnataka 560016, IN Get directions 2590 Pearl St Boulder, CO 80302, US Get directions 601 N 34th St Seattle, WA 98103, US Get directions 48 Pirrama Rd Sydney, NSW 2009, AU Get directions 19510 Jamboree Rd Irvine, CA 92612, US Get directions 320 N Morgan St Chicago, IL 60607, US Get directions 3 Bandra Kurla Complex Road Mumbai, Maharashtra 400051, IN Get directions 5th Ave Taguig City, National Capital Region, PH Get directions 3 Pasir Panjang Rd Singapore, Singapore 118484, SG Get directions 13 Hyderabad, TS 500084, IN Get directions 90 Collins St Melbourne, VIC 3000, AU Get directions 901 Cherry Ave San Bruno, CA 94066, US Get directions Plaza Pablo Ruiz Picasso Madrid, Community of Madrid 28046, ES Get directions 25 Massachusetts Ave NW Washington, DC 20001, US Get directions 15 Gurugram, HR 122001, IN Get directions Carrera 11A 94-45 Bogota, Bogota, D.C. 110221, CO Get directions 2 Matheson St Wan Chai, Hong Kong, HK Get directions 1875 Explorer St Reston, VA 20190, US Get directions 111 Richmond St W Toronto, ON M5H 2G4, CA Get directions 345 Spear St San Francisco, CA 94105, US Get directions 355 Main St Cambridge, MA 02142, US Get directions Via Federico Confalonieri, 4 Milan, Lomb. 20124, IT Get directions St Giles High Street London, England WC2H 8AG, GB Get directions 9606 N Mopac Expy Austin, TX 78759, US Get directions 340 Main St Los Angeles, CA 90291, US Get directions Plaza Pablo Ruiz Picasso Madrid, Community of Madrid 28020, ES Get directions 2300 Traverwood Dr Ann Arbor, MI 48105, US Get directions Avenida Costanera Sur Las Condes, Santiago Metropolitan 7550000, CL Get directions 10 10th St NE Atlanta, GA 30309, US Get directions ulica Emilii Plater 53 Warsaw, MA 00-125, PL Get directions 3 Swamy Vivekananda Road Bengaluru, Karnataka 560016, IN Get directions 777 6th St S Kirkland, WA 98033, US Get directions Erika-Mann-Strasse 33 Munich, BY 80636, DE Get directions Montes Urales Miguel Hidalgo, CDMX 11000, MX Get directions Avenida Alicia Moreau de Justo 350 Buenos Aires City, Buenos Aires Autonomous City 1107, AR Get directions 8 Rue de Londres Paris, IdF 75009, FR Get directions Yigal Allon 98 Tel Aviv-Yafo, Tel Aviv 67891, IL Get directions Unter den Linden 14 Berlin, BE 10117, DE Get directions ABC-Strasse 19 Hamburg, HH 20354, DE Get directions 6175 Main St Frisco, TX 75034, US Get directions Brandschenkestrasse 110 Zurich, ZH 8002, CH Get directions Kungsbron 2 Stockholm, Stockholm County 111 22, SE Get directions Show more locations Show fewer locations Employees at Google Linus Upson Phillip Pearson Lenny T. Brentley Beerline See all employees Updates Google reposted this Sundar Pichai Sundar Pichai is an Influencer 16h Report this post Great to be at #NRF2026 yesterday in NYC! I shared some thoughts on how AI is going to transform every aspect of the shopping journey and how retail businesses are run. Incoming Walmart CEO John Furner joined me on stage to talk more about the opportunities for retailers ahead. What we’ve learned as a company from the last 27 years of working with retailers is that we only succeed together. Our goal is to build a future of retail where the opportunity space expands for everyone. That includes laying the groundwork for AI agents and systems to talk to each other across every step of the shopping journey. As a next step we introduced the Universal Commerce Protocol (UCP), available starting today. It’s built to meet the needs of retailers and customers— from the moments of discovery to decision and beyond. It’s open, agnostic, built together with industry leaders Shopify , Etsy , Wayfair , Target and Walmart , and endorsed by 20+ more. There’s a lot that UCP will enable, and we are starting with native checkout. Soon you’ll see a buy button directly on Google surfaces including AI Mode in Search and Gemini. We also introduced a new Gemini Enterprise for Customer Experience. Now in preview, this helps retailers build sophisticated agents for their own apps. That includes a shopping agent that provides personalized, proactive help, bringing the power of AI Mode right to a retailer’s app or website. Delivery is another important step that AI can help transform. Wing ’s autonomous drone deliveries, in partnership with Walmart, have shown impressive expansion - and will be coming to another 150 stores, in addition to the 120 already announced. Starting in Houston on January 15, and will reach 40M people by the end of the expansion. A big year for AI in retail, and we’re excited for this next chapter of partnership.  8,787 337 Comments Like Comment Share Google reposted this Vidhya Srinivasan 1d Report this post I spent the day at #NRF2026 and spoke with many retailers about the future of agentic commerce. There is a lot of excitement across the industry to solve for complex and disjointed shopping journeys, with shoppers juggling tabs and re-entering information, and retailers losing sales to friction. We announced new tools to create a more seamless experience for both shoppers and businesses: 🛒 It starts with a common language. The new Universal Commerce Protocol (UCP) is an open standard for agentic commerce we built alongside key retail partners to allow different shopping agents and systems to work together effortlessly across the entire shopping journey. To start, this protocol powers our new checkout feature. Shoppers soon can buy products confidently and securely right from AI Mode in Search and the Gemini app. 💬 We're also bridging the gap between discovery and purchase with Business Agent, a customizable AI chat that allows shoppers to connect with retailers on Search. Acting as a virtual sales associate, it answers product questions in a brand's unique voice during critical shopping moments to help drive sales. 🎯 Direct Offers, a new Google Ads pilot, can help connect advertisers with high-intent shoppers in AI Mode. It moves beyond traditional ads by providing exclusive deals—like a special discount—at the exact moment a shopper is ready to buy, delivering greater value for customers and closing the sale for retailers. More here 👉 https://lnkd.in/gyhuGbTR …more 1,152 49 Comments Like Comment Share Google reposted this Dieter Bohn 3d Report this post I’ve been testing some of the new Gemini for Google TV features that were announced at #CES2026 and that are coming out this year – and it’s been a lot of fun. Google TV launched Gemini on their platform in September, and are already doing a lot more to make the experience even more intuitive and interactive. With the next generation of Gemini on your Google TV, you can ask questions and get customized, visually rich answers —like content recs or even a full explainer of an educational topic. And there’s deeper integrations with Google Photos. You can find stuff easier and with Nano Banana and Veo, you can remix old personal photos and create videos from them. It introduces a sense of playfulness to TV that I think is pretty cool. 🪩🕺 Huge props to all the teams involved! Check out everything that Google TV announced → https://lnkd.in/g_7rMvgs …more 1,095 103 Comments Like Comment Share Google 40,235,038 followers 3d Report this post Gmail is entering the Gemini era. ➡️  to learn about the new features. 530 51 Comments Like Comment Share Google 40,235,038 followers 3d Report this post Okwus and Jules bust some of the most common myths we hear about the internship application process. Head to our How We Hire page to learn more about applying and interviewing at Google → https://goo.gle/3KCZhoX …more 319 21 Comments Like Comment Share Google 40,235,038 followers 4d Report this post Gmail is entering the Gemini era. Blake Barnes , VP of Product for Gmail, breaks down some of the new features coming this year, from a new AI Inbox to AI Overviews in Gmail to Help Me Write. Gmail is helping you manage your life, not just your messages. …more 473 50 Comments Like Comment Share Google 40,235,038 followers 4d Report this post Today, we’re bringing Gmail into the Gemini era to make it your personal, proactive inbox assistant. This includes: • AI Inbox, which gives you a personalized TL;DR that will catch you up on what you need to get done or be aware of (coming to trusted testers in the U.S. to start) • AI Overviews, which give you concise summaries of those loooooooong email chains, are rolling out to everyone at no cost. And for Google AI Pro and Ultra subscribers, AI Overviews will also be available when you search your inbox.  • Help Me Write, which helps you polish emails or draft them from scratch, and  Suggested Replies (an update to Smart Replies) which use the context of your conversation to offer relevant, one-click responses that match how you write. Both of these features are rolling out to everyone at no cost. These new capabilities begin rolling out today, and come with built-in security protections to keep your data private and under your control. Get all the details → https://goo.gle/4qkg53K …more 1,595 113 Comments Like Comment Share Google 40,235,038 followers 5d Report this post After earning her PhD in 2005, Ranjita built her career in industry research labs, spending years focused on long-term exploration while collaborating closely with product teams. More recently, she made a shift into product work at Google. “I wanted to get a little bit in the thick of things, and get a little more context for real world problems that are here and now,” she says. “That’s what made me switch from the research lab to the product group.” Now a Technical Lead at Google, she works on network observability — helping detect and resolve issues across Google’s global network. Her team recently launched a tool that identifies performance drops within 30 seconds, supporting engineers as they fix problems fast. Ranjita’s leadership style is shaped by learning from people across experience levels. “I have mentors in my managers, but also people who work for me or who are earlier in their careers. Very often people don’t know that they’re actually teaching me something — but they are.” She adds, “I’m always on the lookout for these nuggets of wisdom that I can get from different people.” Ranjita’s advice to future engineers focuses on one key element: “I think it’s important to be hungry to learn. Frankly, I don’t think there’s anything that is a prerequisite, especially if you’re hungry to learn.” Consider yourself a continuous learner? Explore engineering PhD roles at Google → https://goo.gle/4q7DZPx 1,276 134 Comments Like Comment Share Google 40,235,038 followers 6d Report this post Last month closed out a year of relentless shipping with the launch of Gemini 3 Flash, putting frontier intelligence to work for everyone. As we head into 2026, take a look back at our biggest AI updates from December. The latest AI news we announced in December Google on LinkedIn 2,398 156 Comments Like Comment Share Google 40,235,038 followers 1w Report this post If you want to make 2026 the year you actually stick to your resolutions — whether it be learning a language, advancing your career or creating a custom reading list — let Gemini help. We wrote 10 prompts to keep you committed and on track with your goals in the new year. Learn more and try the prompts for yourself ↓ 10 Gemini prompts to help you keep your New Year’s resolutions Google on LinkedIn 656 67 Comments Like Comment Share Join now to see what you are missing Find people you know at Google Browse recommended jobs for you View all updates, news, and articles Join now Affiliated pages Google for Developers Technology, Information and Internet Mountain View, CA Google Cloud Software Development Mountain View, California YouTube Technology, Information and Internet San Bruno, CA Think with Google Advertising Services Mountain View, California Google Ads Advertising Services Mountain View, California Google Workspace Software Development Mountain View, California Google Analytics Technology, Information and Internet Mountain View, California Google Developer Groups (GDG) Technology, Information and Internet Mountain View, CA Google Marketing Platform Advertising Services Mountain View, California Google Research Technology, Information and Internet Google for Publishers Technology, Information and Internet Grow with Google E-learning Mountain View, California Android Developers Technology, Information and Internet Mountain View, California Google Cloud Partners Internet Publishing Mountain View, California Google Small Business Internet Publishing Mountain View, California ChromeOS &amp; Chrome Enterprise IT Services and IT Consulting Mountain View, CA Google Search Central Technology, Information and Internet Google for Health Technology, Information and Internet TensorFlow Technology, Information and Internet Flutter Dev Technology, Information and Internet Mountain View, California Google AI for Developers Technology, Information and Internet re:Work with Google Human Resources Services Google Partners Advertising Services Google News Initiative Online Audio and Video Media Mountain View, CA Google Play business community IT Services and IT Consulting Mountain View, CA Firebase Software Development Mountain View, CA Android Technology, Information and Internet CapitalG Venture Capital and Private Equity Principals San Francisco, CA Google Pay Developers Technology, Information and Internet Mountain View, California Chrome for Developers Technology, Information and Internet Android Enterprise Information Technology &amp; Services Mountain View, CA Google User Experience Research Technology, Information and Internet Google Chrome Technology, Information and Internet Mountain View, CA Google Public Policy Technology, Information and Internet Adometry (acquired by Google) Advertising Services Mountain View, CA Google Developers North America Technology, Information and Internet Mountain View, CA Google Nest Pro Technology, Information and Internet Mountain View, California Google Public Sector Software Development Reston, VA Google Search Liaison Technology, Information and Internet Google Maps Platform Technology, Information and Internet Mineral.ai Agriculture, Construction, Mining Machinery Manufacturing Mountain View, California Google Learning &amp; Education Technology, Information and Internet Google Antigravity Software Development Google Arabia Technology, Information and Internet Google for Business India Technology, Information and Internet Flutter Google Italia Technology, Information and Internet Firebase Show more affiliated pages Show fewer affiliated pages Similar pages Microsoft Software Development Redmond, Washington Amazon Software Development Seattle, WA Apple Computers and Electronics Manufacturing Cupertino, California Meta Software Development Menlo Park, CA Netflix Entertainment Providers Los Gatos, CA Deloitte Business Consulting and Services IBM IT Services and IT Consulting Armonk, New York, NY LinkedIn Software Development Sunnyvale, CA Spotify Musicians Stockholm, Stockholm County NVIDIA Computer Hardware Manufacturing Santa Clara, CA Show more similar pages Show fewer similar pages Browse jobs Google jobs 127,126 open jobs Analyst jobs 694,057 open jobs Engineer jobs 555,845 open jobs Manager jobs 1,880,925 open jobs Intern jobs 71,196 open jobs Project Manager jobs 253,048 open jobs Associate jobs 1,091,945 open jobs Developer jobs 258,935 open jobs Scientist jobs 48,969 open jobs Director jobs 1,220,357 open jobs Account Manager jobs 121,519 open jobs Marketing Manager jobs 106,879 open jobs Software Engineer jobs 300,699 open jobs Executive jobs 690,514 open jobs Specialist jobs 768,666 open jobs Assistant jobs 711,811 open jobs Accountant jobs 91,739 open jobs Consultant jobs 760,907 open jobs Recruiter jobs 243,016 open jobs Account Executive jobs 71,457 open jobs Show more jobs like this Show fewer jobs like this Funding Google 3 total rounds Last Round Series unknown Jul 7, 1999 External Crunchbase Link for last round of funding US$ 25.0M Investors Kleiner Perkins Sequoia Capital See more info on crunchbase More searches More searches Google jobs Engineer jobs Analyst jobs Manager jobs Intern jobs Project Manager jobs Developer jobs Associate jobs Scientist jobs Software Engineer jobs Director jobs Specialist jobs Consultant jobs Account Manager jobs Data Analyst jobs Assistant jobs Marketing Manager jobs Account Executive jobs Program Manager jobs User Experience Designer jobs Designer jobs Product Manager jobs Executive jobs Human Resources Specialist jobs Recruiter jobs Accountant jobs Marketing Specialist jobs Senior Manager jobs Writer jobs Senior Software Engineer jobs Graduate jobs Data Scientist jobs Business Development Specialist jobs Product Designer jobs Machine Learning Engineer jobs Cyber Security Specialist jobs Vice President jobs Business Analyst jobs Coordinator jobs Technician jobs Administrator jobs Head jobs President jobs Sales Manager jobs Associate Product Manager jobs Lead jobs Partner jobs Human Resources Business Partner jobs Solutions Architect jobs Assistant Manager jobs Senior Product Manager jobs Engineering Manager jobs Mechanical Engineer jobs Python Developer jobs Full Stack Engineer jobs Student jobs Team Lead jobs Marketing Intern jobs Researcher jobs Scrum Master jobs LinkedIn &copy; 2026 About Accessibility User Agreement Privacy Policy Cookie Policy Copyright Policy Brand Policy Guest Controls Community Guidelines العربية (Arabic) বাংলা (Bangla) Čeština (Czech) Dansk (Danish) Deutsch (German) Ελληνικά (Greek) English (English) Español (Spanish) فارسی (Persian) Suomi (Finnish) Français (French) हिंदी (Hindi) Magyar (Hungarian) Bahasa Indonesia (Indonesian) Italiano (Italian) עברית (Hebrew) 日本語 (Japanese) 한국어 (Korean) मराठी (Marathi) Bahasa Malaysia (Malay) Nederlands (Dutch) Norsk (Norwegian) ਪੰਜਾਬੀ (Punjabi) Polski (Polish) Português (Portuguese) Română (Romanian) Русский (Russian) Svenska (Swedish) తెలుగు (Telugu) ภาษาไทย (Thai) Tagalog (Tagalog) Türkçe (Turkish) Українська (Ukrainian) Tiếng Việt (Vietnamese) 简体中文 (Chinese (Simplified)) 正體中文 (Chinese (Traditional)) Language Agree & Join LinkedIn By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . Sign in to see who you already know at Google Sign in Welcome back Email or phone Password Show Forgot password? Sign in or By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . New to LinkedIn? Join now or New to LinkedIn? Join now By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy .
2026-01-13T09:29:55
https://www.notion.com/de/product
Der KI-Workspace, der für dich arbeitet. | Notion Notion Funktionen Notion-KI Erschaffen, schreiben, automatisieren Agenten Übernehmen manuelle Aufgaben Enterprise Suche Finde Antworten in Sekundenschnelle Smart Notes Perfekt geschrieben von der KI Dokumente Einfach und leistungsstark Wissensdatenbank Bündle dein Wissen Projekte Verwalte jede Art von Projekt Websites Veröffentliche alles Mögliche im Handumdrehen Loslegen KI-Anwendungsfälle entdecken Schau dir an, wozu die Notion-KI in der Lage ist Marktplatz durchstöbern Vorlagen für alles Mögliche Einbindungen anzeigen Verbinde deine Apps mit Notion Web Clipper herunterladen Speichere Inhalte aus dem Web in Notion Teste die Desktop-App von Notion für mehr Geschwindigkeit App herunterladen Mail Calendar KI Enterprise Tarife Erkunden Teams Entwicklung und Produkt Design Marketing IT Teamgröße Start-ups KMUs Konzerne Bildungswesen Lernen Hilfe-Center Notion Academy Erfahrungsberichte von Kund/-innen Blog Community Partnerprogramme Entwickeln API Vorlagen Sicherheit Beratung Fordere eine Demo an Anmelden Nutze Notion kostenlos Ein Workspace. Keine lästige Arbeit. Wo deine Teams und KI-Agents Wissen sammeln, Antworten finden und Projekte automatisieren. Jetzt fühlt sich ein Team von 7 Leuten an wie 70. Nutze Notion kostenlos Demo anfordern Top-Teams, die uns vertrauen Entdecke Notion 3.0 Persönlicher Agent Neu Du gibst die Aufgaben vor. Dein Agent erledigt die Arbeit. → Gib deine Routinearbeiten ab Was früher Tage gedauert hat, ist jetzt in wenigen Minuten erledigt. Gib ein, was du erreichen willst, und sieh dabei zu, wie es erledigt wird. Arbeitet mit deinem Team zusammen Es ist, als hätte man einen integrierten Power-User, der mit deinem Team zusammenarbeitet. Weiß alles, was du weißt Findet in allen deinen Seiten, Nachrichten, Dateien und im Internet genau das, was du suchst. Auf dich persönlich zugeschnitten Dein Agent lernt, wie du arbeitest. Du steuerst alles, von seinem Verhalten bis zu seinem Aussehen. Personalisierte Agenten Bald verfügbar Automatisiere sich wiederholende Aufgaben. → Unternehmenssuche Eine Suche für alles. → Smart Notes Perfekte Notizen zu jeder Zeit. → Flexible Workflows Verwalte jedes Projekt, egal ob groß oder klein. → Deine KI-App für alles. Mehr Produktivität. Weniger Tools. Führe alle deine Tools und Teams zusammen. Berechne hierunter deine Einsparungen. Tarifpläne anzeigen → KI-Suche $35/Person KI-Chatbot $20/Person Smart Notes $18/Person KI-Schreibassistent $20/Person KI-E-Mail-App $30/Person KI-Recherche $40/Person Calendar-Terminplanung $15/Person Team-Wiki $10/Person Projektmanagement-Tool $24/Person Basis-CRM $20/Person Website-Ersteller $20/Person Formulare $15/Person Teamgröße Monatliche Einsparungen 0 $ Jährliche Einsparungen 0 $ Teams, die Ergebnisse liefern, vertrauen uns. Eine Plattform, auf der du deine gesamte Arbeit erledigen kannst, ist unglaublich leistungsstark. Notion ist diese Plattform. Lies die ganze Geschichte → Video ansehen Optimierte Workflows, die Zeitleisten um das Dreifache reduzieren. → „Mit Notion haben alle bei Ramp einen KI-Agenten.“ → „Notion versteht, dass man viele Probleme mit einem einzigen Tool lösen kann.“ → „Notion bietet uns den leistungsstärksten und wirkungsvollsten Ansatz zur Optimierung unseres Arbeitsablaufs.“ → „Der Einsatz von KI-gestützten Tools wie Notion verschafft uns einen wichtigen Wettbewerbsvorteil.“ → Ein Hub für Arbeit und KI hält alle auf dem Laufenden und sorgt für reibungslose Arbeitsabläufe. → Dialog schließen Abspielen Oh-oh! Offenbar verhindert dein Werbeblocker, dass das Video abgespielt wird. Schau es dir bitte auf YouTube an Lies die ganze Geschichte → Über 100 Millionen Nutzer/-innen weltweit #1 Wissensdatenbank seit 3 Jahren (G2) #1 KI Enterprise Search (G2) #1 bewerteter KI-Schreibassistent (G2) 62 % der Fortune-100-Unternehmen Über 50 % der YC-Unternehmen Über 1,4 Millionen Community-Mitglieder Über 100 Millionen Nutzer/-innen weltweit #1 Wissensdatenbank seit 3 Jahren (G2) #1 KI Enterprise Search (G2) #1 bewerteter KI-Schreibassistent (G2) 62 % der Fortune-100-Unternehmen Über 50 % der YC-Unternehmen Über 1,4 Millionen Community-Mitglieder Über 100 Millionen Nutzer/-innen weltweit #1 Wissensdatenbank seit 3 Jahren (G2) #1 KI Enterprise Search (G2) #1 bewerteter KI-Schreibassistent (G2) 62 % der Fortune-100-Unternehmen Über 50 % der YC-Unternehmen Über 1,4 Millionen Community-Mitglieder Überlasse Routineaufgaben der Notion-KI. Wähle einen Anwendungsfall aus, um zu sehen, wie Notion deine Arbeit erledigt. Entdecke mehr → Vom Brainstorming zur Roadmap → Verwandle Meetings ins Social-Media-Beiträge → Workspaces organisieren → Onboarding neuer Arbeitskräfte → Überarbeite eine Landing Page → Plane ein Offsite → Tracke deine Lieblingsrestaurants → Verwandle Notizen in Aufgaben → Kostenlos testen. Erste Schritte mit Notion Dein KI-Workspace mit integrierten Agenten. Für Mac herunterladen Notion Mail Der KI-gestützte Posteingang, der mitdenkt. Herunterladen Notion Calendar Zeit, Planung, Aufgaben – alles an einem Ort. Herunterladen Notion ist immer für dich da – direkt in deinem Browser . Deutsch Cookie-Einstellungen © 2026 Notion Labs, Inc. Unternehmen Über uns Karriere Sicherheit Status Nutzungsbedingungen und Datenschutz Deine Datenschutzrechte Download iOS und Android Mac und Windows Calendar Web Clipper Ressourcen Hilfe-Center Preise Blog Community Einbindungen Vorlagen Partnerprogramme Notion für Unternehmen Kleine Unternehmen Persönlich Mehr entdecken →
2026-01-13T09:29:55
https://snyk.io/es/product/snyk-code/
Snyk Code | Herramienta de escaneo de código SAST | Análisis y correcciones de seguridad del código | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API &amp; Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API &amp; Web - Todos los clientes Snyk API &amp; Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo Snyk Code Descripción general Documentos Select Descripción general Documentos Snyk named a Leader in The Forrester Wave™: SAST, Q3 2025 Snyk Code Busca, prioriza y corrige automáticamente los problemas con soluciones SAST centradas en el desarrollador. Busca y corrige automáticamente los fragmentos críticos de código inseguro hasta 50 veces más rápido, con correcciones validadas previamente por una herramienta de prueba de seguridad de aplicaciones estáticas creada por y para desarrolladores. Reserva una demostración en vivo Demostración a pedido del análisis de seguridad del código SAST Mira nuestra demostración grabada para ver cómo los equipos pueden encontrar y corregir automáticamente las vulnerabilidades de código con el escaneo SAST de Snyk Code y la remediación automática de Snyk Agent Fix. Ver ahora Seguridad del código, elegida por los desarrolladores Snyk Code fue la única herramienta de seguridad de código basada en IA preseleccionada por los desarrolladores en la encuesta 2024 de Stack Overflow . Obtén la información de seguridad y los consejos de remediación que necesitas sin interrumpir el flujo de trabajo de desarrollo.  Fácil de usar para desarrolladores Evita los retrasos en el código con asesoramiento sobre correcciones y correcciones automáticas respaldadas por la inteligencia de seguridad líder en la industria. Rápido y preciso Obtén resultados en línea y en tiempo real con escaneos automáticos completos y correcciones con un 80 % de precisión, en el IDE y las solicitudes de cambios. Resultados prácticos Busca vulnerabilidades de código, entiende más con explicaciones contextuales fáciles de entender para los desarrolladores y aplica al instante correcciones automáticas con un solo clic. Escaneo de códigos en tiempo real y autocorrección Ya no hay que esperar a los informes de SAST. Escanea y corrige automáticamente los problemas del código fuente con correcciones preseleccionadas en cuestión de segundos o minutos, sin necesidad de compilación en el IDE y las solicitudes de cambios. Amplia cobertura, incluidas fuentes LLM El escáner de vulnerabilidades de Snyk es compatible con los lenguajes , IDE y herramientas de CI/CD más populares; y nuestra cobertura está en constante expansión, incluyendo nuestras bibliotecas de código fuente , que abarcan el 90 % de todas las bibliotecas LLM, como OpenAI y Hugging Face, entre otras.  Revolucionaria base de conocimientos Con más de 25 millones de casos de flujo de datos modelados, el potente motor de aprendizaje automático de Snyk analiza millones de bibliotecas de código abierto, ayudando a la IA con human-in-the-loop a construir nuestra sólida base de conocimientos, lo que garantiza herramientas de seguridad de vanguardia. Priorizar los principales riesgos del código La detección de vulnerabilidades de código de Snyk aprovecha el amplio contexto de la aplicación y las funciones adaptables para eliminar los resultados ruidosos y priorizar los problemas de código nuevos, implementados o expuestos públicamente que son más arriesgados o relevantes para tu organización. Reduce el tiempo de remediación en un 84 % o más con el análisis de seguridad del código de autoservicio en el flujo de trabajo diario. Empodera a los desarrolladores para que construyan más rápido y se conviertan en cuasiprofesionales de la seguridad con las completas herramientas de escaneo de seguridad del código de Snyk Code. IDE integrado Encuentra los problemas durante el desarrollo, antes de que entren en el proyecto, ahorrándote tiempo y dinero. Pruebas en el flujo de trabajo Escanea automáticamente cada solicitud de cambios y repositorio con el fin de obtener un informe de estado para evaluar, priorizar y corregir los problemas existentes. Puerta de seguridad CI/CD Protege tu aplicación integrando escaneos de vulnerabilidades, incluidas comprobaciones de las solicitudes de cambios, en el proceso de compilación. Integraciones para todo el SDLC Snyk se integra a la perfección con los lenguajes, plataformas y sistemas más populares, para que puedas proteger tu código sin interrumpir el flujo de trabajo existente. Explorar todas las integraciones y lenguajes IA autohospedada que mejora la experiencia de los desarrolladores  La velocidad y precisión inigualables de Snyk Code, junto con su IA creada y alojada de forma privada, aumentan la seguridad del código. Nuestra intuitiva plataforma empodera y motiva a los desarrolladores para formar equipos eficientes y productos seguros. Revolucionario motor de IA autohospedado Nuestro solucionador lógico personalizado se autohospeda para garantizar la privacidad de los datos y ejecuta análisis de datos modernos basados en restricciones más rápido que cualquier motor comparable. Aprendizaje automático continuo Una base de conocimientos que aprende continuamente de la comunidad mundial de código abierto. Conocimiento experto en seguridad integrado Los expertos en seguridad de Snyk agregan el contenido curado y el conocimiento que necesitas para corregir rápidamente y de forma confiable los problemas de seguridad. “Snyk Code nos proporcionó una nueva capacidad neta que agregar a nuestro arsenal,  ya que analiza rápidamente el código que escribimos y proporciona información legítima y procesable que los ingenieros pueden utilizar durante el desarrollo y en los flujos de trabajo de creación. La vista Snyk permite a los ingenieros ver rápidamente cualquier problema de código y otras fuentes de ese problema, así como la forma en que otros ingenieros del sector solucionaron el problema. Nos proporciona resultados de análisis estáticos significativos sobre los que podemos actuar inmediatamente”. Joren McReynolds Director of Engineering , Panther Labs Lee el estudio de caso Introducción al escáner de vulnerabilidades Snyk Code Busca y corrige automáticamente las vulnerabilidades mientras programas, con recomendaciones de remediación en línea directamente en tu IDE y solicitudes de cambios. Compara todos los planes Gratis por siempre Correcciones automáticas con Snyk Agent Fix (solo por tiempo limitado) Comienza gratis con GitHub Comienza gratis con Google Equipo Integración con Jira Correcciones automáticas con Snyk Agent Fix Adquiérelo ya Empresarial Integración con Jira Informes API Rich Roles de usuario personalizados Administración de políticas de seguridad Correcciones automáticas con Snyk Agent Fix Priorización y gestión de programas con Snyk Essentials Reserva una demostración en vivo Más recursos Case Study Komatsu Descubre cómo Komatsu redujo en un 62 % el tiempo medio de corrección de vulnerabilidades. Blog Busca, corrige automáticamente y prioriza de forma inteligente con las herramientas de seguridad de código de Snyk impulsadas por IA DeepCode AI Fix de Snyk Code es una potente herramienta basada en IA que corrige automáticamente las vulnerabilidades del código. Se integra perfectamente en los flujos de trabajo de los desarrolladores y prioriza los problemas críticos. Al aprovechar la IA, DeepCode AI Fix ofrece una corrección automática rápida, precisa y segura, lo que permite a los equipos mejorar la seguridad de las aplicaciones. Blog Desarrollo en C y C++ sin vulnerabilidades en la fabricación de automóviles y vehículos definidos por software (SDV) Analiza los desafíos de seguridad a los que se enfrenta el floreciente mercado de los vehículos definidos por software (SDV). Aunque los SDV prometen funciones y fuentes de ingresos interesantes, su dependencia del código C y C++, famoso por sus vulnerabilidades, es motivo de preocupación. Blog Corregir automáticamente las vulnerabilidades del código con IA Explora Snyk Deep Code AI Fix (DCAIF), un cambio sustancial para los desarrolladores. A diferencia de los asistentes de IA generativa que pueden introducir vulnerabilidades de seguridad, DCAIF aprovecha un modelo de IA híbrido para corregir automáticamente problemas de seguridad comunes como XSS directamente en el IDE. Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:55
http://aws.amazon.com/cli
AWS CLI Skip to main content Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account Developer Center Learning Programming Languages Events Tools Community More Developer Center › Tools to Build on AWS › AWS CLI AWS Command Line Interface The AWS Command Line Interface (AWS CLI) is a unified tool to manage your AWS services. With just one tool to download and configure, you can control multiple AWS services from the command line and automate them through scripts. Get started Command reference How it works The AWS Command Line Interface (AWS CLI) is an open source tool that enables you to interact with AWS services using commands in your command-line shell. With minimal configuration, the AWS CLI enables you to start running commands that implement functionality equivalent to that provided by the browser-based AWS Management Console from the command prompt in your terminal program Getting started with the AWS CLI walks you through installing and configuring the AWS CLI. After that, you can begin making calls to AWS services from the command line. You can get help at various levels directly on the command line to learn more. You can get general help, $ 'aws help' you can learn more about operations for a service, $ 'aws [AWS service] help' and you can learn more about a specific service operation. $ 'aws [AWS service] [operation] help' Features Log in with console credentials Use your existing console credentials to programmatically access AWS with the ‘aws login’ CLI command. Authentication with CLI Tab command completion The AWS CLI v2 includes a command completion feature that enables you to use the tab key to complete a partially-entered command and show suggestions. Enable command completion in the AWS CLI Auto-prompt The AWS CLI v2 can prompt you with commands, parameters, resources, documentation, and more when running an 'aws' command. Enable auto-prompt in the AWS CLI Command history The 'aws history list' and 'aws history show' commands allow you to interact with the history of AWS CLI commands that are run over time. Enable history in the AWS CLI Resources Guide User Guide The user guide describes the features for the latest version of the AWS CLI and how to use them. Learn more Guide Migration Guide Instructions for updating the AWS CLI version 1 to AWS CLI version 2. Learn more Sample code and libraries Command Examples Collection of AWS CLI command examples. Learn more Guide SDKs and Tools Reference Guide The SDK and Tools Reference Guide provides information on how to use cross-SDK, shared configuration files and environment variables to configure your SDK and how to authenticate with AWS when you develop code with AWS services. View documentation Documentation AWS CLI Command Reference Documentation The AWS Command Line Interface Command Reference documentation describes the API operations for the latest version of the AWS CLI. The reference guide also provides sample requests, responses, and errors for the supported web services protocols. View documentation Github AWS CLI GitHub Repository Visit the GitHub repository to dig through the source code, report issues, and connect with the community. View documentation Blog AWS Developer Tools Blog for the AWS CLI Read the AWS Developer blog to get the latest news and announcements on the AWS CLI. Read the blog Create an AWS account Learn What Is AWS? What Is Cloud Computing? What Is Agentic AI? Cloud Computing Concepts Hub AWS Cloud Security What's New Blogs Press Releases Resources Getting Started Training AWS Trust Center AWS Solutions Library Architecture Center Product and Technical FAQs Analyst Reports AWS Partners Developers Builder Center SDKs &amp; Tools .NET on AWS Python on AWS Java on AWS PHP on AWS JavaScript on AWS Help Contact Us File a Support Ticket AWS re:Post Knowledge Center AWS Support Overview Get Expert Help AWS Accessibility Legal English Back to top Amazon is an Equal Opportunity Employer: Minority / Women / Disability / Veteran / Gender Identity / Sexual Orientation / Age. x facebook linkedin instagram twitch youtube podcasts email Privacy Site terms Cookie Preferences © 2026, Amazon Web Services, Inc. or its affiliates. All rights reserved.
2026-01-13T09:29:55
https://l.facebook.com/l.php?u=https%3A%2F%2Fec.europa.eu%2Finfo%2Flaw%2Flaw-topic%2Fdata-protection%2Fdata-transfers-outside-eu%2Fadequacy-protection-personal-data-non-eu-countries_en&amp;h=AT0g1znvV2yXSvfMShhvkv6wsl8GUYHt7rYGX0XMlSJJn2CJhbu-kx0ykVtqHDgiUz_WjTHS4LeNSVA1-w57pAy6K1_2sAz7jgtaQZjN0RCT8p84R2MrB1vsGxYKm9YI5TYazkAv3ChyQBmv
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:55
https://luma.com/cursor?k=c
Cursor · Events Calendar   Explore Events Sign In Subscribe Subscribe Cursor Welcome to Cursor Events. Join us regularly for hands-on sessions, intimate dinners, fireside chats, and conversations exploring how teams build better software with AI. Submit Event January • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • Upcoming Past Events Submit Event You have 0 events pending approval by the calendar admin. They will show up on the schedule once approved   Cursor for Designers ​ By Emily Gavrilenko ​ Zoom   Cursor for Product Managers ​ By Emily Gavrilenko ​ Zoom   Cursor 101 ​ By Emily Gavrilenko ​ Zoom   Developer Productivity Trends from 2025 ​ By Emily Gavrilenko ​ Zoom   Cursor 201 ​ By Emily Gavrilenko ​ Zoom   Cursor for Financial Services ​ By Emily Gavrilenko ​ Zoom   Cursor for Security Teams ​ By Emily Gavrilenko ​ Zoom
2026-01-13T09:29:55
https://l.facebook.com/l.php?u=https%3A%2F%2Fresearch.fb.com%2Fprograms%2F&amp;h=AT09U1WP9ReZ-AP_RO3lLLRGY9oV0epeR7BMF8DS1tOPmNodwY3eJIBBCMSVnm_Gp47MGzMp1-DkseGoG1O2IINc1ZJgcEvsfIzuBaMw_Bzeg5YWx3H111RCruPWDRI7ZmOKycHzvB6wZ4I8
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:55
https://www.notion.so/help/link-previews-and-synced-databases#link-previews
Data &amp; integrations – Notion Help Center Notion Features Notion AI Build, write, automate Agents Handles manual tasks Enterprise Search Find answers instantly AI Meeting Notes Perfectly written by AI Docs Simple &amp; powerful Knowledge Base Centralize your knowledge Projects Manage any project Sites Publish anything, fast Get started Explore AI use cases See what Notion AI can do Browse marketplace Templates for everything View integrations Connect your apps with Notion Download web clipper Save from the web into Notion Try the Notion desktop app for a faster experience Download app Mail Calendar AI Enterprise Pricing Explore Teams Eng &amp; Product Design Marketing IT Team size Startups SMBs Enterprise Education Learn Help center Notion Academy Customer stories Blog Community Partner programs Build API Templates Security Consultants Request a demo Log in Get Notion free Help Center Reference ← Reference 6. Data &amp; integrations In this Chapter Notion makes it easy to connect and move content to and from other tools you use. Integrate Notion with other apps natively, or build your own integrations with our API! Articles Import data into Notion Like most people, you probably have data, documents, and notes scattered across many files and apps. You can centralize your information in one place by moving it all into Notion 🚚 Export your content Need to share your content in PDF, CSV, or HTML format? We got you covered! You can export a Notion page, database, or entire workspace at any time 📤 Back up your data Your data is safe in Notion. Everything is stored in the cloud, and we keep per-minute backups of your page content on our server. That said, your data belongs to you, so we&#x27;ve made it easy to create your own backups and keep your information portable 💿 Embeds, bookmarks &amp; link mentions You can embed virtually any online content within Notion pages — from video and audio players to Tweets, Loom videos, Invision mockups, and entire Miro boards. Enrich your Notion pages with other apps, PDFs, forms, and interactive maps 🦾 9:00 Add &amp; manage integrations You can connect other software to Notion, automate actions within your workspace, and access connections built by our partners 🤖 Notion API integrations With Notion&#x27;s API, you&#x27;ll be able to create custom internal integrations. Some of our partners may also require an internal integration token in order to link their platform to your Notion workspace - below, we&#x27;ll walk you through how to set this up 🏗️ Link previews See live, synced visualizations of links from popular platforms right in your workspace — no need to switch between apps or lose context 🔗 9:00 Synced databases Bring your favorite tools into Notion with synced databases, to keep all of your info in one easily accessible hub 📬 9:00 Connected properties Integrate your favorite tools directly into your Notion databases with Connected properties. Link files from Google Drive, designs from Figma, tickets from Zendesk, and pull requests from GitHub — all without leaving your Notion workspace ↔️ 9:00 Import from Asana Easily import all of your Asana projects and tasks directly into Notion 📥 Import from Confluence Import your Confluence data right into Notion 📥 Import from Monday.com Easily import your data from Monday into Notion 📥 Integrate GitHub Connect Notion and GitHub so you can keep your workflows in sync 🧮 Integrate Slack Bring Notion and Slack together so your team can work better from anywhere 💬 8:00 Integrate Jira Connect Jira with Notion for a seamless experience that keeps you and your team up to date 🔗 Common Jira Sync issues Here’s a list of common issues you might run into with Jira Sync and why they might occur ‼️ Still have questions? 📬 Email us [email&#160;protected] 👋 Join our community Find any answer 💼 Hire a Certified Consultant Find an expert for your needs Reference Docs Getting started Start here What is a block? Create a page Create a subpage What is a database? Create a database Start with a template Share your work Collaborate with people Badges &amp; certifications See all Workspace &amp; sidebar Intro to workspaces Navigate with the sidebar Create, join &amp; leave workspaces Create, join &amp; leave teamspaces Search in your workspace Home &amp; My tasks Workspaces on mobile Delete a workspace See all Pages &amp; blocks Intro to writing &amp; editing Format your page Style &amp; customize your page Images, files &amp; media Links &amp; backlinks Wikis &amp; verified pages Move &amp; duplicate content Delete &amp; restore content Synced blocks Code blocks Math equations Keyboard shortcuts Duplicate public pages Use pages offline See all Databases Intro to databases Views, filters, sorts &amp; groups Database properties Relations &amp; rollups Database settings Database templates Sub-items &amp; dependencies Task databases &amp; sprints Data sources Optimize database load times &amp; performance Table view Board view Timeline view Calendar view List view Gallery view Chart view Unique ID Map view Forms Layouts Feed view See all Sharing &amp; collaboration Sharing &amp; permissions Manage members &amp; guests Collaborate in a workspace Inbox &amp; notifications Comments, mentions &amp; reactions Reminders Suggested edits Page analytics Intro to teamspaces Who’s who in a workspace People profiles People Directory Create &amp; manage groups See all Data &amp; integrations Import data into Notion Export your content Back up your data Embeds, bookmarks &amp; link mentions Add &amp; manage integrations Notion API integrations Link previews Synced databases Connected properties Import from Asana Import from Confluence Import from Monday.com Integrate GitHub Integrate Slack Integrate Jira Common Jira Sync issues See all Automations Buttons Database buttons Database automations Webhook actions See all Formulas Intro to formulas Formula syntax &amp; functions Common formula errors See all Notion apps Notion for desktop Notion for web Notion for mobile System requirements for Notion Notion beta program Mobile widgets Web Clipper Notion New Tab extension See all Plans, billing &amp; payment Change your plan Billing How adding &amp; removing members impacts billing Invoices Payment methods Refunds Notion for education Notion for startups Notion for creators Paid plan trials Understanding block usage What happens when I downgrade my plan? Sales tax Can’t upgrade to the Plus Plan for students and educators See all Workspace administration SAML SSO Set up Identity Provider (IdP) for SAML SSO Manage your Enterprise workspace Domain management Provision users &amp; groups with SCIM Set up Identity Provider (IdP) for SCIM Content search Transfer content from a deprovisioned user Audit log Workspace analytics Add security &amp; compliance integrations Managed users Enterprise connection settings Custom data retention settings Deploy Notion for macOS IP address restrictions Manage teamspaces Network control Deploy Notion for Windows Organization level controls Legal holds See all Settings Account settings &amp; preferences Notification settings Workspace settings Two-step verification Notion IP addresses &amp; domains HIPAA configuration Data access consent Delete your account Notion Faces Log in &amp; out Change your language Passkeys See all Troubleshooting Reset Notion I can&#x27;t log in I can’t access Notion I can&#x27;t access my own page I can’t upload or view a file Common Notion errors Record HAR files for troubleshooting See all Security &amp; privacy Security practices Privacy practices GDPR at Notion Data accessible by your workspace owner Report inappropriate content How Notion 3.0 protects against prompt injection risks How to protect yourself from malvertising Data residency for Notion Dormant account policy Shared Responsibilities Model See all Notion AI What is Notion AI? Notion AI for databases AI Meeting Notes (beta) Notion AI Connectors GitHub AI Connector Google Drive AI Connector Jira AI Connector (beta) Linear AI Connector Microsoft Teams AI Connector (beta) Microsoft SharePoint &amp; OneDrive AI Connector (beta) Slack AI Connector Notion AI complimentary responses Notion AI security &amp; privacy practices Enterprise Search security &amp; privacy practices Notion’s commitment to AI safety Notion MCP Notion Agent Google Calendar AI Connector Notion Calendar AI Connector (beta) Microsoft Outlook AI Connector Enterprise Search Research Mode Gmail AI Connector (Beta) Notion Mail AI Connector (beta) See all Notion Calendar Create a Notion Calendar account Manage your calendars &amp; events Scheduling &amp; availability Blocking Time zones Manage your linked Notion account Notion Calendar settings Notion Calendar integrations &amp; API Use Notion Calendar with Notion Notion Calendar for teams Notion Calendar keyboard shortcuts Notion Calendar apps Notion Calendar security practices See all Notion Sites Publish a Notion Site Edit &amp; customize your Notion Sites Manage your Notion Sites Connect a custom domain with Notion Sites Notion Sites availability &amp; pricing See all Notion Mail Get started with Notion Mail Navigate your inbox Compose an email Views, groups, filters &amp; properties Schedule meetings with Notion Mail Use Notion AI with Notion Mail Notion Mail settings Notion Mail keyboard shortcuts Notion Mail security practices Can’t log into Notion Mail Notion Mail for mobile See all Marketplace Finding templates on Marketplace Selling on Marketplace Getting featured in Marketplace Marketplace guidelines &amp; terms Become a Notion Solutions Partner Offering services on Marketplace Template localization on Marketplace Finding services on Marketplace See all Guides Browse by use case Notion AI Documentation Notes Project management Wiki Product Engineering Design HR &amp; people Marketing Personal Enterprise Startup Demo Template gallery Automations Grow with Notion Notion Academy API Create integrations Support Email us Join our community Find a consultant English (US) Cookie settings © 2026 Notion Labs, Inc. Company About us Careers Security Status Terms &amp; privacy Your privacy rights Download iOS &amp; Android Mac &amp; Windows Calendar Web Clipper Resources Help center Pricing Blog Community Integrations Templates Partner programs Notion for Enterprise Small business Personal Explore more →
2026-01-13T09:29:55
https://goo.gle/4qkg53K?trk=public_post_reshare-text
Gmail launches AI features like AI Overviews and more, made possible by Gemini 3 Skip to main content The Keyword Gmail is entering the Gemini era Share x.com Facebook LinkedIn Mail Copy link Home Innovation &amp; AI Innovation &amp; AI Models &amp; Research Google DeepMind Google Research Google Labs Gemini models See all Products Developer tools Gemini app NotebookLM See all Infrastructure &amp; cloud Global network Google Cloud See all See all AI updates Models &amp; Research Google DeepMind Google Research Google Labs Gemini models See all Products Developer tools Gemini app NotebookLM See all Infrastructure &amp; cloud Global network Google Cloud See all See all AI updates Products &amp; platforms Products &amp; platforms Products Search Maps Chrome Google Workspace Learning &amp; Education Photos Shopping See all Platforms Android Google Play Wear OS See all Devices Pixel Google Nest Fitbit Chromebooks See all See all product updates Products Search Maps Chrome Google Workspace Learning &amp; Education Photos Shopping See all Platforms Android Google Play Wear OS See all Devices Pixel Google Nest Fitbit Chromebooks See all See all product updates Company news Company news Outreach &amp; initiatives Creating opportunity Safety &amp; security Google.org Public policy Sustainability Health See all Leadership Sundar Pichai, CEO More authors See all Inside Google Around the globe Life at Google See all Outreach &amp; initiatives Creating opportunity Safety &amp; security Google.org Public policy Sustainability Health See all Leadership Sundar Pichai, CEO More authors See all Inside Google Around the globe Life at Google See all Feed Subscribe Global (English) Africa (English) Australia (English) Brasil (Português) Canada (English) Canada (Français) Česko (Čeština) Deutschland (Deutsch) España (Español) France (Français) India (English) Indonesia (Bahasa Indonesia) Italia (Italiano) 日本 (日本語) 대한민국 (한국어) Latinoamérica (Español) الشرق الأوسط وشمال أفريقيا (اللغة العربية) MENA (English) Nederlands (Nederland) New Zealand (English) Polska (Polski) Portugal (Português) ประเทศไทย (ไทย) Türkiye (Türkçe) 台灣 (中文) [&quot;How does Gemini work in Google Maps?&quot;, &quot;What is quantum computing?&quot;, &quot;What are the camera features on Pixel 10?&quot;] Subscribe The Keyword Home Innovation &amp; AI Innovation &amp; AI Models &amp; Research Google DeepMind Google Research Google Labs Gemini models See all Products Developer tools Gemini app NotebookLM See all Infrastructure &amp; cloud Global network Google Cloud See all See all AI updates Products &amp; platforms Products &amp; platforms Products Search Maps Chrome Google Workspace Learning &amp; Education Photos Shopping See all Platforms Android Google Play Wear OS See all Devices Pixel Google Nest Fitbit Chromebooks See all See all product updates Company news Company news Outreach &amp; initiatives Creating opportunity Safety &amp; security Google.org Public policy Sustainability Health See all Leadership Sundar Pichai, CEO More authors See all Inside Google Around the globe Life at Google See all Feed Press corner RSS feed Subscribe Breadcrumb Products &amp; Platforms Products Gmail Gmail is entering the Gemini era Jan 08, 2026 · Share x.com Facebook LinkedIn Mail Copy link Here’s a look at where Gmail is going in 2026, as well as new features launching today. Blake Barnes VP Product, Gmail Read AI-generated summary General summary Gmail is entering the Gemini era to help you manage your inbox more efficiently. AI Overviews summarize email threads and answer questions using natural language. Also, Help Me Write, Suggested Replies, and Proofread are available to help you compose messages faster. Summaries were generated by Google AI. Generative AI is experimental. Basic explainer Gmail is getting a major upgrade with AI. It can now summarize long email threads and answer questions about your inbox using AI Overviews. Also, AI can help you write better emails with features like Help Me Write, Suggested Replies, and Proofread. Finally, a new AI Inbox will filter out unimportant emails, so you see what matters most. Summaries were generated by Google AI. Generative AI is experimental. Explore other styles: General summary Basic explainer Share x.com Facebook LinkedIn Mail Copy link Your browser does not support the audio element. Listen to article This content is generated by Google AI. Generative AI is experimental [[duration]] minutes Voice Speed Voice Speed 0.75X 1X 1.5X 2X Today, 3 billion users rely on Gmail to connect and get things done. AI has been a big part of that — from Smart Replies to AI-powered spam blocking . But email has changed considerably since Gmail launched in 2004. With email volume at an all-time high, managing your inbox and the flow of information has become as important as the emails themselves. To help, we're bringing Gmail into the Gemini era and making it your personal, proactive inbox assistant. Ask your inbox anything: AI Overviews Your inbox is full of important information, but accessing it has required you to become a power searcher. And even when you find the right emails, you are often left staring at a list of messages, forced to dig through the text to piece together the answer. That’s why we’re introducing AI Overviews. Just like they do in Google Search , AI Overviews turn information into answers without the digging. When you open an email with dozens of replies, Gmail synthesizes the entire conversation into a concise summary of key points. And when you ask your inbox a question, we use Gemini to generate a simple AI Overview with the answer. Instead of hunting for keywords or digging through a year of emails, just use natural language, like “Who was the plumber that gave me a quote for the bathroom renovation last year?” Gemini’s advanced reasoning pulls the answer, instantly summarizing the exact details you need. AI Overview conversation summaries are rolling out today for everyone at no cost. The ability to ask your inbox questions with AI Overviews is available to Google AI Pro and Ultra subscribers. Get an AI Overview with the key details when you ask your inbox to find renovation quotes from a year ago. Get things done faster: Help Me Write, Suggested Replies and Proofread Starting today, everyone can use Help Me Write to polish emails or draft them from scratch. There are also new Suggested Replies (an update to Smart Replies) which use the context of your conversation to offer relevant, one-click responses that match how you write. Say you’re coordinating a family gathering and your aunt replies asking if she should bring cake instead of pie. Suggested Replies can instantly draft an initial response in your tone and style, leaving you free to refine it before giving it your approval. You can also use the new Proofread feature for advanced grammar, tone and style checks so everything is polished before you send. Help Me Write and Suggested Replies are rolling out to everyone at no cost. The Proofread feature is available for Google AI Pro and Ultra subscribers. And next month, we'll be updating Help Me Write with better personalization by bringing context from your other Google apps. Suggested Replies and Proofread ensure your emails match how you write and are polished, helping you plan your family gathering faster. See what matters most: AI Inbox Your inbox is filled with updates; some are critical, others are just noise. The new AI Inbox filters out the clutter so you can focus on what’s most important. AI Inbox is like having a personalized briefing, highlighting to-dos and catching you up on what matters. It helps you prioritize, identifying your VIPs based on signals like people you email frequently, those in your contacts list and relationships it can infer from message content. Crucially, this analysis happens securely with the privacy protections you expect from Google, keeping your data under your control. This lets high-stakes items — like a bill due tomorrow or a dentist reminder — rise to the top. We’re giving trusted testers access to AI Inbox before making it more broadly available in the coming months. AI Inbox gives you a snapshot of to-dos from important emails — so you can stay on top of dentist appointments and soccer season. Try the new Gmail today Many of these improvements are made possible by Gemini 3 . These new capabilities begin rolling out today in the U.S. to Gmail users as well as Google AI Pro and Ultra subscribers . We're starting with English and excited to roll out more languages and to more regions in the coming months. POSTED IN: Gmail Gemini models Related stories Developer tools Increased file size limits and expanded inputs support in Gemini API By Lucia Loher Jan 12, 2026 Gemini models Joint statement from Google and Apple Jan 12, 2026 Gemini models Here’s where you can use Nano Banana Pro By Molly McHugh-Johnson Dec 23, 2025 Developer tools Inside Kaggle&#x27;s AI Agents intensive course with Google By Brenda Flynn & Anant Nawalgaria Dec 18, 2025 AI Products Watch a podcast discussion about Gemini 3 and the future of Search. Dec 18, 2025 Developer tools Build with Gemini 3 Flash, frontier intelligence that scales with you By Logan Kilpatrick Dec 17, 2025 . Jump to position 1 Jump to position 2 Jump to position 3 Jump to position 4 Jump to position 5 Jump to position 6 Let’s stay in touch. Get the latest news from Google in your inbox. Subscribe No thanks Follow Us Privacy Terms About Google Google Products About the Keyword Help Global (English) Africa (English) Australia (English) Brasil (Português) Canada (English) Canada (Français) Česko (Čeština) Deutschland (Deutsch) España (Español) France (Français) India (English) Indonesia (Bahasa Indonesia) Italia (Italiano) 日本 (日本語) 대한민국 (한국어) Latinoamérica (Español) الشرق الأوسط وشمال أفريقيا (اللغة العربية) MENA (English) Nederlands (Nederland) New Zealand (English) Polska (Polski) Portugal (Português) ประเทศไทย (ไทย) Türkiye (Türkçe) 台灣 (中文)
2026-01-13T09:29:55
https://l.facebook.com/l.php?u=https%3A%2F%2Fhelp.instagram.com%2F448523408565555%3Fref%3Ddp&amp;h=AT13ZOXVnoACqkdFGekVgnXKuw-i2zgcKZNkEwMT7oA1gAtAqfDbyOhCFPMyz7DiqGfYdjU__aPWm8dpc--ai3FkkoY_rDihj8oq97pbsPGY5DuSuLJC5RHbsf0g2UeHGF2xUaw7gJtP2gRo8K4l9kCKBljuIA
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:55
https://infisical.com/docs/documentation/platform/identities/universal-auth
Universal Auth - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Machine Identities Universal Auth Platform Products CLI Reference API Reference SDKs Changelog Getting Started Overview What is Infisical? Concepts Guides Platform Reference Organizations Projects Identities Access Control Audit Logs App Connections Events Workflow Integrations External Migrations Server Admin Console Secret Sharing Connectivity Networking Gateway Authentication Methods User Authentication Machine Identities Explore Options Alibaba Cloud Auth AWS Auth Azure Auth GCP Auth JWT Auth Kubernetes Auth OCI Auth Token Auth TLS Certificate Auth Universal Auth OIDC Auth LDAP Auth Machine Identity Auth Templates Service Token MFA GitHub Team Sync Self-host Infisical Introduction Installation methods Linux Package Replication Upgrade Infisical Instance Environment Variables Release Channels Hardware requirements Guides Reference architectures Infisical Enterprise FAQ Internals Overview Permissions Architecture Security Service tokens Contributing Getting Started Contributing to platform On this page Diagram Concept Guide Sample request Sample response Solving Secret Zero with Periodic Tokens Example: Bootstrapping with a Periodic Token Machine Identities Universal Auth Learn how to authenticate to Infisical from any platform or environment. Universal Auth is a platform-agnostic authentication method that can be configured for a machine identity to authenticate from any platform/environment using a Client ID and Client Secret. This authentication method supports setting token periods, which can help overcome secret zero . ​ Diagram The following sequence diagram illustrates the Universal Auth workflow for authenticating clients with Infisical. ​ Concept In this method, Infisical authenticates a client by verifying the credentials issued for it at the /api/v1/auth/universal-auth/login endpoint. If successful, then Infisical returns a short-lived access token that can be used to make authenticated requests to the Infisical API. To be more specific: The client submits a Client ID and Client Secret to Infisical at the /api/v1/auth/universal-auth/login endpoint. Infisical verifies the credential pair. If all is well, Infisical returns a short-lived access token that the client can use to make authenticated requests to the Infisical API. ​ Guide In the following steps, we explore how to create and use identities for your workloads and applications to access the Infisical API using the Universal Auth authentication method. 1 Creating an identity To create an identity, head to your Organization Settings &gt; Access Control &gt; Identities and press Create identity . When creating an identity, you specify an organization level role for it to assume; you can configure roles in Organization Settings &gt; Access Control &gt; Organization Roles. Now input a few details for your new identity. Here’s some guidance for each field: Name (required): A friendly name for the identity. Role (required): A role from the Organization Roles tab for the identity to assume. The organization role assigned will determine what organization level resources this identity can have access to. Once you’ve created an identity, you’ll be redirected to a page where you can manage the identity. Once you’ve created an identity, you’ll be prompted to configure the Universal Auth authentication method for it. By default, the identity has been configured with Universal Auth. If you wish, you can edit the Universal Auth configuration details by pressing to edit the Authentication section. Here’s some guidance on each field: Configuration Tab Access Token TTL (default is 2592000 equivalent to 30 days): The lifetime for an access token in seconds. This value will be referenced at renewal time. Access Token Max TTL (default is 2592000 equivalent to 30 days): The maximum lifetime for an access token in seconds. This value will be referenced at renewal time. Access Token Max Number of Uses (default is 0 ): The maximum number of times that an access token can be used; a value of 0 implies infinite number of uses. Access Token Period (optional, default is 0 ): If set, the access token becomes a renewable, non-expiring token for the specified period (in seconds). TTL and Max TTL are ignored when this is set. This is ideal for “secret zero” scenarios, where a workload needs to bootstrap itself securely without hard-coded static secrets. Lockout Tab Lockout (enabled by default): The lockout feature will temporarily block login attempts after X consecutive login failures. Lockout Threshold (default is 3 ): The amount of times login must fail before locking the identity auth method. Lockout Duration (default is 5 minutes ): How long an identity auth method lockout lasts. Lockout Counter Reset (default is 30 seconds ): How long to wait from the most recent failed login until resetting the lockout counter. Advanced Tab Client Secret Trusted IPs: The IPs or CIDR ranges that the Client Secret can be used from together with the Client ID to get back an access token. By default, Client Secrets are given the 0.0.0.0/0 , allowing usage from any network address. Access Token Trusted IPs: The IPs or CIDR ranges that access tokens can be used from. By default, each token is given the 0.0.0.0/0 , allowing usage from any network address. Restricting Client Secret and access token usage to specific trusted IPs is a paid feature. If you’re using Infisical Cloud, then it is available under the Pro Tier. If you’re self-hosting Infisical, then you should contact [email&#160;protected] to purchase an enterprise license to use it. 2 Creating a Client Secret In order to use the identity, you’ll need the non-sensitive Client ID of the identity and a Client Secret for it; you can think of these credentials akin to a username and password used to authenticate with the Infisical API. With that, press Create Client Secret . Feel free to input any (optional) details for the Client Secret configuration: Description: A description for the Client Secret . TTL (default is 0 ): The time-to-live for the Client Secret . By default, the TTL will be set to 0 which implies that the Client Secret will never expire; a value of 0 implies an infinite lifetime. Max Number of Uses (default is 0 ): The maximum number of times that the Client Secret can be used together with the Client ID to get back an access token; a value of 0 implies infinite number of uses. 3 Adding an identity to a project To enable the identity to access project-level resources such as secrets within a specific project, you should add it to that project. To do this, head over to the project you want to add the identity to and go to Project Settings &gt; Access Control &gt; Machine Identities and press Add identity . Next, select the identity you want to add to the project and the project level role you want to allow it to assume. The project role assigned will determine what project level resources this identity can have access to. 4 Accessing the Infisical API with the identity To access the Infisical API as the identity, you should first perform a login operation that is to exchange the Client ID and Client Secret of the identity for an access token by making a request to the /api/v1/auth/universal-auth/login endpoint. Choose the correct base URL based on your region: For Infisical Cloud US users: https://app.infisical.com For Infisical Cloud EU users: https://eu.infisical.com ​ Sample request Request Copy Ask AI curl --location --request POST &#x27;https://app.infisical.com/api/v1/auth/universal-auth/login&#x27; \ --header &#x27;Content-Type: application/x-www-form-urlencoded&#x27; \ --data-urlencode &#x27;clientId=...&#x27; \ --data-urlencode &#x27;clientSecret=...&#x27; ​ Sample response Response Copy Ask AI { &quot;accessToken&quot; : &quot;...&quot;, &quot;expiresIn&quot; : 7200, &quot;accessTokenMaxTTL&quot; : 43244 &quot;tokenType&quot; : &quot;Bearer&quot; } Next, you can use the access token to authenticate with the Infisical API Each identity access token has a time-to-live (TTL) which you can infer from the response of the login operation; the default TTL is 7200 seconds which can be adjusted in the Universal Auth configuration. If an identity access token expires, it can no longer authenticate with the Infisical API. In this case, a new access token should be obtained by performing another login operation. ​ Solving Secret Zero with Periodic Tokens In many automated, cloud-native, or ephemeral environments (such as VMs, containers, or serverless functions), it is often unsafe or impractical to hard-code long-lived credentials for bootstrapping access to secrets management systems. The “secret zero” problem refers to the challenge of securely providing a workload with its initial credential, without manual intervention or static secrets that could be leaked or reused. Periodic tokens in Universal Auth are designed to solve this problem by enabling secure, automated bootstrapping and ongoing access renewal, even in dynamic or short-lived environments. A common challenge in cloud-native and automated environments is the “secret zero” problem: how to securely bootstrap a workload (such as a VM, container, or serverless function) with its first credential, without hard-coding static secrets or requiring manual intervention. Periodic tokens in Universal Auth solve this by allowing you to issue an access token that can be continuously renewed by your workload before it expires (i.e., a client-initiated rotation mechanism): When you set the Access Token Period in the Universal Auth configuration, the issued access token can be renewed by your workload for the specified period (in seconds). The token can be renewed any number of times, each time for the same period, with no maximum lifetime (unless you set a use limit). As long as the token is renewed before its period expires, it remains valid, so you do not need to re-issue static credentials. TTL and Max TTL are ignored when Access Token Period is set. ​ Example: Bootstrapping with a Periodic Token Configure Universal Auth for your identity and set Access Token Period (e.g., 3600 for 1 hour). For improved security, configure the Client Secret with a low number of uses (e.g., 1 ) or a short TTL. This ensures that after the initial login, the Client Secret cannot be reused, and any disruption in token renewal will require manual intervention. Deploy your workload with the Client Secret and Client ID . The workload authenticates with Infisical using the Client Secret and Client ID to obtain the initial access token (JWT). The workload uses the access token to authenticate and continuously renews it before expiration: Copy Ask AI curl --location --request POST &#x27;https://app.infisical.com/api/v1/auth/universal-auth/renew&#x27; \ --header &#x27;Authorization: Bearer &lt;accessToken&gt;&#x27; This approach allows your workload to securely bootstrap and maintain access to Infisical without hard-coded secrets, solving the secret zero problem. FAQ Why is the Infisical API rejecting my identity credentials? There are a few reasons for why this might happen: The client secret or access token has expired. The identity is insufficiently permissioned to interact with the resources you wish to access. The client secret/access token is being used from an untrusted IP. What is access token renewal and TTL/Max TTL? A identity access token can have a time-to-live (TTL) or incremental lifetime after which it expires. In certain cases, you may want to extend the lifespan of an access token; to do so, you must set a max TTL parameter. A token can be renewed any number of times where each call to renew it can extend the token’s lifetime by increments of the access token’s TTL. Regardless of how frequently an access token is renewed, its lifespan remains bound to the maximum TTL determined at its creation. How do I reset a lockout? You can reset (remove) all lockouts for an identity auth method by clicking into the auth method and pressing Reset All Lockouts . Was this page helpful? Yes No Suggest edits Raise issue TLS Certificate Auth General ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by
2026-01-13T09:29:55
https://www.commondreams.org/organization/sunrise-project
Raven.config('https://6b64f5cc8af542cbb920e0238864390a@sentry.io/147999').install(); The Sunrise Project | Organization | Common Dreams To donate by check, phone, or other method, see our More Ways to Give page. × Home Politics Climate Economy Rights &amp; Justice War &amp; Peace Breaking News Opinion News Newswire Further Planned Parenthood Action Fund Trade Justice Education Fund Profile Organization Test ProsperUS Repairers of the Breach Fix Our Senate ACLU Florida Alliance for Retired Americans Concerted Action Green New Deal Network Costs of War Fossil Free Media Center for Democratic and Environmental Rights Independent Jewish Voices Canada Cascadia Wildlands Congressman Jamaal Bowman Environmental Defense National Coalition for the Homeless Riverkeeper U.S. Campaign to Ban Landmines Free Gaza Movement Friends of the Earth Europe Bulletin of the Atomic Scientists Basel Action Network Healthy California Now Groundwork Collaborative One Fair Wage Progressive International Congressman Ro Khanna Data for Progress Fight Corporate Monopolies Mijente Congresswoman Pramila Jayapal Oxfam America Repair Our Democracy Farm Action Accountable.Senate The Sentencing Project Hunger Free America Fridays for Future Family Farm Action National Family Farm Coalition Protect the Results AFSCME Color Of Change PAC MPower Change Western Watersheds Project WildEarth Guardians The Elders Gwich&#39;in Steering Committee Stop the Money Pipeline United Nations Human Rights - Special Procedures Quaker United Nations Office (QUNO) Communications Workers of America The Endangered Species Coalition Center for Climate Integrity Climate Power NORML Lower Drug Prices Now National Education Association (NEA) Democracy Initiative Small Business for Paid Leave Campaign Legal Center Muslim Advocates Congresswoman Ilhan Omar Accountable.US Climate Mobilization GLAD Out &amp; Equal American Federation of State, County and Municipal Employees The Sunrise Project American Economic Liberties Project Bend the Arc Poor People&#39;s Campaign Jewish Voice for Peace Action The Revolving Door Project Congresswoman Alexandria Ocasio-Cortez TIME&#39;S UP Now Oil Change U.S. Vote Climate U.S. PAC Community Change Action Democracy 21 Environmental Justice Foundation Center for Popular Democracy Action Climate Justice Alliance Free Press Action International Rivers JVP Action Open Markets Institute Center for Popular Democracy Stand Up America Demand Justice Stand.earth By the People The Sanders Institute Tax March Friends of the Earth Scotland Justice Democrats Sunrise Movement Western Values Project Good Jobs First Climate Works for All Democratic Socialists of America Freedom From Facebook &amp; Google National Center for Transgender Equality As You Sow Rootstrikers Direct Action Everywhere Every Voice Earthworks Global Witness National Abortion Federation Representative Keith Ellison Transgender Law Center (TLC) Sea Shepherd American Promise Americans For Tax Fairness Action Fund Biofuelwatch Grassroots International Climate Justice Programme End Rape On Campus (EROC) Stop the Wall Organization for Competitive Markets Balestra Media Pacifica Foundation The LGBT Network Compassion in World Farming UNHCR Community Alliance for Global Justice Elders Rising Moms Demand Action For Gun Sense in America The Right Livelihood Award Women&#39;s Earth &amp; Climate Action Network (WECAN) The International Rescue Committee Women Cross DMZ Acadia Center American Sustainable Business Council (ASBC) The New York Immigration Coalition GAIA The Culinary Union The American Immigration Council Citizens Against Monopoly Our Revolution United We Dream National Women&#39;s Law Center SumofUs Global Zero The Immigrant Legal Resource Center (ILRC) NAACP Legal Defense Fund Network Lobby NIAC Action Asian Americans Advancing Justice Freedom of the Press Foundation Progressive Congress Action Fund The Main Street Alliance Millions Marching For Medicare For All The World Health Organization Senator Elizabeth Warren Rep. Barbara Lee John Conyers, Jr., Congressman The Commonwealth Fund Social Security Works Mercy for Animals American Federation of Teachers Climate Disobedience Center Nuclear Age Peace Foundation Open Media Campaign for Nuclear Disarmament Community Environmental Legal Defense Fund Bold Alliance The Greenlining Institute Physicians for Reproductive Health Americans for Tax Fairness Climate Action Tracker American Federation of Government Employees Patriotic Millionaires Congresswoman Barbara Lee Progressive Change Campaign Committee Indivisible Friends of the Earth Action Stop the War Coalition Earthrights International Free Speech for People National Employment Law Project Navdanya International Open Debate Coalition Shut It Down - Climate Direct Action SOA Watch Grassroots Global Justice Alliance Green Party of the US Live Share Grow Advancement Project Chicago Teachers Union Indigenous Environmental Network Financial Accountability and Corporate Transparency (FACT) Coalition Coalition to Stop Gun Violence The Leadership Conference on Civil and Human Rights Stop Mass Incarceration Network - Chicago International Campaign to Abolish Nuclear Weapons (ICAN) Progress Michigan 350 Action Climate Action Network International Climate Tracker Regeneration International Ecojustice Together for Global Justice (CIDSE) Carbon Underground Fight for $15 sHELLNO Pembina Institute Global Justice Now Grassroots Leadership La Via Campesina New York Civil Liberties Union Privacy International National Iranian American Council (NIAC) Restaurant Opportunities Centers United U.S. Right to Know Share the World&#39;s Resources National Latina Institute for Reproductive Health Don&#39;t Shoot Coalition Environmental Action Fight for the Future Oceana UltraViolet Huu-ay-aht First Nations Latino Advocacy Western Environmental Law Center Rolling Jubilee Coalition for Peace Action Rodale Institute Food Research and Action Center Reject and Protect The Upstate Coalition to Ground the Drones and End the Wars Center for Reproductive Rights People&#39;s Action Iraq Veterans Against the War Jewish Voice for Peace US Robin Hood Tax Campaign Chesapeake Climate Action Network Council of Canadians Haiti: Make Births Safe Center for Corporate Policy Our Children&#39;s Trust The Partnership for Civil Justice Fund Friends of the Earth International + Common Dreams. To inform. To inspire. To ignite change for the common good. Common Dreams Globe LATEST NEWS OPINION CLIMATE ECONOMY POLITICS RIGHTS &amp; JUSTICE WAR &amp; PEACE LATEST NEWS OPINION Common Dreams To inform. To inspire. To ignite change for the common good. SUBSCRIBE TO OUR FREE NEWSLETTER Daily news &amp; progressive opinion—funded by the people, not the corporations—delivered straight to your inbox. * indicates required Email Address * Signup Form Location 5 #000000 #FFFFFF The Sunrise Project The Sunrise Project grows social movements to drive the transition from fossil fuels to renewable energy as fast as possible. Press page Action page Press Releases Newswire The Sunrise Project In NYC: Hundreds Call on Federal Reserve to Dump Powell, Demand Citigroup Divest from Fossil Fuels Oct 29 2021 · 03:55pm EDT Newswire Climate The Sunrise Project Amidst California&#39;s Airpocalypse, Protesters Call on Samsung to Quit Coal Aug 22 2020 · 12:00am EDT Newswire Climate The Sunrise Project 69 Organizations Tell Fed to Stop Buying Fossil Fuel Debt Jul 30 2020 · 12:00am EDT Newswire Climate The Sunrise Project Rep Garcia, Sen Whitehouse, Indigenous and Community Leaders Call Out BlackRock on Climate Deception May 20 2020 · 12:00am EDT Newswire The Sunrise Project 30 Groups Release Letter to Fed Raising Concerns Over Details of BlackRock Deal Mar 27 2020 · 12:00am EDT SUBSCRIBE TO OUR FREE NEWSLETTER Daily news &amp; progressive opinion—funded by the people, not the corporations—delivered straight to your inbox. subscribe below * indicates required Email Address * True True Follow Us Most Popular Hours After US Citizen Shot Dead by ICE, JD Vance Says ‘Door-to-Door’ Operations Are Coming Schumer, Jeffries Refuse to Join Democrats&#39; Growing Calls to Slash ICE Spending Kristi Noem Goes on TV and Lies Through Her Teeth (Again) About ICE Killing of Renee Nicole Good More Shocking Footage Shows Federal Agents Raiding Minneapolis High School, Handcuffing Staff Ex-Presidents, What More Do You Need to See Before Calling for Trump&#39;s Impeachment? After Claiming Maduro Was Its Kingpin, DOJ Now Admits in Court That &#39;Cartel De Los Soles&#39; Isn&#39;t a Real Group GOP Votes Down Pressley&#39;s Motion to Investigate Minneapolis ICE Shooting Threat of NSPM-7 Made Clear as Kristi Noem Doubles Down on Blaming Renee Good for Fatal Shooting &#39;You Are Murderers!&#39; &#39;Get the F*ck Out!&#39;: Fury at ICE Agents Boils in Minneapolis &#39;ICE Out for Good&#39;: Weekend Rallies Nationwide After Killing of Renee Good We cover the issues the corporate media never will. Please support our journalism.
2026-01-13T09:29:55
https://ko-kr.facebook.com/login/?next=https%3A%2F%2Fl.facebook.com%2Fl.php%3Fu%3Dhttps%253A%252F%252Fwww.meta.ai%252F%26amp%253Bh%3DAT3GHcxzy3_hwgabrQGILAdFg5-sY2UF3NnqPPcszvftFRFkOTEfGUk-rwMDXeNUDholnd7i3yKnlJRQZJRlzh6bTHGOy_AwXAON6FXI3F9Ps5p79OpOuIqxrhg60Qd00lf219tJ000sSHdA
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:55
https://vi-vn.facebook.com/login/?next=https%3A%2F%2Fl.facebook.com%2Fl.php%3Fu%3Dhttps%253A%252F%252Fwww.instagram.com%252F%26amp%253Bh%3DAT3fvYmq9IucQSdaV2EoebdVfZ97rpwd6ZeyvFhSuW7pjsyQjwrbBW-B_ogpIOUP_bbqf-1a8R7uBrstA-wOwF5qqPJfAcGfWZGD00GtSq7371gsEMzZnfRSoaJo6Zd8IZMZ0E37VvSdjj8H
Facebook Khám phá những điều bạn yêu thích . Đăng nhập vào Facebook Email hoặc số di động Mật khẩu Đăng nhập Quên mật khẩu? Tạo tài khoản mới Tiếng Việt 한국어 English (US) Bahasa Indonesia ภาษาไทย Español 中文(简体) Ngôn ngữ khác... Đăng ký Đăng nhập Messenger Facebook Lite Video Meta Pay Cửa hàng trên Meta Meta Quest Ray-Ban Meta Meta AI Nội dung khác do Meta AI tạo Instagram Threads Trung tâm thông tin bỏ phiếu Chính sách quyền riêng tư Trung tâm quyền riêng tư Giới thiệu Tạo quảng cáo Tạo Trang Nhà phát triển Tuyển dụng Cookie Lựa chọn quảng cáo Điều khoản Trợ giúp Tải thông tin liên hệ lên &amp; đối tượng không phải người dùng Meta © 2026
2026-01-13T09:29:55
https://shows.acast.com/frontier/episodes/ep-45-brian-pontarelli-ceo-and-founder-of-fusionauth
Ep. 45: Brian Pontarelli, CEO and Founder of FusionAuth - Frontier Podcast by Gun.io | Acast Follow Share Play Frontier Podcast by Gun.io Ep. 45: Brian Pontarelli, CEO and Founder of FusionAuth Season 4 , Ep. 45 • Thursday, March 28, 2024 On this week's episode, Teja sits down with Brian Pontarelli, Founder and CEO of both FusionAuth and Cleanspeak. They discuss the complexities of growing two businesses at the same time, making progress without using AI, and the subtle clues in an interview process that let you know someone's a great culture fit. https://fusionauth.io/ https://cleanspeak.com/ Show more RSS More episodes View all episodes 46. Ep. 46: Matt Genovese, CEO and Founder of Planorama 54:36 | Thursday, April 11, 2024 | Season 4 , Ep. 46 This week, Teja sits down with Matt Genovese, CEO and Founder of Planorama, a company that designs UX/UI flows for products with complete enablement for software teams. They discuss the intricacies of living abroad, the importance of incorporating design, and how de-risking early on in the life of a new product can make it more successful in the long run.https://planorama.design/matthttps://aiproducthive.com Play 44. Ep. 44: Sabber Ahamed, Founder of xoolooloo 28:31 | Thursday, February 29, 2024 | Season 4 , Ep. 44 This week, Teja talks with Sabber Ahamed, Founder of Xoolooloo and Data Scientist at Bridgestone. They discuss the proliferation of data science, the joys of working on your own projects outside of the 9-5, and the different things career goals of a computational geophysicist can really shake up. Play 43. Ep. 43: Harpreet Singh, CEO and Co-Founder at Launchable 39:22 | Thursday, February 15, 2024 | Season 4 , Ep. 43 This week, Teja talks with Harpreet Singh, Co-CEO and Co-Founder of Launchable, a company that's on a mission to make software testing faster and smarter. They discuss the DACI framework and the importance of intentionality in decision-making, what it's like to bring a behemoth like Jenkins to life, and the power of slowing down to meditate.https://www.launchableinc.com/ Play 42. Ep. 42: Brian Douglas, CEO and Founder at OpenSauced 36:55 | Thursday, February 1, 2024 | Season 4 , Ep. 42 In this week's episode, Teja talks with Brian Douglas, CEO and Founder at OpeSauced. They talk about how a good open source portfolio is more than just getting your name on big projects, the natural progression from developer advocacy to building an open source marketplace, and the trials and tribulations of learning to lead as you grow.opensauced.pizza Play 41. Ep. 41: Ian Villa, COO and Co-founder at Whisper Aero 37:33 | Thursday, January 18, 2024 | Season 4 , Ep. 41 Joining Teja on this week's episode is Ian Villa, COO and Co-founder of Whisper Aero, a company that is developing cleaner, quieter, and more efficient propulsion solutions. They discuss the pros and cons of a campus with on-site housing, the burgeoning Nashville tech scene, and how a 5 am trip to Kinko's can, in hindsight, be a lesson in entrepreneurship.whisper.aero Play 40. Ep. 40: Kate O&#x27;Neil, CEO and Co-founder at Teaming 58:40 | Thursday, January 11, 2024 | Season 4 , Ep. 40 This week, Teja sits down for round two with Kate O'Neil, who has moved into the CEO position at Teaming since the last time they talked. They discuss the differences that come with the transition to becoming a CEO, the importance of incorporating movement into your life, and why getting the best sleep comes down to the perfect sheets.teaming.com Play 39. Ep. 39: Jeremy Snyder, CEO and Founder at FireTail 50:32 | Thursday, January 4, 2024 | Season 4 , Ep. 39 After a brief holiday hiatus, Teja is back this week with Jeremy Snyder, the Founder and CEO of FireTail, an API security platform that provides application layer visibility, real-time, inline inspection, and blocking of malicious API calls. They talk about being a less technical founder, how being a polyglot helps you understand more than language, and the importance of taking the time to find your own adventure.https://www.firetail.io/ Play 38. Ep. 38: Stefan Avram, Head of Growth and Co-Founder at WunderGraph 34:16 | Thursday, December 21, 2023 | Season 4 , Ep. 38 Teja sits down with Stefan Avram, Head of Growth and Co-founder at WunderGraph, an open-source GraphQL federation. They discuss how injuries can change your life trajectory, the complexities of working with distributed teams, and how sometimes getting fired can be the best thing that's ever happened to you. www.wundergraph.com Play Instagram X.com TikTok Copyright Gun.io Hosted with ❤️ by Acast
2026-01-13T09:29:55
https://nl-be.trustpilot.com/review/www.siteground.com
SiteGround reviews | Bekijk consumentenreviews over www.siteground.com Categorieën Blog Inloggen Voor bedrijven Voor bedrijven Inloggen Categorieën Blog Elektronica en technologie Internet en software Webhostingbedrijf SiteGround Samenvatting Over Reviews Bezoek de website Een review schrijven Bezoek de website Geclaimd profiel SiteGround   Reviews   26.190 • 4,9 Webhostingbedrijf Een review schrijven Bezoek de website Een review schrijven Bedrijven op Trustpilot mogen geen beloningen aanbieden of betalen om reviews te verbergen. Lees wat reviewers zeggen SA Sandy 20 aug 2025 Op uitnodiging Ik plaatste mijn site over wegens problemen met spam die niet opgelost geraakten bij een andere provider het is even wennen zeker alles in het engels . Maar tot nu toe altijd goed geholpen en tot een... Toon meer DD dhr. David Claes 5 mrt 2020 Wauw, beste hosting die je kan vinden. Ik ben overgestapt van GoDaddy naar SiteGround en het verschil is ongelofelijk. Mijn site is veel sneller, het platform heel duidelijk en de service echt... Toon meer LZ Ludo Zwaan Geüpdatet op 17 mei 2018 Paar weken geleden Siteground aangeschaft voor onze nieuwe website EnergiekInkopen.nl. Ik heb matige ervaringen met veel webhosting partijen in Nederland. Of ze zijn duur met redelijke support, of er... Toon meer werbediscount 13 dec 2023 Samengevoegd Op uitnodiging Bester Service ever :) Bekijk alle 26.190 reviews Wij controleren reviews Bedrijfsgegevens Actief Trustpilot-abonnement Webhostingbedrijf Business to Business-service DNS-provider Internetmarketing Softwarebedrijf Webdesigner Info over SiteGround Geschreven door het bedrijf SiteGround is a leading hosting provider trusted by the owners of over 3,000,000 domains worldwide. With over 20 years of experience and an extraordinary team of individuals who put their passion, dedication, and expertise into taking care of our customers’ websites, SiteGround has become the go-to place for anyone looking for a reliable hosting partner. Why SiteGround? Whether you’re a business owner establishing your online presence or an agency managing multiple sites, we have everything you need. Enjoy seamless website management with our own Site Tools control panel, 500% faster sites with а platform built for speed and powered by Google Cloud, superb site security with custom-built security features and expert, friendly support with 99% satisfaction rate . Every SiteGround hosting plan also comes with: 24/7 top-rated technical support Free SSL for every website Free business email Free daily backups Free in-house built CDN WordPress auto-updates WordPress Security Plugin WordPress Optimizer Plugin Seamless WordPress Starter &amp; Migrator 99.9% uptime promise 30-day money back guarantee Services Shared Hosting WordPress Hosting WooCommerce Hosting Contactgegevens 700 N. Fairfax St, Suite 614, 22314, Alexandria, VA, Verenigde Staten www.siteground.com 4,9 Uitstekend 26K reviews 5 sterren 4 sterren 3 sterren 2 sterren 1 ster Hoe wordt de TrustScore berekend? Heeft 99% van zijn negatieve reviews beantwoord Reageert doorgaans binnen 24 uur Zo gebruikt dit bedrijf Trustpilot 4,9 Alle reviews 26.190 in totaal ● Een review schrijven 5 sterren 93% 4 sterren 1% 3 sterren &lt; 1% 2 sterren &lt; 1% 1 ster 4% Zo labelt Trustpilot reviews Meer filters Nieuwste Samengevoegde reviews en profiel Lees meer Dit profiel is samengevoegd met een of meer andere Trustpilot-profielen van dit bedrijf. Sommige van de hier getoonde reviews stonden oorspronkelijk op een ander profiel, maar zijn nu samengevoegd op één profiel. Profielen kunnen worden samengevoegd in het geval van identieke domeinen, rebranding of verandering van eigenaar. Lees meer . SA Sandy BE • 15 reviews 20 aug 2025 Op uitnodiging Ik plaatste mijn site over wegens… Ik plaatste mijn site over wegens problemen met spam die niet opgelost geraakten bij een andere provider het is even wennen zeker alles in het engels . Maar tot nu toe altijd goed geholpen en tot een oplossing gekomen. 20 augustus 2025 Bekijk nog 1 review van Sandy Kan ondersteuning van AI gebruiken bij reacties Lees meer Bij Trustpilot draait alles om menselijke content. Dit bedrijf kan echter ook onze AI-ondersteunde tool gebruiken die ze helpt bij het schrijven van hun reacties. TH Thijs NL • 10 reviews 20 jun 2024 Prima, maar bij verlegen €479.88! Ik zou siteground zeker aanraden om websites op te hosten! Echter hun &quot;unlimited&quot; websites pakket wordt beperkt tot 400.000 inodes wat er op neer komt dat als je een aantal wordpress websites hebt met veel plugins of bestanden je dus ook nooit unlimited kunt gebruiken. Het is een leuke truc om binnen te komen bij ze voor een jaar lang 90 euro betalen en vervolgens bij de verlenging vragen ze 479.88 euro. Je kunt geen gebruik meer maken van het lagere tarief omdat dit een actie betreft voor nieuwe klanten. Ik zou het dan wel aanraden qua functies, performance en goede support etc. maar qua prijs kun je beter na een jaar weer weg gaan wat ik nu ook gedaan heb. 1 juni 2024 Review zonder uitnodiging Antwoord van SiteGround 21 jun 2024 Hello, Thijs, Thank you for sharing your thoughts. Please note that Dutch is not a language we currently support, and since you reached our English Trustpilot page, our reply will be in English as well. We would be happy to address your concerns regarding the inodes limit and renewal pricing. At SiteGround, we implement a fair usage policy to ensure stability and optimal performance for all our clients within our shared hosting environment. Each plan is assigned a predefined number of inodes based on various factors, including the average resource needs of most websites, the capabilities and tools of the specific hosting plan, and the overall plan pricing. This approach helps prevent any single account from overusing resources and impacting other users on the same server. While our current allocation of resources suits the needs of the majority of our clients, we understand that some projects with many files or plugins may have unique requirements. For those who need higher limits, we offer a wide range of hosting solutions that might better accommodate their needs. Regarding renewal pricing, our introductory offer, which can be up to 81% off for the first year, is designed to help new customers and business owners launch their projects with minimal initial expense. This allows our clients to thoroughly test our services and determine if they meet their needs as their businesses grow. After this period, regular pricing takes effect, reflecting the comprehensive value of our services, including advanced security measures, exceptional customer support, and cutting-edge technology developed in-house. However, we do offer renewal promotions for longer billing cycles. We are also sorry to hear about your decision to close your account. While we are saddened to see you go, we wish you the best of luck with your future endeavors. Best regards, The SiteGround Team Simon Kloostra NL • 1 review 18 dec 2023 MYSQL verouderd Ik zit al 10-15 jaar bij Sitegound, en ben los van een paar missers best tevreden, met ongeveer 50 sites (Joomla). Echter, ik loop er nu tegenaan dat ze slechts MySQL versie 5.7 ondersteunen, terwijl deze allang voorbij EOL is! Hier kan ik echt niet bij: het is alsof je vast zit aan PHP 7.4. Ik kan sites nu niet eens updaten omdat die gewoon de huidige MySQL versie (8) verwacht... Kortom: ik zit klem: of verouderde sites blijven hosten, of verhuizen. Zeker omdat support nog geen enkele timeline kan bieden vrees ik dat ik dat noodgedwongen zal moeten doen... De feedback dat ik dan maar moet switchen naar PostgreSQl slaat nergens op. 18 december 2023 Review zonder uitnodiging Antwoord van SiteGround 19 dec 2023 Hello Simon, Thank you for your direct feedback and for hosting with us for all of those years. We would like to take this opportunity and respond. The response will be in English, the same as the other reviews under our Trustpilot account, hope this is ok, We strive to provide our customers with the latest and most stable versions of server software, including PHP, MySQL, etc. In addition to that, we&#x27;re committed to ensuring the security and optimization of our current MySQL setup via custom patches for example. With that said, our team is aware Joomla 5 requires MySQL ver 8. That&#x27;s why our team is already working towards upgrading our existing MySQL version. Our main concern here is to mitigate any potential risks for all of our clients. That&#x27;s why we&#x27;re extensively testing the new MySQL version under a wide range of conditions. The end goal is to ensure seamless transition and integration across all of our servers. We&#x27;ll notify our customers when the new MySQL version is available so you can switch to the latest Joomla version. Until then, the workaround we can offer if you want to use Joomla 5 on SiteGround is to utilize PostgreSQL. We hope this was informative. Regards, The SiteGround Team werbediscount DE • 3 reviews 13 dec 2023 Samengevoegd Op uitnodiging Bester Service ever :) 13 december 2023 Bekijk nog 1 review van werbediscount MD Matthew Dunn AU • 4 reviews 1 nov 2023 Op uitnodiging Dil = 10/10!! 1 november 2023 FD FD NL • 1 review 4 jul 2023 Schandalige service! Schandalige service! Een website die ineens niet meer de informatie bevat die hij hoort te bevatten. Gek genoeg na een chat sessie van ruim een uur, waarin de medewerker vooral de schuld buiten SiteGround probeert te schuiven, is er ineens weer een website. Ware het niet dat het een dag oude versie is die van een ander domein afkomt. Na 21 uur nog geen passende oplossing en al ruim 4 uur in &quot;de wacht&quot; voor een klein stukje service. Zelfs het verhuizen wordt me op deze manier onmogelijk gemaakt. Had ik al gezegd dat het schandalig is. 4 juli 2023 Review zonder uitnodiging Antwoord van SiteGround 5 jul 2023 Bedankt voor het delen van uw feedback met ons. Het spijt ons te horen over uw negatieve indruk van onze service. Uw beschrijving van de ervaring voldoet niet aan de hoge eisen die wij aan onszelf stellen en we willen u ervan verzekeren dat we uw zorgen serieus nemen. Aan de hand van de gegevens in uw recensie konden we uw account echter niet identificeren. We willen deze zaak grondig onderzoeken en u zo goed mogelijk helpen. Om dit te doen, vragen we je een e-mail te sturen naar feedback@siteground.com met je accountgegevens en meer details te geven over het specifieke geval. Op deze manier kan ons Customer Care team het probleem in detail onderzoeken en een passende oplossing bieden. We zien uw e-mail graag tegemoet en werken aan een bevredigende oplossing. Met vriendelijke groet, Het SiteGround Team AJ Arend Jan ten Brinke NL • 13 reviews 29 nov 2022 Samengevoegd Ik kreeg een rekening van Site ground… Ik kreeg een rekening van Site ground wat ik niet wist dat ik daarvoor aangemeld was, heb contact gehad met een medewerker en denk dat het opgelost is,dus keurig en netjes geholpen. 29 november 2022 Review zonder uitnodiging Naomi Gorissen NL • 8 reviews Geüpdatet op 15 nov 2022 Erg vaak (voor niks) doorverwezen en probleem nog niet opgelost. Mijn domeinnaam was &quot;expired&quot;, mijn hosting is ergens anders en ik wilde mijn domeinnaam verplaatsen van Siteground naar mijn nieuwe hosting. Was erg moeilijk om de support van Siteground te benaderen. Omdat ik geen hosting heb (maar dus wel een domeinnaam) bij Siteground, kon ik niet intern support benaderen. Ik moest dan een hosting/website bij Siteground hebben. Om een lang verhaal uiteindelijk (hopelijk) kort te maken: Ik heb contact gehad met mijn nieuwe hosting, maar zij konden niet zo veel omdat mijn domeinnaam nog bij Siteground (expired) geregistreerd stond. Ik kreeg geen EPP code door de combinatie: dat ik geen hosting bij Siteground heb, de domeinnaam was expired en het is een .nl domeinnaam. Uiteindelijk kon ik met een andere browser (waar de cookies nog niet opgeslagen waren) de knop &quot;chat as a new client&quot; zien (tip van mijn huidige hosting). Vanuit daar ben ik nog 4!!!!! keer doorverwezen naar een andere afdeling. Toen ik als laatste door werd verwezen naar de afdeling &quot;billing problems&quot; zei ik dat ik geen &quot;billing problem&quot; heb maar een &quot;domain problem&quot;. Toen ging hij nogmaals even kijken en toen kon hij me opeens wel (een soort van) helpen. Ik zeg een soort van, omdat hij dus tot de conclusie te kwam dat ik de &quot;redemption phase&quot; (wat nog ruim een maand duurt) moest afwachten zodat ik uiteindelijk mijn domeinnaam opnieuw kan kopen omdat hij dan pas weer vrijgegeven wordt. Doordat het een .nl website is, en de domeinnaam expired is, kon het op geen andere manier. Uiteindelijk ben ik dus zo&#x27;n 3 uur bezig geweest met dit hele gebeuren, om er achter te komen dat het nog steeds niet is opgelost en dat het ook niet opgelost kan worden. Tip voor Siteground: zorg dat mensen makkelijk bij je support/chat kunnen ook al hebben ze geen hosting, maar alleen een domeinnaam bij je. En zorg dat medewerkers iemand meteen goed doorverwijzen of meteen de juiste informatie verstrekken. En voor mensen in het algemeen: heb je een domeinnaam bij Siteground, houd dan de expiry date goed in de gaten. Dat voorkomt een heleboel ellende. Toch nog 2 - 2,5 sterren omdat de medewerkers op zich wel gewoon vriendelijk waren. En de laatste medewerker die me eigenlijk wilde doorsturen naar &quot;billing problems&quot;, was extra sympathiek toen ik vertelde dat ik al 3 of 4 keer door was gestuurd door zijn collega&#x27;s en dat ik gewoon echt niet meer wist wat ik nu moest doen en dat ik eigenlijk niet nóg een keer mijn verhaal helemaal wilde typen. 15 november 2022 Review zonder uitnodiging Antwoord van SiteGround 17 nov 2022 Hallo Naomi, Wir haben uns entschieden, Ihnen bezüglich Ihrer Bewertung eine Nachricht zu senden und die Situation weiter zu klären. Auch wenn Sie keine aktive Website und nur eine Domain bei uns haben, können Sie unseren Support über das Help Center kontaktieren. Sie müssen die Kategorie Domains &gt; Erneuern oder Reaktivieren einer abgelaufenen Domain &gt; Sonstiges auswählen, wenn die Domain nicht in der Liste ist &gt; Ich benötige Hilfe. Wir nehmen Ihr Feedback weiterhin entgegen und werden es im Hinblick auf mögliche Prozessverbesserungen besprechen. Über die .nl-Domain, die Sie bei uns hatten, haben solche Domainendungen keine Nachfrist, und sobald sie abgelaufen sind, treten sie direkt in die Redemption (Quarantäne) ein. Dies kann hier überprüft werden: https://help.opensrs.com/hc/en-us/articles/204191633--NL-domain-policies. Wir können immer noch bei der Verlängerung helfen, aber die Gebühr wird höher sein. Nach der Reaktivierung können Sie die Domain übertragen, wenn Sie dies wünschen. Wenn Sie daran interessiert sind, die Domain jetzt zu erneuern, können Sie sich jederzeit an unser Team wenden, um Unterstützung zu erhalten. Grüße, The SiteGround Team EV Els van der Zalm NL • 2 reviews 17 jan 2022 GROOTSE NADELEN: GROOTSE NADELEN: 1) Je kunt alleen nog met credit card betalen, OOK ALS ZAKELIJKE KLANT, echt idioot. Zelfs voor een paypal link moet je eerst met klantenservice chatten watje weer een kwartier kost. 2) Je kunt geen ticket indienen voor support. Je bent dus altijd minstens 15 minuten werktijd kwijt, meestal langer voor een vraag die ook via e-mail beantwoord had kunnen worden. 3) Prijzen niet in verhouding tot bovenstaande GROOTSTE VOORDELEN: 1. Qua beschikbare tools ongeevenaard in NL 2. Snelle servers 3. Goede beveiliging 4. 24/7 goede support 17 januari 2022 Review zonder uitnodiging Damrak NL • 19 reviews 23 aug 2021 Koude douche SiteGround zorgde voor een koude douche toen ik mijn domeinnaam even wilde verlengen. Zonder daarover een mail gestuurd te hebben bleken ze iDeal opeens niet meer als betalingsmogelijkheid aan te bieden (wat vorig jaar nog wel kon). Aangezien dat in Nederland verreweg de populairste betalingsmethode is, geeft het bedrijf in Madrid in feite aan geen behoefte meer te hebben aan Nederlandse klanten. Terwijl je website nota bene op een server in de Eemshaven staat. Het laatste wat een klant wil is gedoe, maar dat krijg je nu dus bij SiteGround. Het heeft me een uur en een hoop ergernis gekost. De website neemt nu aan dat je met een creditcard wilt betalen, wat niet het geval is. Je moet dan naar &#x27;Help&#x27; om uit te zoeken wat er aan de hand is. De naam iDeal komt daar niet in voor. Dus je moet de betaalmogelijkheden gaan checken. Per bank overschrijven kan alleen per transactie van 5000 (ongeacht de valuta). Als je PayPal wilt moet je dat eerst aanvragen in een chat. De aanvraag wordt afgewezen: je hebt te weinig woorden ingetypt. Eindelijk in de chat willen ze weten waarom je met PayPal wilt betalen. Ze bieden geen excuses aan voor de inconvenience die ze veroorzaken en wijzen er wel op dat je minimaal €80 (excl. VAT) moet overmaken. Maar &#x27;gezien je probleem&#x27; (ik heb helemaal geen probleem, zij veroorzaken een probleem) krijg je dan eenmalig een betaallink naar PayPal, met het advies een creditcard te gaan aanschaffen. Bij zo&#x27;n klantonvriendelijke hosting provider wil je natuurlijk niet zitten. Zodra mijn hosting plan expireert stap ik over naar een Nederlandse provider. Die natuurlijk wel iDeal aanbiedt. 23 augustus 2021 Review zonder uitnodiging Aris Velperbroek NL • 7 reviews 28 mrt 2021 Goed, administratief communicatief slecht Siteground doet wat ze zeggen. Daar is niets op aan te merken, echter beter kan altijd. Helaas is hun betalingswijze niet erg vriendelijk. Sinds kort accepteren ze geen betalingen onder de $80,00 met IDEAL of PayPal. Hiervoor moet je dan een creditcard hebben. Erg lastig als je een van de meerdere domeinnamen wilt verlengen en geen Creditcard gebruikt. Nog minder klantvriendelijk is het dan als ze dat niet communiceren. Heb je meerdere domeinen willekeurig aflopend, dan kun je niet verlengen voor 1 domein. Dit is dan ook sinds kort, voorheen was dat niet het geval 28 maart 2021 Review zonder uitnodiging Bekijk nog 2 reviews van Aris TB Tineke Boogaarts NL • 6 reviews 1 mrt 2021 Hij was snel en accuraat Hij was snel en accuraat, dus was het snel verholpen. In de video van Siteground zat een fout, niet TSL, maar SSL was de sleutel tot het probleem. 1 maart 2021 Review zonder uitnodiging Bekijk nog 1 review van Tineke MB Marije Battjes NL • 4 reviews 17 feb 2021 Siteground heeft ongevraagd mijn zeer… Siteground heeft ongevraagd mijn zeer goed werkende website overgezet van Cpanel naar Site Tools... nu is mijn website al 6 dagen een complete chaos en ipv hun verantwoordelijkheid te nemen en het op te lossen, laten ze het me voornamelijk zelf uitzoeken... 17 februari 2021 Review zonder uitnodiging Esther Stegeman NL • 5 reviews 12 feb 2021 Good help Good help, quick service and clear answer to my question! Thank you! 12 februari 2021 Review zonder uitnodiging DH DHL NL • 3 reviews 5 feb 2021 Omgeleid clear and helpfull clear and helpfull. thanks 5 februari 2021 Review zonder uitnodiging TA Taltiha NL • 11 reviews 22 dec 2020 Geweldige service Super fijne host, met geweldige service. Ze helpen je super snel en altijd heel vriendelijk. Dikke aanrader! 22 december 2020 Review zonder uitnodiging Erik Speckmann NL • 1 review 31 okt 2020 super thanks, The people from Siteground helped me out, thanks 31 oktober 2020 Review zonder uitnodiging LK Leo Karstel NL • 5 reviews Geüpdatet op 23 sep 2020 Downtime and issues that are nooblevel. Het lijkt wel of er altijd wat aan de hand is. Mn site raakt defect zonder dat we daar zelf debit aan zijn. Of de email werkt niet. Of de klanten kunnen niet inloggen. Of zoals nu, hebben ze doodleuk de server tijdzone veranderd waardoor al mn orders, ook alles uit het verleden ineens 6 uur later in gedocumenteerd staat. Zo lopen mn aangiftes dus ook compleet uit de pas. Na 6 jaar klant te zijn geweest heb ik opdracht gegeven de boel te verkassen. Ik ben de downtime en verrassingen wel een beetje zat. 23 september 2020 Review zonder uitnodiging Antwoord van SiteGround 24 sep 2020 Hello Leo, Thank you for being a long time customer! There are various reasons for why a website could stop working as expected. Whenever such issues arise, and you have not applied any recent changes, please contact our support team. We would gladly look into the matter and check if the issue you are experiencing is due to a misconfiguration of your hosting account, and if so, do our best to resolve it. Regarding the differences in the timezones, it seems that after the migration of your account from a cPanel server to SiteTools, the timestamp of your orders were no longer displayed properly. The admins are looking into the issue to make sure it’s globally resolved for future occasions. Two workaround solutions have already been listed in your latest support ticket. After you review them and select the most convenient one for you, please update the ticket, so we could assist you further. Sincere apologies for the inconvenience caused! Kind regards, The SiteGround team MA Matthijs NL • 2 reviews 16 sep 2020 Snelle hosting, veilig, goede support Bij mijn vorige host leek leek alles prima. Alles was super overzichtelijk, alles in het Nederlands. Maar de snelheid liet te wensen over. Ik kon ik zien bij GT Metrics en Pingdom dat het gewoon te lang duurde voordat het domein met de server geconnect was. Daarnaast had ik bij mijn vorige hosting meerdere websites op 1 server staan. (14 om precies te zijn) Helaas beschikte 1 van deze website een verouderde plugin, waardoor mijn website gehackt was. Deze slimme hackers konden via de achterkant al mijn websites benaderen en hadden deze dus ook allemaal gehackt! :@*!&amp;@)! Maar van fouten leer je.. ;) Op zoek naar een nieuwe webhosting dus.. Nadat ik over was naar Siteground was ik blij verrast. Naast dat ze beschikken over compleet vernieuwd super intuïtief dashboard, was mijn website vele malen sneller! WordPress installeren ging gemakkelijker dan bij iedere andere hosting die ik gebruikt heb. En dat zijn er nogal wat. Ook is het bij Siteground onmogelijk om via een achterdeur bij andere websites op dezelfde server te komen. Dit is volledig afgeschermd dus voelt een stuk veiliger! Groet, Matthijs | Matthijsonline.nl 16 september 2020 Review zonder uitnodiging Bram Huisman NL • 3 reviews 2 jul 2020 Zorg ervoor dat je geen cloud-server… Zorg ervoor dat je geen cloud-server neemt. Ik ben al jaren klant, maar wat er nu aan de hand is slaat nergens op. Als je je SSD space wilt verlagen (want dit kost veel geld) kan dat niet.. want dit is schijnbaar een permanente service? Terwijl je in 2 clicks wel kan upgraden. Echt totale onzin! Begin er niet aan.. 2 juli 2020 Review zonder uitnodiging Antwoord van SiteGround 2 jul 2020 Hello Bram, Wе are truly sorry to hear that you are not content by the downgrade options we offer. While the RAM and CPU cores can be easily decreased via your Client Area without any consequences for your data, the disk space reduction could result in data damages. That is why we do not offer an automated way for downgrading. As a solution, we could suggest creating a new server with the new specifications you require and migrating your data to the new machine. We have provided you with more information about the process via PM. Kind regards, The SiteGround Team Terug 1 2 Volgende pagina Dit is Trustpilot Wij staan open voor iedereen Iedereen kan een review op Trustpilot achterlaten n.a.v. een ervaring met een bedrijf. Gebruikers hebben het recht om hun feedback op elk moment te wijzigen of te verwijderen, en elke gepubliceerde review is zichtbaar zolang het account van de betreffende gebruiker actief is . Wij zijn voorstander van geverifieerde reviews Bedrijven kunnen reviews verzamelen via geautomatiseerde uitnodigingen. Deze reviews worden als geverifieerd bestempeld, omdat het evident is dat ze op echte ervaringen gebaseerd zijn. Lees meer over geverifieerde reviews. Wij bestrijden nepreviews Wij beveiligen ons platform met behulp van toegewijde specialisten en slimme technologieën. Lees meer over hoe wij nepreviews bestrijden . Wij tonen de meest recente reviews Lees meer over Trustpilots reviewproces . Wij moedigen constructieve feedback aan Hier vind je 8 tips voor het schrijven van een goede review . Wij verifiëren reviewers Verificatie helpt ervoor te zorgen dat echte mensen de reviews schrijven die je op Trustpilot ziet staan. Wij zijn tegen vooringenomenheid Beloningen aanbieden voor reviews of een slechts een bepaalde groep mensen vragen om een review te schrijven, kan de TrustScore beïnvloeden. Dit is in strijd met onze richtlijnen . Lees meer are you human? Kies land België Danmark Österreich Schweiz Deutschland Australia Canada United Kingdom Ireland New Zealand United States España Suomi Belgique België France Italia 日本 Norge Nederland Polska Brasil Portugal Sverige Over ons Over ons Werken bij Trustpilot Contact Blog Hoe Trustpilot te werk gaat Pers Investor relations Community Vertrouw in reviews Helpcentrum Inloggen Aanmelden Bedrijven Trustpilot Business Producten Pakketten &amp; Tarieven Bedrijf Login Blog voor bedrijven Volg ons op Juridisch Privacybeleid Gebruikersvoorwaarden Richtlijnen voor reviewers Systeemstatus Modern Slavery Statement © 2026 Trustpilot A/S. Alle rechten voorbehouden.
2026-01-13T09:29:55
https://aws.amazon.com/bedrock/amazon-models/titan/
Amazon Bedrock – Build genAI applications and agents at production scale – AWS Skip to main content Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account Amazon Bedrock Overview Getting Started Capabilities AgentCore Pricing More Artificial Intelligence › Generative AI › Amazon Bedrock Deploy and manage agents at scale with Amazon Bedrock AgentCore Amazon Bedrock The platform for building generative AI applications and agents at production scale Get started with Amazon Bedrock Explore interactive demo Drive real business impact Amazon Bedrock powers generative AI for more than 100,000 organizations worldwide—from startups to global enterprises across every industry. It provides the proven infrastructure and comprehensive capabilities to confidently build applications and agents that work in production with the flexibility, enterprise security, and proven scalability you need to innovate boldly and deliver AI that drives real business impact. Play Meet Amazon Bedrock The core capabilities you need for building production AI in one platform. Capabilities Organizations choose Amazon Bedrock to deliver personalized experiences, automate complex workflows, and uncover actionable insights—all in a comprehensive platform that lets teams innovate fast without compromising on security. Model choice Agent development Customization Safety and guardrails Cost optimization Choose the best model for your use case Amazon Bedrock gives you access to hundreds of FMs from leading AI companies along with evaluation tools to pick the best model based on your unique performance and cost needs. Future-proof your AI strategy as your needs evolve and new models emerge. Learn more about model choice Build and deploy agents Accelerate agents to production with Amazon Bedrock AgentCore , an agentic platform to build, deploy and operate highly capable agents securely, at scale using any framework and model – no infrastructure management required. Or you can orchestrate agents using Amazon Bedrock Agents for guided agent building.&nbsp; Securely customize with your data Move from generic AI to AI that knows your customer and your business by customizing models with your data. By combining multiple data customization tools—Knowledge Bases, Bedrock Data Automation, prompt engineering, and fine-tuning—you can optimize your AI applications to your business, while ensuring you’re always in control of sensitive information. Learn more about customization Apply security, privacy, and responsible AI checks Amazon Bedrock provides industry-leading security, privacy, and compliance for generative AI applications. Bedrock Guardrails &nbsp;can help block up to 88% of harmful content and identify correct model responses with up to 99% accuracy to minimize hallucinations and data ambiguity using Automated Reasoning checks.&nbsp;Bedrock never stores or uses your data to train models, ensuring complete security and privacy, with encryption of data in transit and at rest, as well as identity-based policies for managing data access. Bedrock provides comprehensive monitoring and logging capabilities that can support your governance and audit requirements. Finally, Bedrock is in scope for common compliance standards including ISO, SOC, CSA STAR Level 2, GDPR, FedRAMP High, and is HIPAA eligible. Learn more about safety and guardrails Optimize for cost, latency, and accuracy Ensure your AI applications are optimized for the perfect balance of cost, speed, and accuracy. Features like Model Distillation, Prompt caching, and Intelligent Prompt Routing can reduce expenses while maintaining performance. For example, distilled models run up to 500% faster and cost up to 75% less, with minimal impact on accuracy. Intelligent Prompt Routing can cut costs by up to 30% while maintaining quality. With flexible options for both real-time and batch processing, Bedrock helps you build smart, efficient, and cost-effective AI systems. Learn more about cost optimization Accelerate agents to production with composable services With Amazon Bedrock AgentCore enable agents to take actions across tools and data with the right permissions and controls, run agents securely at scale, and monitor agent performance and quality in production - all without any infrastructure management. AgentCore services and capabilities work together or independently: Runtime for secure, serverless deployment; Gateway for unified tool access and connections; Memory for intelligent context retention across sessions; Identity for seamless authentication across AWS and third-party services; Browser and Code Interpreter for enhanced agent capabilities; Observability for comprehensive monitoring and debugging; Evaluations (Preview) for continuous quality scoring; and Policy (Preview) for fine-grained control over agent actions. &nbsp; Learn more about AgentCore Do more with Amazon Bedrock Get from idea to production fast Write new copy Jump-start your writing project with new pieces of original copy, such as blog posts, social media posts, and webpage copy. Create a virtual assistant Build assistive agents that understand user requests, automatically breakdown tasks, ingest and analyze multi-modal data, and then take actions and create new content to fulfill the request. Skip the reading Summarize long documents such as articles, reports, research papers, technical documentation, and even books to quickly and effectively extract important information. Be the designer Create stunningly realistic and visually appealing images for ad campaigns, websites, presentations, and more in an instant. Streamline workflows Automate routine tasks and streamline operations across functions like financial reporting and demand forecasting with agents. Get deep insights Use agents to automate complex data analysis and simulations—allowing researchers and creators to focus on strategic ideation rather than technical execution. Real results, real customers Robinhood Robinhood transformed into an AI-first financial innovator using Amazon Bedrock, scaling from 500 million to 5 billion tokens daily in just six months—while slashing AI costs by 80% and cutting development time in half. According to Dev Tagare, Robinhood's Head of AI, Amazon Bedrock's model diversity, security, and compliance features are purpose-built for regulated industries. Robinhood's success demonstrates how fintech leaders can use Amazon Bedrock to democratize finance with cutting-edge AI while maintaining enterprise-grade security and compliance. Play Epsilon Epsilon used Amazon Bedrock AgentCore to transform their marketing operations, enabling intelligent agents to automate complex campaign workflows while maintaining enterprise-grade security and compliance. Epsilon accelerated their agent development from months to weeks, delivering personalized marketing experiences at scale while reducing operational overhead. Explore more customer success stories Play Next steps Video Amazon Bedrock customer success stories Watch the videos Documentation Amazon Bedrock documentation Read the documentation Workshop Explore common Amazon Bedrock use cases with a guided workshop View workshop Demo View demos of Amazon Bedrock capabilities Explore the demo library Create an AWS account Learn What Is AWS? What Is Cloud Computing? What Is Agentic AI? Cloud Computing Concepts Hub AWS Cloud Security What's New Blogs Press Releases Resources Getting Started Training AWS Trust Center AWS Solutions Library Architecture Center Product and Technical FAQs Analyst Reports AWS Partners Developers Builder Center SDKs &amp; Tools .NET on AWS Python on AWS Java on AWS PHP on AWS JavaScript on AWS Help Contact Us File a Support Ticket AWS re:Post Knowledge Center AWS Support Overview Get Expert Help AWS Accessibility Legal English Back to top Amazon is an Equal Opportunity Employer: Minority / Women / Disability / Veteran / Gender Identity / Sexual Orientation / Age. x facebook linkedin instagram twitch youtube podcasts email Privacy Site terms Cookie Preferences © 2026, Amazon Web Services, Inc. or its affiliates. All rights reserved.
2026-01-13T09:29:55
https://www.notion.com/id/product/ai-meeting-notes
AI Meeting Notes—Memori rapat yang sempurna | Notion Notion Fitur Notion AI Buat, tulis, otomatiskan Agent Menangani tugas manual Enterprise Search Temukan jawaban secara cepat AI Meeting Notes Ditulis dengan sempurna oleh AI Docs Sederhana &amp; berdaya guna Basis Pengetahuan Pusatkan pengetahuan Anda Projects Kelola proyek Sites Publikasikan apa saja, dengan cepat Memulai Jelajahi kasus penggunaan AI Lihat apa saja yang bisa dilakukan Notion AI Telusuri marketplace Templat untuk semua hal Lihat integrasi Hubungkan aplikasi Anda dengan Notion Unduh web clipper Simpan dari web ke Notion Coba aplikasi desktop Notion untuk pengalaman yang lebih cepat Unduh aplikasi Mail Kalender AI Perusahaan Harga Jelajahi Tim Teknik &amp; Produk Desain Pemasaran TI Ukuran tim Startup UKM Perusahaan Pendidikan Pelajari Pusat bantuan Notion Academy Cerita pelanggan Blog Komunitas Program mitra Buat API Templat Keamanan Konsultan Minta demo Masuk Dapatkan Notion gratis AI Meeting Notes Memori rapat yang sempurna. Pencatat otomatis Anda menangkap setiap detail dan menyajikan rangkuman yang siap ditindaklanjuti, langsung di ruang kerja Anda. Coba gratis Jeda Ups! Sepertinya pemblokir iklan Anda mencegah pemutaran video. Dipercaya oleh tim di Dirancang untuk setiap rapat. Setiap rangkuman memberikan hal persis yang Anda butuhkan untuk melanjutkan pekerjaan. Sesi 1:1 Sinkronisasi tim Panggilan klien Wawancara Brainstorm AI Meeting–Sesi 1:1 AI Meeting–Acara AI Meeting–Panggilan Klien AI Meeting–Wawancara AI Meeting–Acara Berfungsi di mana pun Anda bekerja. Catat percakapan di mana saja. Sinkronkan kalender Anda, dan pencatatan berjalan otomatis. Berfungsi dengan semua alat video Membuat transkripsi audio dan mikrofon sistem Anda. Tanpa pengaturan, tanpa bot. Bahkan untuk tatap muka Catat poin penting secara langsung dari perangkat apa pun. Tersinkron dengan kalender Anda Catatan dibuat, dimulai, dan dibagikan ke peserta secara otomatis. Satu-satunya tempat catatan berubah jadi kemajuan. Tindaklanjuti hasil rapat langsung di Notion. Notion AI mengurus kelanjutannya, jadi Anda bisa fokus pada langkah berikutnya. Langkah aksi berubah jadi tugas Anda Notion Agent membantu menetapkan tugas beserta penanggung jawab, prioritas, dan tenggatnya agar semuanya benar-benar terselesaikan. Proyek diperbarui secara otomatis Notion Agent memastikan proyek Anda tetap terbaru setelah rapat, lengkap dengan status baru, tugas yang selesai, dan lini masa yang direvisi. Ubah catatan jadi tindak lanjut yang tepat sasaran Buat rangkuman rapat yang pas untuk audiens Anda dengan satu prompt sederhana. Temukan jawaban kapan pun Anda membutuhkannya Tanyakan apa saja tentang rapat sebelumnya dan dapatkan jawaban yang penuh konteks. Keamanan dan privasi dengan standar tertinggi. Dipercaya perusahaan Fortune 500 di seluruh dunia, dengan perlindungan setingkat perusahaan skala besar yang terintegrasi. Data Anda tidak digunakan untuk AI training Kami memiliki perjanjian kontrak dengan subpemroses AI kami yang melarang penggunaan data pelanggan untuk melatih model mereka. Penyimpanan transkrip yang bisa disesuaikan Pemilik ruang kerja dapat mengatur jadwal penghapusan transkrip otomatis (khusus paket Enterprise) dan memutuskan apakah audio disimpan secara lokal. Perlindungan bawaan Dengan audit log, izin yang lebih detail, dan SSO, pekerjaan sensitif Anda tetap aman. Pemberitahuan persetujuan Pengingat di aplikasi yang jelas untuk memperoleh persetujuan sebelum menggunakan AI Meeting Notes. Enkripsi aman Saat Anda menggunakan Notion AI, data Anda dienkripsi selama transmisi menggunakan TLS 1.2 atau versi yang lebih tinggi. SOC 2 (Tipe 2) Laporan kami menyatakan bahwa kebijakan dan kontrol keamanan kami terus memenuhi standar tertinggi dalam industri. Akhiri kebiasaan fokus terpecah saat rapat. Cerita langsung dari para pengguna AI Meeting Notes. Suka banget sama Notion AI. Bosku hari ini nggak bisa hadir rapat dan bilang, &quot;eh… pakai AI meeting notes yang waktu itu kamu pakai, dong&quot;. Gas 😎. Mark @miningmark48 Tambahan fitur yang sangat solid untuk platform yang sudah sangat keren. AI Meeting Notes dan Mode Riset saja bisa menghemat banyak jam kerja setiap minggu. Ditambah akses ke GPT-4.1 dan Claude 3.7 yang benar-benar mantap. Nggak sabar lihat bagaimana fitur ini akan mengubah alur kerja harian di industri kami. George Ralph @GeorgeNWRalph Fitur AI meeting notes-nya bagus banget, sumpaaah bagusss. Ankit Mhatre @ankitmhatree Paket Bisnis dibuat untuk membantu Anda bekerja optimal. Gratis Agar individu dapat mengatur proyek pribadi dan urusan sehari-hari. Daftar Penyimpanan tanpa batas untuk individu. Uji coba terbatas untuk tim. Gratis untuk penggunaan perorangan Catat, atur, dan tindak lanjuti tanggapan langsung di Notion. Formulir dasar Publikasikan halaman Notion ke web Situs dasar Hubungkan beberapa Kalender untuk mengelola pekerjaan dan waktu secara bersamaan. Notion Calendar Hubungkan Gmail Anda untuk kotak masuk yang dipersonalisasi dan didukung AI. Notion Mail (Sinkronisasi dengan Gmail) Atur ratusan atau ribuan item di satu tempat, seperti proyek atau tugas Database, termasuk subtugas, dependensi, properti kustom, dan lainnya Notion AI Uji coba kemampuan AI seperti membuat dokumen, atau mengisi otomatis database Uji coba Notion AI Bisnis Direkomendasikan Agar bisnis yang sedang berkembang dapat menyederhanakan kerja tim. Mulai Semua yang ada di paket Plus Kelola akses pegawai berskala besar dengan sistem masuk tunggal yang aman. SAML SSO Berkolaborasi di database Notion tanpa memberikan akses ke seluruh database. Batasi akses ke baris tempat kolaborator ditugaskan. Izin database terperinci Tambahkan lencana terverifikasi ke halaman yang terkini. Muncul di hasil pencarian dan kutipan AI. Verifikasi halaman apa pun Buat ruang tim yang tidak dapat dilihat atau ditemukan oleh siapa pun selain orang-orang yang Anda tambahkan. Cocok untuk informasi sensitif seperti perencanaan perusahaan atau penilaian kinerja. Ruang tim privat Buat formulir dinamis di mana pertanyaan hanya muncul jika relevan berdasarkan respons sebelumnya Logika formulir bersyarat Verifikasi kepemilikan domain email untuk mengakses fitur keamanan canggih, termasuk sistem masuk tunggal. Verifikasi domain Integrasikan dengan GitHub, Asana &amp; lainnya Integrasi premium Notion AI Bekerja untuk Anda. Menyelesaikan tugas yang kompleks dan multi-langkah menggunakan konteks dari Notion, aplikasi Anda yang terhubung, dan web. Agent Cari di seluruh aplikasi terhubung, seperti Slack, Github &amp; lainnya Enterprise search Beta Otomatiskan catatan rapat dan tindak lanjut Anda, tanpa perlu bot Catatan rapat AI Beta Tanya Jawab Bagaimana cara mulai menggunakan AI Meeting Notes di Notion? Cukup ketik /meet di halaman Notion mana pun, ikuti rapat dari Notion Calendar, atau biarkan Notion mengirim pengingat otomatis saat sistemnya mendeteksi adanya rapat. AI Meeting Notes akan mulai mencatat rapat dan membuat ringkasan terstruktur segera setelah rapat selesai. Apakah AI Meeting Notes bisa digunakan dengan Zoom, Google Meet, dan Microsoft Teams? Bisa! AI Meeting Notes di Notion merekam audio sistem, jadi Anda bisa mencatat rapat di Zoom, Google Meet, dan Teams, tanpa perlu bot atau perangkat lunak tambahan. Apakah AI Meeting Notes bisa membuat daftar tugas secara otomatis? Tentu. AI Notion dapat menganalisis transkripsi rapat untuk membuat ringkasan dan daftar tugas demi menghemat waktu Anda. Seberapa cepat AI Meeting Notes dapat membuat ringkasan rapat? Ringkasan rapat bisa langsung tersedia begitu rapat selesai dan tim Anda bisa langsung menindaklanjutinya. Apakah saya bisa mencari catatan rapat sebelumnya? Bisa! Semua transkripsi, ringkasan, keputusan, dan daftar tugas disimpan di Notion dan bisa dicari dalam ruang kerja Anda menggunakan Notion AI. Apakah data rapat saya aman? Ya. Anda bisa mengatur siapa saja yang dapat melihat catatan dan transkripsi rapat. Notion juga menyediakan pengaturan privasi dan opsi pengumpulan persetujuan praktis sebelum rapat dimulai. Mengapa saya harus menggunakan AI Meeting Notes dari Notion dibanding aplikasi serupa lainnya? Tidak seperti aplikasi lainnya, AI Meeting Notes langsung terintegrasi di dalam ruang kerja Anda. Artinya catatan, tugas, dan proyek Anda saling terhubung. Tanpa hambatan, tanpa perlu ganti alat, tanpa kehilangan konteks. Bahasa apa saja yang didukung AI Meeting Notes? AI Meeting Notes mendukung 16 bahasa, termasuk bahasa Inggris, Prancis, Jepang, dan masih banyak lagi. Apakah AI Meeting Notes bisa digunakan untuk semua jenis rapat? Bisa. AI Meeting Notes bisa digunakan untuk segala jenis rapat, mulai dari rapat empat mata, rapat tim, hingga rapat untuk keperluan penjualan. AI akan membuat ringkasan yang relevan sesuai konteks rapat Anda. Apa saja yang perlu saya perhatikan saat memilih produk catatan rapat? Pasarnya memang agak kompleks–coba lihat panduan pembeli kami untuk penjelasan lengkap tentang apa saja yang perlu diperhatikan. Bahasa Indonesia Pengaturan cookie © 2026 Notion Labs, Inc. Perusahaan Tentang kami Karier Keamanan Status Ketentuan &amp; privasi Hak privasi Anda Unduh iOS &amp; Android Mac &amp; Windows Kalender Web Clipper Sumber Daya Pusat bantuan Harga Blog Komunitas Integrasi Templat Program mitra Notion untuk Perusahaan Usaha kecil Personal Telusuri lebih lanjut →
2026-01-13T09:29:55
https://infisical.com/docs/integrations/platforms/certificate-agent#post-event-hooks
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let&#x27;s Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;./client-id&quot; # Path to file containing client ID client-secret : &quot;./client-secret&quot; # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : &quot;kubernetes-auth&quot; config : identity-id : &quot;your-kubernetes-identity-id&quot; service-account-token-path : &quot;/var/run/secrets/kubernetes.io/serviceaccount/token&quot; Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : &quot;azure-auth&quot; config : identity-id : &quot;your-azure-identity-id&quot; Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;gcp-id-token&quot; config : identity-id : &quot;your-gcp-identity-id&quot; GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : &quot;gcp-iam&quot; config : identity-id : &quot;your-gcp-identity-id&quot; service-account-key : &quot;/path/to/service-account-key.json&quot; Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;aws-iam&quot; config : identity-id : &quot;your-aws-identity-id&quot; ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : [ &quot;api.example.com&quot; , &quot;api-v2.example.com&quot; ] ttl : &quot;90d&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; # Enable automatic certificate renewal lifecycle : renew-before-expiry : &quot;30d&quot; status-check-interval : &quot;6h&quot; # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : &quot;/etc/ssl/private/web.key&quot; permission : &quot;0600&quot; # Read/write for owner only certificate : path : &quot;/etc/ssl/certs/web.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner chain : path : &quot;/etc/ssl/certs/web-chain.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo &quot;Certificate issued for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-failure : command : | echo &quot;Certificate operation failed: ${ERROR_MESSAGE}&quot; mail -s &quot;Certificate Alert&quot; [email&#160;protected] &lt; /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., [&quot;www.example.com&quot;, &quot;api.example.com&quot;] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger &#x27;Certificate renewal failed&#x27; , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo &quot;New certificate issued for ${CERT_COMMON_NAME}&quot; chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d &quot;{&#x27;text&#x27;: &#x27;Certificate for ${CERT_COMMON_NAME} renewed successfully&#x27;}&quot; timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo &quot;Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}&quot; # Send alert mail -s &quot;Certificate Failure Alert&quot; [email&#160;protected] &lt; /dev/null # Log to syslog logger -p daemon.error &quot;Certificate agent failure: ${ERROR_MESSAGE}&quot; timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : &quot;https://app.infisical.com&quot; retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; csr-path : &quot;/etc/ssl/requests/api.csr&quot; file-output : certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; lifecycle : renew-before-expiry : &quot;14d&quot; # Renew 14 days before expiration status-check-interval : &quot;6h&quot; # Check certificate status every 6 hours file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; post-hooks : on-issuance : command : &quot;systemctl reload nginx&quot; timeout : 30 on-renewal : command : &quot;systemctl reload nginx &amp;&amp; logger &#x27;Certificate renewed&#x27;&quot; timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:55
https://infisical.com/docs/integrations/platforms/certificate-agent#one-time-certificate-issuance
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let&#x27;s Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;./client-id&quot; # Path to file containing client ID client-secret : &quot;./client-secret&quot; # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : &quot;kubernetes-auth&quot; config : identity-id : &quot;your-kubernetes-identity-id&quot; service-account-token-path : &quot;/var/run/secrets/kubernetes.io/serviceaccount/token&quot; Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : &quot;azure-auth&quot; config : identity-id : &quot;your-azure-identity-id&quot; Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;gcp-id-token&quot; config : identity-id : &quot;your-gcp-identity-id&quot; GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : &quot;gcp-iam&quot; config : identity-id : &quot;your-gcp-identity-id&quot; service-account-key : &quot;/path/to/service-account-key.json&quot; Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;aws-iam&quot; config : identity-id : &quot;your-aws-identity-id&quot; ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : [ &quot;api.example.com&quot; , &quot;api-v2.example.com&quot; ] ttl : &quot;90d&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; # Enable automatic certificate renewal lifecycle : renew-before-expiry : &quot;30d&quot; status-check-interval : &quot;6h&quot; # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : &quot;/etc/ssl/private/web.key&quot; permission : &quot;0600&quot; # Read/write for owner only certificate : path : &quot;/etc/ssl/certs/web.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner chain : path : &quot;/etc/ssl/certs/web-chain.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo &quot;Certificate issued for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-failure : command : | echo &quot;Certificate operation failed: ${ERROR_MESSAGE}&quot; mail -s &quot;Certificate Alert&quot; [email&#160;protected] &lt; /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., [&quot;www.example.com&quot;, &quot;api.example.com&quot;] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger &#x27;Certificate renewal failed&#x27; , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo &quot;New certificate issued for ${CERT_COMMON_NAME}&quot; chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d &quot;{&#x27;text&#x27;: &#x27;Certificate for ${CERT_COMMON_NAME} renewed successfully&#x27;}&quot; timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo &quot;Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}&quot; # Send alert mail -s &quot;Certificate Failure Alert&quot; [email&#160;protected] &lt; /dev/null # Log to syslog logger -p daemon.error &quot;Certificate agent failure: ${ERROR_MESSAGE}&quot; timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : &quot;https://app.infisical.com&quot; retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; csr-path : &quot;/etc/ssl/requests/api.csr&quot; file-output : certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; lifecycle : renew-before-expiry : &quot;14d&quot; # Renew 14 days before expiration status-check-interval : &quot;6h&quot; # Check certificate status every 6 hours file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; post-hooks : on-issuance : command : &quot;systemctl reload nginx&quot; timeout : 30 on-renewal : command : &quot;systemctl reload nginx &amp;&amp; logger &#x27;Certificate renewed&#x27;&quot; timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:55
https://www.notion.com/id/web-clipper
Notion Web Clipper untuk Chrome, Safari, Firefox, dan seluler Notion Fitur Notion AI Buat, tulis, otomatiskan Agent Menangani tugas manual Enterprise Search Temukan jawaban secara cepat AI Meeting Notes Ditulis dengan sempurna oleh AI Docs Sederhana &amp; berdaya guna Basis Pengetahuan Pusatkan pengetahuan Anda Projects Kelola proyek Sites Publikasikan apa saja, dengan cepat Memulai Jelajahi kasus penggunaan AI Lihat apa saja yang bisa dilakukan Notion AI Telusuri marketplace Templat untuk semua hal Lihat integrasi Hubungkan aplikasi Anda dengan Notion Unduh web clipper Simpan dari web ke Notion Coba aplikasi desktop Notion untuk pengalaman yang lebih cepat Unduh aplikasi Mail Kalender AI Perusahaan Harga Jelajahi Tim Teknik &amp; Produk Desain Pemasaran TI Ukuran tim Startup UKM Perusahaan Pendidikan Pelajari Pusat bantuan Notion Academy Cerita pelanggan Blog Komunitas Program mitra Buat API Templat Keamanan Konsultan Minta demo Masuk Dapatkan Notion gratis Web Clipper Notion Simpan halaman apa pun di web ke Notion. Kami akan membantu Anda mengubahnya menjadi tindakan. Apple App Store Instal untuk Chrome Instal untuk Safari Instal untuk Firefox Di desktop Satu klik untuk menyematkan apa pun dan melihatnya di Notion, baik online maupun offline. Simpan dengan satu klik Cukup tekan logo Notion untuk menyimpan halaman apa pun yang sedang terbuka. Pilih tujuannya Tempatkan di Notion menggunakan menu dropdown. Ubah menjadi tugas Tambahkan catatan, bagikan, ubah menjadi tugas. Setiap item bisa diberi tag, ditugaskan, dan lainnya. Jadikan semuanya tertata Simpan database klip Anda untuk referensi dan proyek di masa mendatang. Di iOS &amp; Android Aplikasi seluler dilengkapi dengan web clipper bawaan. Simpan apa saja hanya dengan dua ketukan. Sekarang opsi berbagi di browser seluler mencakup penyimpanan ke Notion. Jadikan ini bagian dari rutinitas Anda. Beri tag pada apa pun yang Anda simpan, agar mudah ditemukan dan digunakan nanti. Masukkan seluruh halaman web ke Notion Web Clipper di Notion mendukung situs terpopuler di internet. Wikipedia NYT Twitter Instagram Pinterest Dan banyak lagi... Pengguna baru di Notion? Memulai itu mudah. Apple App Store Daftar Instal untuk Chrome Instal untuk Safari Instal untuk Firefox Bahasa Indonesia Pengaturan cookie © 2026 Notion Labs, Inc. Perusahaan Tentang kami Karier Keamanan Status Ketentuan &amp; privasi Hak privasi Anda Unduh iOS &amp; Android Mac &amp; Windows Kalender Web Clipper Sumber Daya Pusat bantuan Harga Blog Komunitas Integrasi Templat Program mitra Notion untuk Perusahaan Usaha kecil Personal Telusuri lebih lanjut →
2026-01-13T09:29:55
https://play.google.com/store/apps/details?id=notion.id&amp;hl=es_PA
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d=
2026-01-13T09:29:55
https://www.notion.com/id/security
Notion Security &amp; Compliance | SOC 2 Certified, trusted by Enterprises Notion Fitur Notion AI Buat, tulis, otomatiskan Agent Menangani tugas manual Enterprise Search Temukan jawaban secara cepat AI Meeting Notes Ditulis dengan sempurna oleh AI Docs Sederhana &amp; berdaya guna Basis Pengetahuan Pusatkan pengetahuan Anda Projects Kelola proyek Sites Publikasikan apa saja, dengan cepat Memulai Jelajahi kasus penggunaan AI Lihat apa saja yang bisa dilakukan Notion AI Telusuri marketplace Templat untuk semua hal Lihat integrasi Hubungkan aplikasi Anda dengan Notion Unduh web clipper Simpan dari web ke Notion Coba aplikasi desktop Notion untuk pengalaman yang lebih cepat Unduh aplikasi Mail Kalender AI Perusahaan Harga Jelajahi Tim Teknik &amp; Produk Desain Pemasaran TI Ukuran tim Startup UKM Perusahaan Pendidikan Pelajari Pusat bantuan Notion Academy Cerita pelanggan Blog Komunitas Program mitra Buat API Templat Keamanan Konsultan Minta demo Masuk Security &amp; privacy Your security, safety, and privacy is our top priority — and we build Notion accordingly. Security Notion takes a security-by-design approach to protecting your data. Our team continues to make investments so you can use Notion with confidence. Our security practices → Security infrastructure Notion’s infrastructure is designed with layers of protection to help ensure your data is secure while transmitted, stored, or processed. Protections include but are not limited to encryption, least privilege access, secure software development, and a public bug bounty program . Operational security Our information security team continuously implements new security controls and monitors Notion for malicious activity across our infrastructure, networks, and assets. Product security Notion provides a robust set of in product data protection and admin controls for greater visibility and control over our data. Enterprise admins can deploy Notion to their organizations with SSO via SAML 2.0, provision users through SCIM, and track activity with the audit log features. Enterprise admins can also fine tune permission controls and guests, and manage team organizations. Privacy Notion maintains a comprehensive privacy compliance program and is committed to partnering with its customers and vendors on privacy compliance efforts. This page highlights some of the key aspects of our program. How we handle your data At Notion our team is dedicated to developing and implementing data privacy processes and safeguards that meet industry standards and best practices. We conduct ongoing training for our teams to ensure that they are up to speed with developments in legislation and essential privacy and security practices. Every Notion employee and contractor signs up to non-disclosure terms to maintain the confidentiality and security of your data. Notion also holds any vendors that handle personal data to the same data management, security, and privacy practices and standards to which we hold ourselves. Agreements At Notion we strive to keep all of our agreements up to date with the latest regulations and industry standards. Our Master Subscription Agreement and Data Processing Addendum describe in detail Notion’s data privacy processes, standards, safeguards and our compliance with data protection legislation. To ensure that our terms track with the GDPR, CCPA and other global privacy standards we continually have our terms assessed by leading privacy experts in multiple jurisdictions. Data governance Data governance relates to the policies and procedures that dictate how data is procured and used throughout its life cycle. From creation and collection to processing, distribution, storage and deletion. Notion’s commitment to data governance is key to keeping our users data secure, private, accurate, and accessible. Policies At Notion we want to be as transparent as possible with our customers about how we collect, process, store, and use their personal data. In order to achieve this Notion maintains comprehensive and detailed policies regarding how we handle your personal information. These policies describe in detail how our users can exercise their rights with regard to their data. GDPR The General Data Protection Regulation (GDPR) is a comprehensive data protection law that governs the collection of and use of personal data of EU residents, and that allows data subjects to exercise control over their data. As the GDPR is widely considered to be the most stringent global privacy standard, we have mapped our privacy program to the GDPR and other global privacy regulations. Compliance Notion maintains a comprehensive security and privacy program to provide advanced security features in our Enterprise plan that are designed to protect your data in accordance with various regulatory and industry standards. Notion has been attested by independent third-party auditors. If you’d like a copy of the compliance reports, please reach out to  [email&#160;protected]  for our Trust portal. SOC 2 Type 2 The SOC 2 Type 2 is an audit report performed by an independent third-party certified by the American Institute of Certified Public Accountants (AICPA) to evaluate a service organization&#x27;s controls related to the Trust Services Criteria (TSC). The SOC 2 Type 2 report assesses the effectiveness of these controls over a period of time and is intended to provide assurance to customers and stakeholders that the organization has implemented adequate controls to protect their data. ISO 27001, ISO 27701, ISO 27017, ISO 27018 ISO is an international standard development organization, and Notion has achieved certifications for four ISO standards: ISO 27001, ISO 27701, ISO 27017, and ISO 27018. The standards outline requirements for establishing, implementing, and continuously improving Notion’s Information Security Management System (ISMS) and Privacy Information Management System (PIMS). HIPAA The Health Insurance Portability and Accountability Act (HIPAA) is a US federal law that was enacted in 1996 that requires the protection and confidential handling of protected health information (PHI) by covered entities such as healthcare providers, health plans, and healthcare clearinghouses, as well as their business associates. Provided businesses subject to HIPAA leverage the Notion Enterprise-grade security features described in our Help Center article here and sign Notion’s Business Associate Agreement they may process PHI within their Notion workspace. BSI C5 (Cloud Computing Compliance Controls Catalogue)  BSI C5 is a security standard developed by the German Federal Office for Information Security. It outlines baseline security controls for cloud service providers. C5 includes additional control requirements relating to data location, service provisioning, place of jurisdiction, existing certifications, information disclosure obligations, and a full-service description. Artificial intelligence (AI) governance Notion leverages AI to improve the core product experience and provide real value to our users in their day-to-day work. We strive to do this in a way that’s trustworthy, reliable, and user-centric. Safe &amp; secure: Notion takes a safety-first approach to artificial intelligence. Our AI features and partners undergo security and legal reviews prior to Notion utilizing their services. These security practices apply to our AI features and AI development process. Our security practices → Transparency: At Notion, we want to be transparent with our customers about our AI products. In order to achieve this Notion maintains a Help Center and Terms and Privacy page to outline how our AI products’ functionality and privacy practices. Our terms &amp; privacy policy → Empowering: We aim to create AI-enhanced experiences that aren’t just interesting — but rather, genuinely useful in your day-to-day work. To achieve this, the development of our AI-powered features is grounded in extensive research to understand the needs of our users. Data governance: Your data is yours. Our AI Subprocessors are prohibited from using Customer Data to train models.  The controls and permissions with respect to access and use of customer data will be respected. Reliability Notion is relied on from creatives to cooperations - as such, everyone deserves a platform they can count on. With robust uptime guarantees and multi-level redundancy, you can trust Notion will be there when you need it. Enterprise-grade Infrastructure We partner with AWS and Cloudflare to build a world-class architecture and to ensure users that Notion is built for maximum business resilience. High availability &amp; Failover Notion keeps your data safe by having multiple zones for redundancy, have a comprehensive backup program, and regularly testing our disaster recovery and business continuity program. Notion offers a guaranteed uptime of 99.9%, so users can trust that we’ll be there when you need us. For Notion’s service level terms, please refer here . Service Status Notion makes it transparent and easy with a real-time view of Notion’s availability through the status page . Learn about our enterprise plan Interested in advanced security and control? Let us know your needs and we can help! Tutup dialog Berhasil dikirim Nama depan * Nama belakang * Alamat email kantor * Jabatan * Nama perusahaan * Ukuran perusahaan * Pilih... 1–99 karyawan 100–299 karyawan 300–1999 karyawan 2000+ karyawan Negara atau wilayah * Pilih... Nomor telepon (opsional) Alasan kontak * Pilih... Saya ingin mendiskusikan kasus penggunaan perusahaan Saya ingin melihat opsi harga Saya ingin melihat demo produk Saya mencari harga untuk pelajar/organisasi nirlaba Saya mencari dukungan produk atau penagihan Lainnya (mohon berikan detail lebih lanjut di bawah ini) Berikan detail lebih lanjut (opsional) Hubungi tim penjualan Kata sandi Bahasa Indonesia Pengaturan cookie © 2026 Notion Labs, Inc. Perusahaan Tentang kami Karier Keamanan Status Ketentuan &amp; privasi Hak privasi Anda Unduh iOS &amp; Android Mac &amp; Windows Kalender Web Clipper Sumber Daya Pusat bantuan Harga Blog Komunitas Integrasi Templat Program mitra Notion untuk Perusahaan Usaha kecil Personal Telusuri lebih lanjut →
2026-01-13T09:29:55
https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.instagram.com%2Faccounts%2Fprivacy_and_security%2F&amp;h=AT2O1TfLjAV7T1ZHwX3rkUUf_4QsSLbor8KeAPNbHzcYd-UY2iE99fspPYMF59-plaiDuRiltHfQc-oTYriRK7FQxPfPfs-lUs8XODztayLG6WKAwxmSpZveakKR71gI8pYngKoOXxUJkwv1
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:55
https://www.cisco.com/c/pl_pl/support/index.html
Pomoc techniczna - Wsparcie Cisco i pliki do pobrania — dokumentacja, narzędzia, zgłoszenia - Cisco Skip to Main content Przejdź do szukania Skip to footer Cisco.com Polska Produkty i usługi Rozwiązania Pomoc techniczna Kształć się Poznaj rozwiązania Cisco Jak kupić Strona główna Partnerów Nowa program dla Partnerów Pomoc techniczna Narzędzia Znajdź Partnera Cisco Poznaj naszych Partnerów Zostań Partnerem Cisco Wsparcie i pliki do pobrania Znajdź produkty i pliki do pobrania Helpful Links Licensing Support Technology Support Support for Cisco Acquisitions Support Tools Cisco Community When autocomplete results are available use up and down arrows to review and enter to select Moje wsparcie Open/View Cases Do otwarcia lub wyświetlenia zgłoszenia jest potrzebna umowa o świadczenie usług TAC Connect Bot Otrzymuj natychmiastowe aktualizacje na temat zgłoszenia do asystenta TAC i nie tylko Zobacz otwarte zgłoszenia Zaloguj się Utwórz konto w firmie Cisco Zalety konta w firmie Cisco Oprogramowanie do pobrania Zaloguj się Utwórz konto w firmie Cisco Zalety konta w firmie Cisco Wszystkie pobrane programy Ostatnio wyświetlane produkty Moje zapisane treści Zaloguj się Możesz teraz zapisywać dokumenty i inne treści do wykorzystania w przyszłości. Zaloguj się , aby zobaczyć swoje zapisane treści. Opinie Moje urządzenia Log in to view or manage your My Devices inventory Skontaktuj się z TAC telefonicznie Produkty dla korporacji i dostawców usług Polska 00800 4411 932 Globalne numery telefonów Produkty dla małych firm Polska 00800 7020 43 Globalne numery telefonów Zwroty Portal zwrotów Produkty według kategorii Przełączniki Bezpieczeństwo Routery Łączność bezprzewodowa Ujednolicona komunikacja Oprogramowanie sieciowe (IOS i NX-OS) Terminale i telefony do współpracy Wszystkie wspierane produkty Narzędzia do sprawdzania statusu Porady dotyczące bezpieczeństwa W portalu Cisco Security znajdziesz informacje, które przekładają się na praktyczne działania w zakresie eliminacji luk i zagrożeń bezpieczeństwa w produktach i usługach Cisco oraz produktach firm trzecich. Powiadomienia o problemach Dowiedz się więcej o poważniejszych problemach niekoniecznie dotyczących luk w zabezpieczeniach, które jednak bezpośrednio dotyczą produktów Cisco i najczęściej wymagają uaktualnienia, znalezienia alternatywnego rozwiązania albo innego działania ze strony klienta. Status chmury Cisco Sprawdź bieżący status usług i składników w ramach ofert chmurowych firmy Cisco dla Webex, zabezpieczeń i Internetu rzeczy. TAC Connect Bot W przypadku istniejących zastosowań asystent TAC Connect Bot oferuje klientom i partnerom doświadczenie samoobsługowe w zakresie zapytań dotyczących typowych spraw i podstawowych transakcji, bez konieczności oczekiwania w kolejce. Więcej narzędzi Analizator rozwiązań z zakresu współpracy Zestaw narzędzi wspomagający Cię w codziennej obsłudze infrastruktury do współpracy. Cisco CLI Analyzer Cisco CLI Analyzer (poprzednio ASA CLI Analyzer) to inteligentny klient SSH ze zintegrowanymi narzędziami TAC i know-how. Służy do pomocy w rozwiązywaniu problemów ze wspieranym oprogramowaniem Cisco i sprawdzania jego ogólnej kondycji. Moje powiadomienia Usługa Moje powiadomienia pozwala użytkownikowi zapisać się do systemu powiadomień i odbierać powiadomienia dotyczące bezpieczeństwa, zakończenia wsparcia, problemów oraz aktualizacji oprogramowania i poprawek błędów określonych produktów i technologii Cisco. Wyświetl wszystkie narzędzia Więcej opcji pomocy technicznej Pomoc techniczna dla Partnerów Pomoc techniczna dotycząca produktów dla małych firm Usługi o krytycznym znaczeniu biznesowym Jakość obsługi klienta Pomoc techniczna DevNet Cisco Trust Portal Społeczności Cisco Społeczności Cisco — strona główna Społeczność Partnerów Społeczność wspierająca dla małych firm Społeczność Webex Grupa użytkowników Cisco Insider Licencje Tradycyjne licencjonowanie Generuj licencje PAK oraz licencje na inne urządzenia, w tym licencje demo, i zarządzaj nimi. Licencje Smart Software Licensing Śledź licencje Smart Software License i zarządzaj nimi. Umowy dla przedsiębiorstw Generuj licencje i zarządzaj nimi na podstawie umów Enterprise Agreement. Wsparcie licencjonowania Samodzielne rozwiązuj typowe problemy licencyjne. Oprogramowanie i pliki do pobrania Narzędzie do wyszukiwania błędów Znajdź błędy oprogramowania na podstawie wersji produktu i słowa kluczowego. Badania dotyczące oprogramowania Poznaj propozycje Cisco dotyczące obsługiwanych produktów. Cisco Software Checker Użyj narzędzia Cisco Software Checker, aby wyszukać porady dotyczące bezpieczeństwa, które odnoszą się do określonych wydań oprogramowania Cisco IOS, IOS XE, NX-OS oraz NX-OS w trybie ACI. Pobierz oprogramowanie Cisco Uzyskaj najnowsze aktualizacje, poprawki i wydania oprogramowania Cisco.
2026-01-13T09:29:55
https://wp.me/PaffGk-HH
اتفاقيات معالجة البيانات &#8211; الدعم المنتجات الميزات الموارد الباقات والأسعار تسجيل الدخول ابدأ القائمة استضافة ووردبريس ووردبريس للوكالات كن جهة تابعة اسم النطاق منشئ مواقع الذكاء الاصطناعي منشئ المواقع الإلكترونية إنشاء مدونة رسائل إخبارية بريد إلكتروني احترافي خدمات تصميم موقع الويب التجارة WordPress Studio ووردبريس للمؤسسات &nbsp; نظرة عامة قوالب ووردبريس.كوم المكوِّنات الإضافية في ووردبريس أنماط ووردبريس Google Apps مركز الدعم أخبار ووردبريس منشئ أسماء الشركات صانع الشعارات اكتشف تدوينات جديدة الوسوم الشائعة بحث عن المدوّنات إغلاق قائمة التنقل ابدأ تسجيل تسجيل الدخول معلومات عنّا الباقات والأسعار المنتجات استضافة ووردبريس ووردبريس للوكالات كن جهة تابعة اسم النطاق منشئ مواقع الذكاء الاصطناعي منشئ المواقع الإلكترونية إنشاء مدونة رسائل إخبارية بريد إلكتروني احترافي خدمات تصميم موقع الويب التجارة WordPress Studio ووردبريس للمؤسسات &nbsp; الميزات نظرة عامة قوالب ووردبريس.كوم المكوِّنات الإضافية في ووردبريس أنماط ووردبريس Google Apps الموارد مركز الدعم أخبار ووردبريس منشئ أسماء الشركات صانع الشعارات اكتشف تدوينات جديدة الوسوم الشائعة بحث عن المدوّنات تطبيق Jetpack تعرف على المزيد مركز الدعم الأدلة الدورات التدريبية منتديات اتصل بنا بحث مركز الدعم / الأدلة مركز الدعم الأدلة الدورات التدريبية منتديات اتصل بنا الأدلة / السياسات والسلامة / اتفاقيات معالجة البيانات اتفاقيات معالجة البيانات تلتزم Automattic بمساعدة عملائنا على تشغيل مواقعهم وأعمالهم عبر الإنترنت بطريقة تتوافق مع قوانين حماية البيانات ونقلها في&nbsp; اللائحة العامة لحماية البيانات . تتمثل إحدى الطرق التي نفي بها بالتزامنا في توفير اتفاقية معالجة البيانات، التي تمثّل عقدًا يوثِّق امتثال Automattic بمتطلبات&nbsp; اللائحة العامة لحماية البيانات &nbsp;التي تنطبق علينا بوصفنا جهة معالجة البيانات في موقعك. تستوفي الاتفاقية أيضًا متطلبات بنود النموذج القياسية التي تحكم نقل بياناتك إلى Automattic والشركات التابعة لها. اتفاقية معالجة البيانات هي تعديل لشروط الخدمة وتتوافر لكل مالكي المواقع على ووردبريس.كوم. إنَّ وجود ملحق لمعالجة البيانات لا يُغيِّر أيًّا من ممارسات الخصوصية والأمان الخاصة بزائري الموقع. يحصل الأشخاص الذين يستخدمون خدمتنا على معايير الخصوصية والأمان العالية نفسها. كيف أحصل على اتفاقية معالجة البيانات؟ إذا كنت ترغب في توقيع اتفاقية معالجة البيانات معنا، فيمكنك النقر على زر&nbsp; &#8220;طلب اتفاقية معالجة البيانات &nbsp;في لوحة التحكم لديك بينما يتم تسجيل الدخول إلى حسابك على ووردبريس.كوم. سيُرسل ذلك تلقائيًا اتفاقية معالجة البيانات إلى عنوان البريد الإلكتروني لحسابك، والتي يمكنك توقيعها وإرجاعها إلى&nbsp; privacypolicyupdates@automattic.com &nbsp;للمعالجة. ما نوع الموقع الأكثر فائدة لاتفاقية معالجة البيانات؟ تُعد البيانات التي تشاركها مع Automattic، حول نفسك، مشمولة&nbsp; بسياسة الخصوصية التي نقرها، والتي توضّح التزامات Automattic بشأن معالجة بياناتك ، تماشيًا مع اللائحة العامة لحماية البيانات. يستخدم بعض المستخدمين &#8211; الشركات في الغالب &#8211; مواقعهم بطريقة تنطوي على مشاركة البيانات حول أشخاص آخرين مع Automattic. على سبيل المثال، قد يمتلك مالك الموقع متجرًا على ووردبريس.كوم، يجمع أسماء الأشخاص الآخرين وعناوينهم ويُخزّنها، إلى جانب أنه يستخدم تلك المعلومات لشحن الطرود إليهم. بالنسبة إلى هذا النوع من المعلومات، يتصرف مالك الموقع (شركة عادةً) بوصفه &#8220;مراقب البيانات&#8221; &#8211; وذلك بموجب اللائحة العامة لحماية البيانات، إذا كان المراقب يعالج البيانات ذات الصلة بالمقيمين داخل الاتحاد الأوروبي، فينبغي أن يكون لديه عقد ساري المفعول يسري على هذه البيانات الخاضعة للرقابة ويشتمل على بعض الالتزامات الإضافية، بما يتجاوز سياساتنا العادية. &#8220;اتفاقية معالجة البيانات&#8221; هذه هي اتفاقية بين شركتين تجاريتين ولا تمت بصلة أو تُعد لازمة لمالك الموقع المجاني النموذجي أو الهواة. إذا كنت تتصرف كمراقب بيانات بهذه الطريقة أو لديك بعض المخاوف بخصوص إبرام اتفاقية لتشمل استخدامك ووردبريس.كوم، فيرجى التواصل معنا وسنتعاون معك لمساعدتك. الأدلة ذات الصلة حقوق الطبع والنشر وقانون الألفية للملكية الرقمية حقوق النشر والاستخدام العادل توجيهات المتجر استعادة حسابي لم تتمكن من إيجاد ما تحتاجه؟ اتصل بنا احصل على إجابات من AI assistant الخاص بنا، مع إمكانية الوصول إلى دعم الخبراء البشري على مدار الساعة طوال أيام الأسبوع بخصوص الخطط المدفوعة. اطرح سؤالًا في منتدانا تصفح الأسئلة واحصل على إجابات من مستخدمين آخرين من ذوي الخبرة. Copied to clipboard! WordPress.com المنتجات استضافة&nbsp;ووردبريس ووردبريس&nbsp;للوكالات كن جهة&nbsp;تابعة اسم&nbsp;النطاق منشئ مواقع الذكاء&nbsp;الاصطناعي منشئ المواقع&nbsp;الإلكترونية إنشاء&nbsp;مدونة بريد إلكتروني&nbsp;احترافي خدمات تصميم موقع&nbsp;الويب WordPress&nbsp;Studio ووردبريس للمؤسسات الميزات نظرة&nbsp;عامة قوالب&nbsp;ووردبريس.كوم المكوِّنات الإضافية في&nbsp;ووردبريس أنماط&nbsp;ووردبريس Google&nbsp;Apps الموارد مدونة&nbsp;ووردبريس.كوم منشئ أسماء&nbsp;الشركات صانع&nbsp;الشعارات قارئ&nbsp;ووردبريس.كوم إمكانية&nbsp;الوصول إزالة&nbsp;الاشتراكات مساعدة مركز&nbsp;الدعم الأدلة الدورات&nbsp;التدريبية منتديات اتصل&nbsp;بنا مصادر للمطور الشركة معلومات&nbsp;عنّا صحافة شروط&nbsp;الخدمة سياسة الخصوصية عدم بيع معلوماتي الشخصية أو&nbsp;مشاركتها إشعار الخصوصية الخاص بالمستخدمين في&nbsp;كاليفورنيا Deutsch Español Français Bahasa Indonesia Italiano Nederlands Português do Brasil Svenska Türkçe Русский العربية עִבְרִית 日本語 한국어 简体中文 繁體中文 English Deutsch Español Français Bahasa Indonesia Italiano Nederlands Português do Brasil Svenska Türkçe Русский العربية עִבְרִית 日本語 한국어 简体中文 繁體中文 English تطبيقات الهاتف المحمول تنزيل من على متجر التطبيقات الحصول عليه على Google Play وسائل التواصل الاجتماعي ووردبريس.كوم على فيسبوك ووردبريس.كوم على X (تويتر) ووردبريس.كوم على إنستغرام ووردبريس.كوم على يوتيوب Automattic Automattic اعمل معنا الدعم تسجيل تسجيل الدخول نسخ الرابط القصير إبلاغ عن هذا المحتوى إدارة الاشتراكات
2026-01-13T09:29:55
https://shows.acast.com/frontier/episodes/ep-45-brian-pontarelli-ceo-and-founder-of-fusionauth
Ep. 45: Brian Pontarelli, CEO and Founder of FusionAuth - Frontier Podcast by Gun.io | Acast Follow Share Play Frontier Podcast by Gun.io Ep. 45: Brian Pontarelli, CEO and Founder of FusionAuth Season 4 , Ep. 45 • Thursday, March 28, 2024 On this week's episode, Teja sits down with Brian Pontarelli, Founder and CEO of both FusionAuth and Cleanspeak. They discuss the complexities of growing two businesses at the same time, making progress without using AI, and the subtle clues in an interview process that let you know someone's a great culture fit. https://fusionauth.io/ https://cleanspeak.com/ Show more RSS More episodes View all episodes 46. Ep. 46: Matt Genovese, CEO and Founder of Planorama 54:36 | Thursday, April 11, 2024 | Season 4 , Ep. 46 This week, Teja sits down with Matt Genovese, CEO and Founder of Planorama, a company that designs UX/UI flows for products with complete enablement for software teams. They discuss the intricacies of living abroad, the importance of incorporating design, and how de-risking early on in the life of a new product can make it more successful in the long run.https://planorama.design/matthttps://aiproducthive.com Play 44. Ep. 44: Sabber Ahamed, Founder of xoolooloo 28:31 | Thursday, February 29, 2024 | Season 4 , Ep. 44 This week, Teja talks with Sabber Ahamed, Founder of Xoolooloo and Data Scientist at Bridgestone. They discuss the proliferation of data science, the joys of working on your own projects outside of the 9-5, and the different things career goals of a computational geophysicist can really shake up. Play 43. Ep. 43: Harpreet Singh, CEO and Co-Founder at Launchable 39:22 | Thursday, February 15, 2024 | Season 4 , Ep. 43 This week, Teja talks with Harpreet Singh, Co-CEO and Co-Founder of Launchable, a company that's on a mission to make software testing faster and smarter. They discuss the DACI framework and the importance of intentionality in decision-making, what it's like to bring a behemoth like Jenkins to life, and the power of slowing down to meditate.https://www.launchableinc.com/ Play 42. Ep. 42: Brian Douglas, CEO and Founder at OpenSauced 36:55 | Thursday, February 1, 2024 | Season 4 , Ep. 42 In this week's episode, Teja talks with Brian Douglas, CEO and Founder at OpeSauced. They talk about how a good open source portfolio is more than just getting your name on big projects, the natural progression from developer advocacy to building an open source marketplace, and the trials and tribulations of learning to lead as you grow.opensauced.pizza Play 41. Ep. 41: Ian Villa, COO and Co-founder at Whisper Aero 37:33 | Thursday, January 18, 2024 | Season 4 , Ep. 41 Joining Teja on this week's episode is Ian Villa, COO and Co-founder of Whisper Aero, a company that is developing cleaner, quieter, and more efficient propulsion solutions. They discuss the pros and cons of a campus with on-site housing, the burgeoning Nashville tech scene, and how a 5 am trip to Kinko's can, in hindsight, be a lesson in entrepreneurship.whisper.aero Play 40. Ep. 40: Kate O&#x27;Neil, CEO and Co-founder at Teaming 58:40 | Thursday, January 11, 2024 | Season 4 , Ep. 40 This week, Teja sits down for round two with Kate O'Neil, who has moved into the CEO position at Teaming since the last time they talked. They discuss the differences that come with the transition to becoming a CEO, the importance of incorporating movement into your life, and why getting the best sleep comes down to the perfect sheets.teaming.com Play 39. Ep. 39: Jeremy Snyder, CEO and Founder at FireTail 50:32 | Thursday, January 4, 2024 | Season 4 , Ep. 39 After a brief holiday hiatus, Teja is back this week with Jeremy Snyder, the Founder and CEO of FireTail, an API security platform that provides application layer visibility, real-time, inline inspection, and blocking of malicious API calls. They talk about being a less technical founder, how being a polyglot helps you understand more than language, and the importance of taking the time to find your own adventure.https://www.firetail.io/ Play 38. Ep. 38: Stefan Avram, Head of Growth and Co-Founder at WunderGraph 34:16 | Thursday, December 21, 2023 | Season 4 , Ep. 38 Teja sits down with Stefan Avram, Head of Growth and Co-founder at WunderGraph, an open-source GraphQL federation. They discuss how injuries can change your life trajectory, the complexities of working with distributed teams, and how sometimes getting fired can be the best thing that's ever happened to you. www.wundergraph.com Play Instagram X.com TikTok Copyright Gun.io Hosted with ❤️ by Acast
2026-01-13T09:29:55
https://shows.acast.com/frontier/episodes/ep-40-kate-oneil-ceo-and-co-founder-at-teaming
Ep. 40: Kate O&#x27;Neil, CEO and Co-founder at Teaming - Frontier Podcast by Gun.io | Acast Follow Share Play Frontier Podcast by Gun.io Ep. 40: Kate O&#x27;Neil, CEO and Co-founder at Teaming Season 4 , Ep. 40 • Thursday, January 11, 2024 This week, Teja sits down for round two with Kate O'Neil, who has moved into the CEO position at Teaming since the last time they talked. They discuss the differences that come with the transition to becoming a CEO, the importance of incorporating movement into your life, and why getting the best sleep comes down to the perfect sheets. teaming.com Show more RSS More episodes View all episodes 46. Ep. 46: Matt Genovese, CEO and Founder of Planorama 54:36 | Thursday, April 11, 2024 | Season 4 , Ep. 46 This week, Teja sits down with Matt Genovese, CEO and Founder of Planorama, a company that designs UX/UI flows for products with complete enablement for software teams. They discuss the intricacies of living abroad, the importance of incorporating design, and how de-risking early on in the life of a new product can make it more successful in the long run.https://planorama.design/matthttps://aiproducthive.com Play 45. Ep. 45: Brian Pontarelli, CEO and Founder of FusionAuth 44:05 | Thursday, March 28, 2024 | Season 4 , Ep. 45 On this week's episode, Teja sits down with Brian Pontarelli, Founder and CEO of both FusionAuth and Cleanspeak. They discuss the complexities of growing two businesses at the same time, making progress without using AI, and the subtle clues in an interview process that let you know someone's a great culture fit.https://fusionauth.io/https://cleanspeak.com/ Play 44. Ep. 44: Sabber Ahamed, Founder of xoolooloo 28:31 | Thursday, February 29, 2024 | Season 4 , Ep. 44 This week, Teja talks with Sabber Ahamed, Founder of Xoolooloo and Data Scientist at Bridgestone. They discuss the proliferation of data science, the joys of working on your own projects outside of the 9-5, and the different things career goals of a computational geophysicist can really shake up. Play 43. Ep. 43: Harpreet Singh, CEO and Co-Founder at Launchable 39:22 | Thursday, February 15, 2024 | Season 4 , Ep. 43 This week, Teja talks with Harpreet Singh, Co-CEO and Co-Founder of Launchable, a company that's on a mission to make software testing faster and smarter. They discuss the DACI framework and the importance of intentionality in decision-making, what it's like to bring a behemoth like Jenkins to life, and the power of slowing down to meditate.https://www.launchableinc.com/ Play 42. Ep. 42: Brian Douglas, CEO and Founder at OpenSauced 36:55 | Thursday, February 1, 2024 | Season 4 , Ep. 42 In this week's episode, Teja talks with Brian Douglas, CEO and Founder at OpeSauced. They talk about how a good open source portfolio is more than just getting your name on big projects, the natural progression from developer advocacy to building an open source marketplace, and the trials and tribulations of learning to lead as you grow.opensauced.pizza Play 41. Ep. 41: Ian Villa, COO and Co-founder at Whisper Aero 37:33 | Thursday, January 18, 2024 | Season 4 , Ep. 41 Joining Teja on this week's episode is Ian Villa, COO and Co-founder of Whisper Aero, a company that is developing cleaner, quieter, and more efficient propulsion solutions. They discuss the pros and cons of a campus with on-site housing, the burgeoning Nashville tech scene, and how a 5 am trip to Kinko's can, in hindsight, be a lesson in entrepreneurship.whisper.aero Play 39. Ep. 39: Jeremy Snyder, CEO and Founder at FireTail 50:32 | Thursday, January 4, 2024 | Season 4 , Ep. 39 After a brief holiday hiatus, Teja is back this week with Jeremy Snyder, the Founder and CEO of FireTail, an API security platform that provides application layer visibility, real-time, inline inspection, and blocking of malicious API calls. They talk about being a less technical founder, how being a polyglot helps you understand more than language, and the importance of taking the time to find your own adventure.https://www.firetail.io/ Play 38. Ep. 38: Stefan Avram, Head of Growth and Co-Founder at WunderGraph 34:16 | Thursday, December 21, 2023 | Season 4 , Ep. 38 Teja sits down with Stefan Avram, Head of Growth and Co-founder at WunderGraph, an open-source GraphQL federation. They discuss how injuries can change your life trajectory, the complexities of working with distributed teams, and how sometimes getting fired can be the best thing that's ever happened to you. www.wundergraph.com Play Instagram X.com TikTok Copyright Gun.io Hosted with ❤️ by Acast
2026-01-13T09:29:55
https://www.cisco.com/site/au/en/products/index.html
Cisco Products: Networking, Security, Data Center - Cisco Skip to main content Skip to search Skip to footer Cisco.com Australia / New Zealand Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Close Explore Cisco How to buy Partners EN AU Log in Explore Cisco Search MENU CLOSE How to buy Partners Log in EN AU Close Close Close Close Close Hello, how can I help? Cisco products Find the Cisco products that fit your needs. Browse by featured products Networking Networking Build a future-ready network with an industry leader in networking, whether you&#39;re with a Global 2000 or a local school district. Explore all networking Access networking Simplify, automate, and secure your network experience with software-enabled switching and wireless solutions. Explore access networking Data center and cloud networking Stay in control with industry-leading network management, automation, real-time visibility, and simplified operations. Explore data center and cloud networking Silicon Deploy a unifying silicon architecture that delivers breakthrough innovation in performance, flexibility, and sustainability. Explore Cisco Silicon One technology Industrial IoT Use automated, intelligent, and secure industrial switching, routing, and wireless solutions to do, know, and protect more. Explore Industrial IoT networking Network security Integrate security solutions through your network management dashboard to drive always-on, zero-trust security. Explore network security Networking software Keep your data, workloads, and apps connected, secure, and efficient across your global data center networks. Explore data center and cloud networking Optics and transceivers Get high-quality, performance-leading optical transceivers for any network architecture. Browse optics and transceivers Wide-area network (WAN) Connect, secure, and automate with WAN architecture optimized for SD-WAN, SD-Branch, and multicloud connectivity. Explore wide-area networking View all Cisco products Security Security Get powerful security across all your networks, cloud, endpoints, and email to protect everything that matters, from anywhere. Explore all security Cisco Duo Secure applications, stay protected with MFA, and gain visibility into devices while establishing user and device trust. Explore Cisco Duo Cisco Firewall Protect your network using firewall solutions with advanced threat protection and secure access controls. Choose your firewall Cisco Hypershield Safeguard your infrastructure from cyberthreats with advanced threat intelligence and defense measures. Explore Hypershield Cisco Identity Services Engine (ISE) Simplify highly secure network access control with software-defined access and automation. Explore Identity Services Engine (ISE) Cisco Secure Access Protect your digital assets with cloud-agile robust authentication and security measures grounded in zero trust. Explore Secure Access Cisco Security Cloud Secure your data and applications in a hybrid and multiworld world with a suite of integrated security solutions. Explore Cisco Security Cloud Cisco Umbrella Gain visibility and control over your network with cloud-delivered security and threat intelligence. Explore Cisco Umbrella Cisco XDR Detect the most sophisticated threats across all vectors and prioritize by impact for faster responses. Explore XDR View all Cisco products Collaboration Collaboration Connect, communicate, and collaborate securely and reliably. Explore all collaboration Unified communications Transform your communications infrastructure with integrated voice, video, and data solutions. Explore unified communications Calling Improve your organization&#39;s communications with reliable and scalable call control capabilities. Explore calling Contact center Guide customers with personalized omnichannel experiences that help them find solutions to fit their needs. Explore contact center Conferencing Improve collaboration in virtual meetings with high-quality audio and video conferencing. Explore conferencing Phones, headsets, and collaboration devices Enhance communications and collaboration within your organization with intelligent endpoints. Browse collaboration endpoints Webex Suite Connect, collaborate, and engage in one place to elevate teamwork and maximize productivity. Discover Webex Suite Services for collaboration Connect culture, process, and technology to get more business value from your collaboration investments. Explore collaboration services View all Cisco products Computing Computing Deploy, manage, and optimize your resources across hybrid cloud environments with a scalable infrastructure. Explore all computing Converged infrastructure Streamline IT operations with converged infrastructure solutions that integrate compute, storage, and networking. Explore converged infrastructure Fabric and adapters Unify computing, networking, and management resources into a cohesive system. Explore fabric and adapters Hyperconverged infrastructure Simplify deployment of infrastructure and applications across data center, edge, and hybrid cloud environments. Explore hyperconverged solutions Servers Power your AI infrastructure with a single system that unifies compute, networking, and storage. Explore servers Cisco Intersight Manage your IT infrastructure with one platform that has full visibility and control of your apps and infrastructure. Explore Cisco Intersight UCS X-Series Run any application on a flexible, scalable modular server system for a future-ready data center infrastructure. Meet UCS X-Series Services for unified computing Get expert advice to help you transform your data center, automating IT processes and simplifying management. Explore computing services View all Cisco products Observability Observability Combine the power of the network with market-leading security and observability solutions and gain leading observability and application performance management. Discover Splunk AppDynamics Application security Get cloud and application protection for secure internet access and cloud app usage, and to identify public cloud threats. Explore application security Internet, cloud, and endpoint visibility Gain insight into your network with internet, cloud, and endpoint visibility for optimal performance and reliability. Discover Cisco ThousandEyes Workload optimization Leverage insights to optimize workloads and improve resource use and performance across your IT environment. Explore Intersight Workload Optimizer Services for observability Use expert services to enhance your observability solutions and maximize the value of your IT investments. Explore observability services View all Cisco products Trials and demos Check out our trials and demos to learn how our products and technologies can support your business and technical needs. View trials and demos Explore more Cisco offerings Software Explore software for a wide range of IT needs—from security, networking, and computing to collaboration and observability. Explore software Solutions Read how products and services combined into solutions can tackle issues unique to your industry, business, or technology needs. Explore solutions Services Use services from Cisco and our partners to help you to transform your IT environment and deliver business value.   Explore Cisco Services Show more Cisco Validated Design zone Design, deploy, and extend new technologies with tested and documented approaches, including possible network configurations. Browse design zone Resources End-of-sale and end-of-life End-of-life policy End-of-sale and end-of-life products Tools Cisco DNA Cisco Feature Navigator Cisco security advisories Cisco Software Central Visio stencils All product tools Product documentation Cisco DevNet Product approvals Product identification standard Product warranties Security vulnerability policy Start your transformation journey Connect with Cisco We&#39;re here to help you make informed decisions every step of the way. Contact Cisco Contact a Cisco partner Find a partner with the expertise, resources, and commitment to help you succeed. Find a partner Show more Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Statement Cookies Trademarks Supply Chain Transparency Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:55
https://www.facebook.com/reg/?entry_point=login&amp;next=https%3A%2F%2Fwww.facebook.com%2Fshare_channel%2F%3Ftype%3Dreshare%26link%3Dhttps%253A%252F%252Fdev.to%252Fgianlucam76%252Fsveltos-automate-configuration-updates-for-kubernetes-applications-4o7d%26app_id%3D966242223397117%26source_surface%3Dexternal_reshare%26display%26hashtag#how-we-use-information
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:55
https://www.facebook.com/login/?next=https%3A%2F%2Fwww.facebook.com%2Fshare_channel%2F%3Ftype%3Dreshare%26link%3Dhttps%253A%252F%252Faws.amazon.com%252Fblogs%252Fmachine-learning%252Ftransforming-home-ownership-with-amazon-transcribe-call-analytics-amazon-comprehend-and-amazon-bedrock-rocket-mortgages-journey-with-aws%252F%26app_id%3D966242223397117%26source_surface%3Dexternal_reshare%26display%26hashtag
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:55
https://snyk.io/es/blog/
Blog de seguridad de aplicaciones de código abierto y nativas de la nube | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API &amp; Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API &amp; Web - Todos los clientes Snyk API &amp; Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo Blog de Snyk IA Old AI Security vs Evo: Watch Agentic Security Replace Weeks of Manual Work Leer ahora IA Accelerating innovation with AWS: Snyk selected as an AWS Pattern Partner Leer ahora IA Evo Adds CycloneDX Support to Give Full AI Visibility Leer ahora From Code to Agents: Proactively Securing AI-Native Apps with Cursor and Snyk Leer ahora IA Snyk Log Sniffer: AI-Powered Audit Log Insights for Security Leaders Leer ahora Ver filtros Tema IA Seguridad de las aplicaciones ASPM Seguridad del código Cumplimiento Seguridad del contenedor Cliente DevSecOps Ingeniería Seguridad de IaC Seguridad de código abierto Security Labs Equipo de Snyk Seguridad de la cadena de suministro Información sobre vulnerabilidad Audiencia Desarrollador Seguridad DevOps Ejecutivo Aplicar filtros Restablecer filtros Mostrando 1 - 24 de 1578 publicaciones IA Beyond Detection: Building a Resilient Software Supply Chain (Lessons from the Shai-Hulud Post-Mortem) 8 de enero de 2026 IA Secure by Default: Why Snyk and Augment Code are the New Standard for AI Development 7 de enero de 2026 Seguridad de la aplicación The Holiday Whisper: Shai-Hulud 3.0 29 de diciembre de 2025 From Code to Agents: Proactively Securing AI-Native Apps with Cursor and Snyk 22 de diciembre de 2025 IA Evo Adds CycloneDX Support to Give Full AI Visibility 19 de diciembre de 2025 IA Old AI Security vs Evo: Watch Agentic Security Replace Weeks of Manual Work 16 de diciembre de 2025 IA How Snyk Helps Federal Agencies Prepare for the Genesis Mission Era of AI-Driven Science 9 de diciembre de 2025 IA Accelerating innovation with AWS: Snyk selected as an AWS Pattern Partner 3 de diciembre de 2025 IA Run AutoMCP To Supercharge Your AI Agent with Libraries MCP Servers 3 de diciembre de 2025 Información sobre vulnerabilidad Security Advisory: Critical RCE Vulnerabilities in React Server Components (CVE-2025-55182) 3 de diciembre de 2025 IA When Speed Meets Security: Snyk Studio for Kiro 1 de diciembre de 2025 IA Snyk Log Sniffer: AI-Powered Audit Log Insights for Security Leaders 26 de noviembre de 2025 Seguridad de la cadena de suministro SHA1-Hulud, npm supply chain incident 24 de noviembre de 2025 IA Scaling AI Security: How Evo Complements New Agentic Tools 24 de noviembre de 2025 IA How Snyk Studio for Qodo Is Closing the AI Security Gap 21 de noviembre de 2025 IA Why Threat Modeling Is Now Even More Critical for AI-Native Applications 20 de noviembre de 2025 IA Beyond Automation: Securing Low-Code Agentic AI with MCP Guardrails 19 de noviembre de 2025 IA Anthem Awards 2025: Snyk Learn Recognized for Commitment to Secure AI Development 19 de noviembre de 2025 IA Snyk and Continue Partner to Embed AI-Powered Security into Every Step of the Developer Workflow 18 de noviembre de 2025 Seguridad de la cadena de suministro Automated Package-Publication Incident IndonesianFoods in the NPM Ecosystem Linked to Crypto Reward-Farming Scam 13 de noviembre de 2025 Organizations Achieve 288% ROI with The Snyk AI Trust Platform, According to New Forrester TEI Study 12 de noviembre de 2025 Secure by Design: The Future of Threat Modeling for AI-Native Applications 11 de noviembre de 2025 IA The Agentic OODA Loop: How AI and Humans Learn to Defend Together 10 de noviembre de 2025 IA Snyk Studio brings security scanning and automated fixes to Factory&#x27;s Droids 5 de noviembre de 2025 1 Página 2 Página 3 Página 4 Página 5 Página 66 Suscríbete a nuestro boletín Obtén el contenido más reciente de Snyk directamente en tu correo electrónico. Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:55
https://www.notion.com/templates/category/design
Design Templates | Notion Marketplace Notion Features Notion AI Build, write, automate Agents Handles manual tasks Enterprise Search Find answers instantly AI Meeting Notes Perfectly written by AI Docs Simple &amp; powerful Knowledge Base Centralize your knowledge Projects Manage any project Sites Publish anything, fast Get started Explore AI use cases See what Notion AI can do Browse marketplace Templates for everything View integrations Connect your apps with Notion Download web clipper Save from the web into Notion Try the Notion desktop app for a faster experience Download app Mail Calendar AI Enterprise Pricing Explore Teams Eng &amp; Product Design Marketing IT Team size Startups SMBs Enterprise Education Learn Help center Notion Academy Customer stories Blog Community Partner programs Build API Templates Security Consultants Request a demo Log in Get Notion free Marketplace Work School Life Clear Search template gallery Templates -3 more templates No results for Categories Work Design Design templates Boost your design projects with Notion&#x27;s Design templates. Catering to creatives, our collection includes mood boards, project briefs, design asset management, and feedback collection tools. Designed for designers seeking to streamline their creative process and collaboration. Get Notion free Design Brief 82 templates User Research 417 templates Design System 108 templates Brand Guidelines 198 templates Design Sprint 50 templates Design Portfolio 156 templates 5 more categories Notion + creators Notion + creators Notion Creators Free + paid Free + paid Paid Free Popular Popular Most duplicated Recently added 2,166 Templates Featured Notion Free Featured Notion Free Featured Notion Free Featured Notion Free Featured Ganesh R Free Immi Free Orion Crest Free mrpugo Free heyismail Free Yvi von YMPACT Free Life by Sil 🌙 Free Ganesh Free Elite8AI Free giulia ✩⋆⁺₊ Free Structra Free mrpugo Free Ops Bae Free Cool Productivity Free RageCreates Free Yasmin Zerouali-Amari Free Holistic Digital Marketing Solutions Free BeYo Free Hannah Witton Free MH templates Free 1 2 3 4 5 → Related Collections Browse all collections Your team in-a-box with Notion: 9 all-in-one team setups Notion Top 10 Free Design Studio Templates Notion FAQs Does Notion support project templates for different industries? Yes, Notion offers project templates for various industries, from software and marketing to construction and education. Each template can be customized to fit industry-specific workflows while maintaining core project management principles. Do Notion project management tools allow custom workflow creation? Yes. Notion&#x27;s composable approach lets you create custom workflows tailored to your team&#x27;s needs, combining different views and properties that can evolve as your projects change. What does &quot;composable project management&quot; mean? It&#x27;s the idea of building your system from modular parts that can be reconfigured as needs change. Your project management tool, built by you, for you. Is Notion good for project management? Yes. Teams use Notion to manage plans, tasks, timelines, docs, and status updates in one place. Because templates are composable, you can tailor workflows (Agile, Waterfall, hybrid) without duct‑taping multiple tools together. Competitors offer templates too, but Notion&#x27;s linked databases keep everything connected. What project management templates should I start with? Start with a project plan, timeline (Gantt), WBS, RACI, and a weekly status report. These together cover the four fundamentals of any project: scope, schedule, ownership, and communication. Can I manage Agile projects in Notion? Yes. Use a backlog and sprint board (Kanban), plus a timeline for capacity planning. Add retrospectives and a change log to complete the loop. How do Notion templates compare to spreadsheets or docs? Templates in spreadsheets are quick, but they&#x27;re usually static. Notion templates create databases you can relate, filter, and visualize (board, timeline, calendar), with the flexibility to adapt as projects grow. Notion lets you bring docs, tasks, and wiki together in one space. No more SaaS sprawl! Still have more questions? Learn more in our help center . Become a creator Submit your template to the Notion template gallery, get featured, and even get paid – all in just a few clicks. Get started → English (US) Cookie settings © 2026 Notion Labs, Inc. Company About us Careers Security Status Terms &amp; privacy Your privacy rights Download iOS &amp; Android Mac &amp; Windows Calendar Web Clipper Resources Help center Pricing Blog Community Integrations Templates Partner programs Notion for Enterprise Small business Personal Explore more →
2026-01-13T09:29:55
https://wiki.creativecommons.org/wiki/Frequently_Asked_Questions#can-i-offer-material-under-a-cc-license-that-has-my-trademark-on-it-without-also-licensing-or-affecting-rights-in-the-trademark
Frequently Asked Questions - Creative Commons Skip to content Creative Commons Menu Who We Are What We Do Licenses and Tools Blog Support Us Search Donate Explore CC Global Network Join a global community working to strengthen the Commons Certificate Become an expert in creating and engaging with openly licensed materials Global Summit Attend our annual event, promoting the power of open licensing Chooser Get help choosing the appropriate license for your work Search Portal Find engines to search openly licensed material for creative and educational reuse Open Source Help us build products that maximize creativity and innovation Frequently Asked Questions English | Fran&#xE7;ais 2025-05-12 19:36:36 UTC About CC What is Creative Commons and what do you do? Is Creative Commons against copyright? What does &#x201C;Some Rights Reserved&#x201D; mean? Can Creative Commons give legal advice about its licenses or other tools, or help with CC license enforcement? Does Creative Commons collect or track material licensed under a CC license? What do the Creative Commons buttons do? May I use the Creative Commons logo and buttons? I love Creative Commons. How can I help? Why does Creative Commons run an annual fundraising campaign? What is the money used for and where does it go? General License Information What are Creative Commons licenses? How do CC licenses operate? Which is the latest version of the licenses offered by Creative Commons? Do Creative Commons licenses affect exceptions and limitations to copyright, such as fair dealing and fair use? Who gives permission to use material offered under Creative Commons licenses? Are Creative Commons licenses enforceable in a court of law? What happens if someone applies a Creative Commons license to my work without my knowledge or authorization? What are the international (&#x201C;unported&#x201D;) Creative Commons licenses, and why does CC offer &#x201C;ported&#x201D; licenses? Can I include a work licensed with CC BY in a Wikipedia article even though they use a CC BY-SA license? Can governments and intergovernmental organizations (&#x201C;IGOs&#x201D;) use CC licenses? Can children apply Creative Commons licenses to work they create? What are the official translations of the CC licenses and CC0? What is a BY-SA Compatible License? For Licensors Choosing a license What things should I think about before I apply a Creative Commons license? How should I decide which license to choose? Why should I use the latest version of the Creative Commons licenses? What if CC licenses have not been ported to my jurisdiction? Should I choose an international license or a ported license? Why should I use the license chooser? What if I don&#x2019;t? How do I apply a Creative Commons license to my material? Do I need to register with Creative Commons before I obtain a license? What do the terms and conditions of a CC license apply to? Can I apply a Creative Commons license to software? Can I apply a Creative Commons license to databases? Could I use a CC license to share my logo or trademark? May I apply a Creative Commons license to a work in the public domain? If I take a photograph of another work that is in the public domain, can I apply a CC license to my photo? May I apply a CC license to my work if it incorporates material used under fair use or another exception or limitation to copyright? Rights other than copyright Can I use CC licenses to license rights other than copyright? How do Creative Commons licenses affect my moral rights, if at all? Can I offer material under a CC license that has my trademark on it without also licensing or affecting rights in the trademark? How are publicity, privacy, and personality rights affected when I apply a CC license? What is the difference between plagiarism and copyright infringement? And what role do CC licenses play to address plagiarism? Business models Can I apply a CC license to low-resolution copies of a licensed work and reserve more rights in high-resolution copies? Can I use a Creative Commons license if I am a member of a collecting society? Can I still make money from a work I make available under a Creative Commons license? Alterations and additions to the license Can I insist on the exact placement of the attribution credit? Can I change the license terms or conditions? Can I waive license terms or conditions? Can I enter into separate or supplemental agreements with users of my work? After licensing What happens if I offer my material under a Creative Commons license and someone misuses them? What can I do if I offer my material under a Creative Commons license and I do not like the way someone uses it? Do I have to provide my name? Can I ask that my name be removed? What do I do if someone tries to place effective technological measures (such as DRM) on my CC-licensed material? When I release my work under a CC license in one format (e.g., .pdf), can I restrict licensees from changing it to or using it in other formats? What if I change my mind about using a CC license? For Licensees Before using CC-licensed material What should I think about before using material offered under a Creative Commons license? Does a Creative Commons license give me all the rights I need to use the work? What if there are sui generis database rights that apply to my use of a CC-licensed database? Where can I find material offered under a CC license? Are Creative Commons works really free to use? What should I know about differences between the international licenses and the ported licenses? General license compliance What happens if I want to use the material in a way that is not permitted by the license? Do I always have to comply with the license terms? If not, what are the exceptions? Attribution How do I properly attribute material offered under a Creative Commons license? Do I need to be aware of anything else when providing attribution? Do I always have to attribute the creator of the licensed material? Using licensed material Does my use violate the NonCommercial clause of the licenses? Can I take a CC-licensed work and use it in a different format? How do I know if a low-resolution photo and a high-resolution photo are the same work? Can I reuse an excerpt of a larger work that is licensed with the NoDerivs restriction? Can I use effective technological measures (such as DRM) when I share CC-licensed material? Can I share CC-licensed material on password-protected sites? Can I share CC-licensed material on file-sharing networks? Do I need to worry about website terms of service when I share CC-licensed content on social media platforms? Additional restrictions on licensed material What if I received CC-licensed material encumbered with effective technological measures (such as DRM)? What if I have received CC-licensed material with additional restrictions? Combining and adapting CC material When is my use considered an adaptation? Can I combine material under different Creative Commons licenses in my work? If I derive or adapt material offered under a Creative Commons license, which CC license(s) can I use? If I create a collection that includes a work offered under a CC license, which license(s) may I choose for the collection? License termination When do Creative Commons licenses expire? What happens if the author decides to revoke the CC license to material I am using? How can I lose my rights under a Creative Commons license? If that happens, how do I get them back? Technical Questions How do Creative Commons licenses and public domain tools work technically? What does it mean that Creative Commons licenses are &#x201C;machine-readable&#x201D;? What is RDFa? What is CC REL and why does Creative Commons recommend it? What does it mean for a search engine to be CC-enabled? How do I give users of my site the option to use CC licensing like Flickr does? How can I change or remove the Creative Commons search option built into the Firefox browser? Is Creative Commons involved in digital rights management (DRM)? Legal Background What is copyright and why does it matter? What is the public domain? What do I need to do to get a copyright? What is an adaptation? What are moral rights? What are neighboring rights? What are sui generis database rights? What are collecting societies? What are publicity, personality, and privacy rights? Data Frequently asked questions about data and CC licenses Can databases be released under CC licenses? When a CC license is applied to a database, what is being licensed? How do I apply a CC legal tool to a database? How do the different CC license elements operate for a CC-licensed database? Can I conduct text/data mining on a CC-licensed database? How does the treatment of sui generis database rights vary in prior versions of CC licenses? What is the difference between the Open Data Commons licenses and the CC 4.0 licenses? Frequently asked questions about data, generally Which components of databases are protected by copyright? How do I know whether a particular use of a database is restricted by copyright? If my use of a database is restricted by copyright, how do I comply with the license? Which components of a database are protected by sui generis database rights? How do I know whether a particular use of a database is restricted by sui generis database rights? What constitutes a &#x201C;substantial portion&#x201D; of a database? If my use of a database is restricted by sui generis database rights, how do I comply with the license? Artificial intelligence and CC licenses What are the limits on how CC-licensed works can be used in the development of new technologies, such as training of artificial intelligence software? But what about privacy laws, rules governing ethical research, and data protection laws? What attribution obligations exist when CC-licensed images are included in a published dataset? Is linking to the original image or URI required, and if so, is it adequate? If a for-profit company uses CC-licensed content under a Non Commercial license and releases the work under terms that allow only research purposes, is the NC restriction violated? If CC SA-licensed content is included in a database, does the entire database have to be licensed under an SA license? What, if any, remedies, do users have if they dislike how their photos or images have been reused? Notes These FAQs are designed to provide a better understanding of Creative Commons, our licenses, and our other legal and technical tools. They provide basic information, sometimes about fairly complex topics, and will often link to more detailed information. Other CC FAQs: CC0 Public Domain Dedication and Public Domain Mark . &#x201C;Licensor&#x201D;, &#x201C;rights holder&#x201D;, &#x201C;owner&#x201D;, and &#x201C;creator&#x201D; may be used interchangeably to refer to the person or entity applying a CC license. Information about the licenses is primarily made with reference to the 4.0 suite, but earlier license versions are mentioned where they differ. Have a question that isn&#x2019;t answered here? Contact info@creativecommons.org. Creative Commons does not provide legal advice. This FAQ is for informational purposes and is not a substitute for legal advice. It may not cover important issues that affect you. You should consult with your own lawyer if you have questions. About CC What is Creative Commons and what do you do? Creative Commons is a global nonprofit organization that enables sharing and reuse of creativity and knowledge through the provision of free legal tools. Our legal tools help those who want to encourage reuse of their works by offering them for use under generous, standardized terms; those who want to make creative uses of works; and those who want to benefit from this symbiosis. Our vision is to help others realize the full potential of the internet. CC has affiliates all over the world who help ensure our licenses work internationally and who raise awareness of our work. Although Creative Commons is best known for its licenses, our work extends beyond just providing copyright licenses. CC offers other legal and technical tools that also facilitate sharing and discovery of creative works, such as CC0 , a public domain dedication for rights holders who wish to put their work into the public domain before the expiration of copyright, and the Public Domain Mark , a tool for marking a work that is in the worldwide public domain. Creative Commons licenses and tools were designed specifically to work with the web, which makes content that is offered under their terms easy to search for, discover, and use. For more information about CC, our main website contains in-depth information about the organization , its staff and board of directors , its history , and its supporters . You can also read CC case studies to learn about some of the inspiring ways CC licenses and tools have been used to share works and support innovative business models. You can find regularly updated information about CC by visiting the blog . Is Creative Commons against copyright? Absolutely not. CC has responded to claims to the contrary . CC licenses are copyright licenses, and depend on the existence of copyright to work. CC licenses are legal tools that creators and other rights holders can use to offer certain usage rights to the public, while reserving other rights. Those who want to make their work available to the public for limited kinds of uses while preserving their copyright may want to consider using CC licenses. Others who want to reserve all of their rights under copyright law should not use CC licenses. That said, Creative Commons recognizes the need for change in copyright law, and many members of the Creative Commons community are active participants in the copyright reform movement. For more information, see our statement in support of copyright reform . What does &#x201C;Some Rights Reserved&#x201D; mean? Copyright grants to creators a bundle of exclusive rights over their creative works, which generally include, at a minimum, the right to reproduce, distribute, display, and make adaptations. The phrase &#x201C;All Rights Reserved&#x201D; is often used by owners to indicate that they reserve all of the rights granted to them under the law. When copyright expires, the work enters the public domain , and the rights holder can no longer stop others from engaging in those activities under copyright, with the exception of moral rights reserved to creators in some jurisdictions. Creative Commons licenses offer creators a spectrum of choices between retaining all rights and relinquishing all rights (public domain), an approach we call &#x201C;Some Rights Reserved.&#x201D; Can Creative Commons give legal advice about its licenses or other tools, or help with CC license enforcement? No.&#xA0;Creative Commons is not a law firm and does not provide legal advice or legal services. CC is similar to a self-help service that offers free, form-based legal documents for others to use. These FAQ answers many of the most common questions. There is also specialized information available on the following pages: Marking practices for creators Marking practices for reusers Data FAQ Differences between CC license versions Differences between jurisdiction ports of earlier license versions Public domain mark FAQ CC0 FAQ While CC does provide this informational guidance about its licenses and other tools, this information may not apply to your particular situation, and should never be taken as legal advice. If you&#x2019;re looking for legal advice about using CC licenses and other tools, we recommend contacting the Creative Commons affiliate in your jurisdiction . CC affiliates are highly connected to the communities of copyright lawyers in their countries. We also offer a list of lawyers and organizations who have identified themselves as willing to provide information to others about CC licensing issues. However, please note that CC does not provide referral services, and does not endorse or recommend any person on that list. Does Creative Commons collect or track material licensed under a CC license? No, CC does not collect content or track licensed material. However, CC builds technical tools that help the public search for and use works licensed under our licenses and other legal tools, and many others have built such tools as well. CC Search is one tool developed by CC to help the public discover works offered under Creative Commons licenses on the internet via CC-aware search engines and repositories. What do the Creative Commons buttons do? The CC buttons are a shorthand way to convey the basic permissions associated with material offered under CC licenses. Creators and owners who apply CC licenses to their material can download and apply those buttons to communicate to users the permissions granted in advance. When the material is offered online, the buttons should usually link out to the human-readable license deeds (which, in turn, link to the license itself). May I use the Creative Commons logo and buttons? You may download high resolution versions of the Creative Commons logos and use them in connection with your work or your website, provided you comply with our policies . Among other things, if you use the logos on a website or on your work, you may not alter the logos in any respect&#x2014;such as by changing the font, the proportions, or the colors. CC&#x2019;s buttons, name, and corporate logo (the &#x201C;CC&#x201D; in a circle) are trademarks of Creative Commons. You cannot use them in ways not permitted by our policies unless you first receive express, written permission. This means, for example, that you cannot (without our permission) print your own buttons and t-shirts using CC logos, although you can purchase them in CC&#x2019;s store . I love Creative Commons. How can I help? Please support CC by making a donation through our support page . Donations can be handled through PayPal or by credit card. You can also support CC by visiting our store . CC always welcomes your feedback, which you can provide by emailing &#x69;&#110;&#102;&#x6f;&#32;&#x61;&#116;&#32;&#x63;&#114;&#x65;&#x61;&#116;&#x69;&#118;&#x65;&#x63;&#x6f;&#x6d;&#x6d;&#x6f;&#110;&#x73;&#32;&#100;&#x6f;&#116;&#32;&#x6f;&#114;&#x67; . You can also participate in CC&#x2019;s email discussion lists and share feedback and ideas in one of those forums. If you are a software developer, sysadmin, or have other technical expertise, please join our developer community and help build the tools that build the commons. Finally, one of the best ways to support CC is by supporting our causes yourself. Follow our blog to find out about current issues where you can help get involved and spread the word, and advocate for free and open licensing in your own communities. Why does Creative Commons run an annual fundraising campaign? What is the money used for and where does it go? Creative Commons is a global nonprofit organization that enables sharing and reuse of creativity and knowledge through free legal tools, with affiliates all over the world who help ensure our licenses work internationally and raise awareness about our work. Our tools are free, and our reach is wide. In order to&#x2026; continue developing our licenses and public domain tools to make sure they are legally and technically up-to-date around the world, help creators implement these tools on websites through best practices and individual assistance, enable CC licensing on major content-sharing platforms, enhance CC-licensed resource search and discovery, advocate for CC licensing and open policies in education , science , and culture , and myriad other activities we&#x2019;re forgetting to mention, such as all the everyday boring but essential operations that go into running an organization &#x2026;we need $ to make it all happen! For more information, please take a look at our Annual Report . Creative Commons has always relied on the generosity of both individuals and organizations to fund its ongoing operations. It is essential we have the public&#x2019;s support because it is the creators and users of CC material who make our tools relevant in this digital age. They depend on the tools and services CC provides through their reuse and remix of the rich, open resources available on Wikipedia , Flickr , SoundCloud , Vimeo , Europeana , MIT OpenCourseWare , PLOS , Al Jazeera , and YouTube &#x2014;just to name a few. Many of these people donate $10, $25, or $50 to CC, to help keep it up and running so we can continue to provide our tools and services for free, as a nonprofit organization. The more people who donate to CC, the more independent it will remain. General License Information What are Creative Commons licenses? Creative Commons licenses provide an easy way to manage the copyright terms that attach automatically to all creative material under copyright . Our licenses allow that material to be shared and reused under terms that are flexible and legally sound. Creative Commons offers a core suite of six copyright licenses. Because there is no single &#x201C;Creative Commons license,&#x201D; it is important to identify which of the six licenses you are applying to your material, which of the six licenses has been applied to material that you intend to use, and in both cases the specific version. All of our licenses require that users provide attribution (BY) to the creator when the material is used and shared. Some licensors choose the BY license, which requires attribution to the creator as the only condition to reuse of the material. The other five licenses combine BY with one or more of three additional license elements: NonCommercial (NC), which prohibits commercial use of the material; NoDerivatives (ND), which prohibits the sharing of adaptations of the material; and ShareAlike (SA), which requires adaptations of the material be released under the same license. CC licenses may be applied to any type of work, including educational resources , music , photographs , databases , government and public sector information , and many other types of material . The only categories of works for which CC does not recommend its licenses are computer software and hardware. You should also not apply Creative Commons licenses to works that are no longer protected by copyright or are otherwise in the public domain . Instead, for those works in the worldwide public domain, we recommend that you mark them with the Public Domain Mark . How do CC licenses operate? CC licenses are operative only when applied to material in which a copyright exists, and even then only when a particular use would otherwise not be permitted by copyright. Note that the latest version of CC licenses also applies to rights similar to copyright, such as neighboring rights and sui generis database rights . Learn more about the scope of the licenses. This means that CC license terms and conditions are not triggered by uses permitted under any applicable exceptions and limitations to copyright , nor do license terms and conditions apply to elements of a licensed work that are in the public domain. This also means that CC licenses do not contractually impose restrictions on uses of a work where there is no underlying copyright. This feature (and others) distinguish CC licenses from some other open licenses like the ODbL and ODC-BY , both of which are intended to impose contractual conditions and restrictions on the reuse of databases in jurisdictions where there is no underlying copyright or sui generis database right. All CC licenses are non-exclusive: creators and owners can enter into additional, different licensing arrangements for the same material at any time (often referred to as &#x201C;dual-licensing&#x201D; or &#x201C;multi-licensing&#x201D;). However, CC licenses are not revocable once granted unless there has been a breach, and even then the license is terminated only for the breaching licensee. Please note that CC0 is not a license; it is a public domain dedication. When CC0 is applied to a work, copyright no longer applies to the work in most jurisdictions around the world. Therefore, references to dual licensing arrangements like the one above are inapplicable to CC0. There are also videos and comics that offer visual descriptions of how CC licenses work. Which is the latest version of the licenses offered by Creative Commons? In November 2013, Creative Commons published the version 4.0 license suite. These licenses are the most up-to-date licenses offered by CC, and are recommended over all prior versions. You can see how the licenses have been improved over time on the license versions page . 4.0 has been drafted to be internationally valid, and will have official translations becoming available after publication. Do Creative Commons licenses affect exceptions and limitations to copyright, such as fair dealing and fair use? No.&#xA0;By design, CC licenses do not reduce, limit, or restrict any rights under exceptions and limitations to copyright, such as fair use or fair dealing . If your use of CC-licensed material would otherwise be allowed because of an applicable exception or limitation, you do not need to rely on the CC license or comply with its terms and conditions. This is a fundamental principle of CC licensing. Who gives permission to use material offered under Creative Commons licenses? Our licenses and legal tools are intended for use by anyone who holds copyright in the material. This is often, but not always, the creator. Creative Commons offers licenses and tools to the public free of charge and does not require that creators or other rights holders register with CC in order to apply a CC license to a work. This means that CC does not have special knowledge of who uses the licenses and for what purposes, nor does CC have a way to contact creators beyond means generally available to the public. CC has no authority to grant permission on behalf of those persons, nor does CC manage those rights on behalf of others. If you would like to obtain additional permissions to use the work beyond those granted by the license that has been applied, or if you&#x2019;re not sure if your intended use is permitted by the license, you should contact the rights holder . Are Creative Commons licenses enforceable in a court of law? Creative Commons licenses are drafted to be enforceable around the world, and have been enforced in court in various jurisdictions. To CC&#x2019;s knowledge, the licenses have never been held unenforceable or invalid. CC licenses contain a &#x201C;severability&#x201D; clause. This allows a court to eliminate any provision determined to be unenforceable, and enforce the remaining provisions of the license. What happens if someone applies a Creative Commons license to my work without my knowledge or authorization? CC alerts prospective licensors they need to have all necessary rights before applying a CC license to a work. If that is not the case and someone has marked your work with a CC license without your authorization, you should contact that person and tell them to remove the license from your work. You may also wish to contact a lawyer. Creative Commons is not a law firm and cannot represent you or give you legal advice, but there are lawyers who have identified themselves as interested in representing people in CC-related matters . What are the international (&#x201C;unported&#x201D;) Creative Commons licenses, and why does CC offer &#x201C;ported&#x201D; licenses? One of CC&#x2019;s goals is ensuring that all of its legal tools work globally, so that anyone anywhere in the world can share their work on globally standard terms. To this end, CC offers a core suite of six international copyright licenses (formerly called the &#x201C;unported&#x201D;) that are drafted based largely on various international treaties governing copyright , taking into account as many jurisdiction-specific legal issues as possible. The latest version (4.0) has been drafted with particular attention to the needs of international enforceability. For version 3.0 and earlier, Creative Commons has also offered ported versions of its six core licenses for many jurisdictions (which usually correspond to countries, but not always). These ported licenses are based on the international license suite but have been modified to reflect local nuances in the expression of legal terms and conditions, drafting protocols, and language. The ported licenses and the international licenses are all intended to be legally effective everywhere. CC expects that few, if any, ports will be necessary for 4.0. CC recommends that you take advantage of the improvements in the 4.0 suite explained on the license versions page unless there are particular considerations you are aware of that would require a ported license. Can I include a work licensed with CC BY in a Wikipedia article even though they use a CC BY-SA license? Yes. Works licensed under CC BY may be incorporated into works that are licensed under CC BY-SA. For example, you may incorporate a CC BY photograph into a Wikipedia article so long as you keep all copyright notices intact, provide proper attribution, and otherwise comply with the terms of CC BY. Learn more about the licenses. Can governments and intergovernmental organizations (&#x201C;IGOs&#x201D;) use CC licenses? Yes, anyone may use CC licenses for material they own, including governments and IGOs, and these institutions frequently use CC licenses on their copyrightable material . The reasons for doing so vary, and often include a desire to maximize the impact and utility of works for educational and informational purposes, and to enhance transparency. Creative Commons licenses have desirable features that make them the preferred choice over custom licenses. CC licenses are standard and interoperable, which means material published by different creators using the same type of CC license can be translated, modified, compiled, and remixed without legal barriers depending on the particular license applied . Creative Commons licenses are also machine-readable, allowing CC-licensed works to be easily discovered via search engines such as Google. These features maximize distribution, reuse, and impact of works published by governments and IGOs. Though we encourage anyone to use version 4.0, which is internationally valid and may be used by individuals as well as organizations, there is an IGO ported version of 3.0 that IGOs may also use. Read more about how governments and IGOs use and leverage CC licenses and legal tools, considerations for using our licenses, and how they operate in the IGO context. Can children apply Creative Commons licenses to work they create? This issue depends largely on the laws in place where the child lives. In the United States, children can be copyright holders and are entitled to license their works in the same manner as adults. However, they may have the right to disaffirm certain types of legal agreements, including licenses. In many parts of the United States, for example, children have the ability to disaffirm some types of agreements under certain circumstances once they reach the age where they are considered adults within the relevant jurisdiction. We are unaware of any attempt by a licensor to exercise the disaffirmation right with respect to a CC license applied to a work. What are the official translations of the CC licenses and CC0? Official language translations will be available for the 4.0 licenses and CC0. When you license your own work, you may use or link to the text of any available official translation. When you reuse CC-licensed material, you may comply with the license conditions by referring to any available official translation of the license. These translations are linguistic translations of the English version which adhere as closely as possible to the original text. These translations have been done by our affiliates in accordance with the Legal Code Translation Policy and with the oversight and detailed review of the CC legal team. Note that these are equivalents of the original English; these translations are not jurisdiction ported versions . You may find a list of all available translations here . For versions 3.0 and earlier, official translations are not available. Some unofficial translations were made for informational purposes only. (Jurisdiction ported versions of version 3.0 and earlier were generally published in the official language(s) of the appropriate jurisdiction. However, the ported licenses are not equivalent to the international licenses, and do not serve as substitutable references for purposes of complying with the terms and conditions of the licenses.) What is a BY-SA Compatible License? A BY-SA Compatible License is a license officially designated by Creative Commons pursuant to the ShareAlike compatibility process . Once deemed a BY-SA Compatible License, you may use the license to publish your contributions to an adaptation of a BY-SA work. To see the list of BY-SA Compatible Licenses, click here . Learn more about ShareAlike compatibility here . For Licensors Choosing a license What things should I think about before I apply a Creative Commons license? Applying a Creative Commons license to your material is a serious decision. When you apply a CC license, you give permission to anyone to use your material for the full duration of applicable copyright and similar rights. CC has identified some things that you should consider before you apply a CC license, some of which relate to your ability to apply a CC license at all. Here are some highlights: Is the material copyrightable? If not, is it subject to neighboring rights or sui generis database rights ? CC licenses do not apply to material in the public domain . Different countries have different standards for what is in the public domain. Do you own the material you want to license? If not, are you otherwise authorized to license it under the specific CC license you are interested in using? You should not apply a license to material that you do not own or that you are not authorized to license. Are you aware that CC licenses are not revocable ? You are free to stop offering material under a CC license at any time, but this will not affect the rights associated with any copies of your work already in circulation. (Any particular licensee may lose his or her rights after violating the license, but this does not affect continual use of the work by other licensees.) Are you a member of a collecting society ? If you are, you should make sure that you are able to use CC licenses for your materials . Always read the terms and conditions of the specific license you plan to apply. Additionally, there are several terms that may differ in the earlier versions of the license , both unported and ported. If you choose to use a pre-4.0 version or any ported version , clauses such as choice of law may affect your desired choice of license. How should I decide which license to choose? If you are unsure which license best suits your needs, there are plenty of resources to help rights holders choose the right CC license. CC Australia has developed a flow chart that may be useful in helping you settle on the right license for your work. You can also read case studies of others who are using CC licenses. The CC community can also respond to questions, and may have already addressed issues you raise. The CC community email discussion lists and discussion archives may be useful resources. Finally, you may also want to consult with a lawyer to obtain advice on the best license for your needs. Why should I use the latest version of the Creative Commons licenses? The latest version of the Creative Commons licenses is version 4.0. You should always use the latest version of the Creative Commons licenses in order to take advantage of the many improvements described on the license versions page . In particular, 4.0 is meant to be better suited to international use, and use in many different contexts, including sharing data . What if CC licenses have not been ported to my jurisdiction? All CC licenses are intended to work worldwide. Unless you have a specific reason to use a ported license , we suggest you consider using one of the international licenses. 4.0 will support official translations of the international license for those who wish to use the licenses in another language. As of version 4.0, CC is discouraging ported versions, and has placed a hold on new porting projects following its publication until sometime in 2014. At that point, CC will reevaluate the necessity of porting in the future. Should I choose an international license or a ported license? We recommend that you use a version 4.0 international license. This is the most up-to-date version of our licenses, drafted after broad consultation with our global network of affiliates, and it has been written to be internationally valid. There are currently no ports of 4.0, and it is planned that few, if any, will be created. All of the ported licenses are at version 3.0 or earlier, which means licensors using those licenses do not have the benefit of the improvements made in the 4.0 license suite . But even before considering the improvements in 4.0, there are several reasons why the international licenses may be preferable for rights holders, even if the licenses have been ported to their jurisdiction. As an organization, CC itself licenses all of its own content under an international license because, among other reasons, the international licenses are essentially jurisdiction-neutral while remaining effective globally. The neutral nature of the international licenses appeals to many people and organizations, particularly for use in connection with global projects that transcend political borders. Finally, it is important to know that some of the ported licenses contain a choice of law provision, which may be undesirable for your needs. However, some rights holders still choose a license ported to their local jurisdiction because they believe their needs are not sufficiently met by the international licenses. If the licenses have been ported to your jurisdiction and you feel that the ported licenses better account for some aspect of local legislation, then you may wish to consider a ported license. You can use our jurisdiction database to compare international licenses and ports on these issues and others, such as whether a ported license contains a choice of law or forum selection clause. Why should I use the license chooser? What if I don&#x2019;t? Licensors are not required to use the CC license chooser or provide any information about themselves or their material when applying a CC license to their material. However, using the license chooser enables licensors to take advantage of the &#x201C;machine readable&#x201D; layer of CC licenses. Our machine-readable code enhances the discoverability of your work because that code allows software, search engines, and other tools to recognize when something is licensed under a CC license. The code also facilitates attribution: when users click on the CC button placed on your site, they will be linked directly to HTML code that they can cut and paste to provide attribution. How do I apply a Creative Commons license to my material? For online material : Select the license that is appropriate for your material from the CC license chooser and then follow the instructions to include the HTML code. The code will automatically generate a license button and a statement that your material is licensed under a CC license. If you are only licensing part of a work (for example, if you have created a video under a CC license but are using a song under a different license), be sure to clearly mark which parts are under the CC license and which parts are not. The HTML code will also include metadata, which allows the material to be discovered via Creative Commons-enabled search engines . For offline material : Identify which license you wish to apply to your work and either (a) mark your work with a statement such as, &#x201C;This work is licensed under the Creative Commons [insert description] License. To view a copy of the license, visit [insert url]&#x201D;; or (b) insert the applicable license buttons with the same statement and URL link. For third-party platforms : Many media platforms like Flickr , YouTube , and SoundCloud have built-in Creative Commons capabilities, letting users mark their material with a CC license through their account settings. The benefit of using this functionality is that it allows other people to find your content when searching on those platforms for CC-licensed material . If the platform where you&#x2019;re uploading your content does not support CC licensing, you can still identify your content as CC-licensed in the text description of your content. Legally, these three options are the same. The only difference between applying a CC license offline rather than online is that marking a work online with metadata will ensure that users will be able to find it through CC-enabled search engines. CC offers resources on the best practices for marking your material and on how to mark material in different media (.pdf) . Do I need to register with Creative Commons before I obtain a license? No.&#xA0;CC offers its licenses, code, and tools to the public free of charge, without obligation. You do not need to register with Creative Commons to apply a CC license to your material; it is legally valid as soon as you apply it to any material you have the legal right to license. CC does not require or provide any means for creators or other rights holders to register use of a CC license, nor does CC maintain a database of works distributed under Creative Commons licenses. CC also does not require registration of the work with a national copyright agency. What do the terms and conditions of a CC license apply to? Although CC licenses get attached to tangible works (such as photos and novels), the license terms and conditions apply to the licensor&#x2019;s copyright in the licensed material. The public is granted &#x201C;permission to exercise&#x201D; those rights in any medium or format . It is the expression that is protected by copyright and covered by the licenses, not any particular medium or format in which the expression is manifested. This means, for example, that a CC license applied to a digitized copy of a novel grants the public permission under copyright to use a print version of the same novel on the same terms and conditions (though you may have to purchase the print version from a bookstore). Can I apply a Creative Commons license to software? We recommend against using Creative Commons licenses for software. Instead, we strongly encourage you to use one of the very good software licenses which are already available. We recommend considering licenses listed as free by the Free Software Foundation and listed as &#x201C;open source&#x201D; by the Open Source Initiative . Unlike software-specific licenses, CC licenses do not contain specific terms about the distribution of source code, which is often important to ensuring the free reuse and modifiability of software. Many software licenses also address patent rights, which are important to software but may not be applicable to other copyrightable works. Additionally, our licenses are currently not compatible with the major software licenses, so it would be difficult to integrate CC-licensed work with other free software. Existing software licenses were designed specifically for use with software and offer a similar set of rights to the Creative Commons licenses. Version 4.0 of CC&#x2019;s Attribution-ShareAlike (BY-SA) license is one-way compatible with the GNU General Public License version 3.0 (GPLv3). This compatibility mechanism is designed for situations in which content is integrated into software code in a way that makes it difficult or impossible to distinguish the two. There are special considerations required before using this compatibility mechanism. Read more about it here . Also, the CC0 Public Domain Dedication is GPL-compatible and acceptable for software. For details, see the relevant CC0 FAQ entry . While we recommend against using a CC license on software itself, CC licenses may be used for software documentation, as well as for separate artistic elements such as game art or music. Can I apply a Creative Commons license to databases? Yes. CC licenses can be used on databases . In the 4.0 license suite, applicable sui generis database rights are licensed under the same license conditions as copyright. Many governments and others use CC licenses for data and databases. For more detailed information about how CC licenses apply to data and databases, visit our detailed Data FAQ . Could I use a CC license to share my logo or trademark? Creative Commons does not recommend using a CC license on a logo or trademark. While a logo or trademark can be covered by copyright laws in addition to trademark laws, the special purposes of trademarks make CC licenses an unsuitable mechanism for sharing them in most cases. Generally, logos and trademarks are used to identify the origin of a product or service, or to indicate that it meets a specific standard or quality. Allowing anyone to reuse or modify your logo or trademark as a matter of copyright could result in your inability to limit use of your logo or trademark selectively to accomplish those purposes. Applying a CC license to your trademarks and logos could even result in a loss of your trademark rights altogether. See below for more about how to license material that includes a trademark or logo. There are other ways to share your logos and trademarks widely while preserving your trademark rights. Establishing a trademark policy that grants permissions in advance for limited uses is one common alternative. Mozilla , Wikimedia , and Creative Commons have each published policies that accomplish the dual objectives of encouraging reuse and preserving trademark rights. May I apply a Creative Commons license to a work in the public domain? CC licenses should not be applied to works in the worldwide public domain . All CC licenses are clear that they do not have the effect of placing restrictions on material that would otherwise be unrestricted, and you cannot remove a work from the public domain by applying a CC license to it. If you want to dedicate your own work to the public domain before the expiration of applicable copyright or similar rights, use CC&#x2019;s legally robust public domain dedication . If a work is already in the worldwide public domain, you should mark it with CC&#x2019;s Public Domain Mark . Note that, in some cases, a work may be in the public domain under the copyright laws of some jurisdictions but not others. For example, U.S. government works are in the public domain under the copyright law of the United States, but may be protected by copyright laws in other jurisdictions. A CC license applied to such a work would be effective (and the license restrictions enforceable) in jurisdictions where copyright protection exists, but would not be operative if U.S. copyright law is determined to be the applicable law. Creators may also apply Creative Commons licenses to material they create that are adapted from public domain works, or to remixed material, databases, or collections that include work in the public domain. However, in each of these instances, the license does not affect parts of the work that are unrestricted by copyright or similar rights. We strongly encourage you to mark the public domain material , so that others know they are also free to use this material without legal restriction. If I take a photograph of another work that is in the public domain, can I apply a CC license to my photo? That depends. You can apply a CC license to your photograph if your photograph constitutes a work of original authorship, a question that varies by jurisdiction. As a general matter, your photograph must involve some creative choices, such as background setting, lighting, angle, or other mark of creativity. In the United States, an exact photographic copy of a public domain work is not subject to copyright because there is no originality (even if there is effort or &#x201C;sweat&#x201D; exerted in its creation). In practice, if your photograph is sufficiently creative to attract copyright protection, people will likely have to comply with the license conditions if they reproduce your entire photograph in verbatim form, absent some applicable exception or limitation such as fair use. However, they would not have to comply with the license conditions if they reproduce only those parts of the work in the public domain . This is because your copyright in the adaptation only extends to the material you contributed, not to the underlying work. May I apply a CC license to my work if it incorporates material used under fair use or another exception or limitation to copyright? Yes, but it is important to prominently mark any third party material you incorporate into your work so reusers do not think the CC license applies to that material. The CC license only applies to the rights you have in the work. For example, if your CC-licensed slide deck includes a Flickr image you are using pursuant to fair use, make sure to identify that image as not being subject to the CC license. For more information about incorporating work owned by others, see our page about marking third party content . Read more considerations for licensors here . Rights other than copyright Can I use CC licenses to license rights other than copyright? CC licenses are copyright licenses, but the latest version of CC licenses also cover certain other rights similar to cop
2026-01-13T09:29:55
https://www.notion.com/de/product/notion-for-product-development
Notion für Engineering und Produktentwicklung Notion Funktionen Notion-KI Erschaffen, schreiben, automatisieren Agenten Übernehmen manuelle Aufgaben Enterprise Suche Finde Antworten in Sekundenschnelle Smart Notes Perfekt geschrieben von der KI Dokumente Einfach und leistungsstark Wissensdatenbank Bündle dein Wissen Projekte Verwalte jede Art von Projekt Websites Veröffentliche alles Mögliche im Handumdrehen Loslegen KI-Anwendungsfälle entdecken Schau dir an, wozu die Notion-KI in der Lage ist Marktplatz durchstöbern Vorlagen für alles Mögliche Einbindungen anzeigen Verbinde deine Apps mit Notion Web Clipper herunterladen Speichere Inhalte aus dem Web in Notion Teste die Desktop-App von Notion für mehr Geschwindigkeit App herunterladen Mail Calendar KI Enterprise Tarife Erkunden Teams Entwicklung und Produkt Design Marketing IT Teamgröße Start-ups KMUs Konzerne Bildungswesen Lernen Hilfe-Center Notion Academy Erfahrungsberichte von Kund/-innen Blog Community Partnerprogramme Entwickeln API Vorlagen Sicherheit Beratung Fordere eine Demo an Anmelden Nutze Notion kostenlos Produktentwicklung – leicht gemacht Entwickle bessere Produkte schneller, indem du deinen gesamten Entwicklungsprozess in einer vernetzten Plattform optimierst. Demo anfordern Kostenlos testen Wissensdatenbank Ein durchsuchbarer Speicherort für deine Spezifikationen, OKRs und ältere Dokumente Kundenfeedback Verwandle Nutzerfeedback in umsetzbare Erkenntnisse Roadmap-Planung Erstelle effektive Roadmaps, die das gesamte Team einsehen, gestalten und umsetzen kann Projekt- und Issue-Tracking Verfolge jeden Sprint, Bug und Launch über all deine Tools und Teams hinweg Notions anpassbare Projektmanagementansicht für Aufgaben, Formularen und Abhängigkeiten Team nutzt Notion, um Projekte und Wissen in einem vernetzten Workspace zu verwalten. Die Notion-KI beantwortet eine Anfrage über Teamdokumente und Datenbanken hinweg Die Notion-KI beantwortet eine Anfrage über Teamdokumente und Datenbanken hinweg Eine zu große Auswahl an Tools beeinträchtigt die Produktgeschwindigkeit. Isolierte Teams und Informationen Strategie und Umsetzung sind auf verschiedene Tools verteilt, was zu Launch-Verzögerungen führt. Mangelnde Sichtbarkeit Dokumente, Informationen und Updates sind überall verfügbar, was zu schlecht durchdachten Entscheidungen führt. Produktivitätsverlust Teams verbringen Stunden mit Suchen, Schreiben und Kontextwechseln, statt einfach etwas zu entwickeln. Versende bessere Produkte noch schneller mit einem verbundenen Workspace. Durchgehende Produktentwicklung an einem Ort Analysiere Kundenfeedback, schreibe PRDs, verfolge den Fortschritt und erstelle Launch-Pläne in einem vernetzten Workspace. Ein Ort für all deine Tools Verbinde wichtige Apps und sieh nur das, was du brauchst. Weniger Kontextwechsel, mehr Arbeitsfluss. KI-gestützte Produktentwicklung Beschleunige Entwicklungszyklen mit einer umfassenden KI-Assistenz, die dir bei jedem Schritt in der Produktentwicklung behilflich ist. KI-automatisierte Workflows Optimiere manuelle Arbeit wie Meeting-Notizen, Aktionselemente, PRDs und Fortschrittsupdates. Konzentriere dich auf das Erschaffen. In schnelllebigen Umgebungen mit hoher Komplexität benötigst du eine Möglichkeit, all diese Informationen zu erfassen und zu verstehen. Notion ist so ziemlich das einzige Tool, mit dem ich das schaffen kann. John Allard Engineering, OpenAI #1 Wissensdatenbank und KI-Schreibassistent (G2) 94 % der Forbes AI 50-Teams nutzen Notion 90 % der Forbes Cloud 100-Teams nutzen Notion Vernetzt Mehr Transparenz für bessere Produktentscheidungen. Teams können jetzt viel einfacher auf das Wissen zugreifen, das sie brauchen, um auf dem gleichen Stand zu sein, schneller voranzukommen und fundiertere Entscheidungen zu treffen. Reibungslos Reibungslose Übergaben und Workflows ergeben schnellere Markteinführungen. Roadmaps, PRDs und technische Spezifikationen bleiben mit Projekten und Aufgaben verknüpft. Dank automatisierter Workflows und Updates bleiben technische Teams mühelos auf dem gleichen Stand – ohne Wissensverlust oder veraltete Dokumente. Anpassungsfähig Flexibilität beim Aufbau des Traum-Workspace für dein Team Verzichte auf starre Voreinstellungen. Passe Workflows, Ansichten und Automatisierungen ganz einfach an die Arbeitsweise deines Teams an – ohne unnötigen Ballast. Ein Tool, das technische Teams tatsächlich nutzen wollen. Notion schließt die Lücke zwischen unserer High-Level Produktvision und den kleinsten Details der Entwicklung. Elliott Choi Staff Produktmanager, Cohere Alles steht und fällt mit der Launch-Geschwindigkeit. Wir haben eine Kultur geschaffen, bei der es auf eine möglichst kurze Zeit zur Bereitstellung ankommt – und Notion spielt dabei eine entscheidende Rolle. Lee Robinson VP of Product, Vercel Notion bot uns den leistungsstärksten und effektivsten Ansatz zur Optimierung unseres Workflows. Rahim Makani Produktdirektor, Match Halte alles synchron. Gib deiner Produktentwicklung einen zentralen Ort. Integriere Wireframes und Spezifikationen, automatisiere die Aufgabenverfolgung, synchronisiere Pull-Requests und finde Antworten in verschiedenen Apps – und das alles innerhalb von Notion. Alle Einbindungen anzeigen → Bist du bereit, etwas Schönes zu erschaffen? Deine zentralisierte Produktentwicklung in Notion Bringe die Dokumente, Aufgaben und Kommunikation deines Teams in einem gemeinsamen Workspace zusammen. So geht die Arbeit deutlicher schneller von der Hand. Anleitung lesen → Notion für Produkt-Roadmaps Sieh dir an, wie Produktmanager Projekte teamübergreifend verfolgen, organisatorisches Wissen aufrechterhalten und den Fortschritt automatisch synchronisieren. Interaktive Demo testen → Binde deinen Code in die GitHub-Integration ein Optimiere deine Produktentwicklung, verbessere die Zusammenarbeit und halte deinen Code und deine Dokumentation stets perfekt synchronisiert. Anleitung lesen → Willkommen in der Zukunft der Produktentwicklung. Sprich mit einem Experten oder einer Expertin und erfahre, welche Möglichkeiten sich ergeben, wenn deine Produktentwicklung an einem einzigen vernetzten Ort stattfindet. Demo anfordern Deutsch Cookie-Einstellungen © 2026 Notion Labs, Inc. Unternehmen Über uns Karriere Sicherheit Status Nutzungsbedingungen und Datenschutz Deine Datenschutzrechte Download iOS und Android Mac und Windows Calendar Web Clipper Ressourcen Hilfe-Center Preise Blog Community Einbindungen Vorlagen Partnerprogramme Notion für Unternehmen Kleine Unternehmen Persönlich Mehr entdecken →
2026-01-13T09:29:55
https://play.google.com/store/apps/details?id=notion.id&amp;hl=es_PR
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M12 17.27L
2026-01-13T09:29:56
https://www.telegraph.co.uk/world-news/
World News - The Telegraph Jump to content UK News Website of the Year 2024 Search Icon News Sport Business Money Travel Calculators Opinion Ukraine Health Recommended Lifestyle Culture Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Search Icon Subscribe now Log in See all News UK news UK news home Scotland Wales Northern Ireland Politics Conservatives Labour Lib Dems Reform UK SNP US politics World US News Europe Middle East Asia Australasia Africa South America Donald Trump Health news Defence Science Education Environment Investigations Investigations home Signals Network Contact us Global Health Security Global Health Security home Climate &amp; People Science &amp; Disease Terror &amp; Security Women &amp; Girls Opinion &amp; Analysis Royals King Charles III Queen Camilla Prince William Princess of Wales Prince Harry Duchess of Sussex Sections UK Edition US Edition News News home UK news Politics World Donald Trump Health news Defence Science Education Environment Investigations Global Health Security Royals Sport Sport home Football Rugby Union Cricket Golf F1 Tennis Racing Women&#39;s Sport Cycling Boxing Betting More... Business Business home Economy Companies Markets Tech Money Money home Property Tax Pensions Banking Investing Net Zero Calculators Guides Travel Travel home Europe UK Worldwide City breaks Hotels Cruise Ski Advice Calculators Opinion Opinion home Obituaries Letters to the Editor Telegraph View Our columnists Cartoons Ukraine Ukraine home Daily podcast Weekly newsletter Health Health home Diet Fitness Conditions Wellbeing Parenting Guides Tools Recommended Recommended home Home Garden Sleep Tech Health &amp; Fitness Beauty &amp; Grooming Travel &amp; Outdoors Parenting Lifestyle Lifestyle home Recipes Food &amp; Drink Fashion Beauty Luxury Cars Gardening Culture Culture home TV Film Music Books Theatre Comedy Dance Opera Classical Art Telegraph Tickets Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Subscribe now Log in Login icon Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon More from The Telegraph Download our app Help and support Newsletters Recommended Financial Solutions Events Dating Offers Travel offers Shop Garden shop Bookshop Tickets Puzzles Fantasy Football Work at The Telegraph Telegraph Corporate Announcements The Chelsea Magazine Company Voucher codes See top shops Samsung Nike ASOS eBay Currys Wayfair TUI JD Sports Travelodge Adidas US tells citizens to leave Iran as Trump mulls strikes President may attack first and hold talks later, American officials say Kieran Kelly Save Trump slaps 25pc tariffs on countries trading with Iran Save The Pakistani Thunder fighter jet air forces are lining up to buy Save Iran threatens Trump with ‘unforgettable lesson’ if US attacks Save Myanmar goes on trial for genocide in ‘Gaza test case’ Save Starmer should be asking why China needs 208 underground rooms at its new embassy Save Israel at war Myanmar goes on trial for genocide in ‘Gaza test case’ Save Jewish MP banned from school after pro-Palestine campaign Save Israel’s proposed ambassador to Britain arrested and banned from leaving country Save Ephraim Mirvis Genocide is humanity’s gravest crime. It should not be used as a political insult Save Describing Israel-Gaza war as ‘genocide’ trivialises term, says Chief Rabbi Save Nicole Lampert The BBC’s meagre coverage of the Iran protests has been disgraceful Save Blair’s sister-in-law calls October 7 ‘legendary’ Save Battle Lines podcast Advertisement Ukraine in focus John Woodcock The City of London can be a powerful weapon against the shadow fleets of Iran and Russia UK brokers are uniquely placed to choke off the illicit oil flows that sustain authoritarian regimes Save Russia forces African recruits to become suicide bombers Save Hamish de Bretton-Gordon Russia’s absurd ‘dandelion’ tank shows just how desperate Putin is getting Save Tim Stanley Trump controls the world, and Britain ought to let him have it Save Zelensky hopes reshuffle will give him a better hand at home and away Save Letters to the Editor Labour’s refusal to prioritise defence over welfare leaves Britain exposed Save Ukraine: The Latest Podcast Advertisement United States Trump slaps 25pc tariffs on countries trading with Iran Save UK officials may be barred from US over X ban Save BBC tries to throw out Trump’s $10bn editing scandal lawsuit Save Trump fires lawyer over failure to reopen James Comey case Save Hermer ‘paved the way for payout to Guantanamo terror suspect’ Save Iran protesters rammed by truck in LA Save Self-mutilation and crystal meth: The ‘Chad mindset’ enticing Maga’s young men Save Dispatches My return to Israel in search of Trump’s new peace Save The Ukrainian double-agent playing Russia at its own game Save The parents’ revolt that drove Madeleine McCann suspect from home Save Advertisement Europe Avalanche kills British skier in French Alps Germany plans Nato mission to protect Greenland Turkish man supplied thousands of small boats to people smugglers Middle East US tells citizens to leave Iran as Trump mulls strikes Trump slaps 25pc tariffs on countries trading with Iran Iran threatens Trump with ‘unforgettable lesson’ if US attacks Asia The Pakistani Thunder fighter jet air forces are lining up to buy South Korean ‘hooligans’ will pay for drone incursions, says Pyongyang They protested peacefully. Iran answered with bullets Australasia Inside the covert mission to save Filipino children from British paedophiles Australian teenagers skirt world’s first social media ban New Zealand mother jailed for life after murdering children and hiding bodies in suitcase Africa Sudan’s government returns to Khartoum three years after being forced out Russia forces African recruits to become suicide bombers On the road with the ghetto pop star taking on Uganda’s dictator South America The US weapons that stole Maduro’s power Trump’s ‘Donroe Doctrine’ could be a resounding success. This is how Cubans plead for regime change – just not the Trump variety Pagination Previous Next World news Stay up to date with breaking international news, in-depth analysis and expert commentary from The Telegraph’s global network of correspondents. From politics and business to culture and conflict, we bring you trusted reporting on the events shaping our world The Telegraph Back to top Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon Download the Telegraph App Recommended Podcasts Syndication and Commissioning Help Centre Betting Branded Content Privacy Reader Prints Theatre Tickets Careers About us Announcements Puzzles Guidelines Terms &amp; Conditions Newsletters Crosswords Tax Strategy Advertising terms Subscribe Cryptic Crossword Modern Slavery Subscription Terms &amp; Conditions Gift Subscriptions Plusword The Chelsea Magazine Company &copy; Telegraph Media Group Holdings Limited 2026
2026-01-13T09:29:56
https://openchainproject.org/category/featured
Featured &#8211; OpenChain Skip to main content Search Close Search search Menu Adopt Our Standards Reference Library Webinars Participate Ambassadors Partners Processes FAQ About News twitter linkedin github search Category Featured Dec 22 Panasonic Automotive Systems Announces OpenChain ISO/IEC 5230 Conformance By Shane Coughlan Featured , News Today Panasonic Automotive Systems has announced an OpenChain ISO/IEC 5230 conferment program. As a leading Tier 1 automotive supplier, Panasonic Automotive Systems is at the forefront of both using and effectively managing open source technology. &#8220;During the certification process, we worked to improve the reliability of our OSS usage and products by structuring OSS utilization processes and building a highly secure management system.” said Masashige Mizuyama, Executive Vice President and Chief Technology Officer at Panasonic Automotive Systems. &#8220;We have actively contributed to the industry by promoting the standardization and open-sourcing of VirtIO, an open-source virtualization technology. Taking this certification as an opportunity, we will continue to provide high-quality and highly reliable solutions leveraging OSS, and contribute to the expansion and sustainable growth of the open source ecosystem in the in-vehicle device industry.&#8221; “We are delighted to welcome Panasonic Automotive Systems into our community of conformance,” says Shane Coughlan, OpenChain General Manager. “Adoption of OpenChain ISO/IEC 5230 has been exceptional across the automotive supply chain, and the influence and inspiration provided by Tier 1 adoption cannot be overstated. We look forward to working with the Panasonic Automotive Systems team in the months and years ahead.&#8221; About Panasonic Automotive Systems Co., Ltd.: Panasonic Automotive Systems Co., Ltd., (PAS) was launched on April 1, 2022 as an operating company responsible for the automotive systems business in line with the start of the Panasonic Group’s operating company system, and on December 2, 2024 the company moved to a management structure in which 80% of its shares are held by the funds managed by an affiliate of Apollo Global Management, Inc. and 20% by Panasonic Holdings Corporation. Headquartered in Japan, PAS is a global company with subsidiaries in eight other countries and, as a Tier 1 company, it provides advanced proprietary technologies such as infotainment systems to automakers in Japan and overseas, helping to create comfortable, safe, and secure automobiles. PAS is committed to meeting the expectations of its customers around the world with technologies that stand by people in pursuit of its corporate vision of becoming the “Joy in Motion” design company. To learn more about our company, please visit https://automotive.panasonic.com/en About the OpenChain Project: The OpenChain Project has an extensive global community of over 1,000 companies collaborating to make the supply chain quicker, more effective and more efficient. It maintains OpenChain ISO/IEC 5230, the international standard for open source license compliance programs and OpenChain ISO/IEC 18974, the industry standard for open source security assurance programs. About The Linux Foundation: The Linux Foundation is the world’s leading home for collaboration on open source software, hardware, standards, and data. Linux Foundation projects are critical to the world’s infrastructure, including Linux, Kubernetes, Node.js, ONAP, PyTorch, RISC-V, SPDX, OpenChain, and more. The Linux Foundation focuses on leveraging best practices and addressing the needs of contributors, users, and solution providers to create sustainable models for open collaboration. For more information, please visit us at linuxfoundation.org. Check Out The Publicly Announced Community of Conformance: https://openchainproject.org/community-of-conformance Dec 16 Analog Devices, Inc. has announced OpenChain ISO/IEC 5230:2020 conformance By Shane Coughlan Featured , News Analog Devices, Inc. (ADI) has announced an OpenChain ISO/IEC 5230:2020 conformant program, making another important step forward for open source governance and management in the global silicon supply chain. “Achieving OpenChain conformance underscores our belief that open source stewardship is foundational to engineering excellence,” said Rob Oshana, Senior Vice President, Software &amp; Digital Platforms at ADI. “It reinforces our commitment to transparent processes, clear compliance standards and continuous improvement across the software lifecycle.” “ADI is an excellent steward of open source,” says Shane Coughlan, OpenChain General Manager. “Their contributions to the open source community have been notable too, not least their direct engagement with the OpenChain Project as we have developed and deployed standards and reference material related to open source compliance. It is a genuine pleasure to welcome them to our community of conformance, and we look forward to continued collaboration in the future.&#8221; About ADI ADI is a global semiconductor leader that bridges the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, AI, and software technologies into solutions that help drive advancements in automation and robotics, mobility, energy and data centers, and healthcare, combat climate change, and reliably connect humans and the world. With revenue of more than $11 billion in FY25, ADI ensures today&#8217;s innovators stay Ahead of What&#8217;s Possible. Learn more at www.analog.com and on LinkedIn and X (formerly Twitter). About the OpenChain Project: The OpenChain Project has an extensive global community of over 1,000 companies collaborating to make the supply chain quicker, more effective and more efficient. It maintains OpenChain ISO/IEC 5230, the international standard for open source license compliance programs and OpenChain ISO/IEC 18974, the industry standard for open source security assurance programs. About The Linux Foundation: The Linux Foundation is the world’s leading home for collaboration on open source software, hardware, standards, and data. Linux Foundation projects are critical to the world’s infrastructure, including Linux, Kubernetes, Node.js, ONAP, PyTorch, RISC-V, SPDX, OpenChain, and more. The Linux Foundation focuses on leveraging best practices and addressing the needs of contributors, users, and solution providers to create sustainable models for open collaboration. For more information, please visit us at  linuxfoundation.org . Dec 15 Open Compliance Summit 2025 &#8211; Review and Photos By Shane Coughlan Featured , News The Open Compliance Summit 2025 was a tremendous success, with strong representation from China, Japan, Korea, Germany, Sweden, the United States, the United Kingdom, India and more. Over a packed schedule on the 11th and 12th December, attendees shared knowledge, networked and provided an exceptionally strong analysis of what is coming for licensing, security and regulatory compliance in 2026. This event provided a substantial amount of analysis around OpenChain Project-related activities, ranging from the ISO standards to capability modeling, SBOM quality and AI System Bill of Material management. The Open Compliance Summit is expected be held again in December 2026, and talk submissions are welcome. Learn more about the event on the official LF website around April 2026: https://events.linuxfoundation.org OCS_Japan_251211_001 OCS_Japan_251211_002 OCS_Japan_251211_003 OCS_Japan_251211_004 OCS_Japan_251211_005 OCS_Japan_251211_006 OCS_Japan_251211_007 OCS_Japan_251211_008 OCS_Japan_251211_009 OCS_Japan_251211_010 OCS_Japan_251211_011 OCS_Japan_251211_012 OCS_Japan_251211_013 OCS_Japan_251211_014 OCS_Japan_251211_015 OCS_Japan_251211_016 OCS_Japan_251211_017 OCS_Japan_251211_018 OCS_Japan_251211_019 OCS_Japan_251211_020 OCS_Japan_251211_021 OCS_Japan_251211_022 OCS_Japan_251211_023 OCS_Japan_251211_024 OCS_Japan_251211_025 OCS_Japan_251211_026 OCS_Japan_251211_027 OCS_Japan_251211_028 OCS_Japan_251211_029 OCS_Japan_251211_030 OCS_Japan_251211_031 OCS_Japan_251211_032 OCS_Japan_251211_033 OCS_Japan_251211_034 OCS_Japan_251211_035 OCS_Japan_251211_036 OCS_Japan_251211_037 OCS_Japan_251211_038 OCS_Japan_251211_039 OCS_Japan_251211_040 OCS_Japan_251211_041 OCS_Japan_251211_042 OCS_Japan_251211_043 OCS_Japan_251211_044 OCS_Japan_251211_045 OCS_Japan_251211_046 OCS_Japan_251211_047 OCS_Japan_251211_048 OCS_Japan_251211_049 OCS_Japan_251211_050 OCS_Japan_251211_051 OCS_Japan_251211_052 OCS_Japan_251211_053 OCS_Japan_251211_054 OCS_Japan_251211_055 OCS_Japan_251211_056 OCS_Japan_251211_057 OCS_Japan_251211_058 OCS_Japan_251211_059 OCS_Japan_251211_060 OCS_Japan_251211_061 OCS_Japan_251211_062 OCS_Japan_251211_063 OCS_Japan_251211_064 OCS_Japan_251211_065 OCS_Japan_251211_066 OCS_Japan_251211_067 OCS_Japan_251211_068 OCS_Japan_251211_069 OCS_Japan_251211_070 OCS_Japan_251211_071 OCS_Japan_251211_072 OCS_Japan_251211_073 OCS_Japan_251211_074 OCS_Japan_251211_075 OCS_Japan_251211_076 OCS_Japan_251211_077 OCS_Japan_251211_078 OCS_Japan_251211_079 OCS_Japan_251211_080 OCS_Japan_251211_081 OCS_Japan_251211_082 OCS_Japan_251211_083 OCS_Japan_251211_084 OCS_Japan_251211_085 OCS_Japan_251211_086 OCS_Japan_251211_087 OCS_Japan_251211_088 OCS_Japan_251211_089 OCS_Japan_251211_090 OCS_Japan_251211_091 OCS_Japan_251211_092 OCS_Japan_251211_093 OCS_Japan_251211_094 OCS_Japan_251211_095 OCS_Japan_251211_096 OCS_Japan_251211_097 OCS_Japan_251211_098 OCS_Japan_251211_099 OCS_Japan_251211_100 OCS_Japan_251211_101 OCS_Japan_251211_102 OCS_Japan_251211_103 OCS_Japan_251211_104 OCS_Japan_251211_105 OCS_Japan_251211_106 OCS_Japan_251211_107 OCS_Japan_251211_108 OCS_Japan_251211_109 OCS_Japan_251211_110 OCS_Japan_251211_111 OCS_Japan_251211_112 OCS_Japan_251211_113 OCS_Japan_251211_114 OCS_Japan_251211_115 OCS_Japan_251211_116 OCS_Japan_251211_117 OCS_Japan_251211_118 OCS_Japan_251211_119 OCS_Japan_251211_120 OCS_Japan_251211_121 OCS_Japan_251211_122 OCS_Japan_251211_123 OCS_Japan_251211_124 OCS_Japan_251211_125 OCS_Japan_251211_126 OCS_Japan_251211_127 OCS_Japan_251211_128 OCS_Japan_251211_129 OCS_Japan_251211_130 OCS_Japan_251211_131 OCS_Japan_251211_132 OCS_Japan_251211_133 OCS_Japan_251211_134 OCS_Japan_251211_135 OCS_Japan_251211_136 OCS_Japan_251211_137 OCS_Japan_251211_138 OCS_Japan_251211_139 OCS_Japan_251211_140 OCS_Japan_251211_141 OCS_Japan_251211_142 OCS_Japan_251211_143 OCS_Japan_251211_144 OCS_Japan_251211_145 OCS_Japan_251211_146 OCS_Japan_251211_147 OCS_Japan_251211_148 OCS_Japan_251211_149 OCS_Japan_251211_150 OCS_Japan_251211_151 OCS_Japan_251211_152 OCS_Japan_251211_153 OCS_Japan_251211_154 OCS_Japan_251211_155 OCS_Japan_251211_156 OCS_Japan_251211_157 OCS_Japan_251212_001 OCS_Japan_251212_002 OCS_Japan_251212_003 OCS_Japan_251212_004 OCS_Japan_251212_005 OCS_Japan_251212_006 OCS_Japan_251212_007 OCS_Japan_251212_008 OCS_Japan_251212_009 OCS_Japan_251212_010 OCS_Japan_251212_011 OCS_Japan_251212_012 OCS_Japan_251212_013 OCS_Japan_251212_014 OCS_Japan_251212_015 OCS_Japan_251212_016 OCS_Japan_251212_017 OCS_Japan_251212_018 OCS_Japan_251212_019 OCS_Japan_251212_020 OCS_Japan_251212_021 OCS_Japan_251212_022 OCS_Japan_251212_023 OCS_Japan_251212_024 OCS_Japan_251212_025 OCS_Japan_251212_026 OCS_Japan_251212_027 OCS_Japan_251212_028 OCS_Japan_251212_029 OCS_Japan_251212_030 OCS_Japan_251212_031 OCS_Japan_251212_032 OCS_Japan_251212_033 OCS_Japan_251212_034 OCS_Japan_251212_035 OCS_Japan_251212_036 OCS_Japan_251212_037 OCS_Japan_251212_038 OCS_Japan_251212_039 OCS_Japan_251212_040 OCS_Japan_251212_041 OCS_Japan_251212_042 OCS_Japan_251212_043 OCS_Japan_251212_044 OCS_Japan_251212_045 OCS_Japan_251212_046 OCS_Japan_251212_047 OCS_Japan_251212_001 OCS_Japan_251212_002 OCS_Japan_251212_003 OCS_Japan_251212_004 OCS_Japan_251212_005 OCS_Japan_251212_006 OCS_Japan_251212_007 OCS_Japan_251212_008 OCS_Japan_251212_009 OCS_Japan_251212_010 OCS_Japan_251212_011 OCS_Japan_251212_012 OCS_Japan_251212_013 OCS_Japan_251212_014 OCS_Japan_251212_015 OCS_Japan_251212_016 OCS_Japan_251212_017 OCS_Japan_251212_018 OCS_Japan_251212_019 OCS_Japan_251212_020 OCS_Japan_251212_021 OCS_Japan_251212_022 OCS_Japan_251212_023 OCS_Japan_251212_024 OCS_Japan_251212_025 OCS_Japan_251212_026 OCS_Japan_251212_027 OCS_Japan_251212_028 OCS_Japan_251212_029 OCS_Japan_251212_030 OCS_Japan_251212_031 OCS_Japan_251212_032 OCS_Japan_251212_033 OCS_Japan_251212_034 OCS_Japan_251212_035 OCS_Japan_251212_036 OCS_Japan_251212_037 OCS_Japan_251212_038 OCS_Japan_251212_039 OCS_Japan_251212_040 OCS_Japan_251212_041 OCS_Japan_251212_042 OCS_Japan_251212_043 OCS_Japan_251212_044 OCS_Japan_251212_045 OCS_Japan_251212_046 OCS_Japan_251212_047 This event also marked the last public event of our current General Manager, Shane Coughlan. We had a little ceremony and took some photos. IMG_2022 IMG_6002 IMG_6003 IMG_6004 IMG_6005 IMG_6006 IMG_6007 IMG_6008 IMG_6009 IMG_6010 IMG_6011 IMG_6012 IMG_6013 IMG_6014 IMG_6015 IMG_6016 IMG_6017 IMG_6018 IMG_6019 IMG_6020 IMG_6021 IMG_6022 IMG_6023 IMG_6024 IMG_6025 IMG_6027 IMG_6028 IMG_6029 IMG_6030 IMG_6031 IMG_6032 IMG_6034 IMG_6035 IMG_6037 IMG_6038 IMG_6039 IMG_6040 IMG_6041 IMG_6042 IMG_6043 IMG_6044 IMG_6045 IMG_6046 IMG_6047 IMG_6048 IMG_6049 IMG_6050 IMG_6051 IMG_6052 IMG_6055 IMG_6056 IMG_6057 IMG_6058 IMG_6059 IMG_6060 IMG_6061 IMG_6062 IMG_6063 IMG_6064 IMG_6065 IMG_6066 IMG_6067 IMG_6068 IMG_6069 Nov 28 A Message from the Governing Board of the OpenChain Project By Shane Coughlan Featured , News A message from the Governing Board of the OpenChain Project: We wanted to let you know that there will be a rotation in the administrative leadership of the OpenChain Project in Mid-December 2025. Shane Coughlan, our General Manager over the last eight years, will be transitioning to work on a personal venture, and we will shortly be announcing a new executive leader in the same role. In the meantime, the Governing Board, The Linux Foundation project management office, the Work Group Chairs and the Ambassadors will collaborate as usual to continue our normal meetings, releases and community building. The Governing Board would like to express their gratitude to Shane for all the work he has put into the project over the years, constantly going above and beyond. Shane’s work with the OpenChain Project is nothing short of spectacular, he has been a community builder, role model, and friend to the OpenChain community and he will be missed. The board want to wish him the best of luck in his new endeavors and for him to know that he will forever remain part of the OpenChain family he helped create. “I have been honored to work on this project, with this board and with everyone in our exceptional community over the last eight and a half years,” says Shane Coughlan, OpenChain General Manager. “After such a long period, and enjoying so much collective success, it is a difficult decision to move on to a new venture. However, there is a personal project that I want to attend to, and the passage of time has suggested to me that it is appropriate to begin work on that activity. I will speak more to this in early 2026, but for now my focus is on finalizing the transition of the administrative leadership of the OpenChain Project. We have extensive internal process material and a purposefully distributed management system to aide in sustainability and such transitions, and I am fully confident in the health and continued momentum of the project and our activities. In closing, I want to take a moment to thank everyone who has made this journey possible for me. While there are too many people to name individually &#8211; such is the scale of our community and accomplishment &#8211; I would like to give special thanks to David Marr of Qualcomm for leading the foundation of the OpenChain Project, to Jimmy Ahlberg of Ericsson for leading us through the evolution into a multi-ISO standard project, to Watanabe San, Kobota San, Owada San and Fukuchi San for being instrumental in the development of our work in Japan, to Haksung Jang for leading our work in Korea to such success, to Zhenhua Sun in China for his leadership and driving frequent local meetings, to Oliver Fendt and Marcel Kurzmann in Germany for endlessly encouraging and supporting one of the exceptional local communities in the domain of processes and automation, and finally to the dearly departed Ueda San for providing inspiration in community building that has always helped guide and ensure the success of what we do. And finally my thanks to you all, who have attended calls, come to meetings and read (and reshared) our news across the world. You made this community, and you made this success. I am grateful to call you my colleagues in open source.” An administrative note: For those of you interested in learning more about this transition for 2026 &#8211; and about the executive leadership role &#8211; you can contact Renu from the Project Management office at helpdesk@lists.openchainproject.org Nov 10 CJ Logistics Becomes First in Korean Logistics Industry to Adopt OpenChain ISO/IEC 5230 By Shane Coughlan Featured , News CJ Logistics announced on the 5th that it has obtained ‘OpenChain ISO/IEC 5230:2020&#8242; international standard certification. The OpenChain Project, an initiative led by the U.S. non-profit organization The Linux Foundation, maintains  &#8216;ISO/IEC 5230:2020&#8217; and provides self-certification support to companies. These companies can use the standard and self-certification material to audit and develop a robust open source license compliance program and management capabilities. This achievement is the first of its kind among Korean logistics companies and signifies that CJ Logistics has received international recognition for its responsible management of open source software throughout its digital transformation. About the OpenChain Project: The OpenChain Project has an extensive global community of over 1,000 companies collaborating to make the supply chain quicker, more effective and more efficient. It maintains OpenChain ISO/IEC 5230, the international standard for open source license compliance programs and OpenChain ISO/IEC 18974, the industry standard for open source security assurance programs. About The Linux Foundation: The Linux Foundation is the world’s leading home for collaboration on open source software, hardware, standards, and data. Linux Foundation projects are critical to the world’s infrastructure, including Linux, Kubernetes, Node.js, ONAP, PyTorch, RISC-V, SPDX, OpenChain, and more. The Linux Foundation focuses on leveraging best practices and addressing the needs of contributors, users, and solution providers to create sustainable models for open collaboration. For more information, please visit us at  linuxfoundation.org . Check Out The Publicly Announced Community of Conformance: https://openchainproject.org/community-of-conformance Nov 10 Telechips Announces an OpenChain ISO/IEC 5230 Conformant Program By Shane Coughlan Featured , News Telechips, a leading global fabless company specializing in SoC (System on Chip) solutions for automotive and smart devices, has announced an OpenChain ISO/IEC 5230 conformant program. “The acquisition of OpenChain certification demonstrates that Telechips has advanced beyond simply utilizing open source to establishing systematic management capabilities and transparent governance in compliance with global standards,” said Jiyoung Yeon, Open Source Manager at Telechips. “Building on our technological expertise and trusted reputation in automotive semiconductor design, we will continue to strengthen transparent open source operations—such as Software Bill of Materials (SBOM) management—and actively contribute to the growth of the global open source ecosystem and the establishment of sustainable technology standards.” &#8220;We are delighted to welcome Telechips to the OpenChain Community of Conformance,&#8221; says Shane Coughlan, OpenChain General Manager. &#8220;This is another landmark in demonstrating the applicability of our ISO standard for open source license compliance with industries of all types across the global supply chain. We look forward to working with our colleagues at Telechips and with other companies in the silicon domain on the management of open source.&#8221; About Telechips: Telechips is a leading global fabless company specializing in SoC (System on Chip) solutions for automotive and smart devices. With more than 25 years of innovation and expertise, Telechips provides high-performance and secure semiconductor platforms that power next-generation infotainment, digital cluster, ADAS, and connectivity systems. As the industry rapidly shifts toward SDVs (software-defined vehicles), we are expanding beyond our core in-vehicle infotainment application processors (APs) to a next-generation lineup that includes MCUs, ADAS solutions, and in-vehicle networking. Backed by globally competitive high-performance, low-power SoC design capabilities and customer-tailored solutions, Telechips is accelerating its entry into the global SDV market. We also practice ESG management to help build a sustainable future. Guided by our vision—“New innovations for the future our customers want”—we partner with global customers to shape a better tomorrow. About the OpenChain Project: The OpenChain Project has an extensive global community of over 1,000 companies collaborating to make the supply chain quicker, more effective and more efficient. It maintains OpenChain ISO/IEC 5230, the international standard for open source license compliance programs and OpenChain ISO/IEC 18974, the industry standard for open source security assurance programs. About The Linux Foundation: The Linux Foundation is the world’s leading home for collaboration on open source software, hardware, standards, and data. Linux Foundation projects are critical to the world’s infrastructure, including Linux, Kubernetes, Node.js, ONAP, PyTorch, RISC-V, SPDX, OpenChain, and more. The Linux Foundation focuses on leveraging best practices and addressing the needs of contributors, users, and solution providers to create sustainable models for open collaboration. For more information, please visit us at linuxfoundation.org. Check Out The Publicly Announced Community of Conformance: https://openchainproject.org/community-of-conformance Nov 07 NXP Semiconductors Announces an ISO/IEC 5230 Conformant Program By Shane Coughlan Featured , News NXP Semiconductor, a company that designs purpose-built, rigorously tested technologies that enable devices to sense, think, connect and act intelligently, has announced an OpenChain ISO/IEC 5230 conformant program. &#8220;This achievement shows our strong commitment to both using and contributing to Open Source Software and our effort to keep the highest standards for software integrity and legal adherence,&#8221; says Ileana Bratu, Open-Source Operations Manager at NXP. &#8220;Compliance goes beyond certification; it is part of our engineering mindset. We will keep improving our open source compliance program, give continuous training and encourage a culture of awareness and responsibility in all development teams.&#8221; “It is a deep pleasure to welcome NXP to the OpenChain community,” Shane Coughlan, OpenChain General Manager. “The automotive and semiconductor industries share a deep bond not only in product, but also in how they apply rigor to process management, regulatory compliance and excellence in management. I am grateful to work alongside companies like NXP in developing a more trusted global supply chain” About NXP Semiconductors: NXP Semiconductors N.V. (NASDAQ: NXPI) is the trusted partner for innovative solutions in the automotive, industrial &amp; IoT, mobile, and communications infrastructure markets. NXP&#8217;s &#8220;Brighter Together&#8221; approach combines leading-edge technology with pioneering people to develop system solutions that make the connected world better, safer, and more secure. The company has operations in more than 30 countries and posted revenue of $12.61 billion in 2024. Find out more at http://www.nxp.com/. NXP and the NXP logo are trademarks of NXP B.V. All other product or service names are the property of their respective owners. All rights reserved. © 2025 NXP B.V About the OpenChain Project: The OpenChain Project has an extensive global community of over 1,000 companies collaborating to make the supply chain quicker, more effective and more efficient. It maintains OpenChain ISO/IEC 5230, the international standard for open source license compliance programs and OpenChain ISO/IEC 18974, the industry standard for open source security assurance programs. About The Linux Foundation: The Linux Foundation is the world’s leading home for collaboration on open source software, hardware, standards, and data. Linux Foundation projects are critical to the world’s infrastructure, including Linux, Kubernetes, Node.js, ONAP, PyTorch, RISC-V, SPDX, OpenChain, and more. The Linux Foundation focuses on leveraging best practices and addressing the needs of contributors, users, and solution providers to create sustainable models for open collaboration. For more information, please visit us at linuxfoundation.org. Check Out The Publicly Announced Community of Conformance: https://openchainproject.org/community-of-conformance Oct 31 Hancom Announces an OpenChain ISO/IEC 5230 Conformant Program By Shane Coughlan Featured , News Hancom has announced an OpenChain ISO/IEC 5230 conformant program. &#8220;We are delighted to welcome Hancom to the OpenChain community of conformance,&#8221; says Shane Coughlan, OpenChain General Manager. &#8220;Korea has a vibrant technology ecosystem, and the companies in the local area have an exceptional commitment to process excellent. Hancom is a great example of this, and we look forward to working with them to inspire other companies to adopt and use the international standard for open source license compliance.&#8221; About Hancom: Hancom Inc. (KOSDAQ: 030520) is software development company based in South Korea. It was founded in 1990 and is well-known for Hangul, a word processer for the Korean language. They maintain a broad portfolio of products, including in the field of AI. About the OpenChain Project: The OpenChain Project has an extensive global community of over 1,000 companies collaborating to make the supply chain quicker, more effective and more efficient. It maintains OpenChain ISO/IEC 5230, the international standard for open source license compliance programs and OpenChain ISO/IEC 18974, the industry standard for open source security assurance programs. About The Linux Foundation: The Linux Foundation is the world’s leading home for collaboration on open source software, hardware, standards, and data. Linux Foundation projects are critical to the world’s infrastructure, including Linux, Kubernetes, Node.js, ONAP, PyTorch, RISC-V, SPDX, OpenChain, and more. The Linux Foundation focuses on leveraging best practices and addressing the needs of contributors, users, and solution providers to create sustainable models for open collaboration. For more information, please visit us at  linuxfoundation.org . Check Out The Publicly Announced Community of Conformance: https://openchainproject.org/community-of-conformance Oct 24 Elektrobit strengthens software supply chain with OpenChain ISO/IEC 5230:2020 conformance announcement By Shane Coughlan Featured , News Erlangen, Germany – Elektrobit announces that it conforms to OpenChain ISO / IEC 5230:2020 across its entire product portfolio. OpenChain is the International Standard for open-source license compliance and is designed to build trust in the supply chain. The standard defines the key requirements of a quality open-source compliance program. This activity is in furtherance of Elektrobit’s long-standing commitment to the open-source governance and management. The new accreditation will enable Elektrobit customers to have increased confidence in the company’s ability to manage the use of open-source software across its product portfolio i.e. primarily consists of AUTOSAR software solutions, In-vehicle network and Secure vehicle solutions, Linux for Safety Applications, and User experience. There are growing concerns regarding the need for robust management of security vulnerabilities and license compliance across software supply chain. This concern is also reflected in regulatory frameworks such as UN Regulation No. 155 &#8211; Cyber security and cyber security management system and U.S. Executive Order 14028, “Improving The Nation&#8217;s Cybersecurity” emphasizing the requirement for Software Bill of Materials (SBOMs) for software supplied. Elektrobit aims to supports its customers in all spheres of security and license management regarding the safe and compliant usage of open-source software. OpenChain encourages self-certification, independent assessment, and third-party certification as options for entities seeking to address the risk profile of their supply chain. “Elektrobit continues to lead in securely developing software. We realized the importance of leveraging Open-Source Software and recognized the need for a robust process to manage the use of it in our products,” says Gaurav Gupta, Open Source Manager at Elektrobit. “It is hard to overstate the importance of today’s announcement,” says Shane Coughlan, OpenChain General Manager. “Elektrobit has one of the deepest industry pedigrees in bringing increased peace of mind to enterprise and governmental organizations. Certifying their open-source software management underlines their commitment to excellence and serves as a beacon for other companies to follow.” About Elektrobit Elektrobit is the trusted partner in the transition to the software-defined vehicle (SDV). With over 35 years of award-winning automotive software expertise, Elektrobit’s innovative portfolio and comprehensive SDV ecosystem empower OEMs, Tier 1s, along with ODMs and Big Tech to build future-ready solutions with speed and confidence. Its SDV building blocks include operating systems, middleware, embedded software, digital cockpit solutions, engineering services, and development workflows – driving faster innovation and seamless integration across the vehicle lifecycle. Elektrobit software powers over five billion devices in more than 630 million vehicles worldwide. It is a wholly owned, independently operated subsidiary of AUMOVIO. About the OpenChain Project  The OpenChain Project has an extensive global community of over 1,000 companies collaborating to make the supply chain quicker, more effective and more efficient. It maintains OpenChain ISO/IEC 5230, the international standard for open source license compliance programs and OpenChain ISO/IEC 18974, the industry standard for open source security assurance programs. About The Linux Foundation The Linux Foundation is the world’s leading home for collaboration on open source software, hardware, standards, and data. Linux Foundation projects are critical to the world’s infrastructure, including Linux, Kubernetes, Node.js, ONAP, PyTorch, RISC-V, SPDX, OpenChain, and more. The Linux Foundation focuses on leveraging best practices and addressing the needs of contributors, users, and solution providers to create sustainable models for open collaboration. For more information, please visit us at www.linuxfoundation.org . Check Out The Publicly Announced Community of Conformance: https://openchainproject.org/community-of-conformance Oct 20 Welcoming the OpenChain AI System Bill of Materials Compliance Guide By Shane Coughlan Featured , News The OpenChain AI Work Group has been considering how to manage AI compliance in the supply chain since January 2024. During this time the community has collaboratively produced a guide to identify key process points for a quality AI compliance program. After completing a drafting process, a review process and a public comment period, that guide is now freely available to all in its release version. Download a Printable Version Review the Editing Version on GitHub (MarkDown format) Get Involved: Everyone is welcome to be part of this activity! OpenChain has free, open access to all its work groups and study groups. Just turn up, and listen in, and contribute comments, ideas and suggestions. ✉️ We have a dedicated mailing list for the AI Work Group:  https://lists.openchainproject.org/g/ai Attend Future Meetings: You can find and get the dial-in details for all future meetings from our participate page here:  https://www.openchainproject.org/participate 1 2 3 &hellip; 57 Next Legal We use CC-BY-4.0 for our specifications We use CC-0 for reference material We use The Linux Foundation anti-trust policy We use The Linux Foundation Events Code of Conduct &copy; 2026 OpenChain. All rights reserved. The Linux Foundation has registered trademarks and uses trademarks. For a list of trademarks of The Linux Foundation, please see our  Trademark Usage  page. Linux is a registered trademark of Linus Torvalds.  Privacy Policy  and  Terms of Use Close Menu Adopt Our Standards Reference Library Webinars Participate Ambassadors Partners Processes FAQ About News twitter linkedin github
2026-01-13T09:29:56
https://www.facebook.com/login/?next=https%3A%2F%2Fwww.facebook.com%2Fshare_channel%2F%3Ftype%3Dreshare%26link%3Dhttps%253A%252F%252Faws.amazon.com%252Fblogs%252Fmachine-learning%252Ftransforming-home-ownership-with-amazon-transcribe-call-analytics-amazon-comprehend-and-amazon-bedrock-rocket-mortgages-journey-with-aws%252F%26app_id%3D966242223397117%26source_surface%3Dexternal_reshare%26display%26hashtag
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:56
https://vi-vn.facebook.com/login/?next=https%3A%2F%2Fwww.facebook.com%2Fshare_channel%2F%3Ftype%3Dreshare%26link%3Dhttps%253A%252F%252Faws.amazon.com%252Fblogs%252Fmachine-learning%252Fbuild-an-ai-powered-website-assistant-with-amazon-bedrock%252F%26app_id%3D966242223397117%26source_surface%3Dexternal_reshare%26display%26hashtag
Facebook Facebook Email hoặc điện thoại Mật khẩu Bạn quên tài khoản ư? Tạo tài khoản mới Bạn tạm thời bị chặn Bạn tạm thời bị chặn Có vẻ như bạn đang dùng nhầm tính năng này do sử dụng quá nhanh. Bạn tạm thời đã bị chặn sử dụng nó. Back Tiếng Việt 한국어 English (US) Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch Đăng ký Đăng nhập Messenger Facebook Lite Video Meta Pay Cửa hàng trên Meta Meta Quest Ray-Ban Meta Meta AI Nội dung khác do Meta AI tạo Instagram Threads Trung tâm thông tin bỏ phiếu Chính sách quyền riêng tư Trung tâm quyền riêng tư Giới thiệu Tạo quảng cáo Tạo Trang Nhà phát triển Tuyển dụng Cookie Lựa chọn quảng cáo Điều khoản Trợ giúp Tải thông tin liên hệ lên &amp; đối tượng không phải người dùng Cài đặt Nhật ký hoạt động Meta © 2026
2026-01-13T09:29:56
https://fr-fr.facebook.com/login/?next=https%3A%2F%2Fwww.facebook.com%2Fshare_channel%2F%3Ftype%3Dreshare%26link%3Dhttps%253A%252F%252Faws.amazon.com%252Fblogs%252Fmachine-learning%252Fbuild-an-ai-powered-website-assistant-with-amazon-bedrock%252F%26app_id%3D966242223397117%26source_surface%3Dexternal_reshare%26display%26hashtag
Facebook Facebook Adresse e-mail ou téléphone Mot de passe Informations de compte oubliées ? Créer un compte Cette fonction est temporairement bloquée Cette fonction est temporairement bloquée Il semble que vous ayez abusé de cette fonctionnalité en l’utilisant trop vite. Vous n’êtes plus autorisé à l’utiliser. Back Français (France) 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Deutsch S’inscrire Se connecter Messenger Facebook Lite Vidéo Meta Pay Boutique Meta Meta Quest Ray-Ban Meta Meta AI Plus de contenu Meta AI Instagram Threads Centre d’information sur les élections Politique de confidentialité Centre de confidentialité À propos Créer une publicité Créer une Page Développeurs Emplois Cookies Choisir sa publicité Conditions générales Aide Importation des contacts et non-utilisateurs Paramètres Historique d’activité Meta © 2026
2026-01-13T09:29:56
https://pt-br.facebook.com/login/?next=https%3A%2F%2Fwww.facebook.com%2Fshare_channel%2F%3Ftype%3Dreshare%26link%3Dhttps%253A%252F%252Faws.amazon.com%252Fblogs%252Fmachine-learning%252Fbuild-an-ai-powered-website-assistant-with-amazon-bedrock%252F%26app_id%3D966242223397117%26source_surface%3Dexternal_reshare%26display%26hashtag
Facebook Facebook Email ou telefone Senha Esqueceu a conta? Criar nova conta Você está bloqueado temporariamente Você está bloqueado temporariamente Parece que você estava usando este recurso de forma indevida. Bloqueamos temporariamente sua capacidade de usar o recurso. Back Português (Brasil) 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Français (France) Deutsch Cadastre-se Entrar Messenger Facebook Lite Vídeo Meta Pay Meta Store Meta Quest Ray-Ban Meta Meta AI Mais conteúdo da Meta AI Instagram Threads Central de Informações de Votação Política de Privacidade Central de Privacidade Sobre Criar anúncio Criar Página Desenvolvedores Carreiras Cookies Escolhas para anúncios Termos Ajuda Upload de contatos e não usuários Configurações Registro de atividades Meta © 2026
2026-01-13T09:29:56
https://infisical.com/docs/integrations/platforms/certificate-agent#operating-the-agent
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let&#x27;s Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;./client-id&quot; # Path to file containing client ID client-secret : &quot;./client-secret&quot; # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : &quot;kubernetes-auth&quot; config : identity-id : &quot;your-kubernetes-identity-id&quot; service-account-token-path : &quot;/var/run/secrets/kubernetes.io/serviceaccount/token&quot; Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : &quot;azure-auth&quot; config : identity-id : &quot;your-azure-identity-id&quot; Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;gcp-id-token&quot; config : identity-id : &quot;your-gcp-identity-id&quot; GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : &quot;gcp-iam&quot; config : identity-id : &quot;your-gcp-identity-id&quot; service-account-key : &quot;/path/to/service-account-key.json&quot; Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;aws-iam&quot; config : identity-id : &quot;your-aws-identity-id&quot; ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : [ &quot;api.example.com&quot; , &quot;api-v2.example.com&quot; ] ttl : &quot;90d&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; # Enable automatic certificate renewal lifecycle : renew-before-expiry : &quot;30d&quot; status-check-interval : &quot;6h&quot; # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : &quot;/etc/ssl/private/web.key&quot; permission : &quot;0600&quot; # Read/write for owner only certificate : path : &quot;/etc/ssl/certs/web.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner chain : path : &quot;/etc/ssl/certs/web-chain.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo &quot;Certificate issued for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-failure : command : | echo &quot;Certificate operation failed: ${ERROR_MESSAGE}&quot; mail -s &quot;Certificate Alert&quot; [email&#160;protected] &lt; /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., [&quot;www.example.com&quot;, &quot;api.example.com&quot;] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger &#x27;Certificate renewal failed&#x27; , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo &quot;New certificate issued for ${CERT_COMMON_NAME}&quot; chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d &quot;{&#x27;text&#x27;: &#x27;Certificate for ${CERT_COMMON_NAME} renewed successfully&#x27;}&quot; timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo &quot;Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}&quot; # Send alert mail -s &quot;Certificate Failure Alert&quot; [email&#160;protected] &lt; /dev/null # Log to syslog logger -p daemon.error &quot;Certificate agent failure: ${ERROR_MESSAGE}&quot; timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : &quot;https://app.infisical.com&quot; retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; csr-path : &quot;/etc/ssl/requests/api.csr&quot; file-output : certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; lifecycle : renew-before-expiry : &quot;14d&quot; # Renew 14 days before expiration status-check-interval : &quot;6h&quot; # Check certificate status every 6 hours file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; post-hooks : on-issuance : command : &quot;systemctl reload nginx&quot; timeout : 30 on-renewal : command : &quot;systemctl reload nginx &amp;&amp; logger &#x27;Certificate renewed&#x27;&quot; timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:56
https://ja-jp.facebook.com/login/?next=https%3A%2F%2Fwww.facebook.com%2Fshare_channel%2F%3Ftype%3Dreshare%26link%3Dhttps%253A%252F%252Faws.amazon.com%252Fblogs%252Fmachine-learning%252Fbuild-an-ai-powered-website-assistant-with-amazon-bedrock%252F%26app_id%3D966242223397117%26source_surface%3Dexternal_reshare%26display%26hashtag
Facebook Facebook メールアドレスまたは電話番号 パスワード アカウントを忘れた場合 新しいアカウントを作成 機能の一時停止 機能の一時停止 この機能の使用ペースが早過ぎるため、機能の使用が一時的にブロックされました。 Back 日本語 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) Português (Brasil) Français (France) Deutsch アカウント登録 ログイン Messenger Facebook Lite 動画 Meta Pay Metaストア Meta Quest Ray-Ban Meta Meta AI Meta AIのコンテンツをもっと見る Instagram Threads 投票情報センター プライバシーポリシー プライバシーセンター Facebookについて 広告を作成 ページを作成 開発者 採用情報 Cookie AdChoices 規約 ヘルプ 連絡先のアップロードと非ユーザー 設定 アクティビティログ Meta © 2026
2026-01-13T09:29:56
https://www.cisco.com/c/en_id/products/index.html#fw-footer-v2
Products, Solutions, and Services - Cisco Skip to Main content Skip to search Skip to Footer Cisco.com Indonesia Products and Services Solutions Support Learn Explore Cisco How to Buy Partners Home Partner Program Support Tools Find a Cisco Partner Meet our Partners Become a Cisco Partner Products, Solutions, and Services Want some help finding the Cisco products that fit your needs? You're in the right place. If you want troubleshooting help, documentation, other support, or downloads, visit our&nbsp; technical support area . Contact Cisco Get a call from Sales Contact Sales via Email General Enquires: 62 21 2754 7566 Product Sales: 62 21 2754 7527 Services & Support: 62 21 3004 9100 9:00am-6:00pm Product / Technical Support Products by technology Networking Switches Routers Wireless Software-defined networking Cisco Silicon One Cloud and network management Interfaces and modules Optical networking See all Networking Wireless and Mobility Access points Outdoor and industrial access points Controllers See all Wireless and Mobility Security SecureX platform Secure Firewall Secure Endpoint Secure Email Cisco Duo Umbrella See all Security Collaboration Collaboration endpoints Conferencing Cisco Contact Center Unified communications Experience Management See all Collaboration Data Center Servers: Cisco Unified Computing System Management and automation Security Switches Hyperconverged infrastructure Storage networking Virtual networking See all Data Center Analytics Data center analytics and assurance Network analytics Cisco Secure Network Analytics (Stealthwatch) Video Video endpoints Video intelligence Cisco Vision See all Video Internet of Things (IoT) Industrial Networking Industrial Routers and Gateways Industrial Security Industrial Switching Industrial Wireless Industrial Connectivity Management Extended Enterprise Data Management See all IoT Software Cisco+ (as-a-service) IOS and NX-OS Cisco DNA Software for Wireless Cisco DNA Software for SD-WAN and Routing Cisco ONE for Data Center Networking Cisco ONE for Data Center Compute and Cloud See all Software Product index Products by business type Service providers Small business Midsize business Solutions Cisco can provide your organization with solutions for everything from networking and data center to collaboration and security. Find the options best suited to your business needs. By technology By industry See all solutions Services from Cisco Customer Experience Advisory services Get expert advisory services with data-driven insights to architect and optimize your IT environment. Solution Support Experts provide centralized support across your multiproduct, multivendor Cisco solution environment. Hardware support Get expert technical support guided by insights from solving millions of cases worldwide. Software Support Unlock the full benefits of your Cisco software, both on-premises and in the cloud. Packaged services Our services package provides expertise, insights, learning, and support via our CX Cloud digital platform. Project-based consulting Our experts help you plan, design, and implement new project-based technology transformations. Managed services Have our experts directly manage your IT operations for you to accelerate your time to value. Learning services Training and certifications can enhance your skills and empower your workforce for the future. View all Cisco Services Design Zone: Cisco design guides by category Networking Cloud Security Industries Data center Collaboration See all Cisco design guides End-of-sale and end-of-life End-of-sale and end-of-life products End-of-Life Policy Tools Cisco Commerce Build & Price Cisco Software Central Cisco Feature Navigator See all product tools Resources Cisco Mobile Apps Design Zone: Cisco design guides Cisco DevNet Marketplace Solutions Catalog Product approvals Product identification standard Product warranties Cisco Security Advisories Security Vulnerability Policy Visio stencils Local Resellers Technical Support Demos
2026-01-13T09:29:56
https://www.notion.com/de/product/enterprise-search
Enterprise Search mit Notion-KI | Eine einheitliche Suche durch alle deine Tools Notion Funktionen Notion-KI Erschaffen, schreiben, automatisieren Agenten Übernehmen manuelle Aufgaben Enterprise Suche Finde Antworten in Sekundenschnelle Smart Notes Perfekt geschrieben von der KI Dokumente Einfach und leistungsstark Wissensdatenbank Bündle dein Wissen Projekte Verwalte jede Art von Projekt Websites Veröffentliche alles Mögliche im Handumdrehen Loslegen KI-Anwendungsfälle entdecken Schau dir an, wozu die Notion-KI in der Lage ist Marktplatz durchstöbern Vorlagen für alles Mögliche Einbindungen anzeigen Verbinde deine Apps mit Notion Web Clipper herunterladen Speichere Inhalte aus dem Web in Notion Teste die Desktop-App von Notion für mehr Geschwindigkeit App herunterladen Mail Calendar KI Enterprise Tarife Erkunden Teams Entwicklung und Produkt Design Marketing IT Teamgröße Start-ups KMUs Konzerne Bildungswesen Lernen Hilfe-Center Notion Academy Erfahrungsberichte von Kund/-innen Blog Community Partnerprogramme Entwickeln API Vorlagen Sicherheit Beratung Fordere eine Demo an Anmelden Nutze Notion kostenlos Enterprise Search Jede Antwort, eine Suche. Antworten in Sekunden und detaillierte Berichte in Minutenschnelle – und zwar genau dort, wo deine Teams bereits arbeiten. Nutze Notion kostenlos Demovideo ansehen Pause Oh-oh! Offenbar verhindert dein Werbeblocker, dass das Video abgespielt wird. Was früher eine stundenlange Fehlerbehebung erforderte, kann jetzt in wenigen Minuten gelöst werden, indem man einfach Notion-KI fragt. John Allard Engineering, OpenAI Finde Antworten, wo auch immer sie sich verstecken. Suche über Apps hinweg Mit KI-Konnektoren kannst du deine bevorzugten Arbeitstools integrieren. Die Notion-KI durchsucht alle diese Tools, um genau das zu finden, was du benötigst. Direkte Antworten Erhalte aktuelle Antworten mit Kontext, um Arbeit freizugeben. Ergebnisse, denen du vertrauen kannst Jede Antwort enthält geprüfte Inhalte und Zitate, wobei nur die von dir ausgewählten Quellen verwendet werden. Notion erspart neuen Mitarbeitenden Tage, wenn nicht sogar Wochen bei der Einarbeitung, da sie Informationen schneller finden und daraus lernen können. Scott Entwistle Senior Recruiter, Remote Wir gewinnen jede Woche mindestens einen Tag! Das System verarbeitet Wissen schnell, liefert präzise Antworten und ermöglicht es uns, innerhalb von Sekunden neue Inhalte zu verfassen oder andere Aufgaben anzustoßen. Matthias Lambrecht Product Owner, ecosio Es ist unglaublich hilfreich, wenn Notion-KI mir Wissen aus dem Unternehmen zeigt, von dem ich gar nicht wusste, dass es überhaupt existiert, geschweige denn, dass ich danach suchen sollte. Faith Lierheimer Senior Technical Instructor, dbt Labs Recherche-Modus: Suche, die die Arbeit erledigt. Erstelle in wenigen Minuten detaillierte Berichte, die du speichern und teilen kannst, indem du Informationen aus all deinen Quellen und dem Internet abrufst. Du sparst damit Tage an Zeit Analysiert deine Workspaces, Apps und sogar das Internet in wenigen Minuten. Denkt intensiv für dich nach Sieh dabei zu, wie die Notion-KI Fragen in einen mehrstufigen Rechercheprozess aufteilt. Verfasst gemeinsam nutzbare Berichte Erhalte ausgefeilte, gründliche Berichte, die du sofort speichern und weitergeben kannst – und das ohne zusätzliche Arbeit. Beginne Dokumente niemals von Grund auf neu. Erstelle Projektupdates aus verstreuten Quellen. Erstelle wöchentliche Zusammenfassungen von Fortschritten und Hindernissen, einschließlich des neuesten Kontexts von Jira-Tickets, GitHub-PRs und Teamdiskussionen in Slack oder Microsoft Teams. Berichte zur Kundenforschung in nur wenigen Minuten. Beschleunige die Produktentwicklung durch schnelleres Feedback. Der Recherche-Modus analysiert Recherche-Aufrufe, Zendesk-Tickets (in Kürze) und entdeckt relevantes Feedback im Internet. Sei auf jedes Meeting vorbereitet. Steht ein Kundengespräch an? Der Recherche-Modus sammelt Wettbewerbsinformationen aus internen Dokumenten, dem Internet und Salesforce (in Kürze), um dich darauf vorzubereiten. Suche und analysiere auf deine Weise. Wähle deine KI-Modelle Chatte mit deinen bevorzugten KI-Modellen direkt am Arbeitsplatz. Keine zusätzlichen Kosten und kein Training mit deinen Daten. Durchsuche hochgeladene PDF-Dateien Notion-KI durchsucht alle hochgeladenen PDF-Dateien in deinem Notion-Workspace, in Google Drive, SharePoint und OneDrive. Sicher durchsuchen. Erfahre mehr über die Sicherheit von Notion-KI → Folgt den Berechtigungseinstellungen Notion-KI ist sicher, da nur die Informationen angezeigt werden, für die du als Benutzer/-in eine Zugriffsberechtigung hast, einschließlich aller mit dir verbundenen Apps. Deine Daten werden nicht zu Trainingszwecken verwendet Wir haben vertragliche Vereinbarungen mit unseren KI-Auftragsverarbeitern geschlossen, die den Einsatz von Kundendaten zum Trainieren von Modellen verbieten. Zertifiziert, um deine Sicherheits- und Datenschutzanforderungen zu erfüllen SOC 2 (Typ 2), ISO 27001, DSGVO, CCPA, und Null Datenspeicherung (nur Unternehmen). Sichere Verschlüsselung Wenn du die Notion-KI verwendest, werden deine Daten während der Übertragung mit TLS 1.2 oder höher verschlüsselt. Kontrolliere, wo du suchst Du wählst aus, welche Apps, Quellen (z. B. das Internet) und KI-Modelle durchsucht werden sollen – so hast du die volle Kontrolle. Der KI-Workspace, der alles kann. Zu einem einfachen Preis. Kostenlos testen → Tool-Wildwuchs Notion Unternehmenssuche: ~35 $/Benutzer/-in ✔️ Inklusive Chatbot: ~20 $/Benutzer/-in ✔️ Inklusive Meeting-Transkription: ~18 $/Benutzer/-in ✔️ Inklusive Schreibassistent: ~20 $/Benutzer/-in ✔️ Inklusive E-Mail-Assistent: ~30 $/Benutzer/-in ✔️ Inklusive Terminplanung: ~15 $/Benutzer/-in ✔️ Inklusive Team-Wiki: ~10 $/Benutzer/-in ✔️ Inklusive Projektmanagement-Tool: 10 $/Benutzer/-in ✔️ Inklusive Insgesamt: +150 $/Benutzer/-in Insgesamt: ab 20 $/Benutzer/-in Häufig gestellte Fragen Wie durchsucht die Notion-KI mehrere Apps? Mithilfe von KI-Konnektoren führt Notion-KI eine interne Wissenssuche durch, indem sie Inhalte aus deinen Arbeitstools basierend auf deinen Berechtigungen indiziert. Wenn du eine Frage stellst, werden Slack-Nachrichten, Dateien und PDFs in Google Drive, Jira-Tickets, GitHub Issues und Pull Requests und andere verbundene Apps durchsucht, um die relevantesten Informationen zu liefern – und das schnell. Ist Notion-KI sicher? Ja. Notion-KI zeigt nur Informationen an, für die du eine Zugriffsberechtigung hast. Es befolgt strenge Sicherheitsstandards wie SOC 2 Typ 2, ISO 27001, DSGVO und CCPA-Compliance, mit null Datenspeicherung für Unternehmensnutzer/-innen. Kann Notion-KI Berichte aus mehreren Quellen erstellen? Auf jeden Fall. Im Recherche-Modus analysiert die Notion-KI Daten aus deinen vernetzten Apps und dem Internet, um detaillierte und gemeinsam nutzbare Berichte zu erstellen, die Teams tagelange manuelle Recherchen ersparen. Welche Tools kann ich mit Notion-KI verbinden? Du kannst heute schon Anwendungen wie Slack, Google Drive, GitHub, Jira, MSFT Teams, SharePoint und OneDrive integrieren, weitere werden bald folgen: Linear, Gmail, Salesforce, Zendesk, Box und mehr. Diese Einbindungen ermöglichen ein wirklich einheitliches Sucherlebnis für alle deine internen und externen Wissensquellen. Kann ich auswählen, welche Quellen die Notion-KI durchsucht? Ja. Du bestimmst, wo und wie die Notion-KI sucht, indem du auswählst, welche Apps, Dokumente und Webquellen einbezogen werden sollen – so hast du die volle Kontrolle über deine Suche. Wie unterscheidet sich die Notion-KI von herkömmlichen Suchwerkzeugen für Unternehmen? Im Gegensatz zur herkömmlichen Suche findet die Notion-KI nicht nur Dateien, sondern versteht Fragen, findet aktuelle Antworten mit Zitaten und nutzt sogar kritisches Denken, um komplexe Fragen zu analysieren und detaillierte Rechercheberichte in Minutenschnelle zu erstellen. Deutsch Cookie-Einstellungen © 2026 Notion Labs, Inc. Unternehmen Über uns Karriere Sicherheit Status Nutzungsbedingungen und Datenschutz Deine Datenschutzrechte Download iOS und Android Mac und Windows Calendar Web Clipper Ressourcen Hilfe-Center Preise Blog Community Einbindungen Vorlagen Partnerprogramme Notion für Unternehmen Kleine Unternehmen Persönlich Mehr entdecken →
2026-01-13T09:29:56
https://snyk.io/es/product/container-vulnerability-management/
Gestión de vulnerabilidades de contenedores y seguridad para cargas de trabajo en Kubernetes | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API &amp; Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API &amp; Web - Todos los clientes Snyk API &amp; Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo Snyk Container Descripción general Documentos Select Descripción general Documentos Snyk Container Seguridad para contenedores simple y enfocada a desarrolladores La seguridad de contenedores y Kubernetes ayuda a los equipos de desarrollo y DevOps a buscar, priorizar y corregir vulnerabilidades en todo el SDLC, antes de que las cargas de trabajo lleguen a producción. Reserva una demostración en vivo Demostración de Snyk bajo demanda Mira nuestra demostración grabada para descubrir cómo los equipos pueden encontrar y corregir vulnerabilidades en código, dependencias, imágenes de contenedores e IaC. Watch now Encuentra y corrige automáticamente vulnerabilidades en cargas de trabajo y contenedores El enfoque de Snyk a desarrolladores eliminó la barrera para acceder a la seguridad de contenedores, y les permite a los equipos buscar y corregir incontables vulnerabilidades. Remedio automatizado Recibe recomendaciones de imágenes base listas para desarrolladores y actualízalas automáticamente para corregir vulnerabilidades. Flujos de trabajo flexibles con imágenes Sugerencias de remedios prácticos que se adecúan a los procesos del equipo de DevOps de tu organización para incluir imágenes de contenedores personalizadas y mantenidas. Supervisión contextualizada Supervisa de forma continua en busca de vulnerabilidades y prioriza remediación según el contexto y su capacidad de ser explotadas. Dependencias protegidas Busca y corrige vulnerabilidades en las dependencias de código abierto utilizadas en imágenes base y en comandos de Dockerfile. Los desarrolladores corrigen vulnerabilidades de contenedores antes de que lleguen a producción Indicaciones sobre remedios Con Snyk Container, los desarrolladores conocen los riesgos de cada imagen, y reciben actualizaciones y recomendaciones de imágenes alternativas que solo exigen un clic para implementarse. Priorización para reducir el ruido La puntuación de prioridad te permite poner la atención en los problemas más graves según ciertas indicaciones de riesgos, como la madurez de la explotación de una vulnerabilidad y configuraciones inseguras de cargas de trabajo. Aplicaciones y contenedores en una sola vista Escanea los contenedores y las dependencias de código abierto en dichos contenedores, todo de una sola vez, desde una plataforma de seguridad unificada para desarrolladores. Enfocada a desarrolladores Con Snyk Container, los desarrolladores llegan directamente a las dependencias y los comandos vulnerables de Dockerfile, sin necesidad de conocimiento experto en seguridad. Corrige vulnerabilidades en cargas de trabajo de K8s y contenedores durante todo el SDLC Supervisión y escaneo nativos en Git Escanea solicitudes de cambios antes de fusionar mediante combinación y haz pruebas de los proyectos directamente en el repositorio. Supervisa diariamente para buscar y corregir vulnerabilidades con mayor rapidez. Protección desde el pipeline hasta producción Escanea el pipeline CI/CD automáticamente en busca de vulnerabilidades durante el desarrollo y haz pruebas en los entornos en ejecución para eliminar cualquier vulnerabilidad encontrada.  Priorización de riesgos importantes para contenedores Aprovecha el amplio contexto de la aplicación para priorizar los problemas implementados o expuestos públicamente que supongan un mayor nivel de riesgo para tu organización. Supervisa continuamente para tener protección después de las implementaciones Escaneo automático en busca de nuevas vulnerabilidades Supervisa las imágenes y busca vulnerabilidades nuevas y actualizaciones de imágenes base, y recibe alertas por Slack, Jira, correo electrónico o una integración personalizada. Supervisión de contenedores en K8s Detecta cargas de trabajo recién implementadas y actualizadas en clústeres de Kubernetes y descubre configuraciones inseguras en las cargas de trabajo de Kubernetes. Elaboración de informes y priorización Entiende cómo es la seguridad de las aplicaciones desde un solo lugar y supervisa problemas mediante un inventario auditable de dependencias con priorización según el contexto. Integraciones de Snyk Container Snyk Container funciona con diversos sistemas operativos con imágenes de contenedores y gestores de paquetes, sabores de Kubernetes y registros de contenedores. Descubre todas las integraciones de Snyk Container Plataformas de Kubernetes Amazon Elastic Kubernetes Service (EKS) Microsoft Azure Kubernetes Service (AKS) Google Kubernetes Engine (GKE) Red Hat OpenShift VMware Tanzu Grid Y otras plataformas desarrolladas con Kubernetes Registros de contenedores Docker Hub Amazon Elastic Container Registry (ECR) Microsoft Azure Container Registry (ACR) Google Container Registry (GCR) JFrog Artifactory VMware Harbor Red Hat Quay Sistemas operativos con imágenes base de contenedores Amazon Linux Red Hat Enterprise Linux y UBI Alpine Linux Debian Ubuntu CentOS Oracle Linux “Me parece increíble poder escanear los contenedores antes de llevar a producción los tiempos de ejecución. No le prestábamos atención a las vulnerabilidades en contenedores, por lo que esto fue toda una revelación para la organización. Somos más conscientes de las vulnerabilidades y podemos automatizar ciertas tareas. Y estamos más en sintonía con una mentalidad de mejora de la calidad que los equipos de ingeniería aplican a sus prácticas de CI/CD”. Charlotte Townsley Director, Security Engineering , Natera Lee el estudio de caso Protege la cadena de suministro de software Snyk Container integra nuestra solución de seguridad de la cadena de suministro de software. Protege componentes críticos de la cadena de suministro de software, que abarcan código propio, bibliotecas de código abierto e imágenes de contenedores, directamente desde las herramientas que los desarrolladores usan a diario. Conoce la solución Seguridad del código Protege código propio con seguridad de autoservicio, sin abandonar el flujo de trabajo diario. Seguridad de IaC Protege la infraestructura como código antes de las implementaciones y detecta desviaciones cuando suceden. Seguridad del contenedor Escanea tus imágenes base y los manifiestos de Kubernetes antes de implementarlos. Mantente seguro en  tiempo de ejecución con Sysdig . Transparencia de software Snyk ofrece transparencia del software, de modo que puedes exportar y evaluar SBOM (listas de materiales de software). Empieza a utilizar Snyk Container Protege los contenedores y las cargas de trabajo de Kubernetes con escaneos de vulnerabilidades, correcciones automáticas y recomendaciones de imágenes base. Snyk Container puede adquirirse en paquete junto con Snyk Open Source. Compara todos los planes Gratis por siempre Comienza gratis con GitHub Comienza gratis con Google Team Integración con Jira Adquiérelo ya Enterprise Integración con Jira Informes API Rich Roles de usuario personalizados Administración de políticas de seguridad Registros de contenedores autohospedados, como Docker Hub, ECR, ACR y GCR Priorización y supervisión en Kubernetes Recomendaciones de imágenes base personalizadas Reserva una demostración en vivo Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:56
https://ai.google.dev/api/tokens?hl=tr
Counting tokens &nbsp;|&nbsp; Gemini API &nbsp;|&nbsp; Google AI for Developers Ana içeriğe atla / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 API anahtarı alma Tarif Defteri Topluluk Oturum aç Dokümanlar API referansı Gemini API Dokümanlar API referansı API anahtarı alma Tarif Defteri Topluluk Genel bakış API sürümleri İşlemler Modeller İçerik oluşturuluyor Canlı API Live Music API Interactions API Simgeler Dosyalar Toplu API Önbelleğe alma Yerleştirmeler Dosya arama Dosya arama mağazaları Doküman Tüm yöntemler Kullanımdan kaldırıldı PaLM (artık kaldırıldı) SDK referansları Python Go TypeScript Java C# Ana Sayfa Gemini API API referansı Geri bildirim gönderin Counting tokens Resim, ses ve video dahil olmak üzere Gemini API ile jeton sayma hakkında ayrıntılı bilgi için Jeton sayma kılavuzu ve beraberindeki Cookbook tarifi 'ne bakın. Yöntem: models.countTokens Uç nokta Yol parametreleri İstek metni JSON gösterimi Yanıt metni JSON gösterimi Yetkilendirme kapsamları Örnek istek Metin Chat Satır içi medya Video PDF Önbellek Sistem Talimatı (System Instruction) Araçlar Giriş Content üzerinde bir modelin belirteçleştiricisini çalıştırır ve belirteç sayısını döndürür. Jetonlar hakkında daha fazla bilgi edinmek için jeton kılavuzuna bakın. Uç nokta post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:countTokens Yol parametreleri model string Zorunlu. Modelin kaynak adı. Bu, Model'in kullanacağı bir kimlik görevi görür. Bu ad, models.list yöntemi tarafından döndürülen bir model adıyla eşleşmelidir. Biçim: models/{model} models/{model} biçimindedir. İstek içeriği İstek içeriği aşağıdaki yapıyla birlikte verileri içerir: Alanlar contents[] object ( Content ) İsteğe bağlıdır. Modele istem olarak verilen giriş. generateContentRequest ayarlandığında bu alan yoksayılır. generateContentRequest object ( GenerateContentRequest ) İsteğe bağlıdır. Model verilen genel girdi. Buna istemin yanı sıra sistem talimatları gibi diğer model yönlendirme bilgileri ve/veya işlev çağrısı için işlev bildirimleri dahildir. Model s/ Content s ve generateContentRequest s birbirini dışlar. Model + Content veya generateContentRequest gönderebilirsiniz ancak ikisini birden gönderemezsiniz. Örnek istek Metin Python from google import genai client = genai . Client () prompt = "The quick brown fox jumps over the lazy dog." # Count tokens using the new client method. total_tokens = client . models . count_tokens ( model = "gemini-2.0-flash" , contents = prompt ) print ( "total_tokens: " , total_tokens ) # ( e.g., total_tokens: 10 ) response = client . models . generate_content ( model = "gemini-2.0-flash" , contents = prompt ) # The usage_metadata provides detailed token counts. print ( response . usage_metadata ) # ( e.g., prompt_token_count: 11, candidates_token_count: 73, total_token_count: 84 ) count_tokens.py Node.js // Make sure to include the following import: // import {GoogleGenAI} from '@google/genai'; const ai = new GoogleGenAI ({ apiKey : process . env . GEMINI_API_KEY }); const prompt = "The quick brown fox jumps over the lazy dog." ; const countTokensResponse = await ai . models . countTokens ({ model : "gemini-2.0-flash" , contents : prompt , }); console . log ( countTokensResponse . totalTokens ); const generateResponse = await ai . models . generateContent ({ model : "gemini-2.0-flash" , contents : prompt , }); console . log ( generateResponse . usageMetadata ); count_tokens . js Go ctx := context . Background () client , err := genai . NewClient ( ctx , &amp; genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } prompt := "The quick brown fox jumps over the lazy dog." // Convert prompt to a slice of *genai.Content using the helper. contents := [] * genai . Content { genai . NewContentFromText ( prompt , genai . RoleUser ), } countResp , err := client . Models . CountTokens ( ctx , "gemini-2.0-flash" , contents , nil ) if err != nil { return err } fmt . Println ( "total_tokens:" , countResp . TotalTokens ) response , err := client . Models . GenerateContent ( ctx , "gemini-2.0-flash" , contents , nil ) if err != nil { log . Fatal ( err ) } usageMetadata , err := json . MarshalIndent ( response . UsageMetadata , "" , " " ) if err != nil { log . Fatal ( err ) } fmt . Println ( string ( usageMetadata )) count_tokens . go kabuk curl https://generativelanguage.googleapis.com/v1beta/models/gemini-2.0-flash:countTokens?key = $GEMINI_API_KEY \ -H 'Content-Type: application/json' \ -X POST \ -d '{ "contents": [{ "parts":[{ "text": "The quick brown fox jumps over the lazy dog." }], }], }' count_tokens.sh Sohbet Python from google import genai from google.genai import types client = genai . Client () chat = client . chats . create ( model = "gemini-2.0-flash" , history = [ types . Content ( role = "user" , parts = [ types . Part ( text = "Hi my name is Bob" )] ), types . Content ( role = "model" , parts = [ types . Part ( text = "Hi Bob!" )]), ], ) # Count tokens for the chat history. print ( client . models . count_tokens ( model = "gemini-2.0-flash" , contents = chat . get_history () ) ) # ( e.g., total_tokens: 10 ) response = chat . send_message ( message = "In one sentence, explain how a computer works to a young child." ) print ( response . usage_metadata ) # ( e.g., prompt_token_count: 25, candidates_token_count: 21, total_token_count: 46 ) # You can count tokens for the combined history and a new message. extra = types . UserContent ( parts = [ types . Part ( text = "What is the meaning of life?" , ) ] ) history = chat . get_history () history . append ( extra ) print ( client . models . count_tokens ( model = "gemini-2.0-flash" , contents = history )) # ( e.g., total_tokens: 56 ) count_tokens.py Node.js // Make sure to include the following import: // import {GoogleGenAI} from '@google/genai'; const ai = new GoogleGenAI ({ apiKey : process . env . GEMINI_API_KEY }); // Initial chat history. const history = [ { role : "user" , parts : [{ text : "Hi my name is Bob" }] }, { role : "model" , parts : [{ text : "Hi Bob!" }] }, ]; const chat = ai . chats . create ({ model : "gemini-2.0-flash" , history : history , }); // Count tokens for the current chat history. const countTokensResponse = await ai . models . countTokens ({ model : "gemini-2.0-flash" , contents : chat . getHistory (), }); console . log ( countTokensResponse . totalTokens ); const chatResponse = await chat . sendMessage ({ message : "In one sentence, explain how a computer works to a young child." , }); console . log ( chatResponse . usageMetadata ); // Add an extra user message to the history. const extraMessage = { role : "user" , parts : [{ text : "What is the meaning of life?" }], }; const combinedHistory = chat . getHistory (); combinedHistory . push ( extraMessage ); const combinedCountTokensResponse = await ai . models . countTokens ({ model : "gemini-2.0-flash" , contents : combinedHistory , }); console . log ( "Combined history token count:" , combinedCountTokensResponse . totalTokens , ); count_tokens . js Go ctx := context . Background () client , err := genai . NewClient ( ctx , &amp; genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } // Initialize chat with some history. history := [] * genai . Content { { Role : genai . RoleUser , Parts : [] * genai . Part {{Text: "Hi my name is Bob"} }}, { Role : genai . RoleModel , Parts : [] * genai . Part {{Text: "Hi Bob!"} }}, } chat , err := client . Chats . Create ( ctx , "gemini-2.0-flash" , nil , history ) if err != nil { log . Fatal ( err ) } firstTokenResp , err := client . Models . CountTokens ( ctx , "gemini-2.0-flash" , chat . History ( false ), nil ) if err != nil { log . Fatal ( err ) } fmt . Println ( firstTokenResp . TotalTokens ) resp , err := chat . SendMessage ( ctx , genai . Part { Text : "In one sentence, explain how a computer works to a young child." }, ) if err != nil { log . Fatal ( err ) } fmt . Printf ( "%#v\n" , resp . UsageMetadata ) // Append an extra user message and recount. extra := genai . NewContentFromText ( "What is the meaning of life?" , genai . RoleUser ) hist := chat . History ( false ) hist = append ( hist , extra ) secondTokenResp , err := client . Models . CountTokens ( ctx , "gemini-2.0-flash" , hist , nil ) if err != nil { log . Fatal ( err ) } fmt . Println ( secondTokenResp . TotalTokens ) count_tokens . go kabuk curl https://generativelanguage.googleapis.com/v1beta/models/gemini-2.0-flash:countTokens?key = $GEMINI_API_KEY \ -H 'Content-Type: application/json' \ -X POST \ -d '{ "contents": [ {"role": "user", "parts": [{"text": "Hi, my name is Bob."}], }, {"role": "model", "parts":[{"text": "Hi Bob"}], }, ], }' count_tokens.sh Satır içi medya Python from google import genai import PIL.Image client = genai . Client () prompt = "Tell me about this image" your_image_file = PIL . Image . open ( media / "organ.jpg" ) # Count tokens for combined text and inline image. print ( client . models . count_tokens ( model = "gemini-2.0-flash" , contents = [ prompt , your_image_file ] ) ) # ( e.g., total_tokens: 263 ) response = client . models . generate_content ( model = "gemini-2.0-flash" , contents = [ prompt , your_image_file ] ) print ( response . usage_metadata ) # ( e.g., prompt_token_count: 264, candidates_token_count: 80, total_token_count: 345 ) count_tokens.py Node.js // Make sure to include the following import: // import {GoogleGenAI} from '@google/genai'; const ai = new GoogleGenAI ({ apiKey : process . env . GEMINI_API_KEY }); const prompt = "Tell me about this image" ; const imageBuffer = fs . readFileSync ( path . join ( media , "organ.jpg" )); // Convert buffer to base64 string. const imageBase64 = imageBuffer . toString ( "base64" ); // Build contents using createUserContent and createPartFromBase64. const contents = createUserContent ([ prompt , createPartFromBase64 ( imageBase64 , "image/jpeg" ), ]); const countTokensResponse = await ai . models . countTokens ({ model : "gemini-2.0-flash" , contents : contents , }); console . log ( countTokensResponse . totalTokens ); const generateResponse = await ai . models . generateContent ({ model : "gemini-2.0-flash" , contents : contents , }); console . log ( generateResponse . usageMetadata ); count_tokens . js Go model := client . GenerativeModel ( "gemini-1.5-flash" ) prompt := "Tell me about this image" imageFile , err := os . ReadFile ( filepath . Join ( testDataDir , "personWorkingOnComputer.jpg" )) if err != nil { log . Fatal ( err ) } // Call `CountTokens` to get the input token count // of the combined text and file (`total_tokens`). // An image's display or file size does not affect its token count. // Optionally, you can call `count_tokens` for the text and file separately. tokResp , err := model . CountTokens ( ctx , genai . Text ( prompt ), genai . ImageData ( "jpeg" , imageFile )) if err != nil { log . Fatal ( err ) } fmt . Println ( "total_tokens:" , tokResp . TotalTokens ) // ( total_tokens: 264 ) resp , err := model . GenerateContent ( ctx , genai . Text ( prompt ), genai . ImageData ( "jpeg" , imageFile )) if err != nil { log . Fatal ( err ) } fmt . Println ( "prompt_token_count:" , resp . UsageMetadata . PromptTokenCount ) fmt . Println ( "candidates_token_count:" , resp . UsageMetadata . CandidatesTokenCount ) fmt . Println ( "total_token_count:" , resp . UsageMetadata . TotalTokenCount ) // ( prompt_token_count: 264, candidates_token_count: 100, total_token_count: 364 ) docs-snippets_test.go kabuk curl "https://generativelanguage.googleapis.com/v1beta/models/gemini-2.0-flash:countTokens?key= $GEMINI_API_KEY " \ -H 'Content-Type: application/json' \ -X POST \ -d '{ "contents": [{ "parts":[ {"text": "Tell me about this instrument"}, { "inline_data": { "mime_type":"image/jpeg", "data": "' $( base64 $B64FLAGS $IMG_PATH ) '" } } ] }] }' 2 &gt; /dev/null count_tokens.sh Video Python from google import genai import time client = genai . Client () prompt = "Tell me about this video" your_file = client . files . upload ( file = media / "Big_Buck_Bunny.mp4" ) # Poll until the video file is completely processed (state becomes ACTIVE). while not your_file . state or your_file . state . name != "ACTIVE" : print ( "Processing video..." ) print ( "File state:" , your_file . state ) time . sleep ( 5 ) your_file = client . files . get ( name = your_file . name ) print ( client . models . count_tokens ( model = "gemini-2.0-flash" , contents = [ prompt , your_file ] ) ) # ( e.g., total_tokens: 300 ) response = client . models . generate_content ( model = "gemini-2.0-flash" , contents = [ prompt , your_file ] ) print ( response . usage_metadata ) # ( e.g., prompt_token_count: 301, candidates_token_count: 60, total_token_count: 361 ) count_tokens.py Node.js // Make sure to include the following import: // import {GoogleGenAI} from '@google/genai'; const ai = new GoogleGenAI ({ apiKey : process . env . GEMINI_API_KEY }); const prompt = "Tell me about this video" ; let videoFile = await ai . files . upload ({ file : path . join ( media , "Big_Buck_Bunny.mp4" ), config : { mimeType : "video/mp4" }, }); // Poll until the video file is completely processed (state becomes ACTIVE). while ( ! videoFile . state || videoFile . state . toString () !== "ACTIVE" ) { console . log ( "Processing video..." ); console . log ( "File state: " , videoFile . state ); await sleep ( 5000 ); videoFile = await ai . files . get ({ name : videoFile . name }); } const countTokensResponse = await ai . models . countTokens ({ model : "gemini-2.0-flash" , contents : createUserContent ([ prompt , createPartFromUri ( videoFile . uri , videoFile . mimeType ), ]), }); console . log ( countTokensResponse . totalTokens ); const generateResponse = await ai . models . generateContent ({ model : "gemini-2.0-flash" , contents : createUserContent ([ prompt , createPartFromUri ( videoFile . uri , videoFile . mimeType ), ]), }); console . log ( generateResponse . usageMetadata ); count_tokens . js Go ctx := context . Background () client , err := genai . NewClient ( ctx , &amp; genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } file , err := client . Files . UploadFromPath ( ctx , filepath . Join ( getMedia (), "Big_Buck_Bunny.mp4" ), &amp; genai . UploadFileConfig { MIMEType : "video/mp4" , }, ) if err != nil { log . Fatal ( err ) } // Poll until the video file is completely processed (state becomes ACTIVE). for file . State == genai . FileStateUnspecified || file . State != genai . FileStateActive { fmt . Println ( "Processing video..." ) fmt . Println ( "File state:" , file . State ) time . Sleep ( 5 * time . Second ) file , err = client . Files . Get ( ctx , file . Name , nil ) if err != nil { log . Fatal ( err ) } } parts := [] * genai . Part { genai . NewPartFromText ( "Tell me about this video" ), genai . NewPartFromURI ( file . URI , file . MIMEType ), } contents := [] * genai . Content { genai . NewContentFromParts ( parts , genai . RoleUser ), } tokenResp , err := client . Models . CountTokens ( ctx , "gemini-2.0-flash" , contents , nil ) if err != nil { log . Fatal ( err ) } fmt . Println ( "Multimodal video/audio token count:" , tokenResp . TotalTokens ) response , err := client . Models . GenerateContent ( ctx , "gemini-2.0-flash" , contents , nil ) if err != nil { log . Fatal ( err ) } usageMetadata , err := json . MarshalIndent ( response . UsageMetadata , "" , " " ) if err != nil { log . Fatal ( err ) } fmt . Println ( string ( usageMetadata )) count_tokens . go kabuk MIME_TYPE = $( file -b --mime-type " ${ VIDEO_PATH } " ) NUM_BYTES = $( wc -c &lt; " ${ VIDEO_PATH } " ) DISPLAY_NAME = VIDEO_PATH # Initial resumable request defining metadata. # The upload url is in the response headers dump them to a file. curl " ${ BASE_URL } /upload/v1beta/files?key= ${ GOOGLE_API_KEY } " \ -D upload-header.tmp \ -H "X-Goog-Upload-Protocol: resumable" \ -H "X-Goog-Upload-Command: start" \ -H "X-Goog-Upload-Header-Content-Length: ${ NUM_BYTES } " \ -H "X-Goog-Upload-Header-Content-Type: ${ MIME_TYPE } " \ -H "Content-Type: application/json" \ -d "{'file': {'display_name': ' ${ DISPLAY_NAME } '}}" 2 &gt; /dev/null upload_url = $( grep -i "x-goog-upload-url: " " ${ tmp_header_file } " | cut -d " " -f2 | tr -d "\r" ) rm " ${ tmp_header_file } " # Upload the actual bytes. curl " ${ upload_url } " \ -H "Content-Length: ${ NUM_BYTES } " \ -H "X-Goog-Upload-Offset: 0" \ -H "X-Goog-Upload-Command: upload, finalize" \ --data-binary "@ ${ VIDEO_PATH } " 2 &gt; /dev/null &gt; file_info.json file_uri = $( jq ".file.uri" file_info.json ) state = $( jq ".file.state" file_info.json ) name = $( jq ".file.name" file_info.json ) while [[ "( $state )" = * "PROCESSING" * ]] ; do echo "Processing video..." sleep 5 # Get the file of interest to check state curl https://generativelanguage.googleapis.com/v1beta/files/ $name &gt; file_info.json state = $( jq ".file.state" file_info.json ) done curl "https://generativelanguage.googleapis.com/v1beta/models/gemini-1.5-flash:countTokens?key= $GOOGLE_API_KEY " \ -H 'Content-Type: application/json' \ -X POST \ -d '{ "contents": [{ "parts":[ {"text": "Describe this video clip"}, {"file_data":{"mime_type": "video/mp4", "file_uri": ' $file_uri '}}] }] }' count_tokens.sh PDF Python from google import genai client = genai . Client () sample_pdf = client . files . upload ( file = media / "test.pdf" ) token_count = client . models . count_tokens ( model = "gemini-2.0-flash" , contents = [ "Give me a summary of this document." , sample_pdf ], ) print ( f " { token_count =} " ) response = client . models . generate_content ( model = "gemini-2.0-flash" , contents = [ "Give me a summary of this document." , sample_pdf ], ) print ( response . usage_metadata ) count_tokens . py Önbellek Python from google import genai from google.genai import types import time client = genai . Client () your_file = client . files . upload ( file = media / "a11.txt" ) cache = client . caches . create ( model = "gemini-1.5-flash-001" , config = { "contents" : [ "Here the Apollo 11 transcript:" , your_file ], "system_instruction" : None , "tools" : None , }, ) # Create a prompt. prompt = "Please give a short summary of this file." # Count tokens for the prompt (the cached content is not passed here). print ( client . models . count_tokens ( model = "gemini-2.0-flash" , contents = prompt )) # ( e.g., total_tokens: 9 ) response = client . models . generate_content ( model = "gemini-1.5-flash-001" , contents = prompt , config = types . GenerateContentConfig ( cached_content = cache . name , ), ) print ( response . usage_metadata ) # ( e.g., prompt_token_count: ..., cached_content_token_count: ..., candidates_token_count: ... ) client . caches . delete ( name = cache . name ) count_tokens . py Node.js // Make sure to include the following import: // import {GoogleGenAI} from '@google/genai'; const ai = new GoogleGenAI ({ apiKey : process . env . GEMINI_API_KEY }); const textFile = await ai . files . upload ({ file : path . join ( media , "a11.txt" ), config : { mimeType : "text/plain" }, }); const cache = await ai . caches . create ({ model : "gemini-1.5-flash-001" , config : { contents : createUserContent ([ "Here the Apollo 11 transcript:" , createPartFromUri ( textFile . uri , textFile . mimeType ), ]), system_instruction : null , tools : null , }, }); const prompt = "Please give a short summary of this file." ; const countTokensResponse = await ai . models . countTokens ({ model : "gemini-2.0-flash" , contents : prompt , }); console . log ( countTokensResponse . totalTokens ); const generateResponse = await ai . models . generateContent ({ model : "gemini-1.5-flash-001" , contents : prompt , config : { cachedContent : cache . name }, }); console . log ( generateResponse . usageMetadata ); await ai . caches . delete ({ name : cache . name }); return { totalTokens : countTokensResponse . totalTokens , usage : generateResponse . usageMetadata , }; } count_tokens . js Go ctx := context . Background () client , err := genai . NewClient ( ctx , &amp; genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } file , err := client . Files . UploadFromPath ( ctx , filepath . Join ( getMedia (), "a11.txt" ), &amp; genai . UploadFileConfig { MIMEType : "text/plain" , }, ) if err != nil { log . Fatal ( err ) } parts := [] * genai . Part { genai . NewPartFromText ( "Here the Apollo 11 transcript:" ), genai . NewPartFromURI ( file . URI , file . MIMEType ), } contents := [] * genai . Content { genai . NewContentFromParts ( parts , genai . RoleUser ), } // Create cached content using a simple slice with text and a file. cache , err := client . Caches . Create ( ctx , "gemini-1.5-flash-001" , &amp; genai . CreateCachedContentConfig { Contents : contents , }) if err != nil { log . Fatal ( err ) } prompt := "Please give a short summary of this file." countResp , err := client . Models . CountTokens ( ctx , "gemini-2.0-flash" , [] * genai . Content { genai . NewContentFromText ( prompt , genai . RoleUser ), }, nil ) if err != nil { log . Fatal ( err ) } fmt . Printf ( "%d" , countResp . TotalTokens ) response , err := client . Models . GenerateContent ( ctx , "gemini-1.5-flash-001" , [] * genai . Content { genai . NewContentFromText ( prompt , genai . RoleUser ), }, &amp; genai . GenerateContentConfig { CachedContent : cache . Name , }) if err != nil { log . Fatal ( err ) } usageMetadata , err := json . MarshalIndent ( response . UsageMetadata , "" , " " ) if err != nil { log . Fatal ( err ) } // Returns `nil` for some reason fmt . Println ( string ( usageMetadata )) _ , err = client . Caches . Delete ( ctx , cache . Name , &amp; genai . DeleteCachedContentConfig {}) count_tokens . go Sistem Talimatı Go ctx := context . Background () client , err := genai . NewClient ( ctx , &amp; genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } // Construct the user message contents. contents := [] * genai . Content { genai . NewContentFromText ( "Good morning! How are you?" , genai . RoleUser ), } // Set the system instruction as a *genai.Content. config := &amp; genai . GenerateContentConfig { SystemInstruction : genai . NewContentFromText ( "You are a cat. Your name is Neko." , genai . RoleUser ), } response , err := client . Models . GenerateContent ( ctx , "gemini-2.0-flash" , contents , config ) if err != nil { log . Fatal ( err ) } printResponse ( response ) system_instruction . go Araçlar Java FunctionDeclaration multiplyDefinition = defineFunction ( /* name */ "multiply" , /* description */ "returns a * b." , /* parameters */ Arrays . asList ( Schema . numDouble ( "a" , "First parameter" ), Schema . numDouble ( "b" , "Second parameter" )), /* required */ Arrays . asList ( "a" , "b" )); Tool tool = new Tool ( Arrays . asList ( multiplyDefinition ), null ); ; // Specify a Gemini model appropriate for your use case GenerativeModel gm = new GenerativeModel ( /* modelName */ "gemini-1.5-flash" , // Access your API key as a Build Configuration variable (see "Set up your API key" // above) /* apiKey */ BuildConfig . apiKey , /* generationConfig (optional) */ null , /* safetySettings (optional) */ null , /* requestOptions (optional) */ new RequestOptions (), /* tools (optional) */ Arrays . asList ( tool )); GenerativeModelFutures model = GenerativeModelFutures . from ( gm ); Content inputContent = new Content . Builder (). addText ( "What's your name?." ). build (); // For illustrative purposes only. You should use an executor that fits your needs. Executor executor = Executors . newSingleThreadExecutor (); // For text-only input ListenableFuture&lt;CountTokensResponse&gt; countTokensResponse = model . countTokens ( inputContent ); Futures . addCallback ( countTokensResponse , new FutureCallback&lt;CountTokensResponse&gt; () { @Override public void onSuccess ( CountTokensResponse result ) { int totalTokens = result . getTotalTokens (); System . out . println ( "TotalTokens = " + totalTokens ); } @Override public void onFailure ( Throwable t ) { t . printStackTrace (); } }, executor ); count_tokens . java Yanıt gövdesi models.countTokens adlı kullanıcıdan yanıt. prompt için modelin tokenCount değerini döndürür. Başarılı olursa yanıt metni aşağıdaki yapıyla birlikte verileri içerir: Alanlar totalTokens integer Model tarafından prompt öğesinin jetonlaştırıldığı jeton sayısı. Her zaman negatif olmayan bir değerdir. cachedContentTokenCount integer İstemdeki önbelleğe alınmış bölümdeki (önbelleğe alınmış içerik) jeton sayısı. promptTokensDetails[] object ( ModalityTokenCount ) Yalnızca çıkış. İstek girişinde işlenen yöntemlerin listesi. cacheTokensDetails[] object ( ModalityTokenCount ) Yalnızca çıkış. Önbelleğe alınmış içerikte işlenen yöntemlerin listesi. JSON gösterimi { "totalTokens" : integer , "cachedContentTokenCount" : integer , "promptTokensDetails" : [ { object ( ModalityTokenCount ) } ] , "cacheTokensDetails" : [ { object ( ModalityTokenCount ) } ] } Geri bildirim gönderin Aksi belirtilmediği sürece bu sayfanın içeriği Creative Commons Atıf 4.0 Lisansı altında ve kod örnekleri Apache 2.0 Lisansı altında lisanslanmıştır. Ayrıntılı bilgi için Google Developers Site Politikaları 'na göz atın. Java, Oracle ve/veya satış ortaklarının tescilli ticari markasıdır. Son güncelleme tarihi: 2025-12-16 UTC. Bize geri bildirimde bulunmak mı istiyorsunuz? [[["Anlaması kolay","easyToUnderstand","thumb-up"],["Sorunumu çözdü","solvedMyProblem","thumb-up"],["Diğer","otherUp","thumb-up"]],[["İhtiyacım olan bilgiler yok","missingTheInformationINeed","thumb-down"],["Çok karmaşık / çok fazla adım var","tooComplicatedTooManySteps","thumb-down"],["Güncel değil","outOfDate","thumb-down"],["Çeviri sorunu","translationIssue","thumb-down"],["Örnek veya kod sorunu","samplesCodeIssue","thumb-down"],["Diğer","otherDown","thumb-down"]],["Son güncelleme tarihi: 2025-12-16 UTC."],[],[]] Şartlar Gizlilik Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:56
https://infisical.com/docs/documentation/platform/identities/aws-auth
AWS Auth - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Machine Identities AWS Auth Platform Products CLI Reference API Reference SDKs Changelog Getting Started Overview What is Infisical? Concepts Guides Platform Reference Organizations Projects Identities Access Control Audit Logs App Connections Events Workflow Integrations External Migrations Server Admin Console Secret Sharing Connectivity Networking Gateway Authentication Methods User Authentication Machine Identities Explore Options Alibaba Cloud Auth AWS Auth Azure Auth GCP Auth JWT Auth Kubernetes Auth OCI Auth Token Auth TLS Certificate Auth Universal Auth OIDC Auth LDAP Auth Machine Identity Auth Templates Service Token MFA GitHub Team Sync Self-host Infisical Introduction Installation methods Linux Package Replication Upgrade Infisical Instance Environment Variables Release Channels Hardware requirements Guides Reference architectures Infisical Enterprise FAQ Internals Overview Permissions Architecture Security Service tokens Contributing Getting Started Contributing to platform On this page Diagram Concept Guide Machine Identities AWS Auth Learn how to authenticate with Infisical for EC2 instances, Lambda functions, and other IAM principals. AWS Auth is an AWS-native authentication method for IAM principals like EC2 instances or Lambda functions to access Infisical. ​ Diagram The following sequence diagram illustrates the AWS Auth workflow for authenticating AWS IAM principals with Infisical. ​ Concept At a high-level, Infisical authenticates an IAM principal by verifying its identity and checking that it meets specific requirements (e.g. it is an allowed IAM principal ARN) at the /api/v1/auth/aws-auth/login endpoint. If successful, then Infisical returns a short-lived access token that can be used to make authenticated requests to the Infisical API. To be more specific: The client IAM principal signs a GetCallerIdentity query using the AWS Signature v4 algorithm ; this is done using the credentials from the AWS environment where the IAM principal is running. The client sends the signed query data to Infisical including the request method, request body, and request headers at the /api/v1/auth/aws-auth/login endpoint. Infisical reconstructs the query and sends it to AWS STS API via the sts:GetCallerIdentity method for verification and obtains the identity associated with the IAM principal. Infisical checks the identity’s properties against set criteria such Allowed Principal ARNs . If all is well, Infisical returns a short-lived access token that the IAM principal can use to make authenticated requests to the Infisical API. We recommend using one of Infisical’s clients like SDKs or the Infisical Agent to authenticate with Infisical using AWS Auth as they handle the authentication process including the signed GetCallerIdentity query construction for you. Also, note that Infisical needs network-level access to send requests to the AWS STS API as part of the AWS Auth workflow. ​ Guide In the following steps, we explore how to create and use identities for your workloads and applications on AWS to access the Infisical API using the AWS Auth authentication method. 1 Creating an identity To create an identity, head to your Organization Settings &gt; Access Control &gt; Identities and press Create identity . When creating an identity, you specify an organization level role for it to assume; you can configure roles in Organization Settings &gt; Access Control &gt; Organization Roles. Now input a few details for your new identity. Here’s some guidance for each field: Name (required): A friendly name for the identity. Role (required): A role from the Organization Roles tab for the identity to assume. The organization role assigned will determine what organization level resources this identity can have access to. Once you’ve created an identity, you’ll be redirected to a page where you can manage the identity. Since the identity has been configured with Universal Auth by default, you should re-configure it to use AWS Auth instead. To do this, press to edit the Authentication section, remove the existing Universal Auth configuration, and add a new AWS Auth configuration onto the identity. Here’s some more guidance on each field: Allowed Principal ARNs: A comma-separated list of trusted IAM principal ARNs that are allowed to authenticate with Infisical. The values should take one of three forms: arn:aws:iam::123456789012:user/MyUserName , arn:aws:iam::123456789012:role/MyRoleName , or arn:aws:iam::123456789012:* . Using a wildcard in this case allows any IAM principal in the account 123456789012 to authenticate with Infisical under the identity. Allowed Account IDs: A comma-separated list of trusted AWS account IDs that are allowed to authenticate with Infisical. STS Endpoint (default is https://sts.amazonaws.com/ ): The endpoint URL for the AWS STS API. This value should be adjusted based on the AWS region you are operating in (e.g. https://sts.us-east-1.amazonaws.com/ ); refer to the list of regional STS endpoints here . Access Token TTL (default is 2592000 equivalent to 30 days): The lifetime for an acccess token in seconds. This value will be referenced at renewal time. Access Token Max TTL (default is 2592000 equivalent to 30 days): The maximum lifetime for an acccess token in seconds. This value will be referenced at renewal time. Access Token Max Number of Uses (default is 0 ): The maximum number of times that an access token can be used; a value of 0 implies infinite number of uses. Access Token Trusted IPs: The IPs or CIDR ranges that access tokens can be used from. By default, each token is given the 0.0.0.0/0 , allowing usage from any network address. 2 Adding an identity to a project To enable the identity to access project-level resources such as secrets within a specific project, you should add it to that project. To do this, head over to the project you want to add the identity to and go to Project Settings &gt; Access Control &gt; Machine Identities and press Add identity . Next, select the identity you want to add to the project and the project level role you want to allow it to assume. The project role assigned will determine what project level resources this identity can have access to. 3 Accessing the Infisical API with the identity To access the Infisical API as the identity, you need to construct a signed GetCallerIdentity query using the AWS Signature v4 algorithm and make a request to the /api/v1/auth/aws-auth/login endpoint containing the query data in exchange for an access token. We provide a few code examples below of how you can authenticate with Infisical from inside a Lambda function, EC2 instance, etc. and obtain an access token to access the Infisical API . Sample code for inside a Lambda function The following query construction is an example of how you can authenticate with Infisical from inside a Lambda function. The shown example uses Node.js but you can use other languages supported by AWS Lambda. Copy Ask AI import AWS from &quot;aws-sdk&quot; ; import axios from &quot;axios&quot; ; export const handler = async ( event , context ) =&gt; { try { const region = process . env . AWS_REGION ; AWS . config . update ({ region }); const iamRequestURL = `https://sts. ${ region } .amazonaws.com/` ; const iamRequestBody = &quot;Action=GetCallerIdentity&amp;Version=2011-06-15&quot; ; const iamRequestHeaders = { &quot;Content-Type&quot; : &quot;application/x-www-form-urlencoded; charset=utf-8&quot; , Host: `sts. ${ region } .amazonaws.com` , }; // Create the request const request = new AWS . HttpRequest ( iamRequestURL , region ); request . method = &quot;POST&quot; ; request . headers = iamRequestHeaders ; request . headers [ &quot;X-Amz-Date&quot; ] = AWS . util . date . iso8601 ( new Date ()) . replace ( / [ :- ] | \. \d {3} / g , &quot;&quot; ); request . body = iamRequestBody ; request . headers [ &quot;Content-Length&quot; ] = Buffer . byteLength ( iamRequestBody ). toString (); // Sign the request const signer = new AWS . Signers . V4 ( request , &quot;sts&quot; ); signer . addAuthorization ( AWS . config . credentials , new Date ()); const infisicalUrl = &quot;https://app.infisical.com&quot; ; // or your self-hosted Infisical URL const identityId = &quot;&lt;your-identity-id&gt;&quot; ; const { data } = await axios . post ( ` ${ infisicalUrl } /api/v1/auth/aws-auth/login` , { identityId , iamHttpRequestMethod: &quot;POST&quot; , iamRequestUrl: Buffer . from ( iamRequestURL ). toString ( &quot;base64&quot; ), iamRequestBody: Buffer . from ( iamRequestBody ). toString ( &quot;base64&quot; ), iamRequestHeaders: Buffer . from ( JSON . stringify ( iamRequestHeaders ) ). toString ( &quot;base64&quot; ), } ); console . log ( &quot;result data: &quot; , data ); // access token here } catch ( err ) { console . error ( err ); } }; Sample code for inside an EC2 instance The following query construction is an example of how you can authenticate with Infisical from inside a EC2 instance. The shown example uses Node.js but you can use other language you wish. Copy Ask AI import AWS from &quot;aws-sdk&quot; ; import axios from &quot;axios&quot; ; const main = async () =&gt; { try { // obtain region from EC2 instance metadata const tokenResponse = await axios . put ( &quot;http://169.254.169.254/latest/api/token&quot; , null , { headers: { &quot;X-aws-ec2-metadata-token-ttl-seconds&quot; : &quot;21600&quot; } }); const url = &quot;http://169.254.169.254/latest/dynamic/instance-identity/document&quot; ; const response = await axios . get ( url , { headers: { &quot;X-aws-ec2-metadata-token&quot; : tokenResponse . data } }); const region = response . data . region ; AWS . config . update ({ region }); const iamRequestURL = `https://sts. ${ region } .amazonaws.com/` ; const iamRequestBody = &quot;Action=GetCallerIdentity&amp;Version=2011-06-15&quot; ; const iamRequestHeaders = { &quot;Content-Type&quot; : &quot;application/x-www-form-urlencoded; charset=utf-8&quot; , Host: `sts. ${ region } .amazonaws.com` }; const request = new AWS . HttpRequest ( new AWS . Endpoint ( iamRequestURL ), AWS . config . region ); request . method = &quot;POST&quot; ; request . headers = iamRequestHeaders ; request . headers [ &quot;X-Amz-Date&quot; ] = AWS . util . date . iso8601 ( new Date ()). replace ( / [ :- ] | \. \d {3} / g , &quot;&quot; ); request . body = iamRequestBody ; request . headers [ &quot;Content-Length&quot; ] = Buffer . byteLength ( iamRequestBody ); const signer = new AWS . Signers . V4 ( request , &quot;sts&quot; ); signer . addAuthorization ( AWS . config . credentials , new Date ()); const infisicalUrl = &quot;https://app.infisical.com&quot; ; // or your self-hosted Infisical URL const identityId = &quot;&lt;your-identity-id&gt;&quot; ; const { data } = await axios . post ( ` ${ infisicalUrl } /api/v1/auth/aws-auth/login` , { identityId , iamHttpRequestMethod: &quot;POST&quot; , iamRequestUrl: Buffer . from ( iamRequestURL ). toString ( &quot;base64&quot; ), iamRequestBody: Buffer . from ( iamRequestBody ). toString ( &quot;base64&quot; ), iamRequestHeaders: Buffer . from ( JSON . stringify ( iamRequestHeaders )). toString ( &quot;base64&quot; ) }); console . log ( &quot;result data: &quot; , data ); // access token here } catch ( err ) { console . error ( err ); } } main (); Sample code for general query construction The following query construction provides a generic example of how you can construct a signed GetCallerIdentity query and obtain the required payload components. The shown example uses Node.js but you can use any language you wish. Copy Ask AI const AWS = require ( &quot;aws-sdk&quot; ); const region = &quot;&lt;your-aws-region&gt;&quot; ; const infisicalUrl = &quot;https://app.infisical.com&quot; ; // or your self-hosted Infisical URL const iamRequestURL = `https://sts. ${ region } .amazonaws.com/` ; const iamRequestBody = &quot;Action=GetCallerIdentity&amp;Version=2011-06-15&quot; ; const iamRequestHeaders = { &quot;Content-Type&quot; : &quot;application/x-www-form-urlencoded; charset=utf-8&quot; , Host: `sts. ${ region } .amazonaws.com` }; const request = new AWS . HttpRequest ( new AWS . Endpoint ( iamRequestURL ), region ); request . method = &quot;POST&quot; ; request . headers = iamRequestHeaders ; request . headers [ &quot;X-Amz-Date&quot; ] = AWS . util . date . iso8601 ( new Date ()). replace ( / [ :- ] | \. \d {3} / g , &quot;&quot; ); request . body = iamRequestBody ; request . headers [ &quot;Content-Length&quot; ] = Buffer . byteLength ( iamRequestBody ); const signer = new AWS . Signers . V4 ( request , &quot;sts&quot; ); signer . addAuthorization ( AWS . config . credentials , new Date ()); ​ Sample request Request Copy Ask AI curl --location --request POST &#x27;https://app.infisical.com/api/v1/auth/aws-auth/login&#x27; \ --header &#x27;Content-Type: application/x-www-form-urlencoded&#x27; \ --data-urlencode &#x27;identityId=...&#x27; \ --data-urlencode &#x27;iamHttpRequestMethod=...&#x27; \ --data-urlencode &#x27;iamRequestBody=...&#x27; \ --data-urlencode &#x27;iamRequestHeaders=...&#x27; Note that you should replace &lt;identityId&gt; with the ID of the identity you created in step 1. ​ Sample response Response Copy Ask AI { &quot;accessToken&quot; : &quot;...&quot;, &quot;expiresIn&quot; : 7200, &quot;accessTokenMaxTTL&quot; : 43244 &quot;tokenType&quot; : &quot;Bearer&quot; } Next, you can use the access token to access the Infisical API Sample code for inside an EKS pod The following query construction is an example of how you can authenticate with Infisical from inside an EKS pod. The shown example uses Node.js Typescript but you can use any language you wish. Copy Ask AI import axios from &quot;axios&quot; ; import { Sha256 } from &quot;@aws-crypto/sha256-js&quot; ; import { fromNodeProviderChain } from &quot;@aws-sdk/credential-providers&quot; ; import { HttpRequest } from &quot;@aws-sdk/protocol-http&quot; ; import { SignatureV4 } from &quot;@aws-sdk/signature-v4&quot; ; const main = async () =&gt; { try { const tokenRes = await axios . put &lt; string &gt;( &quot;http://169.254.169.254/latest/api/token&quot; , undefined , { headers: { &quot;X-aws-ec2-metadata-token-ttl-seconds&quot; : &quot;21600&quot; } }); const { data : { region } } = await axios . get &lt;{ region : string }&gt;( &quot;http://169.254.169.254/latest/dynamic/instance-identity/document&quot; , { headers: { &quot;X-aws-ec2-metadata-token&quot; : tokenRes . data , Accept: &quot;application/json&quot; } }); const credentials = await fromNodeProviderChain ()(); if (! credentials . accessKeyId || ! credentials . secretAccessKey ) { throw new Error ( &quot;Credentials not found&quot; ); } const iamRequestURL = `https://sts. ${ region } .amazonaws.com/` ; const iamRequestBody = &quot;Action=GetCallerIdentity&amp;Version=2011-06-15&quot; ; const iamRequestHeaders = { &quot;Content-Type&quot; : &quot;application/x-www-form-urlencoded; charset=utf-8&quot; , Host: `sts. ${ region } .amazonaws.com` }; const request = new HttpRequest ({ protocol: &quot;https:&quot; , hostname: `sts. ${ region } .amazonaws.com` , path: &quot;/&quot; , method: &quot;POST&quot; , headers: { ... iamRequestHeaders , &quot;Content-Length&quot; : String ( Buffer . byteLength ( iamRequestBody )) }, body: iamRequestBody }); const signer = new SignatureV4 ({ credentials , region , service: &quot;sts&quot; , sha256: Sha256 }); const signedRequest = await signer . sign ( request ); const headers : Record &lt; string , string &gt; = {}; Object . entries ( signedRequest . headers ). forEach (([ key , value ]) =&gt; { if ( typeof value === &quot;string&quot; ) headers [ key ] = value ; }); const iamRequest = { iamHttpRequestMethod: &quot;POST&quot; , iamRequestUrl: iamRequestURL , iamRequestBody: iamRequestBody , iamRequestHeaders: headers }; const { data : { accessToken } } = await axios . post &lt;{ accessToken : string }&gt;( &quot;https://app.infisical.com/api/v1/auth/aws-auth/login&quot; , { ... iamRequest , identityId: &quot;&lt;replace-with-your-identity-id&gt;&quot; }); console . log ( `Infisical Access Token: ${ accessToken } ` ); } catch ( e ) { console . error ( &quot;Failed to do AWS auth&quot; , e ); } }; We recommend using one of Infisical’s clients like SDKs or the Infisical Agent to authenticate with Infisical using AWS Auth as they handle the authentication process including the signed GetCallerIdentity query construction for you. Each identity access token has a time-to-live (TTL) which you can infer from the response of the login operation; the default TTL is 7200 seconds which can be adjusted. If an identity access token expires, it can no longer authenticate with the Infisical API. In this case, a new access token should be obtained by performing another login operation. Was this page helpful? Yes No Suggest edits Raise issue Alibaba Cloud Auth Azure Auth ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Mermaid, Note, OptimizedImage, Step, Steps, Tip} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Mermaid) _missingMdxReference(\"Mermaid\", true);\n if (!Note) _missingMdxReference(\"Note\", true);\n if (!OptimizedImage) _missingMdxReference(\"OptimizedImage\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tip) _missingMdxReference(\"Tip\", true);\n return _jsxs(_Fragment, {\n children: [_jsxs(_components.p, {\n children: [_jsx(_components.strong, {\n children: \"AWS Auth\"\n }), \" is an AWS-native authentication method for IAM principals like EC2 instances or Lambda functions to access Infisical.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"diagram\",\n children: \"Diagram\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"The following sequence diagram illustrates the AWS Auth workflow for authenticating AWS IAM principals with Infisical.\"\n }), \"\\n\", _jsx(Mermaid, {\n chart: \"sequenceDiagram\\n participant Client as Client\\n participant Infis as Infisical\\n participant AWS as AWS STS\\n\\n Note over Client,Client: Step 1: Sign GetCallerIdentityQuery\\n\\n Note over Client,Infis: Step 2: Login Operation\\n Client-\u003e\u003eInfis: Send signed query details /api/v1/auth/aws-auth/login\\n\\n Note over Infis,AWS: Step 3: Query verification\\n Infis-\u003e\u003eAWS: Forward signed GetCallerIdentity query\\n AWS--\u003e\u003eInfis: Return IAM user/role details\\n\\n Note over Infis: Step 4: Identity Property Validation\\n Infis-\u003e\u003eClient: Return short-lived access token\\n\\n Note over Client,Infis: Step 5: Access Infisical API with Token\\n Client-\u003e\u003eInfis: Make authenticated requests using the short-lived access token\"\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"At a high-level, Infisical authenticates an IAM principal by verifying its identity and checking that it meets specific requirements (e.g. it is an allowed IAM principal ARN) at the \", _jsx(_components.code, {\n children: \"/api/v1/auth/aws-auth/login\"\n }), \" endpoint. If successful,\\nthen Infisical returns a short-lived access token that can be used to make authenticated requests to the Infisical API.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"To be more specific:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"The client IAM principal signs a \", _jsx(_components.code, {\n children: \"GetCallerIdentity\"\n }), \" query using the \", _jsx(_components.a, {\n href: \"https://docs.aws.amazon.com/IAM/latest/UserGuide/create-signed-request.html\",\n children: \"AWS Signature v4 algorithm\"\n }), \"; this is done using the credentials from the AWS environment where the IAM principal is running.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"The client sends the signed query data to Infisical including the request method, request body, and request headers at the \", _jsx(_components.code, {\n children: \"/api/v1/auth/aws-auth/login\"\n }), \" endpoint.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Infisical reconstructs the query and sends it to AWS STS API via the \", _jsx(_components.a, {\n href: \"https://docs.aws.amazon.com/STS/latest/APIReference/API_GetCallerIdentity.html\",\n children: \"sts:GetCallerIdentity\"\n }), \" method for verification and obtains the identity associated with the IAM principal.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Infisical checks the identity’s properties against set criteria such \", _jsx(_components.strong, {\n children: \"Allowed Principal ARNs\"\n }), \".\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"If all is well, Infisical returns a short-lived access token that the IAM principal can use to make authenticated requests to the Infisical API.\"\n }), \"\\n\"]\n }), \"\\n\", _jsxs(Note, {\n children: [_jsxs(_components.p, {\n children: [\"We recommend using one of Infisical’s clients like SDKs or the Infisical Agent\\nto authenticate with Infisical using AWS Auth as they handle the\\nauthentication process including the signed \", _jsx(_components.code, {\n children: \"GetCallerIdentity\"\n }), \" query\\nconstruction for you.\"]\n }), _jsx(_components.p, {\n children: \"Also, note that Infisical needs network-level access to send requests to the AWS STS API\\nas part of the AWS Auth workflow.\"\n })]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"guide\",\n children: \"Guide\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"In the following steps, we explore how to create and use identities for your workloads and applications on AWS to\\naccess the Infisical API using the AWS Auth authentication method.\"\n }), \"\\n\", _jsxs(Steps, {\n children: [_jsxs(Step, {\n title: \"Creating an identity\",\n children: [_jsxs(_components.p, {\n children: [\"To create an identity, head to your Organization Settings \u003e Access Control \u003e Identities and press \", _jsx(_components.strong, {\n children: \"Create identity\"\n }), \".\"]\n }), _jsx(OptimizedImage, {\n src: \"https://mintlify.s3.us-west-1.amazonaws.com/infisical/images/platform/identities/identities-org.png\",\n alt: \"identities organization\"\n }), _jsxs(_components.p, {\n children: [\"When creating an identity, you specify an organization level \", _jsx(_components.a, {\n href: \"/documentation/platform/access-controls/role-based-access-controls\",\n children: \"role\"\n }), \" for it to assume; you can configure roles in Organization Settings \u003e Access Control \u003e Organization Roles.\"]\n }), _jsx(OptimizedImage, {\n src: \"https://mintlify.s3.us-west-1.amazonaws.com/infisical/images/platform/identities/identities-org-create.png\",\n alt: \"identities organization create\"\n }), _jsx(_components.p, {\n children: \"Now input a few details for your new identity. Here’s some guidance for each field:\"\n }), _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Name (required): A friendly name for the identity.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Role (required): A role from the \", _jsx(_components.strong, {\n children: \"Organization Roles\"\n }), \" tab for the identity to assume. The organization role assigned will determine what organization level resources this identity can have access to.\"]\n }), \"\\n\"]\n }), _jsx(_components.p, {\n children: \"Once you’ve created an identity, you’ll be redirected to a page where you can manage the identity.\"\n }), _jsx(OptimizedImage, {\n src: \"https://mintlify.s3.us-west-1.amazonaws.com/infisical/images/platform/identities/identities-page.png\",\n alt: \"identities page\"\n }), _jsxs(_components.p, {\n children: [\"Since the identity has been configured with Universal Auth by default, you should re-configure it to use AWS Auth instead. To do this, press to edit the \", _jsx(_components.strong, {\n children: \"Authentication\"\n }), \" section,\\nremove the existing Universal Auth configuration, and add a new AWS Auth configuration onto the identity.\"]\n }), _jsx(OptimizedImage, {\n src: \"https://mintlify.s3.us-west-1.amazonaws.com/infisical/images/platform/identities/identities-page-remove-default-auth.png\",\n alt: \"identities page remove default auth\"\n }), _jsx(OptimizedImage, {\n src: \"https://mintlify.s3.us-west-1.amazonaws.com/infisical/images/platform/identities/identities-org-create-aws-auth-method.png\",\n alt: \"identities create aws auth method\"\n }), _jsx(_components.p, {\n children: \"Here’s some more guidance on each field:\"\n }), _jsxs(_components.ul, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Allowed Principal ARNs: A comma-separated list of trusted IAM principal ARNs that are allowed to authenticate with Infisical. The values should take one of three forms: \", _jsx(_components.code, {\n children: \"arn:aws:iam::123456789012:user/MyUserName\"\n }), \", \", _jsx(_components.code, {\n children: \"arn:aws:iam::123456789012:role/MyRoleName\"\n }), \", or \", _jsx(_components.code, {\n children: \"arn:aws:iam::123456789012:*\"\n }), \". Using a wildcard in this case allows any IAM principal in the account \", _jsx(_components.code, {\n children: \"123456789012\"\n }), \" to authenticate with Infisical under the identity.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Allowed Account IDs: A comma-separated list of trusted AWS account IDs that are allowed to authenticate with Infisical.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"STS Endpoint (default is \", _jsx(_components.code, {\n children: \"https://sts.amazonaws.com/\"\n }), \"): The endpoint URL for the AWS STS API. This value should be adjusted based on the AWS region you are operating in (e.g. \", _jsx(_components.code, {\n children: \"https://sts.us-east-1.amazonaws.com/\"\n }), \"); refer to the list of regional STS endpoints \", _jsx(_components.a, {\n href: \"https://docs.aws.amazon.com/general/latest/gr/sts.html\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Access Token TTL (default is \", _jsx(_components.code, {\n children: \"2592000\"\n }), \" equivalent to 30 days): The lifetime for an acccess token in seconds. This value will be referenced at renewal time.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Access Token Max TTL (default is \", _jsx(_components.code, {\n children: \"2592000\"\n }), \" equivalent to 30 days): The maximum lifetime for an acccess token in seconds. This value will be referenced at renewal time.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Access Token Max Number of Uses (default is \", _jsx(_components.code, {\n children: \"0\"\n }), \"): The maximum number of times that an access token can be used; a value of \", _jsx(_components.code, {\n children: \"0\"\n }), \" implies infinite number of uses.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Access Token Trusted IPs: The IPs or CIDR ranges that access tokens can be used from. By default, each token is given the \", _jsx(_components.code, {\n children: \"0.0.0.0/0\"\n }), \", allowing usage from any network address.\"]\n }), \"\\n\"]\n })]\n }), _jsxs(Step, {\n title: \"Adding an identity to a project\",\n children: [_jsx(_components.p, {\n children: \"To enable the identity to access project-level resources such as secrets within a specific project, you should add it to that project.\"\n }), _jsxs(_components.p, {\n children: [\"To do this, head over to the project you want to add the identity to and go to Project Settings \u003e Access Control \u003e Machine Identities and press \", _jsx(_components.strong, {\n children: \"Add identity\"\n }), \".\"]\n }), _jsx(_components.p, {\n children: \"Next, select the identity you want to add to the project and the project level role you want to allow it to assume. The project role assigned will determine what project level resources this identity can have access to.\"\n }), _jsx(OptimizedImage, {\n src: \"https://mintlify.s3.us-west-1.amazonaws.com/infisical/images/platform/identities/identities-project.png\",\n alt: \"identities project\"\n }), _jsx(OptimizedImage, {\n src: \"https://mintlify.s3.us-west-1.amazonaws.com/infisical/images/platform/identities/identities-project-create.png\",\n alt: \"identities project create\"\n })]\n }), _jsxs(Step, {\n title: \"Accessing the Infisical API with the identity\",\n children: [_jsxs(_components.p, {\n children: [\"To access the Infisical API as the identity, you need to construct a signed \", _jsx(_components.code, {\n children: \"GetCallerIdentity\"\n }), \" query using the \", _jsx(_components.a, {\n href: \"https://docs.aws.amazon.com/IAM/latest/UserGuide/create-signed-request.html\",\n children: \"AWS Signature v4 algorithm\"\n }), \" and make a request to the \", _jsx(_components.code, {\n children: \"/api/v1/auth/aws-auth/login\"\n }), \" endpoint containing the query data\\nin exchange for an access token.\"]\n }), _jsxs(_components.p, {\n children: [\"We provide a few code examples below of how you can authenticate with Infisical from inside a Lambda function, EC2 instance, etc. and obtain an access token to access the \", _jsx(_components.a, {\n href: \"/api-reference/overview/introduction\",\n children: \"Infisical API\"\n }), \".\"]\n }), _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Sample code for inside a Lambda function\",\n children: [_jsx(_components.p, {\n children: \"The following query construction is an example of how you can authenticate with Infisical from inside a Lambda function.\"\n }), _jsx(_components.p, {\n children: \"The shown example uses Node.js but you can use other languages supported by AWS Lambda.\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"51\",\n language: \"javascript\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"javascript\",\n children: _jsxs(_components.code, {\n language: \"javascript\",\n numberOfLines: \"51\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#C586C0\",\n \"--shiki-dark\": \"#C586C0\"\n },\n children: \"import\"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \" AWS\"\n }), _jsx(_components.span, {\n style: {\n color: \"#C586C0\",\n \"--shiki-dark\": \"#C586C0\"\n },\n children: \" from\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \" \\\"aws-sdk\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \";\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#C586C0\",\n \"--shiki-dark\": \"#C586C0\"\n },\n children: \"import\"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \" axios\"\n }), _jsx(_components.span, {\n style: {\n color: \"#C586C0\",\n \"--shiki-dark\": \"#C586C0\"\n },\n children: \" from\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \" \\\"axios\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \";\"\n })]\n }), \"\\n\", _jsx(_components.span, {\n className: \"line\"\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#C586C0\",\n \"--shiki-dark\": \"#C586C0\"\n },\n children: \"export\"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" const\"\n }), _jsx(_components.span, {\n style: {\n color: \"#DCDCAA\",\n \"--shiki-dark\": \"#DCDCAA\"\n },\n children: \" handler\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" = \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"async\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" (\"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \"event\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \", \"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \"context\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \") \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"=\u003e\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" {\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#C586C0\",\n \"--shiki-dark\": \"#C586C0\"\n },\n children: \" try\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" {\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" const\"\n }), _jsx(_components.span, {\n style: {\n color: \"#4FC1FF\",\n \"--shiki-dark\": \"#4FC1FF\"\n },\n children: \" region\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" = \"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \"process\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \".\"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \"env\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \".\"\n }), _jsx(_components.span, {\n style: {\n color: \"#4FC1FF\",\n \"--shiki-dark\": \"#4FC1FF\"\n },\n children: \"AWS_REGION\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \";\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#4FC1FF\",\n \"--shiki-dark\": \"#4FC1FF\"\n },\n children: \" AWS\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \".\"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \"config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \".\"\n }), _jsx(_components.span, {\n style: {\n color: \"#DCDCAA\",\n \"--shiki-dark\": \"#DCDCAA\"\n },\n children: \"update\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \"({ \"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \"region\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" });\"\n })]\n }), \"\\n\", _jsx(_components.span, {\n className: \"line\"\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" const\"\n }), _jsx(_components.span, {\n style: {\n color: \"#4FC1FF\",\n \"--shiki-dark\": \"#4FC1FF\"\n },\n children: \" iamRequestURL\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" = \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"`https://sts.\"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"${\"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \"region\"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"}\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \".amazonaws.com/`\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \";\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" const\"\n }), _jsx(_components.span, {\n style: {\n color: \"#4FC1FF\",\n \"--shiki-dark\": \"#4FC1FF\"\n },\n children: \" iamRequestBody\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" = \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"Action=GetCallerIdentity\u0026Version=2011-06-15\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \";\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" const\"\n }), _jsx(_components.span, {\n style: {\n color: \"#4FC1FF\",\n \"--shiki-dark\": \"#4FC1FF\"\n },\n children: \" iamRequestHeaders\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" = {\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \" \\\"Content-Type\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \":\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \" \\\"application/x-www-form-urlencoded; charset=utf-8\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \",\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \" Host:\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \" `sts.\"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"${\"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \"region\"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"}\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \".amazonaws.com`\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \",\"\n })]\n }), \"\\n\", _jsx(_components.span, {\n className: \"line\",\n children: _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" };\"\n })\n }), \"\\n\", _jsx(_components.span, {\n className: \"line\"\n }), \"\\n\", _jsx(_components.span, {\n className: \"line\",\n children: _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" // Create the request\"\n })\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" const\"\n }), _jsx(_components.span, {\n style: {\n color: \"#4FC1FF\",\n \"--shiki-dark\": \"#4FC1FF\"\n },\n children: \" request\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" = \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"new\"\n }), _jsx(_components.span, {\n style: {\n color: \"#4FC1FF\",\n \"--shiki-dark\": \"#4FC1FF\"\n },\n children: \" AWS\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \".\"\n }), _jsx(_components.span, {\n style: {\n color: \"#DCDCAA\",\n \"--shiki-dark\": \"#DCDCAA\"\n },\n children: \"HttpRequest\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \"(\"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \"iamRequestURL\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \", \"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \"region\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \");\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \" request\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \".\"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \"method\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" = \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"POST\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \";\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \" request\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \".\"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \"headers\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" = \"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \"iamRequestHeaders\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \";\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \" request\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \".\"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \"headers\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \"[\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"X-Amz-Date\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \"] = \"\n }), _jsx(_components.span, {\n style: {\n color: \"#4FC1FF\",\n \"--shiki-dark\": \"#4FC1FF\"\n },\n children: \"AWS\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \".\"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \"util\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \".\"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \"date\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" .\"\n }), _jsx(_components.span, {\n style: {\n color: \"#DCDCAA\",\n \"--shiki-dark\": \"#DCDCAA\"\n },\n children: \"iso8601\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \"(\"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"new\"\n }), _jsx(_components.span, {\n style: {\n color: \"#DCDCAA\",\n \"--shiki-dark\": \"#DCDCAA\"\n },\n children: \" Date\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \"())\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" .\"\n }), _jsx(_components.span, {\n style: {\n color: \"#DCDCAA\",\n \"--shiki-dark\": \"#DCDCAA\"\n },\n children: \"replace\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \"(\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D16969\",\n \"--shiki-dark\": \"#D16969\"\n },\n children: \"/\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"[\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D16969\",\n \"--shiki-dark\": \"#D16969\"\n },\n children: \":-\"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"]\"\n }), _jsx(_components.span, {\n style: {\n color: \"#DCDCAA\",\n \"--shiki-dark\": \"#DCDCAA\"\n },\n children: \"|\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D7BA7D\",\n \"--shiki-dark\": \"#D7BA7D\"\n },\n children: \"\\\\.\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D16969\",\n \"--shiki-dark\": \"#D16969\"\n },\n children: \"\\\\d\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D7BA7D\",\n \"--shiki-dark\": \"#D7BA7D\"\n },\n children: \"{3}\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D16969\",\n \"--shiki-dark\": \"#D16969\"\n },\n children: \"/\"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"g\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \", \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \");\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \" request\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \".\"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \"body\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \" = \"\n }), _jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"--shiki-dark\": \"#9CDCFE\"\n },\n children: \"iamRequestBody\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \";\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#9CDCFE\",\n \"-
2026-01-13T09:29:56
https://play.google.com/store/apps/details?id=notion.id&amp;hl=ka
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M12 17.27L18.18
2026-01-13T09:29:56
https://play.google.com/store/apps/details?id=notion.id&amp;hl=es_BO
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M12 17.27L
2026-01-13T09:29:56
https://snyk.io/es/solutions/software-supply-chain-security/
Solución de seguridad de la cadena de suministro de software | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API &amp; Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API &amp; Web - Todos los clientes Snyk API &amp; Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo Soluciones Seguridad de la aplicación Seguridad de la cadena de suministro de software Código seguro generado por IA Vulnerabilidades de día cero Secure at inception Select Seguridad de la aplicación Seguridad de la cadena de suministro de software Código seguro generado por IA Vulnerabilidades de día cero Secure at inception Fortalece la seguridad de tu cadena de suministro de software Snyk te permite proteger componentes críticos de la cadena de suministro de software, que abarcan código propio, bibliotecas de código abierto, imágenes de contenedores y configuraciones de IaC, directamente en las herramientas que los desarrolladores usan a diario. Reserva una demostración en vivo Demostración de Snyk bajo demanda Mira nuestra demostración grabada para descubrir cómo los equipos pueden encontrar y corregir vulnerabilidades en toda la cadena de suministro de software. Mirar ahora Aplica las prácticas recomendadas de seguridad a la cadena de suministro Snyk brinda visibilidad sobre los problemas de seguridad de la cadena de suministro y sugerencias de correcciones para resolverlos con rapidez. Conoce la postura de seguridad de los paquetes de código abierto Con Snyk Advisor y la Base de datos de vulnerabilidades de Snyk , recibirás información actualizada sobre riesgos críticos y cómo mitigarlos, de modo que puedas gestionar las amenazas de seguridad antes de comenzar un proyecto. Seguridad guiada para el código que escribes La protección en tiempo real y con tecnología de IA de SAST (prueba de seguridad de aplicaciones estáticas) de Snyk Code permite a los desarrolladores proteger el código a medida que lo escriben. La IA de Snyk ofrece correcciones seguras y aprobadas para problemas complejos de seguridad de código en el IDE y en todo el SDLC. Tu navegador no admite la etiqueta de video. Visibilidad Identifica dependencias, y encuentra y corrige vulnerabilidades Usa Snyk Open Source y Snyk Container para analizar los proyectos y recibir recomendaciones a fin de obtener imágenes de contenedores, bibliotecas de código abierto y componentes más seguros. Aplica correcciones sugeridas más rápidamente Las solicitudes de cambios de corrección permiten a los desarrolladores corregir vulnerabilidades de forma veloz y eficiente para poder regresar rápidamente a desarrollar aplicaciones. Software transparency with SBOMs Whether you&#x27;re required to share SBOMs for your apps and services or you receive them from your vendors and providers, Snyk helps you generate, test, and enrich SBOMs to translate software transparency into a current risk snapshot. Mitiga riesgos en toda la cadena de suministro de software Con Snyk, podrás comprender y gestionar la seguridad de la cadena de suministro: desde realizar diseños seguros y supervisar dependencias hasta corregir vulnerabilidades. Diseña aplicaciones seguras desde la primera línea de código Supervisa la seguridad, el mantenimiento y la popularidad de más de 1 millón de paquetes de código abierto en diversos ecosistemas. Desarrolla una SBOM en segundos Escanea las aplicaciones para crear una SBOM (lista de materiales de software) identificando todos los componentes y sus interacciones. Corrige más problemas de seguridad más rápido Recibe consejos sobre remedios y genera automáticamente solicitudes de cambios de corrección directamente desde las herramientas que usan los equipos. Recursos sobre la seguridad de la cadena de suministro de software Obtén información sobre cómo crear prácticas recomendadas de seguridad de la cadena de suministro de software en todos los proyectos. Article Software Supply Chain Security Learn more about software supply chain security, why it’s important to organizations, and how you can secure your supply chains with Snyk. Blog Comprender los requisitos de seguridad de la cadena de suministro de software en la orden ejecutiva sobre ciberseguridad Conoce los requisitos de la seguridad de la cadena de suministro de software de la orden ejecutiva del presidente Biden de EE. UU. para mejorar la ciberseguridad de la nación y cómo Snyk puede cumplirlos. Video Cómo mitigar los riesgos de seguridad de las cadenas de suministro El equipo de Ingeniería de Soluciones de Snyk conversa sobre la mitigación de riesgos y las complejidades de las cadenas de suministro. Ve a Snyk en acción Reserva una demostración con un experto para ver en acción todas las características de la solución de seguridad de Snyk para cadenas de suministro de software. Reserva una demostración en vivo Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:56
https://play.google.com/store/apps/details?id=notion.id&amp;hl=es_CL
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M0 0h24v24H0
2026-01-13T09:29:56
https://infisical.com/docs/integrations/platforms/certificate-agent#operating-the-agent
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let&#x27;s Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;./client-id&quot; # Path to file containing client ID client-secret : &quot;./client-secret&quot; # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : &quot;kubernetes-auth&quot; config : identity-id : &quot;your-kubernetes-identity-id&quot; service-account-token-path : &quot;/var/run/secrets/kubernetes.io/serviceaccount/token&quot; Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : &quot;azure-auth&quot; config : identity-id : &quot;your-azure-identity-id&quot; Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;gcp-id-token&quot; config : identity-id : &quot;your-gcp-identity-id&quot; GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : &quot;gcp-iam&quot; config : identity-id : &quot;your-gcp-identity-id&quot; service-account-key : &quot;/path/to/service-account-key.json&quot; Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;aws-iam&quot; config : identity-id : &quot;your-aws-identity-id&quot; ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : [ &quot;api.example.com&quot; , &quot;api-v2.example.com&quot; ] ttl : &quot;90d&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; # Enable automatic certificate renewal lifecycle : renew-before-expiry : &quot;30d&quot; status-check-interval : &quot;6h&quot; # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : &quot;/etc/ssl/private/web.key&quot; permission : &quot;0600&quot; # Read/write for owner only certificate : path : &quot;/etc/ssl/certs/web.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner chain : path : &quot;/etc/ssl/certs/web-chain.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo &quot;Certificate issued for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-failure : command : | echo &quot;Certificate operation failed: ${ERROR_MESSAGE}&quot; mail -s &quot;Certificate Alert&quot; [email&#160;protected] &lt; /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., [&quot;www.example.com&quot;, &quot;api.example.com&quot;] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger &#x27;Certificate renewal failed&#x27; , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo &quot;New certificate issued for ${CERT_COMMON_NAME}&quot; chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d &quot;{&#x27;text&#x27;: &#x27;Certificate for ${CERT_COMMON_NAME} renewed successfully&#x27;}&quot; timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo &quot;Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}&quot; # Send alert mail -s &quot;Certificate Failure Alert&quot; [email&#160;protected] &lt; /dev/null # Log to syslog logger -p daemon.error &quot;Certificate agent failure: ${ERROR_MESSAGE}&quot; timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : &quot;https://app.infisical.com&quot; retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; csr-path : &quot;/etc/ssl/requests/api.csr&quot; file-output : certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; lifecycle : renew-before-expiry : &quot;14d&quot; # Renew 14 days before expiration status-check-interval : &quot;6h&quot; # Check certificate status every 6 hours file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; post-hooks : on-issuance : command : &quot;systemctl reload nginx&quot; timeout : 30 on-renewal : command : &quot;systemctl reload nginx &amp;&amp; logger &#x27;Certificate renewed&#x27;&quot; timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:56
https://play.google.com/store/apps/details?id=notion.id&amp;hl=es_SV
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M12 17.27L18.1
2026-01-13T09:29:56