url
stringlengths
11
2.25k
text
stringlengths
88
50k
ts
timestamp[s]date
2026-01-13 08:47:33
2026-01-13 09:30:40
https://play.google.com/store/apps/details?id=notion.id&hl=es_DO
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M12 17.27L1
2026-01-13T09:29:56
https://www.cisco.com/c/hr_hr/about.html#bar_tall
povijest tvrtke cisco, podaci o tvrtki cisco, informacije o tvrtki cisco - Cisco Skip to Main Content Skip to search Skip to Footer Cisco.com Hrvatska IZBORNIK ZATVORI Proizvodi Podrška Partneri Više Pretraga Prijava Odjava Odabir jezika hr hr Više Prijava Odjava &nbsp;Prijava Imate račun? &nbsp;&nbsp;Prilagođeni sadržaj &nbsp;&nbsp;Vaši proizvodi i podrška Prijava Zaboravili ste korisnički ID i/ili lozinku? Upravljanje računom Trebate račun? Stvori račun Pomoć Odabir jezika hr hr &nbsp;Odabir jezika Proizvodi Podrška Trening i Događanja Kupnja Partneri O tvrtki Cisco O tvrtki Cisco Podaci i informacije Odnosi s analitičarima Nagrade tvrtke Cisco Videozapis o povijesti tvrtke Cisco: 1984. – 2013. Ukratko o tvrtki Rukovodeći tim Državni poslovi Mobilne aplikacije Zaštita privatnosti na mreži RSS sadržaji Naši ljudi Odnosi s investitorima Godišnja izvješća Korporativno upravljanje Financijska izvješća Burzovno izvješće Svi odnosi s investitorima Zašto odabrati Cisco? Pristup kvaliteti Uvidi u poslovanje Studije slučaja / priče o uspjehu naših klijenata Cisco o Ciscu Istraživački centar tvrtke Cisco Korporativna društvena odgovornost Pristupačnost Godišnje izvješće CSR Partneri u zajednici i potpore Zaštita okoliša i održivost Područja utjecaja Naši prioriteti Recikliranje proizvoda Cijela korporativna društvena odgovornost Poslovanje s tvrtkom Cisco Dobit Poslovni kontinuitet Informacijski centar tvrtke Cisco Brojevi za globalni pristup konferencijama tvrtke Cisco Ured za korporativnu strategiju Informacije službe za korisnike Pravne obavijesti Otvoreni kod tvrtke Cisco Prijavljivanje neetičnog ponašanja Centar za sigurnost Informacije o dobavljačima Održivost dobavljača Centar povjerenja Obratite se tvrtki Cisco Cisco Systems, Inc. Grand Centar Hektorovićeva 2 / I 10000 Zagreb Croatia Tel: +385 1 462 8900 Faks: +385 1 462 8909 Obratite se tvrtki Cisco Centri za korisničko iskustvo Karijere Početna stranica karijera Život u tvrtki Cisco Pretraživanje poslova Novosti Povezane značajke Uredništvo Publikacije i proizvodi Trgovina proizvoda tvrtke Cisco Izdavačka djelatnost tvrtke Cisco Publikacije Uključivost i suradnja Uključivost i suradnja Organizacije resursa zaposlenika The bridge to possible --> Slijedite nas Novosti i događaji Uredništvo Događaji Blogovi Zajednica O Nama O Nama Priče klijenata O tvrtki Cisco Priče klijenata Odnosi s investitorima Društvena odgovornost Ekološka održivost Centar za pouzdanost Obratite Nam Se Obratite Nam Se Obratite se tvrtki Cisco Upoznajte naše partnere Pronađite prodavača Surađujte S Nama Karijere Mi smo Cisco Naša priča Postanite partner tvrtke Cisco Web-Mjesta Tvrtke Cisco Meraki Webex Webex Teams Cisco Umbrella Kontakti Povratne informacije Pomoć Karta stranice Uvjeti i odredbe Privatnost Izjava o zaštiti privatnosti Kolačići Kolačići Zaštitni znakovi
2026-01-13T09:29:56
https://www.notion.com/id/teams
Notion for Teams and Businesses Notion Fitur Notion AI Buat, tulis, otomatiskan Agent Menangani tugas manual Enterprise Search Temukan jawaban secara cepat AI Meeting Notes Ditulis dengan sempurna oleh AI Docs Sederhana &amp; berdaya guna Basis Pengetahuan Pusatkan pengetahuan Anda Projects Kelola proyek Sites Publikasikan apa saja, dengan cepat Memulai Jelajahi kasus penggunaan AI Lihat apa saja yang bisa dilakukan Notion AI Telusuri marketplace Templat untuk semua hal Lihat integrasi Hubungkan aplikasi Anda dengan Notion Unduh web clipper Simpan dari web ke Notion Coba aplikasi desktop Notion untuk pengalaman yang lebih cepat Unduh aplikasi Mail Kalender AI Perusahaan Harga Jelajahi Tim Teknik &amp; Produk Desain Pemasaran TI Ukuran tim Startup UKM Perusahaan Pendidikan Pelajari Pusat bantuan Notion Academy Cerita pelanggan Blog Komunitas Program mitra Buat API Templat Keamanan Konsultan Minta demo Masuk Dapatkan Notion gratis Where teams work better, together Your projects, wikis and docs, all side by side. For small teams to large organizations. Dapatkan Notion gratis Minta demo Ship projects faster Keep everyone aligned from scoping to launch day. Manage high-level projects and specific tasks with custom Gantt and Kanban setups. Bagikan Notion helps us keep track of the 30+ projects we have going at once. We can click into any of them to get the full lay of the land right away. Justin Watt Director of Ops &amp; Marketing, MetaLab Your digital office Say goodbye to messy folders and different versions of the same doc. Keep everything in one central space, so everyone has what they need to do their best work. Semua ruang tim Cari ruang tim... Your teamspaces General Engineering Sales Marketing Managers More teamspaces Kyoto Office 32 anggota London Office 44 anggota HR &amp; Legal 22 anggota Conference Planning 96 anggota Ruang tim baru Bagikan Before Notion, a lot of the team&#x27;s knowledge was bottlenecked in the minds of a few. Now folks feel empowered to self serve and move at speed. Sanjay Nand Innovation Strategist, Capgemini Docs that keep everyone aligned Meeting notes, goal planning, process docs — log all crucial decisions and give stakeholders visibility into who&#x27;s doing what and when. Bagikan We used to send meeting recap emails all the time. But now the team knows where to go if they have a question about scope or anything else. Zoe Bachman Curriculum Product Manager, Codecademy Start with the Free Plan Invite your team members and start getting organized. There&#x27;s no time limit or credit card info, so you can try before you buy. Dapatkan Notion gratis Fitur Notion for teams Real-time collaboration Customizable permissions API integrations Gantt, kanban board &amp; calendar views Manage tasks &amp; projects Build a wiki / internal knowledge base Beautiful notes &amp; docs Easy drag &amp; drop editing Full functionality on mobile app Built for every team Notion solves problems unique to any function. 🛠 Engineering Ship features faster with sprint tasks, code guidelines, bug fixes &amp; more, all in one place. Pelajari selengkapnya 🎒 Product Get your work into the world quicker with user research and cross-functional projects in Notion. Pelajari selengkapnya 🎨 Design Build a consistent design language by uniting assets, guides, and prototypes in Notion. Pelajari selengkapnya Start with a template Add a pre-built setup to your team&#x27;s workspace, then customize to serve your team&#x27;s specific workflows. Headspace&#x27;s design system Collaborate on shared design resources with your team with this template. Get this template → Match Group&#x27;s roadmap Prioritize your big bets for the year to maintain vision and focus. Get this template → See why customers love us Notion is rated the best on G2 Notion consistently ranks as the G2 industry leader based on hundreds of customer reviews. But don&#x27;t take our word for it. Check out G2&#x27;s comparison for more info. 86% Ease of use 90% Ease of admin 91% Meets requirements 86% Ease of setup Try Notion today Get started for free, then add anyone you want. Dapatkan Notion gratis Bahasa Indonesia Pengaturan cookie © 2026 Notion Labs, Inc. Perusahaan Tentang kami Karier Keamanan Status Ketentuan &amp; privasi Hak privasi Anda Unduh iOS &amp; Android Mac &amp; Windows Kalender Web Clipper Sumber Daya Pusat bantuan Harga Blog Komunitas Integrasi Templat Program mitra Notion untuk Perusahaan Usaha kecil Personal Telusuri lebih lanjut →
2026-01-13T09:29:56
https://zh-cn.facebook.com/login/?next=https%3A%2F%2Fwww.facebook.com%2Fshare_channel%2F%3Ftype%3Dreshare%26link%3Dhttps%253A%252F%252Faws.amazon.com%252Fblogs%252Fmachine-learning%252Fbuild-an-ai-powered-website-assistant-with-amazon-bedrock%252F%26app_id%3D966242223397117%26source_surface%3Dexternal_reshare%26display%26hashtag
Facebook Facebook 邮箱或手机号 密码 忘记账户了? 创建新账户 你暂时被禁止使用此功能 你暂时被禁止使用此功能 似乎你过度使用了此功能,因此暂时被阻止,不能继续使用。 Back 中文(简体) 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 日本語 Português (Brasil) Français (France) Deutsch 注册 登录 Messenger Facebook Lite 视频 Meta Pay Meta 商店 Meta Quest Ray-Ban Meta Meta AI Meta AI 更多内容 Instagram Threads 选民信息中心 隐私政策 隐私中心 关于 创建广告 创建公共主页 开发者 招聘信息 Cookie Ad Choices 条款 帮助 联系人上传和非用户 设置 动态记录 Meta © 2026
2026-01-13T09:29:56
https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.instagram.com%2F&amp;h=AT1oewryNDNEaQyDhFBta-J8opuClygra41AJ6t5ZxBm1qoQJR4GqzZFVyKMLHKc0ulq9nZNE-lTRz4m9q5onTGN89ecUHY0Yw78akGTsc8hPulxCFMgVm0wdkb_lyLxClYYpnCMOEVSZYRv
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:56
https://es-la.facebook.com/login/?next=https%3A%2F%2Fwww.facebook.com%2Fshare_channel%2F%3Ftype%3Dreshare%26link%3Dhttps%253A%252F%252Faws.amazon.com%252Fblogs%252Fmachine-learning%252Fbuild-an-ai-powered-website-assistant-with-amazon-bedrock%252F%26app_id%3D966242223397117%26source_surface%3Dexternal_reshare%26display%26hashtag
Facebook Facebook Correo o teléfono Contraseña ¿Olvidaste tu cuenta? Crear cuenta nueva Se te bloqueó temporalmente Se te bloqueó temporalmente Parece que hiciste un uso indebido de esta función al ir muy rápido. Se te bloqueó su uso temporalmente. Back Español 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch Registrarte Iniciar sesión Messenger Facebook Lite Video Meta Pay Tienda de Meta Meta Quest Ray-Ban Meta Meta AI Más contenido de Meta AI Instagram Threads Centro de información de votación Política de privacidad Centro de privacidad Información Crear anuncio Crear página Desarrolladores Empleo Cookies Opciones de anuncios Condiciones Ayuda Importación de contactos y no usuarios Configuración Registro de actividad Meta © 2026
2026-01-13T09:29:56
https://www.cisco.com/c/ar_eg/products/index.html#fw-content
المنتجات والحلول والخدمات - Cisco التخطي إلى المحتوى التخطي للبحث التخطي إلى التذييل Cisco.com مصر المنتجات والخدمات الحلول الدعم تعلّم استكشاف Cisco كيفية الشراء الصفحة الرئيسية للشركاء برنامج الشريك الجديد الدعم الأدوات العثور على شريك Cisco مقابلة شركائنا انضم إلى شركاء Cisco المنتجات والحلول والخدمات هل تريد مساعدة في العثور على منتجات من Cisco تلبي احتياجاتك؟ أنت في المكان الصحيح. إذا كنت تريد المساعدة في استكشاف الأخطاء أو التوثيق أو الحصول على دعم آخر أو التنزيلات، فاذهب إلى &nbsp; قسم الدعم الفني الخاص بنا. اتصل بنا أحصل على مكالمة من ممثل مبيعات الحصول على الدعم الفني المنتجات حسب التقنية الشبكات المبدّلات الموجّهات اللاسلكية الشبكات محددة البرامج بنية Cisco Silicon One إدارة الشبكة الواجهات والوحدات النمطية الشبكات الضوئية الاطلاع على كل ما يخص الشبكات الحلول اللاسلكية وحلول التنقل نقاط الوصول نقاط الوصول الخارجية والصناعية وحدات التحكم الاطلاع على كل ما يخص الحلول اللاسلكية وحلول التنقل الأمن منصة SecureX حماية جدار الحماية نظام حماية نقاط النهاية حماية البريد الإلكتروني حماية الوصول بواسطة Duo Umbrella الاطلاع على كل ما يخص الأمان التعاون الأجهزة الطرفية للتعاون المؤتمرات مركز الاتصال من Cisco الاتصالات الموحدة الاطلاع على كل ما يخص التعاون مركز البيانات الخوادم: نظام الحوسبة الموحّدة من Cisco الإدارة والأتمتة الأمان المبدّلات البنية التحتية عالية الاندماج شبكات التخزين الشبكات الافتراضية الاطلاع على كل ما يخص مركز البيانات التحليلات تحليلات وضمان مركز البيانات تحليلات الشبكة ( تحليلات وضمان Cisco DNA) نظام حماية تحليلات الشبكة من Cisco (Stealthwatch) الفيديو الأجهزة الطرفية للفيديو ذكاء الفيديو رؤية Cisco عرض جميع مقاطع الفيديو إنترنت الأشياء (IoT) الشبكة الصناعية المبدلات الصناعية والبوابات الأمان الصناعي الشبكة اللاسلكية الصناعية إدارة الاتصال الصناعي مؤسسة موسعة إدارة البيانات الاطلاع على كل ما يتعلق بإنترنت الأشياء البرامج IOS وNX-OS برنامج Cisco DNA للاتصال اللاسلكي برنامج Cisco DNA للتحويل برنامج Cisco DNA لشبكة WAN المعرفة بواسطة البرنامج والتوجيه برنامج Cisco ONE لشبكات مراكز البيانات برنامج Cisco ONE for Data Center Compute and Cloud الاطلاع على جميع البرامج فهرس المنتجات المنتجات حسب نوع الشركة مزودو الخدمة الشركات الصغيرة الشركات المتوسطة الحلول يمكن أن تقدم لمؤسستك حلولًا لجميع الأمور بدايةً من الشبكات ومركز البيانات وصولًا إلى التعاون والأمن. اعثر على الخيارات الأنسب لاحتياجات عملك. حسب التقنية حسب الصناعة اطلع على جميع الحلول الخدمات المقدمة من تجربة عميل Cisco خدمات الدعم الدعم الفني الذي يقدمه خبراء من الطراز العالمي ويسترشد بالأفكار المستمدة من حل ملايين القضايا في جميع أنحاء العالم، كل عام. خدمات الأعمال المهمة يوفر خبراؤنا، الذين هم على علم بالتحليلات والرؤى والأتمتة، تكنولوجيا معلومات مرنة، وقابلة للتكيّف، وتحويلية في أي مكان. الخدمات المدارة الإدارة الاستباقية، والمراقبة، والتحسين لبيئة تكنولوجيا المعلومات لديك لتسريع وقتك لتحقيق القيمة بشكل آمن. الخدمات المتقدمة مشاركات الخبراء في التقنيات الناشئة من الاستراتيجية والتصميم إلى التنفيذ مع مخاطر أقل. عرض جميع خدمات Cisco منطقة التصميم: أدلة تصميم Cisco حسب الفئة الشبكات السحابة الأمن الصناعات مركز البيانات التعاون اطلع على جميع أدلة تصميم Cisco تاريخ انتهاء التخفيضات وتاريخ انتهاء العمر الافتراضي منتجات من خط إنتاج منتهٍ ومنتجات في نهاية عمرها سياسة انتهاء العمر الافتراضي للمنتجات الأدوات Cisco Commerce Build &amp; Price Cisco Software Central Cisco Feature Navigator الاطلاع على جميع أدوات المنتجات الموارد تطبيقات Cisco Mobile منطقة التصميم: أدلة تصميم Cisco Cisco DevNet كتالوج حلول السوق الموافقات على المنتجات معيار تعريف المنتجات ضمانات المنتجات نصائح الأمان من Cisco سياسة الثغرات الأمنية Visio stencils اتصل بمبيعات الدعم الفني التجارب والعروض التوضيحية والعروض
2026-01-13T09:29:56
https://infisical.com/docs/integrations/platforms/infisical-agent#token-renewal
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Agent Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Secrets Management Overview Concepts Guides Product Reference Projects Folders Secret Versioning Point-in-Time Recovery Referencing and Importing Secret Rotation Dynamic Secrets Webhooks Infrastructure Integrations Ansible Apache Airflow AWS Kubernetes Operator Kubernetes Agent Injector Kubernetes CSI Agent Infisical Agent Docker Swarm Amazon ECS Docker Packer Pulumi Terraform Secret Syncs Explore Options Overview Syncs CI/CD Integrations AWS Amplify Bitbucket GitHub Actions GitLab Jenkins Plugin Framework Integrations Explore Options Spring Boot with Maven React Vue Express, Fastify, Koa View more Build Tool Integrations Gradle Others Backstage Infisical Plugin On this page Key Features Token Renewal Templating Available secret template functions Caching Persistent Caching Cache eviction Cache Configuration Retrying mechanism Agent configuration file Authentication Quick start Infisical Agent Agent Infisical Agent This page describes how to manage secrets using Infisical Agent. Infisical Agent is a client daemon that simplifies the adoption of Infisical by providing a more scalable and user-friendly approach for applications to interact with Infisical. It eliminates the need to modify application logic by enabling clients to decide how they want their secrets rendered through the use of templates. ​ Key Features Token lifecycle management : Automatically authenticates with Infisical and deposits renewed access tokens at specified path for applications to consume Templating : Renders secrets and dynamic secret leases via user provided templates to desired formats for applications to consume ​ Token Renewal The Infisical agent can help manage the life cycle of access tokens. The token renewal process is split into two main components: a Method , which is the authentication process suitable for your current setup, and Sinks , which are the places where the agent deposits the new access token whenever it receives updates. When the Infisical Agent is started, it will attempt to obtain a valid access token using the authentication method you have configured. If the agent is unable to fetch a valid token, the agent will keep trying, increasing the time between each attempt. Once a access token is successfully fetched, the agent will make sure the access token stays valid, continuing to renew it before it expires. Every time the agent successfully retrieves a new access token, it writes the new token to the Sinks you’ve configured. Access tokens can be utilized with Infisical SDKs or directly in API requests to retrieve secrets from Infisical ​ Templating The Infisical agent can help deliver formatted secrets to your application in a variety of environments. To achieve this, the agent will retrieve secrets from Infisical, format them using a specified template, and then save these formatted secrets to a designated file path. Templating process is done through the use of Go language’s text/template feature .You can refer to the available secret template functions here . Multiple template definitions can be set in the agent configuration file to generate a variety of formatted secret files. When the agent is started and templates are defined in the agent configuration file, the agent will attempt to acquire a valid access token using the set authentication method outlined in the agent’s configuration. If this initial attempt is unsuccessful, the agent will momentarily pauses before continuing to make more attempts. Once the agent successfully obtains a valid access token, the agent proceeds to fetch the secrets from Infisical using it. It then formats these secrets using the user provided templates and writes the formatted data to configured file paths. ​ Available secret template functions The secret template functions is what you will use to fetch resources such as static secrets and dynamic secret leases from Infisical. Below is a list of the available secret template functions that you can use in your templates. secret Copy Ask AI secret &quot;&lt;project-id&gt;&quot; &quot;environment-slug&quot; &quot;&lt;secret-path&gt;&quot; &quot;&lt;optional-modifier&gt;&quot; example-template-usage-1 Copy Ask AI {{- with secret &quot;6553ccb2b7da580d7f6e7260&quot; &quot;dev&quot; &quot;/&quot; `{&quot;recursive&quot;: false, &quot;expandSecretReferences&quot;: true}` }} {{- range . }} {{ .Key }}={{ .Value }} {{- end }} {{- end }} example-template-usage-2 Copy Ask AI {{- with secret &quot;da8056c8-01e2-4d24-b39f-cb4e004b8d44&quot; &quot;staging&quot; &quot;/&quot; `{&quot;recursive&quot;: true, &quot;expandSecretReferences&quot;: true}` }} {{- range . }} {{- if eq .SecretPath &quot;/&quot;}} {{ .Key }}={{ .Value }} {{- else}} {{ .SecretPath }}/{{ .Key }}={{ .Value }} {{- end}} {{- end }} {{- end }} Function name : secret Description : This function can be used to render the full list of secrets within a given project, environment and secret path. An optional JSON argument is also available. It includes the properties recursive , which defaults to false, and expandSecretReferences , which defaults to true and expands the returned secrets. Returns : A single secret object with the following keys Key, WorkspaceId, Value, SecretPath, Type, ID, and Comment getSecretByName Copy Ask AI getSecretByName &quot;&lt;project-id&gt;&quot; &quot;&lt;environment-slug&gt;&quot; &quot;&lt;secret-path&gt;&quot; &quot;&lt;secret-name&gt;&quot; example-template-usage Copy Ask AI {{ with getSecretByName &quot;d821f21d-aa90-453b-8448-8c78c1160a0e&quot; &quot;dev&quot; &quot;/&quot; &quot;POSTHOG_HOST&quot;}} {{ if .Value }} password = &quot;{{ .Value }}&quot; {{ end }} {{ end }} Function name : getSecretByName Description : This function can be used to render a single secret by it’s name. Returns : A list of secret objects with the following keys Key, WorkspaceId, Value, Type, ID, and Comment dynamic_secret Copy Ask AI dynamic_secret &quot;&lt;project-slug&gt;&quot; &quot;&lt;environment-slug&gt;&quot; &quot;&lt;secret-path&gt;&quot; &quot;&lt;dynamic-secret-name&gt;&quot; &quot;&lt;lease-ttl&gt;&quot; example-redis-dynamic-secret Copy Ask AI {{ with dynamic_secret &quot;aaa-o7en-s5qm&quot; &quot;dev&quot; &quot;/&quot; &quot;redis&quot; &quot;1m&quot; }} {{ .DB_USERNAME }}={{ .DB_PASSWORD }} {{- end }} Function Name : dynamic_secret Description : This function can be used to render a dynamic secret lease credentials. The credentials are automatically renewed before they expire, ensuring that the rendered credentials are always up-to-date. Returns : An object with keys corresponding to the dynamic secret lease credentials. Note that if you have multiple dynamic secret templates with identical configurations, only one lease will be created in Infisical for those templates, and the same lease will be written to your specified destination paths. ​ Caching The Infisical Agent supports clientside caching of Dynamic Secret leases. If the cache is enabled, the agent will persist the dynamic secret leases to the cache across restarts of the agent. ​ Persistent Caching The Agent currently only supports persistent caching. To utilize persistent caching, you must be within a Kubernetes environment. We recommend using the Infisical Agent Injector to inject the agent into pods within your Kubernetes cluster on demand. ​ Cache eviction Cache eviction is the process of removing cached data from the cache. The Agent will automatically evict cached data when the cache is full during a garbage collection cycle which is triggered every 10 minutes. The cache will also automatically evict cached data that has gone stale or is about to go stale. For dynamic resources (such as dynamic secret leases), there’s a TTL (Time-to-Live) associated with each lease which is used to determine if the lease is stale or about to go stale. If a stale dynamic secret lease is detected, it will be automatically evicted from the cache and replaced with a new up-to-date lease. ​ Cache Configuration Configuring the cache is done through the agent configuration file. The following fields are available to configure the cache: Persistent Caching ​ cache.persistent.type string The type of persistent caching to use. Currently only kubernetes is available, and will only work within Kubernetes environments. ​ cache.persistent.path string The path to where your persistent cache will be stored. Persistent caching is only supported within kubernetes environments at the moment. Please refer to the Infisical Agent Injector documentation for more information on how to use persistent caching within Kubernetes environments. example-agent-config-file.yaml Copy Ask AI cache : persistent : type : &quot;kubernetes&quot; path : &quot;/home/infisical/cache&quot; service-account-token-path : &quot;/var/run/secrets/kubernetes.io/serviceaccount/token&quot; ​ Retrying mechanism The agent will automatically attempt to retry failed API requests such as authentication, secrets retrieval, dynamic secret lease provisioning, etc. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file. The following fields are available to configure the retrying mechanism: ​ infisical.retry-strategy.max-retries number How many times to retry failed API requests such as authentication, secret retrieval, etc. Defaults to 3 retries. ​ infisical.retry-strategy.max-delay duration The maximum delay between retries. Defaults to 5s (5 seconds). ​ infisical.retry-strategy.base-delay duration The base delay between retries. Defaults to 200ms (200 milliseconds). example-agent-config-file.yaml Copy Ask AI infisical : address : &quot;https://app.infisical.com&quot; retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # ... rest of the agent configuration file ​ Agent configuration file To set up the authentication method for token renewal and to define secret templates, the Infisical agent requires a YAML configuration file containing properties defined below. While specifying an authentication method is mandatory to start the agent, configuring sinks and secret templates are optional. Field Description infisical.address The URL of the Infisical service. Default: &quot;https://app.infisical.com&quot; . infisical.exit-after-auth Whether to exit the agent after authentication and first secret render. Default: &quot;false&quot; . infisical.revoke-credentials-on-shutdown Whether to revoke all managed dynamic secret leases and identity access tokens on shutdown. Default: &quot;false&quot; . infisical.retry-strategy.max-retries How many times to retry failed API requests such as authentication, secret retrieval, etc. Defaults to 3 retries. infisical.retry-strategy.max-delay The maximum delay between retries. Defaults to 5s (5 seconds). infisical.retry-strategy.base-delay The base delay between retries. Defaults to 200ms (200 milliseconds). auth.type The type of authentication method used. Available options: universal-auth , kubernetes , azure , gcp-id-token , gcp-iam , aws-iam auth.config.identity-id The file path where the machine identity id is stored This field is required when using any of the following auth types: kubernetes , azure , gcp-id-token , gcp-iam , or aws-iam . auth.config.service-account-token Path to the Kubernetes service account token to use (optional) Default: /var/run/secrets/kubernetes.io/serviceaccount/token auth.config.service-account-key Path to your GCP service account key file. This field is required when using gcp-iam auth type. Please note that the file should be in JSON format. auth.config.client-id The file path where the universal-auth client id is stored. auth.config.client-secret The file path where the universal-auth client secret is stored. auth.config.remove_client_secret_on_read This will instruct the agent to remove the client secret from disk. sinks[].type The type of sink in a list of sinks. Each item specifies a sink type. Currently, only &quot;file&quot; type is available. sinks[].config.path The file path where the access token should be stored for each sink in the list. cache.persistent.type The type of persistent caching to use. Currently only kubernetes is available, and will only work within Kubernetes environments. cache.persistent.path The path to where your persistent cache will be stored. cache.persistent.service-account-token-path The path to the Kubernetes service account token to use for encrypting the persistent cache. Required when using kubernetes cache type. Defaults to /var/run/secrets/kubernetes.io/serviceaccount/token templates[].source-path The path to the template file that should be used to render secrets. templates[].template-content The inline secret template to be used for rendering the secrets. templates[].destination-path The path where the rendered secrets from the source template will be saved to. templates[].config.polling-interval How frequently to check for secret changes. Default: 5m (5 minutes) (optional) templates[].config.execute.command The command to execute when secret change is detected (optional) templates[].config.execute.timeout How long in seconds to wait for command to execute before timing out (optional) ​ Authentication The Infisical agent supports multiple authentication methods. Below are the available authentication methods, with their respective configurations. Universal Auth The Universal Auth method is a simple and secure way to authenticate with Infisical. It requires a client ID and a client secret to authenticate with Infisical. ​ config UniversalAuthConfig Show properties ​ client-id string required Path to the file containing the universal auth client ID. ​ client-secret string required Path to the file containing the universal auth client secret. ​ remove_client_secret_on_read boolean Instructs the agent to remove the client secret from disk after reading it. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, client ID, and client secret. In the snippet below you can see a sample configuration of the auth field when using the Universal Auth method. example-auth-config.yaml Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;./client-id&quot; # Path to the file containing the client ID client-secret : &quot;./client&quot; # Path to the file containing the client secret remove_client_secret_on_read : false # Optional field, instructs the agent to remove the client secret from disk after reading it Native Kubernetes The Native Kubernetes method is used to authenticate with Infisical when running in a Kubernetes environment. It requires a service account token to authenticate with Infisical. ​ config KubernetesAuthConfig Show properties ​ identity-id string required Path to the file containing the machine identity ID. ​ service-account-token string Path to the Kubernetes service account token to use. Default: /var/run/secrets/kubernetes.io/serviceaccount/token . 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account token. In the snippet below you can see a sample configuration of the auth field when using the Kubernetes method. example-auth-config.yaml Copy Ask AI auth : type : &quot;kubernetes&quot; config : identity-id : &quot;./identity-id&quot; # Path to the file containing the machine identity ID service-account-token : &quot;/var/run/secrets/kubernetes.io/serviceaccount/token&quot; # Optional field, custom path to the Kubernetes service account token to use Native Azure The Native Azure method is used to authenticate with Infisical when running in an Azure environment. ​ config AzureAuthConfig Show properties ​ identity-id string required Path to the file containing the machine identity ID. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID. In the snippet below you can see a sample configuration of the auth field when using the Azure method. example-auth-config.yaml Copy Ask AI auth : type : &quot;azure&quot; config : identity-id : &quot;./identity-id&quot; # Path to the file containing the machine identity ID Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. ​ config GCPIDTokenAuthConfig Show properties ​ identity-id string required Path to the file containing the machine identity ID. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID. In the snippet below you can see a sample configuration of the auth field when using the GCP ID Token method. example-auth-config.yaml Copy Ask AI auth : type : &quot;gcp-id-token&quot; config : identity-id : &quot;./identity-id&quot; # Path to the file containing the machine identity ID GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. ​ config GCPIAMAuthConfig Show properties ​ identity-id string required Path to the file containing the machine identity ID. ​ service-account-key string required Path to your GCP service account key file. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key. In the snippet below you can see a sample configuration of the auth field when using the GCP IAM method. example-auth-config.yaml Copy Ask AI auth : type : &quot;gcp-iam&quot; config : identity-id : &quot;./identity-id&quot; # Path to the file containing the machine identity ID service-account-key : &quot;./service-account-key.json&quot; # Path to your GCP service account key file Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment like EC2, Lambda, etc. ​ config AWSIAMAuthConfig Show properties ​ identity-id string required Path to the file containing the machine identity ID. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID. In the snippet below you can see a sample configuration of the auth field when using the AWS IAM method. example-auth-config.yaml Copy Ask AI auth : type : &quot;aws-iam&quot; config : identity-id : &quot;./identity-id&quot; # Path to the file containing the machine identity ID ​ Quick start Infisical Agent To install the Infisical agent, you must first install the Infisical CLI in the desired environment where you’d like the agent to run. This is because the Infisical agent is a sub-command of the Infisical CLI. Once you have the CLI installed, you will need to provision programmatic access for the agent via Universal Auth . To obtain a Client ID and a Client Secret , follow the step by step guide outlined here . Next, create agent config file as shown below. The example agent configuration file defines the token authentication method, one sink location, and a secret template. example-agent-config-file.yaml Copy Ask AI infisical : address : &quot;https://app.infisical.com&quot; auth : type : &quot;universal-auth&quot; config : client-id : &quot;./client-id&quot; client-secret : &quot;./client-secret&quot; remove_client_secret_on_read : false sinks : - type : &quot;file&quot; config : path : &quot;/some/path/to/store/access-token/file-name&quot; templates : - source-path : my-dot-ev-secret-template destination-path : /some/path/.env config : polling-interval : 60s execute : timeout : 30 command : ./reload-app.sh The secret template below will be used to render the secrets with the key and the value separated by = sign. You’ll notice that a custom function named secret is used to fetch the secrets. This function takes the following arguments: secret &quot;&lt;project-id&gt;&quot; &quot;&lt;environment-slug&gt;&quot; &quot;&lt;secret-path&gt;&quot; . my-dot-ev-secret-template Copy Ask AI {{- with secret &quot;6553ccb2b7da580d7f6e7260&quot; &quot;dev&quot; &quot;/&quot; }} {{- range . }} {{ .Key }}={{ .Value }} {{- end }} {{- end }} After defining the agent configuration file, run the command below pointing to the path where the agent configuration file is located. Copy Ask AI infisical agent --config example-agent-config-file.yaml Was this page helpful? Yes No Suggest edits Raise issue Kubernetes CSI Docker Swarm ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"41:I[42080,[\"73473\",\"static/chunks/891cff7f-dcf0b8e94fd9e2cd.js?dpl=dpl_BuadQuXKa8xpmRznkahBVvNdNdeK\",\"53016\",\"static/chunks/cfdfcc00-442051842d4b5e4f.js?dpl=dpl_BuadQuXKa8xpmRznkahBVvNdNdeK\",\"41725\",\"static/chunks/d30757c7-2d2105da33b688d0.js?dpl=dpl_BuadQuXKa8xpmRznkahBVvNdNdeK\",\"82431\",\"static/chunks/82431-a3e0a126611457bf.js?dpl=dpl_BuadQuXKa8xpmRznkahBVvNdNdeK\",\"43881\",\"static/chunks/43881-67920a24b626c850.js?dpl=dpl_BuadQuXKa8xpmRznkahBVvNdNdeK\",\"98816\",\"static/chunks/98816-4875194b6205382d.js?dpl=dpl_BuadQuXKa8xpmRznkahBVvNdNdeK\",\"77187\",\"static/chunks/77187-54d234c2e70a9fd4.js?dpl=dpl_BuadQuXKa8xpmRznkahBVvNdNdeK\",\"19664\",\"static/chunks/19664-8ce43df6b74bea12.js?dpl=dpl_BuadQuXKa8xpmRznkahBVvNdNdeK\",\"21246\",\"static/chunks/21246-a76922653256bc59.js?dpl=dpl_BuadQuXKa8xpmRznkahBVvNdNdeK\",\"91769\",\"static/chunks/91769-84a60608f35c4c3d.js?dpl=dpl_BuadQuXKa8xpmRznkahBVvNdNdeK\",\"70523\",\"static/chunks/70523-43da3b59f75962b1.js?dpl=dpl_BuadQuXKa8xpmRznkahBVvNdNdeK\",\"25930\",\"static/chunks/25930-4f81ba70faf4103b.js?dpl=dpl_BuadQuXKa8xpmRznkahBVvNdNdeK\",\"73205\",\"static/chunks/73205-76d4949febf700ad.js?dpl=dpl_BuadQuXKa8xpmRznkahBVvNdNdeK\",\"14224\",\"static/chunks/14224-151b71762bfe53d3.js?dpl=dpl_BuadQuXKa8xpmRznkahBVvNdNdeK\",\"83667\",\"static/chunks/83667-9f6e01e9cb0525db.js?dpl=dpl_BuadQuX
2026-01-13T09:29:56
https://careers.cisco.com/
Careers at Cisco Search results Careers Explore opportunities We’re honored to be ranked #3 on World’s Best Workplaces 2025 by Fortune and Great Places to Work! Browse jobs Power an Inclusive Future for All We are looking for innovators to build the critical infrastructure for the AI era and beyond. We are advancing AI with a full-stack, comprehensive approach in every part of the organization &nbsp; Learn more Building multi-agentic systems with AGNTCY's Application SDK and reference application Meet CoffeeAGNTCY: the fastest way to experiment with and build multi-agent software with Model Context Protocol, Agent2Agent, and AGNTCY components.&nbsp; Read more Explore Cisco Live: Innovations, emerging tech trends, and the future of AI&nbsp; Cisco President and Chief Product Officer, Jeetu Patel kicks off Cisco Live 2025 with what’s next in AI.&nbsp; Watch the video Powering real-time collaboration with embedded AI Our new groundbreaking tool: AI Canvas is a multi-data, multi-agent, generative UI shared workspace to reinvent how IT teams work and win together. Watch the video Creating transformational AI technology for cybersecurity&nbsp; Cisco Foundation AI is our team of engineers, researchers, and deep experts dedicated to open, bleeding-edge AI innovation for enterprise security.&nbsp; Watch the video Webex AI team: Shaping the future with audio AI&nbsp; Cisco’s Webex AI team is creating audio AI models that have never existed before to enhance speech and remove noise for millions of users around the world.&nbsp; Watch the video A sense of mutual respect and mindfulness permeates our culture-in fact, it's the key to our success. Learn more Card text Limitless opportunities to&nbsp; make an impact At Cisco, you can make a meaningful difference at a global scale. We move fast. We fearlessly innovate to lead boldly and solve real world problems, always keeping humanity at the heart of our work. Join us as we bring big ideas to life. Feel the difference Employee Stories/Research and Projects See more Lead the way in AI AI is part of everything we do. From cutting-edge applications to everyday operations, we power the high-performance security, technology, and infrastructure of the future. AI at work Build your future There are limitless ways to grow and develop at Cisco. From coaching and upskilling to stretch assignments and new technologies, the support and options abound. Explore options A sense of mutual respect and mindfulness permeates our culture-in fact, it’s the key to our success. Learn more “For me, it has been incredibly rewarding working on a team where the significance of our work is evident—not only in influencing the trajectory of technology, but also in helping shape the future of AI .” Whitney E., Engineering Product Manager &nbsp; UCS Compute and Commodities&nbsp; “ People can use what I'm actually working on and get something out of it . I don't want to work on something and it enters the void. People are using it and they're sending me messages about what they do and don't like about it. The feedback lets me know they care.” Zac L., Engineer &nbsp; Customer Experience&nbsp; “We're always busy, but we're having fun. We're always working on the latest and greatest technology . It's gives you bragging rights, working on something that is the cutting edge of the technology.” Juan Carlos P., Director of Engineering, UI &amp; UX &nbsp; Customer Experience A sense of mutual respect and mindfulness permeates our culture-in fact, it’s the key to our success. Learn more Do good for you. Do good for others. Enjoy exceptional benefits that support you, your family, and your broader community. From your health and well-being to volunteer time-off and peer recognition, we’re committed to helping you thrive in every way. Explore benefits Take some “me” time Pause, step away from work, and enjoy life’s meaningful moments with a quarterly paid day off. Learn more Expanded medical care access Connect to medical experts around the world via telemedicine for more insights and second opinions. Learn more Time-off for volunteering Make an impact in your community with 10 paid days through our Time2Give program. Learn more Celebrate your peers Praise fellow employees with our Connected Recognition Program that offers gift cards and other rewards.&nbsp; Learn more Boost your giving Make your donation dollars go further. Cisco will match contributions to approved non-profits.&nbsp; Learn more Supporting neurodivergence Access coaching and support to best leverage your unique strengths and those of your team. Learn more A sense of mutual respect and mindfulness permeates our culture-in fact, it’s the key to our success. Learn more An award-winning culture&nbsp; Our culture thrives on learning, creating, and winning together. By combining unique skills, talents, and perspectives, we create solutions that are greater than the sum of their parts. And the world has taken notice. Our Recognition 2024 #1 Best Company to Work For in 15+ Countries From Spain to Singapore, Canada to Costa Rica, we're proud to be named a top employer by Fortune and Great Place to Work around the world.&nbsp; Learn more 2024 #1 PEOPLE Companies that Care Cisconians drive global impact on a local scale, giving back to our communities around the world.&nbsp; Learn more 2025 Best Places to Work by Glassdoor Our employees' feedback has made us one of the top workplaces in the world—for the eighth year in a row.&nbsp; Learn more A sense of mutual respect and mindfulness permeates our culture-in fact, it's the key to our success. Learn more Big ideas and bold thinking Find out firsthand what it’s like to be a Cisconian. From employee perspectives to exciting new projects, our people tell our stories best. We’re proud of the culture we’ve created and the innovative ideas we’re bringing to life. See more Cisco Powers AI-Ready Data Centers, From Hyperscale to Enterprise&nbsp; Our innovations position Cisco as the trusted partner enabling AI-driven evolution across the ecosystem.&nbsp; Read more Building resilience, in tech, skills, and security&nbsp; Our employees will play a big role in our next big ambition to truly impact 40 communities around the world.&nbsp; Read more A Cisco strategy to support clean energy&nbsp; Our AI, smart grids, and energy solutions, plus new PPAs, support Cisco customers and a net-zero future. Read more A sense of mutual respect and mindfulness permeates our culture-in fact, it’s the key to our success. Learn more Let's connect Discover all the amazing things our people, teams, and company are doing. Follow us on LinkedIn, YouTube, and Instagram for everyday snapshots of what protecting and connecting the AI era is all about. Follow us on : Instagram | LinkedIn | YouTube Learn more A sense of mutual respect and mindfulness permeates our culture-in fact, it’s the key to our success. Learn more Heading Learn more Stay in the know about jobs at Cisco Sign up to stay on top of what’s happening at Cisco. Tell us about yourself to get personalized information and see new job opportunities.&nbsp; Join our talent community A sense of mutual respect and mindfulness permeates our culture-in fact, it’s the key to our success. Learn more --> Cisco is an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, genetic information, age, disability, veteran status, or any other legally protected basis. 200 Gibraltar Road Suite 315, Horsham, PA 19044 TEL: 888-985-7755 Follow us Copyright © 2025 Cisco Systems, Inc. e6df0e4e5c8041a0bff74e8584d5cc12
2026-01-13T09:29:56
https://infisical.com/docs/integrations/platforms/certificate-agent#certificate-issuance-with-automatic-renewal
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let&#x27;s Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;./client-id&quot; # Path to file containing client ID client-secret : &quot;./client-secret&quot; # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : &quot;kubernetes-auth&quot; config : identity-id : &quot;your-kubernetes-identity-id&quot; service-account-token-path : &quot;/var/run/secrets/kubernetes.io/serviceaccount/token&quot; Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : &quot;azure-auth&quot; config : identity-id : &quot;your-azure-identity-id&quot; Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;gcp-id-token&quot; config : identity-id : &quot;your-gcp-identity-id&quot; GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : &quot;gcp-iam&quot; config : identity-id : &quot;your-gcp-identity-id&quot; service-account-key : &quot;/path/to/service-account-key.json&quot; Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;aws-iam&quot; config : identity-id : &quot;your-aws-identity-id&quot; ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : [ &quot;api.example.com&quot; , &quot;api-v2.example.com&quot; ] ttl : &quot;90d&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; # Enable automatic certificate renewal lifecycle : renew-before-expiry : &quot;30d&quot; status-check-interval : &quot;6h&quot; # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : &quot;/etc/ssl/private/web.key&quot; permission : &quot;0600&quot; # Read/write for owner only certificate : path : &quot;/etc/ssl/certs/web.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner chain : path : &quot;/etc/ssl/certs/web-chain.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo &quot;Certificate issued for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-failure : command : | echo &quot;Certificate operation failed: ${ERROR_MESSAGE}&quot; mail -s &quot;Certificate Alert&quot; [email&#160;protected] &lt; /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., [&quot;www.example.com&quot;, &quot;api.example.com&quot;] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger &#x27;Certificate renewal failed&#x27; , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo &quot;New certificate issued for ${CERT_COMMON_NAME}&quot; chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d &quot;{&#x27;text&#x27;: &#x27;Certificate for ${CERT_COMMON_NAME} renewed successfully&#x27;}&quot; timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo &quot;Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}&quot; # Send alert mail -s &quot;Certificate Failure Alert&quot; [email&#160;protected] &lt; /dev/null # Log to syslog logger -p daemon.error &quot;Certificate agent failure: ${ERROR_MESSAGE}&quot; timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : &quot;https://app.infisical.com&quot; retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; csr-path : &quot;/etc/ssl/requests/api.csr&quot; file-output : certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; lifecycle : renew-before-expiry : &quot;14d&quot; # Renew 14 days before expiration status-check-interval : &quot;6h&quot; # Check certificate status every 6 hours file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; post-hooks : on-issuance : command : &quot;systemctl reload nginx&quot; timeout : 30 on-renewal : command : &quot;systemctl reload nginx &amp;&amp; logger &#x27;Certificate renewed&#x27;&quot; timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:56
https://www.telegraph.co.uk/business/
Business: News, comments &amp; analysis - The Telegraph Jump to content UK News Website of the Year 2024 Search Icon News Sport Business Money Travel Calculators Opinion Ukraine Health Recommended Lifestyle Culture Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Search Icon Subscribe now Log in See all Business Economy Economy home Bank of England UK economy Global economy Jobs Interest rates Eurozone Housing Oil Companies Companies home Banks and finance Retail and consumer Media Energy Transport Property Manufacturing Markets Markets home FTSE 100 Bonds Tech Sections UK Edition US Edition News News home UK news Politics World Donald Trump Health news Defence Science Education Environment Investigations Global Health Security Royals Sport Sport home Football Rugby Union Cricket Golf F1 Tennis Racing Women&#39;s Sport Cycling Boxing Betting More... Business Business home Economy Companies Markets Tech Money Money home Property Tax Pensions Banking Investing Net Zero Calculators Guides Travel Travel home Europe UK Worldwide City breaks Hotels Cruise Ski Advice Calculators Opinion Opinion home Obituaries Letters to the Editor Telegraph View Our columnists Cartoons Ukraine Ukraine home Daily podcast Weekly newsletter Health Health home Diet Fitness Conditions Wellbeing Parenting Guides Tools Recommended Recommended home Home Garden Sleep Tech Health &amp; Fitness Beauty &amp; Grooming Travel &amp; Outdoors Parenting Lifestyle Lifestyle home Recipes Food &amp; Drink Fashion Beauty Luxury Cars Gardening Culture Culture home TV Film Music Books Theatre Comedy Dance Opera Classical Art Telegraph Tickets Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Subscribe now Log in Login icon Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon More from The Telegraph Download our app Help and support Newsletters Recommended Financial Solutions Events Dating Offers Travel offers Shop Garden shop Bookshop Tickets Puzzles Fantasy Football Work at The Telegraph Telegraph Corporate Announcements The Chelsea Magazine Company Voucher codes See top shops Samsung Nike ASOS eBay Currys Wayfair TUI JD Sports Travelodge Adidas Top stories Live Markets China threatens Trump with retaliation over Iran tariffs Save Pubs face ‘last straw’ as Reeves plots £400m tax raid on drinkers Save Tories pledge to sack underperforming civil servants Save Labour triggers biggest hiring slump since pandemic Save Send the Army into Tunbridge Wells to fix water crisis, Starmer urged Save Trump warned credit card crackdown will trigger financial crisis for millions Save How Heathrow got back on schedule Save Insights How Whitehall created a skills crisis by discriminating against nerds Save What would the British economy look like with net-zero migration? Save The German plot to woo Rolls-Royce Save Trump’s plan to make Greenlanders an offer they can’t refuse Save The mystery of Maduro’s crypto riches Save No end in sight for Germany’s economic crisis Save Opinion and analysis Ben Marlow Miliband’s net zero zealotry will be Labour’s downfall The Energy Secretary’s clean power targets are total fantasy that will leave voters poorer Save Jeremy Warner Trump’s economic failure has led him to Orban’s dangerous tactics Political interference in monetary policy is the last thing Western economies need Save Matthew Lynn Tax self-assessment has turned into a war on enterprise Save Roger Bootle Trump’s new era of imperialism threatens to tear apart Western alliances Save Julian Jessop Labour’s economic mismanagement is stifling Britain’s building boom Save Ben Marlow Last orders for Rachel Reeves Save Ambrose Evans-Pritchard Trump’s narcotic charades obscure the simple way to break Putin Save Advertisement More stories Sexual AI images to be criminalised in crackdown on Musk’s Grok Technology Secretary will make creating ‘deepfakes’ priority offence under Online Safety Act Save Scottish independence accounts go dark after Iran internet blackout Save Paramount sues Warner Bros in attempt to revive hostile takeover Save British jobs at risk as Army ‘prepares to buy Black Hawk helicopters’ Save Wall Street tycoon’s attack on City funds is ‘bad for Britain’ Save Jobseekers flood the market as companies lay off staff Save Reeves’s tax raid to force 540 pubs to shut this year Rate of closures to accelerate by almost 50pc if business rates burden not eased, analysis shows Tom Haynes Save Advertisement Banking Trump warned credit card crackdown will trigger financial crisis for millions ‘Un-pensioning’ could set a very dangerous precedent indeed How the 50/30/20 budgeting hack can unlock your finances Retail M&amp;S accused of ripping off ‘brain food’ snacks Billionaire Labour donor pays himself £66m Claire’s collapse thrusts high street undertakers into the spotlight Jobs Tories pledge to sack underperforming civil servants Labour triggers biggest hiring slump since pandemic More illegal migrant workers arrested than ever before, claims Labour Energy Norway to reopen ‘dead’ North Sea oil fields as Britain retreats Finally, a value electric heater that can be seen and not heard The 12 best electric heaters, tested for energy efficiency and warmth Transport Diesel lorries to be banned in eco drive Drug-driving causes more road deaths than alcohol Drivers could be fined years after speeding Questor The investing of the 2010s is dead. Long live quality (and the FTSE) Five key indicators for how your investments will perform in 2026 The five trends that defined markets in 2025 – and which will continue The Telegraph Back to top Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon Download the Telegraph App Recommended Podcasts Syndication and Commissioning Help Centre Betting Branded Content Privacy Reader Prints Theatre Tickets Careers About us Announcements Puzzles Guidelines Terms &amp; Conditions Newsletters Crosswords Tax Strategy Advertising terms Subscribe Cryptic Crossword Modern Slavery Subscription Terms &amp; Conditions Gift Subscriptions Plusword The Chelsea Magazine Company &copy; Telegraph Media Group Holdings Limited 2026
2026-01-13T09:29:56
https://play.google.com/store/apps/details?id=notion.id&amp;hl=es_VE
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M12 17.27L18.18
2026-01-13T09:29:56
https://www.notion.com/es-es/integrations
Integraciones – Notion Notion Funciones IA de Notion Crea, escribe y automatiza Agentes Gestiona las tareas manuales Búsqueda Enterprise Encuentra respuestas al instante Anotador con IA Registra a la perfección las notas de tus reuniones Documentos Sencillos y potentes Base de conocimiento Centraliza el conocimiento Proyectos Gestiona cualquier proyecto Sitios Publica lo que quieras en un pispás Primeros pasos Explora casos prácticos de la IA Descubre todo lo que puede hacer la IA de Notion Explora Notion Marketplace Plantillas para todo Descubre las integraciones Conecta tus aplicaciones con Notion Descargar Web Clipper Guarda páginas de la web en Notion Prueba la app de escritorio de Notion para una mejor experiencia Descarga la app Correo Calendario IA Enterprise Precios Explora Equipos Desarrollo y producto Diseño Marketing TI Tamaño del equipo Startups Pymes Empresa Educación Lecciones Centro de ayuda Notion Academy Historias de clientes Blog Comunidad Programas para socios Crear API Plantillas Seguridad Consultores Solicita una demo Inicia sesión Consigue Notion gratis Integraciones Conecta tus herramientas favoritas a Notion Deja de ir de una aplicación a otra mientras trabajas. Haz que la información fluya entre tus herramientas y Notion y reduce la complejidad del proceso gracias a nuestras integraciones. Explorar integraciones → Seguridad y cumplimiento Convierte tus datos de Notion en información analizable y dinámica Integra plataformas de seguridad y cumplimiento para que tu equipo pueda usar Notion a gran escala sin preocupaciones. Primeros pasos con Panther Splunk Datadog Nightfall AI Vistas previas de enlaces El contexto que necesitas en una sola herramienta Aquí puedes ver el contenido y el estado de tareas en Jira, hilos de Slack, informes de GitHub... Y todo esto sin salir de Notion. Primeros pasos con Jira Slack GitHub Asana Renovación de marca Compartir Renovación de marca Tareas y problemas Actualizar la paleta de colores de iOS En progreso AD-1 - Asignado a Mala Fontes - Actualizado hace 44 minutos Añadir definiciones a colors.ts Abierta #1 • jessilace • Abierto hace 8 minutos Contexto Roisin Joyce ¡Hola, Sam! Aquí tienes los valores hexadecimales que te harán falta: #E16259 #F99C95 #333333 notion.slack.com Bases de datos sincronizadas Beta Mantén sincronizados los datos de otras herramientas ¿Quieres una fuente de datos constante para tus herramientas externas? Con las bases de datos sincronizadas, puedes verificar directamente desde cualquier base de datos de Notion el estado de los proyectos de Jira, los PR de GitHub o las tareas de Asana. Primeros pasos con Jira GitHub Asana Gitlab Compartir Automatizaciones Automatiza tus flujos de trabajo en Notion Integra todas tus herramientas con Notion como punto central. Actualiza automáticamente otras aplicaciones, gestiónalas y coordina tus documentos para trabajar con eficiencia. Primeros pasos con Zapier Make Tray.io Personaliza Notion con decenas de integraciones Date una vuelta por la Galería de integraciones y configura tu flujo de trabajo a tu medida. Explorar integraciones → Asana GitHub Google Drive Make Trello Jira Slack Zapier Figma Webex IFTTT Slapdash Tray.io Typeform Unito Miro Preguntas frecuentes ¿Qué es una integración de Notion? Las integraciones de Notion conectan a la plataforma herramientas como Jira, Google Drive y Slack para potenciar tu flujo de trabajo. Las integraciones se crean con la API de Notion . Soy desarrollador. ¿Cómo puedo incluir mi integración en el directorio? La Galería de integraciones incluye socios tecnológicos seleccionados por nuestro equipo en función de factores como la adopción de las integraciones o la superposición de clientes, entre otros. Si crees que tu integración podría resultar útil, infórmate aquí sobre el Programa de socios tecnológicos de Notion e indica que te interesa colaborar. Ten en cuenta que todas las integraciones destacadas deben estar disponibles públicamente a través de OAuth, y se someterán a una revisión de seguridad y privacidad antes de anunciarse. ¿Puedo crear mi propia integración? ¡Por supuesto! La API de Notion está disponible para cualquiera que desee utilizarla. Para ir empezando, consulta nuestra documentación en developers.notion.com . Puedes crear integraciones internas para uso privado o integraciones públicas para todos los usuarios de Notion. ¿Están incluidas todas las integraciones de Notion en el directorio? Las integraciones anunciadas en el directorio son solo algunas de las integraciones disponibles para los usuarios de Notion. Este directorio incluye todas las integraciones creadas por Notion, así como otras desarrolladas por nuestros socios y terceros. Se añaden integraciones al directorio continuamente. ¿Las integraciones que figuran en el directorio están revisadas por Notion? Las integraciones creadas por Notion están sujetas al mismo proceso de revisión y los mismos estándares que los propios productos y servicios de Notion. Notion revisa las integraciones de terceros que se anuncian en nuestro directorio, pero no las patrocina ni certifica, ni tampoco ofrece asistencia en relación con ellas. ¿Hay que pagar por usar las integraciones? Notion no cobra nada por utilizar las integraciones, pero nuestros socios sí que pueden aplicar cargos por utilizar su servicio. Puedes obtener más información en la página de cada integración. ¿Tengo que mejorar mi plan para instalar integraciones? No es necesario. Puedes acceder a la API e instalar integraciones sea cual sea el tipo de plan de Notion que tengas. Español (España) Configuración de cookies © 2026 Notion Labs, Inc. Empresa Conócenos Únete a nuestro equipo Seguridad Estado Términos de uso y privacidad Tus derechos de privacidad Descargar iOS y Android Mac y Windows Notion Calendar Web Clipper Recursos Centro de ayuda Precios Blog Comunidad Integraciones Plantillas Programas para socios Notion para Enterprise Pequeña empresa Uso personal Explorar más →
2026-01-13T09:29:56
https://vi-vn.facebook.com/login/?next=https%3A%2F%2Fl.facebook.com%2Fl.php%3Fu%3Dhttps%253A%252F%252Fwww.threads.com%252F%26amp%253Bh%3DAT1DcrLVspry1AEMP_6Agf82ehhyc5c6xSpft5p5Eaerg5GUoJnwOkCtruxFSliK4GAtk1iuw5XMFcjamw08dCpoXPvbkwUMNYZ1f54p7PxjzLOXFkv-W4XRzduMeY9mh0RjY5XcOMfJKyXl
Facebook Facebook Email hoặc điện thoại Mật khẩu Bạn quên tài khoản ư? Tạo tài khoản mới Bạn tạm thời bị chặn Bạn tạm thời bị chặn Có vẻ như bạn đang dùng nhầm tính năng này do sử dụng quá nhanh. Bạn tạm thời đã bị chặn sử dụng nó. Back Tiếng Việt 한국어 English (US) Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch Đăng ký Đăng nhập Messenger Facebook Lite Video Meta Pay Cửa hàng trên Meta Meta Quest Ray-Ban Meta Meta AI Nội dung khác do Meta AI tạo Instagram Threads Trung tâm thông tin bỏ phiếu Chính sách quyền riêng tư Trung tâm quyền riêng tư Giới thiệu Tạo quảng cáo Tạo Trang Nhà phát triển Tuyển dụng Cookie Lựa chọn quảng cáo Điều khoản Trợ giúp Tải thông tin liên hệ lên &amp; đối tượng không phải người dùng Cài đặt Nhật ký hoạt động Meta © 2026
2026-01-13T09:29:56
https://infisical.com/docs/integrations/platforms/certificate-agent#authentication
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let&#x27;s Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;./client-id&quot; # Path to file containing client ID client-secret : &quot;./client-secret&quot; # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : &quot;kubernetes-auth&quot; config : identity-id : &quot;your-kubernetes-identity-id&quot; service-account-token-path : &quot;/var/run/secrets/kubernetes.io/serviceaccount/token&quot; Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : &quot;azure-auth&quot; config : identity-id : &quot;your-azure-identity-id&quot; Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;gcp-id-token&quot; config : identity-id : &quot;your-gcp-identity-id&quot; GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : &quot;gcp-iam&quot; config : identity-id : &quot;your-gcp-identity-id&quot; service-account-key : &quot;/path/to/service-account-key.json&quot; Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;aws-iam&quot; config : identity-id : &quot;your-aws-identity-id&quot; ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : [ &quot;api.example.com&quot; , &quot;api-v2.example.com&quot; ] ttl : &quot;90d&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; # Enable automatic certificate renewal lifecycle : renew-before-expiry : &quot;30d&quot; status-check-interval : &quot;6h&quot; # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : &quot;/etc/ssl/private/web.key&quot; permission : &quot;0600&quot; # Read/write for owner only certificate : path : &quot;/etc/ssl/certs/web.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner chain : path : &quot;/etc/ssl/certs/web-chain.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo &quot;Certificate issued for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-failure : command : | echo &quot;Certificate operation failed: ${ERROR_MESSAGE}&quot; mail -s &quot;Certificate Alert&quot; [email&#160;protected] &lt; /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., [&quot;www.example.com&quot;, &quot;api.example.com&quot;] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger &#x27;Certificate renewal failed&#x27; , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo &quot;New certificate issued for ${CERT_COMMON_NAME}&quot; chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d &quot;{&#x27;text&#x27;: &#x27;Certificate for ${CERT_COMMON_NAME} renewed successfully&#x27;}&quot; timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo &quot;Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}&quot; # Send alert mail -s &quot;Certificate Failure Alert&quot; [email&#160;protected] &lt; /dev/null # Log to syslog logger -p daemon.error &quot;Certificate agent failure: ${ERROR_MESSAGE}&quot; timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : &quot;https://app.infisical.com&quot; retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; csr-path : &quot;/etc/ssl/requests/api.csr&quot; file-output : certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; lifecycle : renew-before-expiry : &quot;14d&quot; # Renew 14 days before expiration status-check-interval : &quot;6h&quot; # Check certificate status every 6 hours file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; post-hooks : on-issuance : command : &quot;systemctl reload nginx&quot; timeout : 30 on-renewal : command : &quot;systemctl reload nginx &amp;&amp; logger &#x27;Certificate renewed&#x27;&quot; timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:56
https://infisical.com/docs/documentation/platform/identities/machine-identities
Machine Identities - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Identities Machine Identities Platform Products CLI Reference API Reference SDKs Changelog Getting Started Overview What is Infisical? Concepts Guides Platform Reference Organizations Projects Identities Overview User Identities Machine Identities Access Control Audit Logs App Connections Events Workflow Integrations External Migrations Server Admin Console Secret Sharing Connectivity Networking Gateway Authentication Methods User Authentication Machine Identities Machine Identity Auth Templates Service Token MFA GitHub Team Sync Self-host Infisical Introduction Installation methods Linux Package Replication Upgrade Infisical Instance Environment Variables Release Channels Hardware requirements Guides Reference architectures Infisical Enterprise FAQ Internals Overview Permissions Architecture Security Service tokens Contributing Getting Started Contributing to platform On this page Concept Scopes Workflow Authentication Methods Identity Lockout FAQ Identities Machine Identities Learn how to use Machine Identities to programmatically interact with Infisical. ​ Concept An Infisical machine identity is an entity that represents a workload or application that require access to various resources in Infisical. This is conceptually similar to an IAM user in AWS or service account in Google Cloud Platform (GCP). Each identity must authenticate with the Infisical API using a supported authentication method like Token Auth , Universal Auth , Kubernetes Auth , AWS Auth , Azure Auth , or GCP Auth to get back a short-lived access token to be used in subsequent requests. Key Features: Role Assignment: Identities must be assigned roles . These roles determine the scope of access to resources, either at the organization level or project level. Auth/Token Configuration: Identities must be configured with corresponding authentication methods and access token properties to securely interact with the Infisical API. ​ Scopes Identities can be created either at the organization-level or the project-level. Outside of identity management and scope of operation, organization and project identities are functionally identical. Project identities are managed at the project-level and can only operate within their respective project. Project-level identities are useful for organizations that delegate responsibility to autonomous teams via projects. Organization identities are managed at the organization-level and can be assigned to one or more projects, as well as perform organization-level operations. Organization-level identities are useful for organizations that have cross-project operations. ​ Workflow Project Identities Organization Identities A typical workflow for using project identities consists of three steps: Creating the identity with a name and role in Project &gt; Access Control &gt; Machine Identities. This step also involves configuring an authentication method for it. Authenticating the identity with the Infisical API based on the configured authentication method on it and receiving a short-lived access token back. Authenticating subsequent requests with the Infisical API using the short-lived access token. A typical workflow for using organization identities consists of four steps: Creating the identity with a name and role in Organization &gt; Access Control &gt; Machine Identities. This step also involves configuring an authentication method for it. Adding the identity to the project(s) you want it to have access to. Authenticating the identity with the Infisical API based on the configured authentication method on it and receiving a short-lived access token back. Authenticating subsequent requests with the Infisical API using the short-lived access token. ​ Authentication Methods To interact with various resources in Infisical, Machine Identities can authenticate with the Infisical API using: Token Auth : A platform-agnostic, simple authentication method suitable to authenticate with Infisical using a token. Universal Auth : A platform-agnostic authentication method suitable to authenticate with Infisical using a Client ID and Client Secret. Kubernetes Auth : A Kubernetes-native authentication method for applications (e.g. pods). AWS Auth : An AWS-native authentication method for AWS services (e.g. EC2, Lambda functions, etc.). Azure Auth : An Azure-native authentication method for Azure resources (e.g. Azure VMs, Azure App Services, Azure Functions, Azure Kubernetes Service, etc.). GCP Auth : A GCP-native authentication method for GCP resources (e.g. Compute Engine, App Engine, Cloud Run, Google Kubernetes Engine, IAM service accounts, etc.). OIDC Auth : A platform-agnostic, JWT-based authentication method for workloads using an OpenID Connect identity provider. ​ Identity Lockout Lockout is a feature that prevents brute-force attacks on identity login endpoints. Auth methods that support lockout include: Universal Auth , LDAP Auth . Supported auth methods have lockout enabled by default. If triggered, lockout temporarily disables the login endpoint for 5 minutes after 3 consecutive failed login attempts within a 30-second window. Lockout can be configured and disabled in the identity auth method settings. ​ FAQ Can I use machine identities with the CLI? Yes - Identities can be used with the CLI. You can learn more about how to do this in the CLI quickstart here . What is the difference between an identity and service token? A service token is a project-level authentication method that is being deprecated in favor of identities. The service token method will be removed in the future in accordance with the deprecation notice and timeline stated here . Amongst many differences, identities provide broader access over the Infisical API, utilizes the same permission system as user identities, and come with a significantly larger number of configurable authentication and security features. If you’re looking for a simple authentication method, similar to service tokens, that can be bound onto an identity, we recommend checking out Token Auth . Why can I not create, read, update, or delete an identity? There are a few reasons for why this might happen: You have insufficient organization permissions to create, read, update, delete identities. The identity you are trying to read, update, or delete is more privileged than yourself. The role you are trying to create an identity for or update an identity to is more privileged than yours. Was this page helpful? Yes No Suggest edits Raise issue User Identities Overview ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by
2026-01-13T09:29:56
https://th-th.facebook.com/login/?next=https%3A%2F%2Fwww.facebook.com%2Fshare_channel%2F%3Ftype%3Dreshare%26amp%253Bamp%253Blink%3Dhttps%253A%252F%252Fweb-smartbear-blog.pages.dev%252Fblog%252Fmake-your-debugging-workflow-smarter-faster-with-bugsnag-and-smartbear-mcp%252F%26amp%253Bamp%253Bapp_id%3D966242223397117%26amp%253Bamp%253Bsource_surface%3Dexternal_reshare%26amp%253Bamp%253Bdisplay%26amp%253Bamp%253Bhashtag
Facebook Facebook อีเมลหรือโทรศัพท์ รหัสผ่าน ลืมบัญชีใช่หรือไม่ สร้างบัญชีใหม่ คุณถูกบล็อกชั่วคราว คุณถูกบล็อกชั่วคราว ดูเหมือนว่าคุณจะใช้คุณสมบัตินี้ในทางที่ผิดโดยการใช้เร็วเกินไป คุณถูกบล็อกจากการใช้โดยชั่วคราว Back ภาษาไทย 한국어 English (US) Tiếng Việt Bahasa Indonesia Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch สมัคร เข้าสู่ระบบ Messenger Facebook Lite วิดีโอ Meta Pay Meta Store Meta Quest Ray-Ban Meta Meta AI เนื้อหาเพิ่มเติมจาก Meta AI Instagram Threads ศูนย์ข้อมูลการลงคะแนนเสียง นโยบายความเป็นส่วนตัว ศูนย์ความเป็นส่วนตัว เกี่ยวกับ สร้างโฆษณา สร้างเพจ ผู้พัฒนา ร่วมงานกับ Facebook คุกกี้ ตัวเลือกโฆษณา เงื่อนไข ความช่วยเหลือ การอัพโหลดผู้ติดต่อและผู้ที่ไม่ได้ใช้บริการ การตั้งค่า บันทึกกิจกรรม Meta © 2026
2026-01-13T09:29:56
https://learn.deeplearning.ai/index
DeepLearning.AI - Learning Platform close Quick Guide &amp; Tips 💻   Accessing Utils File and Helper Functions In each notebook on the top menu: 1:   Click on &quot;File&quot; 2:   Then, click on &quot;Open&quot; You will be able to see all the notebook files for the lesson, including any helper functions used in the notebook on the left sidebar. See the following image for the steps above. 🔄   Reset User Workspace If you need to reset your workspace to its original state, follow these quick steps: 1:   Access the Menu: Look for the three-dot menu (⋮) in the top-right corner of the notebook toolbar. 2:   Restore Original Version: Click on &quot;Restore Original Version&quot; from the dropdown menu. For more detailed instructions, please visit our Reset Workspace Guide . 💻   Downloading Notebooks In each notebook on the top menu: 1:   Click on &quot;File&quot; 2:   Then, click on &quot;Download as&quot; 3:   Then, click on &quot;Notebook (.ipynb)&quot; 💻   Uploading Your Files After following the steps shown in the previous section (&quot;File&quot; =&gt; &quot;Open&quot;), then click on &quot;Upload&quot; button to upload your files. 📗   See Your Progress Once you enroll in this course—or any other short course on the DeepLearning.AI platform—and open it, you can click on &#x27;My Learning&#x27; at the top right corner of the desktop view. There, you will be able to see all the short courses you have enrolled in and your progress in each one. Additionally, your progress in each short course is displayed at the bottom-left corner of the learning page for each course (desktop view). 📱   Features to Use 🎞   Adjust Video Speed: Click on the gear icon (⚙) on the video and then from the Speed option, choose your desired video speed. 🗣   Captions (English and Spanish): Click on the gear icon (⚙) on the video and then from the Captions option, choose to see the captions either in English or Spanish. 🔅   Video Quality: If you do not have access to high-speed internet, click on the gear icon (⚙) on the video and then from Quality , choose the quality that works the best for your Internet speed. 🖥   Picture in Picture (PiP): This feature allows you to continue watching the video when you switch to another browser tab or window. Click on the small rectangle shape on the video to go to PiP mode. √   Hide and Unhide Lesson Navigation Menu: If you do not have a large screen, you may click on the small hamburger icon beside the title of the course to hide the left-side navigation menu. You can then unhide it by clicking on the same icon again. 🧑   Efficient Learning Tips The following tips can help you have an efficient learning experience with this short course and other courses. 🧑   Create a Dedicated Study Space: Establish a quiet, organized workspace free from distractions. A dedicated learning environment can significantly improve concentration and overall learning efficiency. 📅   Develop a Consistent Learning Schedule: Consistency is key to learning. Set out specific times in your day for study and make it a routine. Consistent study times help build a habit and improve information retention. Tip: Set a recurring event and reminder in your calendar, with clear action items, to get regular notifications about your study plans and goals. ☕   Take Regular Breaks: Include short breaks in your study sessions. The Pomodoro Technique, which involves studying for 25 minutes followed by a 5-minute break, can be particularly effective. 💬   Engage with the Community: Participate in forums, discussions, and group activities. Engaging with peers can provide additional insights, create a sense of community, and make learning more enjoyable. ✍   Practice Active Learning: Don&#x27;t just read or run notebooks or watch the material. Engage actively by taking notes, summarizing what you learn, teaching the concept to someone else, or applying the knowledge in your practical projects. 📚   Enroll in Other Short Courses Keep learning by enrolling in other short courses. We add new short courses regularly. Visit DeepLearning.AI Short Courses page to see our latest courses and begin learning new topics. 👇 👉👉 🔗 DeepLearning.AI – All Short Courses [+] 🙂   Let Us Know What You Think Your feedback helps us know what you liked and didn&#x27;t like about the course. We read all your feedback and use them to improve this course and future courses. Please submit your feedback by clicking on &quot;Course Feedback&quot; option at the bottom of the lessons list menu (desktop view). Also, you are more than welcome to join our community 👉👉 🔗 DeepLearning.AI Forum close Sign in Continue with Google Continue with LinkedIn Or, sign in with your email Email Password Sign in Forgot password? Don&#x27;t have an account? Create account By signing up, you agree to our Terms Of Use and Privacy Policy close Create Your Account Continue with Google Continue with LinkedIn Or, sign up with your email Email Address Sign up Already have an account? Sign in here! By signing up, you agree to our Terms Of Use and Privacy Policy close Choose Your Plan Monthly Yearly Change Your Plan Your subscription plan will change at the end of your current billing period. You&#x27;ll continue to have access to your current plan until then. Manage Subscription close Learn More Keep Current Plan close Welcome back! Hi , We&#x27;d like to know you better so we can create more relevant courses. What do you do for work? Subscribe to receive AI news, events and course updates from DeepLearning.AI ! Start Your Course You have successfully joined undefined You now have access to all Pro features. Click below to start learning! Start Learning close Explore Courses Membership Community Forum Events Ambassadors Ambassador Spotlight My Learning AI courses Grow your AI career with foundational specializations and skill-specific short courses taught by leaders in the field. Most popular Professional Certificate DeepLearning.AI PyTorch for Deep Learning PyTorch for Deep Learning Learn the core principles of building, optimizing, and deploying deep learning models using PyTorch. Intermediate Deep Learning Deep Learning Learn More Enroll Now Professional Certificate DeepLearning.AI PyTorch for Deep Learning PyTorch for Deep Learning Learn the core principles of building, optimizing, and deploying deep learning models using PyTorch. Intermediate Deep Learning Deep Learning Learn More Enroll Now Discover All courses Favorites In progress Course Type Short Course: Quickly learn practical skills and industry tools through hands-on projects. Course: Gain new knowledge on topics in AI with flexible online learning. Earn a shareable certificate. Professional Certificate: Master career skills through long form courses and projects. Earn a shareable certificate. Short Course 1-2 hrs Course 3-10 hrs Professional Certificate 10+ hrs Difficulty Beginner Intermediate Popular Topics GenAI Applications 61 Prompt Engineering 47 Agents 39 RAG 35 Generative Models 28 LLMOps 27 Search and Retrieval 24 AI Frameworks 22 Chatbots 22 Evaluation and Monitoring 20 Task Automation 20 Embeddings 19 Fine-Tuning 17 NLP 17 Vector Databases 15 Transformers 14 Data Processing 13 Deep Learning 13 AI Coding 12 Document Processing 10 MultiModal 10 AI Safety 9 AI in Software Development 9 Machine Learning 9 Computer Vision 7 Supervised Learning 7 LLM Serving 5 MLOps 5 Data Engineering 4 Compression and Quantization 3 Diffusion Models 3 Event-Driven AI 3 Anomaly Detection 2 Mathematical Foundations 2 On-Device AI 1 Synthetic Data 1 Time Series 1 Unsupervised Learning 1 Add filters Filters Course Type Short Course: Quickly learn practical skills and industry tools through hands-on projects. Course: Gain new knowledge on topics in AI with flexible online learning. Earn a shareable certificate. Professional Certificate: Master career skills through long form courses and projects. Earn a shareable certificate. Short Course 1-2 hrs Course 3-10 hrs Professional Certificate 10+ hrs Difficulty Beginner Intermediate Popular Topics GenAI Applications 61 Prompt Engineering 47 Agents 39 RAG 35 Generative Models 28 LLMOps 27 Search and Retrieval 24 AI Frameworks 22 Chatbots 22 Evaluation and Monitoring 20 Task Automation 20 Embeddings 19 Fine-Tuning 17 NLP 17 Vector Databases 15 Transformers 14 Data Processing 13 Deep Learning 13 AI Coding 12 Document Processing 10 MultiModal 10 AI Safety 9 AI in Software Development 9 Machine Learning 9 Computer Vision 7 Supervised Learning 7 LLM Serving 5 MLOps 5 Data Engineering 4 Compression and Quantization 3 Diffusion Models 3 Event-Driven AI 3 Anomaly Detection 2 Mathematical Foundations 2 On-Device AI 1 Synthetic Data 1 Time Series 1 Unsupervised Learning 1 Course Type Short Course: Quickly learn practical skills and industry tools through hands-on projects. Course: Gain new knowledge on topics in AI with flexible online learning. Earn a shareable certificate. Professional Certificate: Master career skills through long form courses and projects. Earn a shareable certificate. Short Course 1-2 hrs Course 3-10 hrs Professional Certificate 10+ hrs Difficulty Beginner Intermediate Popular Topics GenAI Applications 61 Prompt Engineering 47 Agents 39 RAG 35 Generative Models 28 LLMOps 27 Search and Retrieval 24 AI Frameworks 22 Chatbots 22 Evaluation and Monitoring 20 Task Automation 20 Embeddings 19 Fine-Tuning 17 NLP 17 Vector Databases 15 Transformers 14 Data Processing 13 Deep Learning 13 AI Coding 12 Document Processing 10 MultiModal 10 AI Safety 9 AI in Software Development 9 Machine Learning 9 Computer Vision 7 Supervised Learning 7 LLM Serving 5 MLOps 5 Data Engineering 4 Compression and Quantization 3 Diffusion Models 3 Event-Driven AI 3 Anomaly Detection 2 Mathematical Foundations 2 On-Device AI 1 Synthetic Data 1 Time Series 1 Unsupervised Learning 1 Add filters Filters Course Type Short Course: Quickly learn practical skills and industry tools through hands-on projects. Course: Gain new knowledge on topics in AI with flexible online learning. Earn a shareable certificate. Professional Certificate: Master career skills through long form courses and projects. Earn a shareable certificate. Short Course 1-2 hrs Course 3-10 hrs Professional Certificate 10+ hrs Difficulty Beginner Intermediate Popular Topics GenAI Applications 61 Prompt Engineering 47 Agents 39 RAG 35 Generative Models 28 LLMOps 27 Search and Retrieval 24 AI Frameworks 22 Chatbots 22 Evaluation and Monitoring 20 Task Automation 20 Embeddings 19 Fine-Tuning 17 NLP 17 Vector Databases 15 Transformers 14 Data Processing 13 Deep Learning 13 AI Coding 12 Document Processing 10 MultiModal 10 AI Safety 9 AI in Software Development 9 Machine Learning 9 Computer Vision 7 Supervised Learning 7 LLM Serving 5 MLOps 5 Data Engineering 4 Compression and Quantization 3 Diffusion Models 3 Event-Driven AI 3 Anomaly Detection 2 Mathematical Foundations 2 On-Device AI 1 Synthetic Data 1 Time Series 1 Unsupervised Learning 1 Top Rated Just Added Course DeepLearning.AI Build with Andrew If you&#x27;ve never written code before, this course is for you. In less than 30 minutes, you&#x27;ll learn to describe an idea in words and let AI transform it into an app for you. Beginner Short Course Nvidia Nvidia’s NeMo Agent Toolkit: Making Agents Reliable Turn proof-of-concept agent demos into production-ready systems using observability, evaluation, and deployment tools from Nvidia&#x27;s NeMo Agent Toolkit. Intermediate Short Course Qdrant Multi-vector Image Retrieval Build advanced retrieval systems that represent images with multiple vectors, enabling fine-grained matching between text queries and visual content for accurate multi-modal search. Intermediate Short Course E2B Building Coding Agents with Tool Execution Build AI agents that write and execute code to accomplish tasks, running safely in sandboxed cloud environments that protect your systems from untrusted code. Intermediate Professional Certificate DeepLearning.AI TensorFlow Developer Professional Certificate Equip yourself with the knowledge necessary to use the TensorFlow API along with best practices and hands-on experience in one of the most in-demand deep learning frameworks. Intermediate Short Course Redis Semantic Caching for AI Agents Speed up and reduce the costs of your AI agents by implementing semantic caching that reuses responses based on meaning rather than exact text. Intermediate Professional Certificate DeepLearning.AI Generative AI for Software Development Learn practical prompt engineering and pair programming techniques with LLMs to write, test, and improve your code. Beginner Course CrewAI Design, Develop, and Deploy Multi-Agent Systems with CrewAI Build practical multi-agent systems that collaborate, use tools and memory, and scale reliably to production Beginner Course DeepLearning.AI Machine Learning in Production Design an ML production system: scoping, data, modeling, deployment. Prototype development, deployment &amp; continuous improvement. Intermediate AI Agents AI Coding View all Get Started Chatbots View all Machine Learning GenAI Applications View all Deep Learning Prompt Engineering View all Mathematics for Machine Learning RAG View all Code with AI Transformers View all Data Analysis Search and Retrieval View all RAG Document Processing View all Python Fundamentals Vector Databases View all Prototype with AI MultiModal View all Fine-Tuning View all Embeddings View all Evaluation and Monitoring View all Course Type Short Course: Quickly learn practical skills and industry tools through hands-on projects. Course: Gain new knowledge on topics in AI with flexible online learning. Earn a shareable certificate. Professional Certificate: Master career skills through long form courses and projects. Earn a shareable certificate. Short Course 1-2 hrs Course 3-10 hrs Professional Certificate 10+ hrs Difficulty Beginner Intermediate Popular Topics GenAI Applications 61 Prompt Engineering 47 Agents 39 RAG 35 Generative Models 28 LLMOps 27 Search and Retrieval 24 AI Frameworks 22 Chatbots 22 Evaluation and Monitoring 20 Task Automation 20 Embeddings 19 Fine-Tuning 17 NLP 17 Vector Databases 15 Transformers 14 Data Processing 13 Deep Learning 13 AI Coding 12 Document Processing 10 MultiModal 10 AI Safety 9 AI in Software Development 9 Machine Learning 9 Computer Vision 7 Supervised Learning 7 LLM Serving 5 MLOps 5 Data Engineering 4 Compression and Quantization 3 Diffusion Models 3 Event-Driven AI 3 Anomaly Detection 2 Mathematical Foundations 2 On-Device AI 1 Synthetic Data 1 Time Series 1 Unsupervised Learning 1 Add filters Filters Course Type Short Course: Quickly learn practical skills and industry tools through hands-on projects. Course: Gain new knowledge on topics in AI with flexible online learning. Earn a shareable certificate. Professional Certificate: Master career skills through long form courses and projects. Earn a shareable certificate. Short Course 1-2 hrs Course 3-10 hrs Professional Certificate 10+ hrs Difficulty Beginner Intermediate Popular Topics GenAI Applications 61 Prompt Engineering 47 Agents 39 RAG 35 Generative Models 28 LLMOps 27 Search and Retrieval 24 AI Frameworks 22 Chatbots 22 Evaluation and Monitoring 20 Task Automation 20 Embeddings 19 Fine-Tuning 17 NLP 17 Vector Databases 15 Transformers 14 Data Processing 13 Deep Learning 13 AI Coding 12 Document Processing 10 MultiModal 10 AI Safety 9 AI in Software Development 9 Machine Learning 9 Computer Vision 7 Supervised Learning 7 LLM Serving 5 MLOps 5 Data Engineering 4 Compression and Quantization 3 Diffusion Models 3 Event-Driven AI 3 Anomaly Detection 2 Mathematical Foundations 2 On-Device AI 1 Synthetic Data 1 Time Series 1 Unsupervised Learning 1 Course Type Short Course: Quickly learn practical skills and industry tools through hands-on projects. Course: Gain new knowledge on topics in AI with flexible online learning. Earn a shareable certificate. Professional Certificate: Master career skills through long form courses and projects. Earn a shareable certificate. Short Course 1-2 hrs Course 3-10 hrs Professional Certificate 10+ hrs Difficulty Beginner Intermediate Popular Topics GenAI Applications 61 Prompt Engineering 47 Agents 39 RAG 35 Generative Models 28 LLMOps 27 Search and Retrieval 24 AI Frameworks 22 Chatbots 22 Evaluation and Monitoring 20 Task Automation 20 Embeddings 19 Fine-Tuning 17 NLP 17 Vector Databases 15 Transformers 14 Data Processing 13 Deep Learning 13 AI Coding 12 Document Processing 10 MultiModal 10 AI Safety 9 AI in Software Development 9 Machine Learning 9 Computer Vision 7 Supervised Learning 7 LLM Serving 5 MLOps 5 Data Engineering 4 Compression and Quantization 3 Diffusion Models 3 Event-Driven AI 3 Anomaly Detection 2 Mathematical Foundations 2 On-Device AI 1 Synthetic Data 1 Time Series 1 Unsupervised Learning 1 Add filters Filters Course Type Short Course: Quickly learn practical skills and industry tools through hands-on projects. Course: Gain new knowledge on topics in AI with flexible online learning. Earn a shareable certificate. Professional Certificate: Master career skills through long form courses and projects. Earn a shareable certificate. Short Course 1-2 hrs Course 3-10 hrs Professional Certificate 10+ hrs Difficulty Beginner Intermediate Popular Topics GenAI Applications 61 Prompt Engineering 47 Agents 39 RAG 35 Generative Models 28 LLMOps 27 Search and Retrieval 24 AI Frameworks 22 Chatbots 22 Evaluation and Monitoring 20 Task Automation 20 Embeddings 19 Fine-Tuning 17 NLP 17 Vector Databases 15 Transformers 14 Data Processing 13 Deep Learning 13 AI Coding 12 Document Processing 10 MultiModal 10 AI Safety 9 AI in Software Development 9 Machine Learning 9 Computer Vision 7 Supervised Learning 7 LLM Serving 5 MLOps 5 Data Engineering 4 Compression and Quantization 3 Diffusion Models 3 Event-Driven AI 3 Anomaly Detection 2 Mathematical Foundations 2 On-Device AI 1 Synthetic Data 1 Time Series 1 Unsupervised Learning 1 No favorite courses yet. Click the heart icon on any course to add it to your favorites! No courses in progress yet. Start learning by enrolling in a course!
2026-01-13T09:29:56
https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.instagram.com%2F&amp;h=AT08Qzu7UEJf_EyJCTd8kWbYonT0-jhmdfol21wyfZ8fXoZoXIYDTX01AL-5Xf2C3dZ-i8910MWn3rmGxdD-x_2CLnbbnwN_sHRM6oVoZtX0VIKsH9V7Syj7EQDD_0Tro3Rh2ogcY-3xSrip
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:56
https://play.google.com/store/apps/details?id=notion.id&amp;hl=fr
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="
2026-01-13T09:29:56
https://www.notion.com/de/product/mail
Notion Mail Notion Funktionen Notion-KI Erschaffen, schreiben, automatisieren Agenten Übernehmen manuelle Aufgaben Enterprise Suche Finde Antworten in Sekundenschnelle Smart Notes Perfekt geschrieben von der KI Dokumente Einfach und leistungsstark Wissensdatenbank Bündle dein Wissen Projekte Verwalte jede Art von Projekt Websites Veröffentliche alles Mögliche im Handumdrehen Loslegen KI-Anwendungsfälle entdecken Schau dir an, wozu die Notion-KI in der Lage ist Marktplatz durchstöbern Vorlagen für alles Mögliche Einbindungen anzeigen Verbinde deine Apps mit Notion Web Clipper herunterladen Speichere Inhalte aus dem Web in Notion Teste die Desktop-App von Notion für mehr Geschwindigkeit App herunterladen Mail Calendar KI Enterprise Tarife Erkunden Teams Entwicklung und Produkt Design Marketing IT Teamgröße Start-ups KMUs Konzerne Bildungswesen Lernen Hilfe-Center Notion Academy Erfahrungsberichte von Kund/-innen Blog Community Partnerprogramme Entwickeln API Vorlagen Sicherheit Beratung Fordere eine Demo an Anmelden Nutze Notion Mail kostenlos Der Posteingang, der so denkt wie du Lerne Notion Mail kennen – den Posteingang, der sich selbst organisiert, der E-Mails verfasst und Meetings ganz nach deinen Vorstellungen plant. Nutze Notion Mail kostenlos Organisieren Bewerber/-innen rekrutieren Gruppe Support-Tickets Herausfiltern Kalte E-Mails Doru Suchen Ansichten Posteingang Kalender Einstellung Support Reisen Newsletter Mail Alle E-Mails Gesendet Entwürfe Posteingang Automatisches Label Andrew, Jason Nächste Schritte Einstellung Jack Steadman Kann Abmelde-Button nicht finden Support Bud, Stephanie Produktdesign-Rolle Einstellung Natalie Dunkelmodus sieht merkwürdig aus Support Kosta B Technisches Vorstellungsgespräch Einstellung Sunny, Vaishnavi Re: Kaffee Einstellung Enabled MD Spannende neue Rolle Einstellung Vicky Soara Beschleunige deine IT CMYK Apparel Kostenloses Mittagessen? Michai Loutsa Ausstehend: Dein Input zum Projektumfang Kaltakquise-E-Mail Finanzabteilung, Penny B Status der Spesenabrechnung Kaltakquise-E-Mail Nan E. Lohra Unterzeichnete Vereinbarung ausstehend Notion Mail bringt endlich Innovation in etwas, das seit Jahrzehnten stagniert. Deniz Birlikci @denizbirlikci Notion Mail hat es mir ermöglicht, ein System zu erstellen, das so auf meine Arbeitsweise, meine Beziehungen und meinen Tonfall zugeschnitten ist, dass ich nicht mehr zu etwas anderem zurück könnte. Camille Ricketts @camillericketts Ok: Notion Mail ist ziemlich cool. Aleks @aleksliving Sie haben an Notion Mail wirklich getüftelt. Besonders am KI-Auto-Filter. Vielleicht lässt sich damit endlich ein abgearbeiteter Posteingang erreichen. Arian @ariancodes Die Verwendung von @NotionMail ist wie das Erstellen gefilterter Ansichten für Ihre Datenbanken, aber die Eigenschaften sind Elemente aus Ihren E-Mails. Ich bin so gespannt, das einzurichten. Hunter Bohn @TheHunterBohm Notion Mail bringt endlich Innovation in etwas, das seit Jahrzehnten stagniert. Deniz Birlikci @denizbirlikci Notion Mail hat es mir ermöglicht, ein System zu erstellen, das so auf meine Arbeitsweise, meine Beziehungen und meinen Tonfall zugeschnitten ist, dass ich nicht mehr zu etwas anderem zurück könnte. Camille Ricketts @camillericketts Ok: Notion Mail ist ziemlich cool. Aleks @aleksliving Sie haben an Notion Mail wirklich getüftelt. Besonders am KI-Auto-Filter. Vielleicht lässt sich damit endlich ein abgearbeiteter Posteingang erreichen. Arian @ariancodes Die Verwendung von @NotionMail ist wie das Erstellen gefilterter Ansichten für Ihre Datenbanken, aber die Eigenschaften sind Elemente aus Ihren E-Mails. Ich bin so gespannt, das einzurichten. Hunter Bohn @TheHunterBohm @NotionMail hat den aktuellen Hype absolut verdient. Der Wechsel von Gmail ist für Power-User ganz normal. Mike Majara @mikemajara Mit der KI von @NotionMail landen überflüssige Mails richtig in Spam, Updates, Werbeaktionen, Soziale, GitHub usw., während ich mich auf wichtige E-Mails konzentrieren kann. Rohit Ghumare @ghumare64 Ich liebe es @NotionMail, zu benutzen, vor allem für die KI-Auto-Label-Funktion. Damit kannst du dein Postfach ganz einfach organisieren. Muhammad Tayyab @tayyabgoose Es fühlt sich fantastisch an. Endlich bin ich die Angst vor E-Mails losgeworden. Vielleicht liebe ich @NotionMail sogar noch mehr als Notion selbst. Kamil Ruczynski @unable0_ @NotionMail hat den aktuellen Hype absolut verdient. Der Wechsel von Gmail ist für Power-User ganz normal. Mike Majara @mikemajara Mit der KI von @NotionMail landen überflüssige Mails richtig in Spam, Updates, Werbeaktionen, Soziale, GitHub usw., während ich mich auf wichtige E-Mails konzentrieren kann. Rohit Ghumare @ghumare64 Ich liebe es @NotionMail, zu benutzen, vor allem für die KI-Auto-Label-Funktion. Damit kannst du dein Postfach ganz einfach organisieren. Muhammad Tayyab @tayyabgoose Es fühlt sich fantastisch an. Endlich bin ich die Angst vor E-Mails losgeworden. Vielleicht liebe ich @NotionMail sogar noch mehr als Notion selbst. Kamil Ruczynski @unable0_ Alle E-Mails vollautomatisch organisiert. S t e l l e n a n g e b o t e ,   d i e   e i n e   U n t e r s c h r i f t   e r f o r d e r n Empfohlen Dokumente, die meine Unterschrift erfordern Produktfeedback von Kunden/Kundinnen Reisebuchungen und -bestätigungen Posteingang Automatisches Label Kosta B Stellenangebot Unterschrift Ryan K Lebenslauf für die Stelle im Vertrieb Joe Z Startdatum? Unterschrift Natalie A Vorstellungsgespräch mit Kristie M. geplant Kiki Segall Herzlichen Glückwunsch!! Unterschrift Teile Notion-KI mit, welche Arten von E-Mails wichtig sind und sie werden automatisch gekennzeichnet und sortiert, sobald sie eintreffen. Doru Suchen Ansichten Posteingang Kalender Einstellung Support Reisen Newsletter E-Mail Alle E-Mails Gesendet Entwürfe Posteingang Kosta B Kosta B Zeitleiste für die Einstellung? Ryan K Lebenslauf für die Stelle im Vertrieb Kiki Segall Joe Z Bewerbung für die Stelle des Produktdesigners Natalie A Vorstellungsgespräch mit Kristie M. geplant Kiki Segall Ich freue mich auf mein morgiges Vorstellungsgespräch! Teile deinen Posteingang in individuelle Ansichten auf, die deinen Themenbereichen entsprechen. Filtern nach Domain Kalender Label Person Domain Kalender Label Person Domain Kalender Label Person Domain Kalender Label Person Teile E-Mails in Gruppen ein und filtere sie nach Thema, Absender, Bezeichnung – wie auch immer du es brauchst. Jede Antwort schnell verfasst. Schnipsel Verfasse niemals dieselbe E-Mail zweimal. Erstelle E-Mail-Vorlagen, die du mit einem Klick wiederverwenden kannst. Integrierte Terminplanung Schnelle Antworten Verbessere deinen Schreibstil mit KI Diana M [email&#160;protected] Jack Steadman Zusammenarbeit Hallo {first_name} , ich heiße Diana. Ich bewundere Ihre Arbeit bei {Unternehmen} und kann spannende Möglichkeiten für eine künftige Zusammenarbeit erkennen. Hätten Sie Zeit für ein kurzes Gespräch? Für einen schnellen Start gemacht. Verbinde Gmail und überzeuge dich selbst. Jetzt kostenlos loslegen Es funktioniert genau wie Notion. Mit dem Notion-Editor lassen sich schnell ansprechende E-Mails verfassen. Diana M [email&#160;protected] Jack Steadman Zusammenarbeit Hallo Andrew, ich hoffe, es geht Ihnen gut! Ich wollte mich nur kurz vorstellen – ich bin Alex und arbeite als Designer bei Acme Labs. / Basis-Blöcke Aufzählung Hervorhebung Überschrift 1 Zeitplan Text Überall verfügbar, sogar offline. E-Mail unterwegs mit der iOS-App. Download für iOS → E-Mail ohne Ablenkungen. Hol dir die Mac-App. Download für macOS → Entwickelt mit Blick auf Datensicherheit. DSGVO- und CCPA-konform. Kein Training mit deinen Daten. HIPAA- und SOC 2 (Typ 1)-zertifiziert. Häufig gestellte Fragen Mit welchen E-Mail-Anbietern ist Notion-Mail kompatibel? Notion Mail lässt sich in Google- und Gmail-Konten integrieren. Wann wird Notion Mail auf Mobilgeräten verfügbar sein? Die iOS-App ist bald verfügbar! Notion Mail wird 2025 auch für Android verfügbar sein. In welchen Sprachen ist Notion Mail verfügbar? Notion Mail ist derzeit auf Englisch verfügbar. Wir werden sehr bald 13 weitere Sprachen (genau wie bei Notion!) anbieten. Kann ich mehrere E-Mail-Konten mit Notion Mail verwalten? Ja! Du kannst mehrere Notion-Konten verwenden, um verschiedene E-Mails zu verwalten. Wir bieten derzeit keinen einheitlichen Posteingang an, der E-Mails von all deinen Konten an einem Ort anzeigt. Welche Sicherheitsstandards gelten bei Notion Mail? Notion Mail ist, genau wie Notion, SOC2-zertifiziert und HIPAA-konform. Notion Mail berücksichtigt auch dieselben Bedingungen und Datenschutzrichtlinien, denen du bereits vertraust. Mehr erfahren. Deutsch Cookie-Einstellungen © 2026 Notion Labs, Inc. Unternehmen Über uns Karriere Sicherheit Status Nutzungsbedingungen und Datenschutz Deine Datenschutzrechte Download iOS und Android Mac und Windows Calendar Web Clipper Ressourcen Hilfe-Center Preise Blog Community Einbindungen Vorlagen Partnerprogramme Notion für Unternehmen Kleine Unternehmen Persönlich Mehr entdecken →
2026-01-13T09:29:56
https://wiki.creativecommons.org/wiki/Frequently_Asked_Questions#are-creative-commons-works-really-free-to-use
Frequently Asked Questions - Creative Commons Skip to content Creative Commons Menu Who We Are What We Do Licenses and Tools Blog Support Us Search Donate Explore CC Global Network Join a global community working to strengthen the Commons Certificate Become an expert in creating and engaging with openly licensed materials Global Summit Attend our annual event, promoting the power of open licensing Chooser Get help choosing the appropriate license for your work Search Portal Find engines to search openly licensed material for creative and educational reuse Open Source Help us build products that maximize creativity and innovation Frequently Asked Questions English | Fran&#xE7;ais 2025-05-12 19:36:36 UTC About CC What is Creative Commons and what do you do? Is Creative Commons against copyright? What does &#x201C;Some Rights Reserved&#x201D; mean? Can Creative Commons give legal advice about its licenses or other tools, or help with CC license enforcement? Does Creative Commons collect or track material licensed under a CC license? What do the Creative Commons buttons do? May I use the Creative Commons logo and buttons? I love Creative Commons. How can I help? Why does Creative Commons run an annual fundraising campaign? What is the money used for and where does it go? General License Information What are Creative Commons licenses? How do CC licenses operate? Which is the latest version of the licenses offered by Creative Commons? Do Creative Commons licenses affect exceptions and limitations to copyright, such as fair dealing and fair use? Who gives permission to use material offered under Creative Commons licenses? Are Creative Commons licenses enforceable in a court of law? What happens if someone applies a Creative Commons license to my work without my knowledge or authorization? What are the international (&#x201C;unported&#x201D;) Creative Commons licenses, and why does CC offer &#x201C;ported&#x201D; licenses? Can I include a work licensed with CC BY in a Wikipedia article even though they use a CC BY-SA license? Can governments and intergovernmental organizations (&#x201C;IGOs&#x201D;) use CC licenses? Can children apply Creative Commons licenses to work they create? What are the official translations of the CC licenses and CC0? What is a BY-SA Compatible License? For Licensors Choosing a license What things should I think about before I apply a Creative Commons license? How should I decide which license to choose? Why should I use the latest version of the Creative Commons licenses? What if CC licenses have not been ported to my jurisdiction? Should I choose an international license or a ported license? Why should I use the license chooser? What if I don&#x2019;t? How do I apply a Creative Commons license to my material? Do I need to register with Creative Commons before I obtain a license? What do the terms and conditions of a CC license apply to? Can I apply a Creative Commons license to software? Can I apply a Creative Commons license to databases? Could I use a CC license to share my logo or trademark? May I apply a Creative Commons license to a work in the public domain? If I take a photograph of another work that is in the public domain, can I apply a CC license to my photo? May I apply a CC license to my work if it incorporates material used under fair use or another exception or limitation to copyright? Rights other than copyright Can I use CC licenses to license rights other than copyright? How do Creative Commons licenses affect my moral rights, if at all? Can I offer material under a CC license that has my trademark on it without also licensing or affecting rights in the trademark? How are publicity, privacy, and personality rights affected when I apply a CC license? What is the difference between plagiarism and copyright infringement? And what role do CC licenses play to address plagiarism? Business models Can I apply a CC license to low-resolution copies of a licensed work and reserve more rights in high-resolution copies? Can I use a Creative Commons license if I am a member of a collecting society? Can I still make money from a work I make available under a Creative Commons license? Alterations and additions to the license Can I insist on the exact placement of the attribution credit? Can I change the license terms or conditions? Can I waive license terms or conditions? Can I enter into separate or supplemental agreements with users of my work? After licensing What happens if I offer my material under a Creative Commons license and someone misuses them? What can I do if I offer my material under a Creative Commons license and I do not like the way someone uses it? Do I have to provide my name? Can I ask that my name be removed? What do I do if someone tries to place effective technological measures (such as DRM) on my CC-licensed material? When I release my work under a CC license in one format (e.g., .pdf), can I restrict licensees from changing it to or using it in other formats? What if I change my mind about using a CC license? For Licensees Before using CC-licensed material What should I think about before using material offered under a Creative Commons license? Does a Creative Commons license give me all the rights I need to use the work? What if there are sui generis database rights that apply to my use of a CC-licensed database? Where can I find material offered under a CC license? Are Creative Commons works really free to use? What should I know about differences between the international licenses and the ported licenses? General license compliance What happens if I want to use the material in a way that is not permitted by the license? Do I always have to comply with the license terms? If not, what are the exceptions? Attribution How do I properly attribute material offered under a Creative Commons license? Do I need to be aware of anything else when providing attribution? Do I always have to attribute the creator of the licensed material? Using licensed material Does my use violate the NonCommercial clause of the licenses? Can I take a CC-licensed work and use it in a different format? How do I know if a low-resolution photo and a high-resolution photo are the same work? Can I reuse an excerpt of a larger work that is licensed with the NoDerivs restriction? Can I use effective technological measures (such as DRM) when I share CC-licensed material? Can I share CC-licensed material on password-protected sites? Can I share CC-licensed material on file-sharing networks? Do I need to worry about website terms of service when I share CC-licensed content on social media platforms? Additional restrictions on licensed material What if I received CC-licensed material encumbered with effective technological measures (such as DRM)? What if I have received CC-licensed material with additional restrictions? Combining and adapting CC material When is my use considered an adaptation? Can I combine material under different Creative Commons licenses in my work? If I derive or adapt material offered under a Creative Commons license, which CC license(s) can I use? If I create a collection that includes a work offered under a CC license, which license(s) may I choose for the collection? License termination When do Creative Commons licenses expire? What happens if the author decides to revoke the CC license to material I am using? How can I lose my rights under a Creative Commons license? If that happens, how do I get them back? Technical Questions How do Creative Commons licenses and public domain tools work technically? What does it mean that Creative Commons licenses are &#x201C;machine-readable&#x201D;? What is RDFa? What is CC REL and why does Creative Commons recommend it? What does it mean for a search engine to be CC-enabled? How do I give users of my site the option to use CC licensing like Flickr does? How can I change or remove the Creative Commons search option built into the Firefox browser? Is Creative Commons involved in digital rights management (DRM)? Legal Background What is copyright and why does it matter? What is the public domain? What do I need to do to get a copyright? What is an adaptation? What are moral rights? What are neighboring rights? What are sui generis database rights? What are collecting societies? What are publicity, personality, and privacy rights? Data Frequently asked questions about data and CC licenses Can databases be released under CC licenses? When a CC license is applied to a database, what is being licensed? How do I apply a CC legal tool to a database? How do the different CC license elements operate for a CC-licensed database? Can I conduct text/data mining on a CC-licensed database? How does the treatment of sui generis database rights vary in prior versions of CC licenses? What is the difference between the Open Data Commons licenses and the CC 4.0 licenses? Frequently asked questions about data, generally Which components of databases are protected by copyright? How do I know whether a particular use of a database is restricted by copyright? If my use of a database is restricted by copyright, how do I comply with the license? Which components of a database are protected by sui generis database rights? How do I know whether a particular use of a database is restricted by sui generis database rights? What constitutes a &#x201C;substantial portion&#x201D; of a database? If my use of a database is restricted by sui generis database rights, how do I comply with the license? Artificial intelligence and CC licenses What are the limits on how CC-licensed works can be used in the development of new technologies, such as training of artificial intelligence software? But what about privacy laws, rules governing ethical research, and data protection laws? What attribution obligations exist when CC-licensed images are included in a published dataset? Is linking to the original image or URI required, and if so, is it adequate? If a for-profit company uses CC-licensed content under a Non Commercial license and releases the work under terms that allow only research purposes, is the NC restriction violated? If CC SA-licensed content is included in a database, does the entire database have to be licensed under an SA license? What, if any, remedies, do users have if they dislike how their photos or images have been reused? Notes These FAQs are designed to provide a better understanding of Creative Commons, our licenses, and our other legal and technical tools. They provide basic information, sometimes about fairly complex topics, and will often link to more detailed information. Other CC FAQs: CC0 Public Domain Dedication and Public Domain Mark . &#x201C;Licensor&#x201D;, &#x201C;rights holder&#x201D;, &#x201C;owner&#x201D;, and &#x201C;creator&#x201D; may be used interchangeably to refer to the person or entity applying a CC license. Information about the licenses is primarily made with reference to the 4.0 suite, but earlier license versions are mentioned where they differ. Have a question that isn&#x2019;t answered here? Contact info@creativecommons.org. Creative Commons does not provide legal advice. This FAQ is for informational purposes and is not a substitute for legal advice. It may not cover important issues that affect you. You should consult with your own lawyer if you have questions. About CC What is Creative Commons and what do you do? Creative Commons is a global nonprofit organization that enables sharing and reuse of creativity and knowledge through the provision of free legal tools. Our legal tools help those who want to encourage reuse of their works by offering them for use under generous, standardized terms; those who want to make creative uses of works; and those who want to benefit from this symbiosis. Our vision is to help others realize the full potential of the internet. CC has affiliates all over the world who help ensure our licenses work internationally and who raise awareness of our work. Although Creative Commons is best known for its licenses, our work extends beyond just providing copyright licenses. CC offers other legal and technical tools that also facilitate sharing and discovery of creative works, such as CC0 , a public domain dedication for rights holders who wish to put their work into the public domain before the expiration of copyright, and the Public Domain Mark , a tool for marking a work that is in the worldwide public domain. Creative Commons licenses and tools were designed specifically to work with the web, which makes content that is offered under their terms easy to search for, discover, and use. For more information about CC, our main website contains in-depth information about the organization , its staff and board of directors , its history , and its supporters . You can also read CC case studies to learn about some of the inspiring ways CC licenses and tools have been used to share works and support innovative business models. You can find regularly updated information about CC by visiting the blog . Is Creative Commons against copyright? Absolutely not. CC has responded to claims to the contrary . CC licenses are copyright licenses, and depend on the existence of copyright to work. CC licenses are legal tools that creators and other rights holders can use to offer certain usage rights to the public, while reserving other rights. Those who want to make their work available to the public for limited kinds of uses while preserving their copyright may want to consider using CC licenses. Others who want to reserve all of their rights under copyright law should not use CC licenses. That said, Creative Commons recognizes the need for change in copyright law, and many members of the Creative Commons community are active participants in the copyright reform movement. For more information, see our statement in support of copyright reform . What does &#x201C;Some Rights Reserved&#x201D; mean? Copyright grants to creators a bundle of exclusive rights over their creative works, which generally include, at a minimum, the right to reproduce, distribute, display, and make adaptations. The phrase &#x201C;All Rights Reserved&#x201D; is often used by owners to indicate that they reserve all of the rights granted to them under the law. When copyright expires, the work enters the public domain , and the rights holder can no longer stop others from engaging in those activities under copyright, with the exception of moral rights reserved to creators in some jurisdictions. Creative Commons licenses offer creators a spectrum of choices between retaining all rights and relinquishing all rights (public domain), an approach we call &#x201C;Some Rights Reserved.&#x201D; Can Creative Commons give legal advice about its licenses or other tools, or help with CC license enforcement? No.&#xA0;Creative Commons is not a law firm and does not provide legal advice or legal services. CC is similar to a self-help service that offers free, form-based legal documents for others to use. These FAQ answers many of the most common questions. There is also specialized information available on the following pages: Marking practices for creators Marking practices for reusers Data FAQ Differences between CC license versions Differences between jurisdiction ports of earlier license versions Public domain mark FAQ CC0 FAQ While CC does provide this informational guidance about its licenses and other tools, this information may not apply to your particular situation, and should never be taken as legal advice. If you&#x2019;re looking for legal advice about using CC licenses and other tools, we recommend contacting the Creative Commons affiliate in your jurisdiction . CC affiliates are highly connected to the communities of copyright lawyers in their countries. We also offer a list of lawyers and organizations who have identified themselves as willing to provide information to others about CC licensing issues. However, please note that CC does not provide referral services, and does not endorse or recommend any person on that list. Does Creative Commons collect or track material licensed under a CC license? No, CC does not collect content or track licensed material. However, CC builds technical tools that help the public search for and use works licensed under our licenses and other legal tools, and many others have built such tools as well. CC Search is one tool developed by CC to help the public discover works offered under Creative Commons licenses on the internet via CC-aware search engines and repositories. What do the Creative Commons buttons do? The CC buttons are a shorthand way to convey the basic permissions associated with material offered under CC licenses. Creators and owners who apply CC licenses to their material can download and apply those buttons to communicate to users the permissions granted in advance. When the material is offered online, the buttons should usually link out to the human-readable license deeds (which, in turn, link to the license itself). May I use the Creative Commons logo and buttons? You may download high resolution versions of the Creative Commons logos and use them in connection with your work or your website, provided you comply with our policies . Among other things, if you use the logos on a website or on your work, you may not alter the logos in any respect&#x2014;such as by changing the font, the proportions, or the colors. CC&#x2019;s buttons, name, and corporate logo (the &#x201C;CC&#x201D; in a circle) are trademarks of Creative Commons. You cannot use them in ways not permitted by our policies unless you first receive express, written permission. This means, for example, that you cannot (without our permission) print your own buttons and t-shirts using CC logos, although you can purchase them in CC&#x2019;s store . I love Creative Commons. How can I help? Please support CC by making a donation through our support page . Donations can be handled through PayPal or by credit card. You can also support CC by visiting our store . CC always welcomes your feedback, which you can provide by emailing &#x69;&#110;&#102;&#x6f;&#32;&#x61;&#116;&#32;&#x63;&#114;&#x65;&#x61;&#116;&#x69;&#118;&#x65;&#x63;&#x6f;&#x6d;&#x6d;&#x6f;&#110;&#x73;&#32;&#100;&#x6f;&#116;&#32;&#x6f;&#114;&#x67; . You can also participate in CC&#x2019;s email discussion lists and share feedback and ideas in one of those forums. If you are a software developer, sysadmin, or have other technical expertise, please join our developer community and help build the tools that build the commons. Finally, one of the best ways to support CC is by supporting our causes yourself. Follow our blog to find out about current issues where you can help get involved and spread the word, and advocate for free and open licensing in your own communities. Why does Creative Commons run an annual fundraising campaign? What is the money used for and where does it go? Creative Commons is a global nonprofit organization that enables sharing and reuse of creativity and knowledge through free legal tools, with affiliates all over the world who help ensure our licenses work internationally and raise awareness about our work. Our tools are free, and our reach is wide. In order to&#x2026; continue developing our licenses and public domain tools to make sure they are legally and technically up-to-date around the world, help creators implement these tools on websites through best practices and individual assistance, enable CC licensing on major content-sharing platforms, enhance CC-licensed resource search and discovery, advocate for CC licensing and open policies in education , science , and culture , and myriad other activities we&#x2019;re forgetting to mention, such as all the everyday boring but essential operations that go into running an organization &#x2026;we need $ to make it all happen! For more information, please take a look at our Annual Report . Creative Commons has always relied on the generosity of both individuals and organizations to fund its ongoing operations. It is essential we have the public&#x2019;s support because it is the creators and users of CC material who make our tools relevant in this digital age. They depend on the tools and services CC provides through their reuse and remix of the rich, open resources available on Wikipedia , Flickr , SoundCloud , Vimeo , Europeana , MIT OpenCourseWare , PLOS , Al Jazeera , and YouTube &#x2014;just to name a few. Many of these people donate $10, $25, or $50 to CC, to help keep it up and running so we can continue to provide our tools and services for free, as a nonprofit organization. The more people who donate to CC, the more independent it will remain. General License Information What are Creative Commons licenses? Creative Commons licenses provide an easy way to manage the copyright terms that attach automatically to all creative material under copyright . Our licenses allow that material to be shared and reused under terms that are flexible and legally sound. Creative Commons offers a core suite of six copyright licenses. Because there is no single &#x201C;Creative Commons license,&#x201D; it is important to identify which of the six licenses you are applying to your material, which of the six licenses has been applied to material that you intend to use, and in both cases the specific version. All of our licenses require that users provide attribution (BY) to the creator when the material is used and shared. Some licensors choose the BY license, which requires attribution to the creator as the only condition to reuse of the material. The other five licenses combine BY with one or more of three additional license elements: NonCommercial (NC), which prohibits commercial use of the material; NoDerivatives (ND), which prohibits the sharing of adaptations of the material; and ShareAlike (SA), which requires adaptations of the material be released under the same license. CC licenses may be applied to any type of work, including educational resources , music , photographs , databases , government and public sector information , and many other types of material . The only categories of works for which CC does not recommend its licenses are computer software and hardware. You should also not apply Creative Commons licenses to works that are no longer protected by copyright or are otherwise in the public domain . Instead, for those works in the worldwide public domain, we recommend that you mark them with the Public Domain Mark . How do CC licenses operate? CC licenses are operative only when applied to material in which a copyright exists, and even then only when a particular use would otherwise not be permitted by copyright. Note that the latest version of CC licenses also applies to rights similar to copyright, such as neighboring rights and sui generis database rights . Learn more about the scope of the licenses. This means that CC license terms and conditions are not triggered by uses permitted under any applicable exceptions and limitations to copyright , nor do license terms and conditions apply to elements of a licensed work that are in the public domain. This also means that CC licenses do not contractually impose restrictions on uses of a work where there is no underlying copyright. This feature (and others) distinguish CC licenses from some other open licenses like the ODbL and ODC-BY , both of which are intended to impose contractual conditions and restrictions on the reuse of databases in jurisdictions where there is no underlying copyright or sui generis database right. All CC licenses are non-exclusive: creators and owners can enter into additional, different licensing arrangements for the same material at any time (often referred to as &#x201C;dual-licensing&#x201D; or &#x201C;multi-licensing&#x201D;). However, CC licenses are not revocable once granted unless there has been a breach, and even then the license is terminated only for the breaching licensee. Please note that CC0 is not a license; it is a public domain dedication. When CC0 is applied to a work, copyright no longer applies to the work in most jurisdictions around the world. Therefore, references to dual licensing arrangements like the one above are inapplicable to CC0. There are also videos and comics that offer visual descriptions of how CC licenses work. Which is the latest version of the licenses offered by Creative Commons? In November 2013, Creative Commons published the version 4.0 license suite. These licenses are the most up-to-date licenses offered by CC, and are recommended over all prior versions. You can see how the licenses have been improved over time on the license versions page . 4.0 has been drafted to be internationally valid, and will have official translations becoming available after publication. Do Creative Commons licenses affect exceptions and limitations to copyright, such as fair dealing and fair use? No.&#xA0;By design, CC licenses do not reduce, limit, or restrict any rights under exceptions and limitations to copyright, such as fair use or fair dealing . If your use of CC-licensed material would otherwise be allowed because of an applicable exception or limitation, you do not need to rely on the CC license or comply with its terms and conditions. This is a fundamental principle of CC licensing. Who gives permission to use material offered under Creative Commons licenses? Our licenses and legal tools are intended for use by anyone who holds copyright in the material. This is often, but not always, the creator. Creative Commons offers licenses and tools to the public free of charge and does not require that creators or other rights holders register with CC in order to apply a CC license to a work. This means that CC does not have special knowledge of who uses the licenses and for what purposes, nor does CC have a way to contact creators beyond means generally available to the public. CC has no authority to grant permission on behalf of those persons, nor does CC manage those rights on behalf of others. If you would like to obtain additional permissions to use the work beyond those granted by the license that has been applied, or if you&#x2019;re not sure if your intended use is permitted by the license, you should contact the rights holder . Are Creative Commons licenses enforceable in a court of law? Creative Commons licenses are drafted to be enforceable around the world, and have been enforced in court in various jurisdictions. To CC&#x2019;s knowledge, the licenses have never been held unenforceable or invalid. CC licenses contain a &#x201C;severability&#x201D; clause. This allows a court to eliminate any provision determined to be unenforceable, and enforce the remaining provisions of the license. What happens if someone applies a Creative Commons license to my work without my knowledge or authorization? CC alerts prospective licensors they need to have all necessary rights before applying a CC license to a work. If that is not the case and someone has marked your work with a CC license without your authorization, you should contact that person and tell them to remove the license from your work. You may also wish to contact a lawyer. Creative Commons is not a law firm and cannot represent you or give you legal advice, but there are lawyers who have identified themselves as interested in representing people in CC-related matters . What are the international (&#x201C;unported&#x201D;) Creative Commons licenses, and why does CC offer &#x201C;ported&#x201D; licenses? One of CC&#x2019;s goals is ensuring that all of its legal tools work globally, so that anyone anywhere in the world can share their work on globally standard terms. To this end, CC offers a core suite of six international copyright licenses (formerly called the &#x201C;unported&#x201D;) that are drafted based largely on various international treaties governing copyright , taking into account as many jurisdiction-specific legal issues as possible. The latest version (4.0) has been drafted with particular attention to the needs of international enforceability. For version 3.0 and earlier, Creative Commons has also offered ported versions of its six core licenses for many jurisdictions (which usually correspond to countries, but not always). These ported licenses are based on the international license suite but have been modified to reflect local nuances in the expression of legal terms and conditions, drafting protocols, and language. The ported licenses and the international licenses are all intended to be legally effective everywhere. CC expects that few, if any, ports will be necessary for 4.0. CC recommends that you take advantage of the improvements in the 4.0 suite explained on the license versions page unless there are particular considerations you are aware of that would require a ported license. Can I include a work licensed with CC BY in a Wikipedia article even though they use a CC BY-SA license? Yes. Works licensed under CC BY may be incorporated into works that are licensed under CC BY-SA. For example, you may incorporate a CC BY photograph into a Wikipedia article so long as you keep all copyright notices intact, provide proper attribution, and otherwise comply with the terms of CC BY. Learn more about the licenses. Can governments and intergovernmental organizations (&#x201C;IGOs&#x201D;) use CC licenses? Yes, anyone may use CC licenses for material they own, including governments and IGOs, and these institutions frequently use CC licenses on their copyrightable material . The reasons for doing so vary, and often include a desire to maximize the impact and utility of works for educational and informational purposes, and to enhance transparency. Creative Commons licenses have desirable features that make them the preferred choice over custom licenses. CC licenses are standard and interoperable, which means material published by different creators using the same type of CC license can be translated, modified, compiled, and remixed without legal barriers depending on the particular license applied . Creative Commons licenses are also machine-readable, allowing CC-licensed works to be easily discovered via search engines such as Google. These features maximize distribution, reuse, and impact of works published by governments and IGOs. Though we encourage anyone to use version 4.0, which is internationally valid and may be used by individuals as well as organizations, there is an IGO ported version of 3.0 that IGOs may also use. Read more about how governments and IGOs use and leverage CC licenses and legal tools, considerations for using our licenses, and how they operate in the IGO context. Can children apply Creative Commons licenses to work they create? This issue depends largely on the laws in place where the child lives. In the United States, children can be copyright holders and are entitled to license their works in the same manner as adults. However, they may have the right to disaffirm certain types of legal agreements, including licenses. In many parts of the United States, for example, children have the ability to disaffirm some types of agreements under certain circumstances once they reach the age where they are considered adults within the relevant jurisdiction. We are unaware of any attempt by a licensor to exercise the disaffirmation right with respect to a CC license applied to a work. What are the official translations of the CC licenses and CC0? Official language translations will be available for the 4.0 licenses and CC0. When you license your own work, you may use or link to the text of any available official translation. When you reuse CC-licensed material, you may comply with the license conditions by referring to any available official translation of the license. These translations are linguistic translations of the English version which adhere as closely as possible to the original text. These translations have been done by our affiliates in accordance with the Legal Code Translation Policy and with the oversight and detailed review of the CC legal team. Note that these are equivalents of the original English; these translations are not jurisdiction ported versions . You may find a list of all available translations here . For versions 3.0 and earlier, official translations are not available. Some unofficial translations were made for informational purposes only. (Jurisdiction ported versions of version 3.0 and earlier were generally published in the official language(s) of the appropriate jurisdiction. However, the ported licenses are not equivalent to the international licenses, and do not serve as substitutable references for purposes of complying with the terms and conditions of the licenses.) What is a BY-SA Compatible License? A BY-SA Compatible License is a license officially designated by Creative Commons pursuant to the ShareAlike compatibility process . Once deemed a BY-SA Compatible License, you may use the license to publish your contributions to an adaptation of a BY-SA work. To see the list of BY-SA Compatible Licenses, click here . Learn more about ShareAlike compatibility here . For Licensors Choosing a license What things should I think about before I apply a Creative Commons license? Applying a Creative Commons license to your material is a serious decision. When you apply a CC license, you give permission to anyone to use your material for the full duration of applicable copyright and similar rights. CC has identified some things that you should consider before you apply a CC license, some of which relate to your ability to apply a CC license at all. Here are some highlights: Is the material copyrightable? If not, is it subject to neighboring rights or sui generis database rights ? CC licenses do not apply to material in the public domain . Different countries have different standards for what is in the public domain. Do you own the material you want to license? If not, are you otherwise authorized to license it under the specific CC license you are interested in using? You should not apply a license to material that you do not own or that you are not authorized to license. Are you aware that CC licenses are not revocable ? You are free to stop offering material under a CC license at any time, but this will not affect the rights associated with any copies of your work already in circulation. (Any particular licensee may lose his or her rights after violating the license, but this does not affect continual use of the work by other licensees.) Are you a member of a collecting society ? If you are, you should make sure that you are able to use CC licenses for your materials . Always read the terms and conditions of the specific license you plan to apply. Additionally, there are several terms that may differ in the earlier versions of the license , both unported and ported. If you choose to use a pre-4.0 version or any ported version , clauses such as choice of law may affect your desired choice of license. How should I decide which license to choose? If you are unsure which license best suits your needs, there are plenty of resources to help rights holders choose the right CC license. CC Australia has developed a flow chart that may be useful in helping you settle on the right license for your work. You can also read case studies of others who are using CC licenses. The CC community can also respond to questions, and may have already addressed issues you raise. The CC community email discussion lists and discussion archives may be useful resources. Finally, you may also want to consult with a lawyer to obtain advice on the best license for your needs. Why should I use the latest version of the Creative Commons licenses? The latest version of the Creative Commons licenses is version 4.0. You should always use the latest version of the Creative Commons licenses in order to take advantage of the many improvements described on the license versions page . In particular, 4.0 is meant to be better suited to international use, and use in many different contexts, including sharing data . What if CC licenses have not been ported to my jurisdiction? All CC licenses are intended to work worldwide. Unless you have a specific reason to use a ported license , we suggest you consider using one of the international licenses. 4.0 will support official translations of the international license for those who wish to use the licenses in another language. As of version 4.0, CC is discouraging ported versions, and has placed a hold on new porting projects following its publication until sometime in 2014. At that point, CC will reevaluate the necessity of porting in the future. Should I choose an international license or a ported license? We recommend that you use a version 4.0 international license. This is the most up-to-date version of our licenses, drafted after broad consultation with our global network of affiliates, and it has been written to be internationally valid. There are currently no ports of 4.0, and it is planned that few, if any, will be created. All of the ported licenses are at version 3.0 or earlier, which means licensors using those licenses do not have the benefit of the improvements made in the 4.0 license suite . But even before considering the improvements in 4.0, there are several reasons why the international licenses may be preferable for rights holders, even if the licenses have been ported to their jurisdiction. As an organization, CC itself licenses all of its own content under an international license because, among other reasons, the international licenses are essentially jurisdiction-neutral while remaining effective globally. The neutral nature of the international licenses appeals to many people and organizations, particularly for use in connection with global projects that transcend political borders. Finally, it is important to know that some of the ported licenses contain a choice of law provision, which may be undesirable for your needs. However, some rights holders still choose a license ported to their local jurisdiction because they believe their needs are not sufficiently met by the international licenses. If the licenses have been ported to your jurisdiction and you feel that the ported licenses better account for some aspect of local legislation, then you may wish to consider a ported license. You can use our jurisdiction database to compare international licenses and ports on these issues and others, such as whether a ported license contains a choice of law or forum selection clause. Why should I use the license chooser? What if I don&#x2019;t? Licensors are not required to use the CC license chooser or provide any information about themselves or their material when applying a CC license to their material. However, using the license chooser enables licensors to take advantage of the &#x201C;machine readable&#x201D; layer of CC licenses. Our machine-readable code enhances the discoverability of your work because that code allows software, search engines, and other tools to recognize when something is licensed under a CC license. The code also facilitates attribution: when users click on the CC button placed on your site, they will be linked directly to HTML code that they can cut and paste to provide attribution. How do I apply a Creative Commons license to my material? For online material : Select the license that is appropriate for your material from the CC license chooser and then follow the instructions to include the HTML code. The code will automatically generate a license button and a statement that your material is licensed under a CC license. If you are only licensing part of a work (for example, if you have created a video under a CC license but are using a song under a different license), be sure to clearly mark which parts are under the CC license and which parts are not. The HTML code will also include metadata, which allows the material to be discovered via Creative Commons-enabled search engines . For offline material : Identify which license you wish to apply to your work and either (a) mark your work with a statement such as, &#x201C;This work is licensed under the Creative Commons [insert description] License. To view a copy of the license, visit [insert url]&#x201D;; or (b) insert the applicable license buttons with the same statement and URL link. For third-party platforms : Many media platforms like Flickr , YouTube , and SoundCloud have built-in Creative Commons capabilities, letting users mark their material with a CC license through their account settings. The benefit of using this functionality is that it allows other people to find your content when searching on those platforms for CC-licensed material . If the platform where you&#x2019;re uploading your content does not support CC licensing, you can still identify your content as CC-licensed in the text description of your content. Legally, these three options are the same. The only difference between applying a CC license offline rather than online is that marking a work online with metadata will ensure that users will be able to find it through CC-enabled search engines. CC offers resources on the best practices for marking your material and on how to mark material in different media (.pdf) . Do I need to register with Creative Commons before I obtain a license? No.&#xA0;CC offers its licenses, code, and tools to the public free of charge, without obligation. You do not need to register with Creative Commons to apply a CC license to your material; it is legally valid as soon as you apply it to any material you have the legal right to license. CC does not require or provide any means for creators or other rights holders to register use of a CC license, nor does CC maintain a database of works distributed under Creative Commons licenses. CC also does not require registration of the work with a national copyright agency. What do the terms and conditions of a CC license apply to? Although CC licenses get attached to tangible works (such as photos and novels), the license terms and conditions apply to the licensor&#x2019;s copyright in the licensed material. The public is granted &#x201C;permission to exercise&#x201D; those rights in any medium or format . It is the expression that is protected by copyright and covered by the licenses, not any particular medium or format in which the expression is manifested. This means, for example, that a CC license applied to a digitized copy of a novel grants the public permission under copyright to use a print version of the same novel on the same terms and conditions (though you may have to purchase the print version from a bookstore). Can I apply a Creative Commons license to software? We recommend against using Creative Commons licenses for software. Instead, we strongly encourage you to use one of the very good software licenses which are already available. We recommend considering licenses listed as free by the Free Software Foundation and listed as &#x201C;open source&#x201D; by the Open Source Initiative . Unlike software-specific licenses, CC licenses do not contain specific terms about the distribution of source code, which is often important to ensuring the free reuse and modifiability of software. Many software licenses also address patent rights, which are important to software but may not be applicable to other copyrightable works. Additionally, our licenses are currently not compatible with the major software licenses, so it would be difficult to integrate CC-licensed work with other free software. Existing software licenses were designed specifically for use with software and offer a similar set of rights to the Creative Commons licenses. Version 4.0 of CC&#x2019;s Attribution-ShareAlike (BY-SA) license is one-way compatible with the GNU General Public License version 3.0 (GPLv3). This compatibility mechanism is designed for situations in which content is integrated into software code in a way that makes it difficult or impossible to distinguish the two. There are special considerations required before using this compatibility mechanism. Read more about it here . Also, the CC0 Public Domain Dedication is GPL-compatible and acceptable for software. For details, see the relevant CC0 FAQ entry . While we recommend against using a CC license on software itself, CC licenses may be used for software documentation, as well as for separate artistic elements such as game art or music. Can I apply a Creative Commons license to databases? Yes. CC licenses can be used on databases . In the 4.0 license suite, applicable sui generis database rights are licensed under the same license conditions as copyright. Many governments and others use CC licenses for data and databases. For more detailed information about how CC licenses apply to data and databases, visit our detailed Data FAQ . Could I use a CC license to share my logo or trademark? Creative Commons does not recommend using a CC license on a logo or trademark. While a logo or trademark can be covered by copyright laws in addition to trademark laws, the special purposes of trademarks make CC licenses an unsuitable mechanism for sharing them in most cases. Generally, logos and trademarks are used to identify the origin of a product or service, or to indicate that it meets a specific standard or quality. Allowing anyone to reuse or modify your logo or trademark as a matter of copyright could result in your inability to limit use of your logo or trademark selectively to accomplish those purposes. Applying a CC license to your trademarks and logos could even result in a loss of your trademark rights altogether. See below for more about how to license material that includes a trademark or logo. There are other ways to share your logos and trademarks widely while preserving your trademark rights. Establishing a trademark policy that grants permissions in advance for limited uses is one common alternative. Mozilla , Wikimedia , and Creative Commons have each published policies that accomplish the dual objectives of encouraging reuse and preserving trademark rights. May I apply a Creative Commons license to a work in the public domain? CC licenses should not be applied to works in the worldwide public domain . All CC licenses are clear that they do not have the effect of placing restrictions on material that would otherwise be unrestricted, and you cannot remove a work from the public domain by applying a CC license to it. If you want to dedicate your own work to the public domain before the expiration of applicable copyright or similar rights, use CC&#x2019;s legally robust public domain dedication . If a work is already in the worldwide public domain, you should mark it with CC&#x2019;s Public Domain Mark . Note that, in some cases, a work may be in the public domain under the copyright laws of some jurisdictions but not others. For example, U.S. government works are in the public domain under the copyright law of the United States, but may be protected by copyright laws in other jurisdictions. A CC license applied to such a work would be effective (and the license restrictions enforceable) in jurisdictions where copyright protection exists, but would not be operative if U.S. copyright law is determined to be the applicable law. Creators may also apply Creative Commons licenses to material they create that are adapted from public domain works, or to remixed material, databases, or collections that include work in the public domain. However, in each of these instances, the license does not affect parts of the work that are unrestricted by copyright or similar rights. We strongly encourage you to mark the public domain material , so that others know they are also free to use this material without legal restriction. If I take a photograph of another work that is in the public domain, can I apply a CC license to my photo? That depends. You can apply a CC license to your photograph if your photograph constitutes a work of original authorship, a question that varies by jurisdiction. As a general matter, your photograph must involve some creative choices, such as background setting, lighting, angle, or other mark of creativity. In the United States, an exact photographic copy of a public domain work is not subject to copyright because there is no originality (even if there is effort or &#x201C;sweat&#x201D; exerted in its creation). In practice, if your photograph is sufficiently creative to attract copyright protection, people will likely have to comply with the license conditions if they reproduce your entire photograph in verbatim form, absent some applicable exception or limitation such as fair use. However, they would not have to comply with the license conditions if they reproduce only those parts of the work in the public domain . This is because your copyright in the adaptation only extends to the material you contributed, not to the underlying work. May I apply a CC license to my work if it incorporates material used under fair use or another exception or limitation to copyright? Yes, but it is important to prominently mark any third party material you incorporate into your work so reusers do not think the CC license applies to that material. The CC license only applies to the rights you have in the work. For example, if your CC-licensed slide deck includes a Flickr image you are using pursuant to fair use, make sure to identify that image as not being subject to the CC license. For more information about incorporating work owned by others, see our page about marking third party content . Read more considerations for licensors here . Rights other than copyright Can I use CC licenses to license rights other than copyright? CC licenses are copyright licenses, but the latest version of CC licenses also cover certain other rights similar to cop
2026-01-13T09:29:56
https://ai.google.dev/api/palm?hl=it
PaLM (decommissioned) &nbsp;|&nbsp; Gemini API &nbsp;|&nbsp; Google AI for Developers Passa ai contenuti principali / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 Recupera chiave API Libro di ricette Community Accedi Documenti Riferimento API Gemini API Documenti Riferimento API Recupera chiave API Libro di ricette Community Panoramica Versioni dell&#39;API Funzionalità Modelli Generazione di contenuti in corso... API Live API Live Music API Interactions Token File API Batch Memorizzazione nella cache Embedding Ricerca di file Archivi di ricerca file Documento Tutti i metodi Ritirato PaLM (ignorato) Riferimenti SDK Python Go TypeScript Java C# Home page Gemini API Riferimento API Invia feedback PaLM (decommissioned) Metodo: models.generateText Endpoint Parametri del percorso Corpo della richiesta Rappresentazione JSON Corpo della risposta Ambiti di autorizzazione Genera una risposta dal modello dato un messaggio di input. Endpoint post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:generateText Parametri del percorso model string Obbligatorio. Il nome di Model o TunedModel da utilizzare per generare il completamento. Esempi: models/text-bison-001 tunedModels/sentence-translator-u3b7m Assume la forma models/{model} . Corpo della richiesta Il corpo della richiesta contiene dati con la seguente struttura: Campi prompt object ( TextPrompt ) Obbligatorio. Il testo di input in formato libero fornito al modello come prompt. Dato un prompt, il modello genera una risposta TextCompletion che prevede come completamento del testo di input. safetySettings[] object ( SafetySetting ) (Facoltativo) Un elenco di istanze SafetySetting uniche per bloccare i contenuti non sicuri. che verranno applicate il giorno GenerateTextRequest.prompt e GenerateTextResponse.candidates . Non deve esserci più di un'impostazione per ogni tipo di SafetyCategory . L'API bloccherà tutti i prompt e le risposte che non soddisfano le soglie impostate da queste impostazioni. Questo elenco sostituisce le impostazioni predefinite per ogni SafetyCategory specificato in safetySettings. Se nell'elenco non è presente SafetySetting per un determinato SafetyCategory , l'API utilizzerà l'impostazione di sicurezza predefinita per quella categoria. Le categorie di contenuti dannosi HARM_CATEGORY_DEROGATORY, HARM_CATEGORY_TOXICITY, HARM_CATEGORY_VIOLENCE, HARM_CATEGORY_SEXUAL, HARM_CATEGORY_MEDICAL, HARM_CATEGORY_DANGEROUS sono supportate nel servizio di testo. stopSequences[] string Il set di sequenze di caratteri (fino a 5) che interromperanno la generazione dell'output. Se specificata, l'API si interromperà alla prima occorrenza di una sequenza di interruzione. La sequenza di fermate non verrà inclusa nella risposta. temperature number (Facoltativo) Controlla la casualità dell'output. Nota: il valore predefinito varia in base al modello. Consulta l'attributo Model.temperature della funzione Model restituita dalla funzione getModel . I valori possono variare da [0.0,1.0], inclusi. Un valore più vicino a 1,0 produrrà risposte più varie e creative, mentre un valore più vicino a 0,0 in genere genererà risposte più dirette da parte del modello. candidateCount integer (Facoltativo) Numero di risposte generate da restituire. Questo valore deve essere compreso tra 1 e 8 inclusi. Se non viene impostato, il valore predefinito è 1. maxOutputTokens integer (Facoltativo) Il numero massimo di token da includere in un candidato. Se non impostato, il valore predefinito sarà outputTokenLimit specificato nella specifica Model . topP number (Facoltativo) La probabilità cumulativa massima dei token da considerare durante il campionamento. Il modello utilizza il campionamento combinato Top-k e nucleus. I token vengono ordinati in base alle probabilità assegnate, in modo che vengano presi in considerazione solo i token più probabili. Il campionamento top-k limita direttamente il numero massimo di token da considerare, mentre il campionamento Nucleus limita il numero di token in base alla probabilità cumulativa. Nota: il valore predefinito varia in base al modello. Consulta l'attributo Model.top_p della funzione Model restituita dalla funzione getModel . topK integer (Facoltativo) Il numero massimo di token da considerare durante il campionamento. Il modello utilizza il campionamento combinato Top-k e nucleus. Il campionamento Top-k considera l'insieme dei topK token più probabili. Il valore predefinito è 40. Nota: il valore predefinito varia in base al modello. Consulta l'attributo Model.top_k della funzione Model restituita dalla funzione getModel . Corpo della risposta In caso di esito positivo, il corpo della risposta contiene un'istanza di GenerateTextResponse . Metodo: models.countTextTokens Endpoint Parametri del percorso Corpo della richiesta Rappresentazione JSON Corpo della risposta Rappresentazione JSON Ambiti di autorizzazione Esegue il tokenizer di un modello su un testo e restituisce il conteggio dei token. Endpoint post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:countTextTokens Parametri del percorso model string Obbligatorio. Il nome della risorsa del modello. che funge da ID da utilizzare per il modello. Questo nome deve corrispondere a un nome di modello restituito dal metodo models.list . Formato: models/{model} . Assume la forma models/{model} . Corpo della richiesta Il corpo della richiesta contiene dati con la seguente struttura: Campi prompt object ( TextPrompt ) Obbligatorio. Il testo di input in formato libero fornito al modello come prompt. Corpo della risposta Una risposta da models.countTextTokens . Restituisce il tokenCount del modello per prompt . In caso di esito positivo, il corpo della risposta contiene dati con la seguente struttura: Campi tokenCount integer Il numero di token in cui model suddivide prompt . Sempre non negativi. Rappresentazione JSON { "tokenCount" : integer } Metodo: models.generateMessage Endpoint Parametri del percorso Corpo della richiesta Rappresentazione JSON Corpo della risposta Rappresentazione JSON Ambiti di autorizzazione Genera una risposta dal modello dato un input MessagePrompt . Endpoint post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:generateMessage Parametri del percorso model string Obbligatorio. Il nome del modello da utilizzare. Formato: name=models/{model} . Assume la forma models/{model} . Corpo della richiesta Il corpo della richiesta contiene dati con la seguente struttura: Campi prompt object ( MessagePrompt ) Obbligatorio. L'input testuale strutturato fornito al modello come prompt. Dato un prompt, il modello restituirà quello che prevede essere il messaggio successivo nella discussione. temperature number (Facoltativo) Controlla la casualità dell'output. I valori possono variare in un intervallo di [0.0,1.0] , inclusi. Un valore più vicino a 1.0 produrrà risposte più varie, mentre un valore più vicino a 0.0 in genere genererà risposte meno sorprendenti da parte del modello. candidateCount integer (Facoltativo) Il numero di messaggi di risposta generati da restituire. Questo valore deve essere compreso tra [1, 8] incluso. Se non viene impostato, il valore predefinito è 1 . topP number (Facoltativo) La probabilità cumulativa massima dei token da considerare durante il campionamento. Il modello utilizza il campionamento combinato Top-k e nucleus. Il campionamento del nucleo considera il più piccolo insieme di token la cui somma di probabilità è almeno topP . topK integer (Facoltativo) Il numero massimo di token da considerare durante il campionamento. Il modello utilizza il campionamento combinato Top-k e nucleus. Il campionamento Top-k considera l'insieme dei topK token più probabili. Corpo della risposta La risposta del modello. Sono inclusi i messaggi dei candidati e la cronologia delle conversazioni sotto forma di messaggi ordinati cronologicamente. In caso di esito positivo, il corpo della risposta contiene dati con la seguente struttura: Campi candidates[] object ( Message ) Messaggi di risposta candidati del modello. messages[] object ( Message ) La cronologia delle conversazioni utilizzata dal modello. filters[] object ( ContentFilter ) Un insieme di metadati di filtraggio dei contenuti per il testo del prompt e della risposta. Indica quali SafetyCategory hanno bloccato un candidato da questa risposta, il HarmProbability più basso che ha attivato un blocco e l'impostazione HarmThreshold per quella categoria. Rappresentazione JSON { "candidates" : [ { object ( Message ) } ] , "messages" : [ { object ( Message ) } ] , "filters" : [ { object ( ContentFilter ) } ] } Metodo: models.countMessageTokens Endpoint Parametri del percorso Corpo della richiesta Rappresentazione JSON Corpo della risposta Rappresentazione JSON Ambiti di autorizzazione Esegue il tokenizer di un modello su una stringa e restituisce il conteggio dei token. Endpoint post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:countMessageTokens Parametri del percorso model string Obbligatorio. Il nome della risorsa del modello. che funge da ID da utilizzare per il modello. Questo nome deve corrispondere a un nome di modello restituito dal metodo models.list . Formato: models/{model} . Assume la forma models/{model} . Corpo della richiesta Il corpo della richiesta contiene dati con la seguente struttura: Campi prompt object ( MessagePrompt ) Obbligatorio. Il prompt di cui deve essere restituito il conteggio dei token. Corpo della risposta Una risposta da models.countMessageTokens . Restituisce il tokenCount del modello per prompt . In caso di esito positivo, il corpo della risposta contiene dati con la seguente struttura: Campi tokenCount integer Il numero di token in cui model suddivide prompt . Sempre non negativi. Rappresentazione JSON { "tokenCount" : integer } Metodo: models.embedText Endpoint Parametri del percorso Corpo della richiesta Rappresentazione JSON Corpo della risposta Rappresentazione JSON Ambiti di autorizzazione Genera un embedding dal modello dato un messaggio di input. Endpoint post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:embedText Parametri del percorso model string Obbligatorio. Il nome del modello da utilizzare con il formato model=models/{model}. Assume la forma models/{model} . Corpo della richiesta Il corpo della richiesta contiene dati con la seguente struttura: Campi text string (Facoltativo) Il testo di input in formato libero che il modello trasformerà in un embedding. Corpo della risposta La risposta a una EmbedTextRequest. In caso di esito positivo, il corpo della risposta contiene dati con la seguente struttura: Campi embedding object ( Embedding ) Solo output. L'incorporamento generato dal testo di input. Rappresentazione JSON { "embedding" : { object ( Embedding ) } } Metodo: models.batchEmbedText Endpoint Parametri del percorso Corpo della richiesta Rappresentazione JSON Corpo della risposta Rappresentazione JSON Ambiti di autorizzazione EmbedTextRequest Rappresentazione JSON Genera più incorporamenti dal modello dato il testo di input in una chiamata sincrona. Endpoint post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:batchEmbedText Parametri del percorso model string Obbligatorio. Il nome di Model da utilizzare per generare l'incorporamento. Esempi: models/embedding-gecko-001 Assume il formato models/{model} . Corpo della richiesta Il corpo della richiesta contiene dati con la seguente struttura: Campi texts[] string (Facoltativo) I testi di input in formato libero che il modello trasformerà in un embedding. Il limite attuale è di 100 testi, oltre il quale verrà generato un errore. requests[] object ( EmbedTextRequest ) (Facoltativo) Incorpora le richieste per il batch. È possibile impostare solo uno tra texts o requests . Corpo della risposta La risposta a una EmbedTextRequest. In caso di esito positivo, il corpo della risposta contiene dati con la seguente struttura: Campi embeddings[] object ( Embedding ) Solo output. Gli incorporamenti generati dal testo di input. Rappresentazione JSON { "embeddings" : [ { object ( Embedding ) } ] } EmbedTextRequest Richiesta per ottenere un embedding di testo dal modello. Campi model string Obbligatorio. Il nome del modello da utilizzare con il formato model=models/{model}. text string (Facoltativo) Il testo di input in formato libero che il modello trasformerà in un embedding. Rappresentazione JSON { "model" : string , "text" : string } ContentFilter Rappresentazione JSON BlockedReason Metadati di filtraggio dei contenuti associati all'elaborazione di una singola richiesta. ContentFilter contiene un motivo e una stringa di supporto facoltativa. Il motivo potrebbe non essere specificato. Campi reason enum ( BlockedReason ) Il motivo per cui i contenuti sono stati bloccati durante l'elaborazione della richiesta. message string Una stringa che descrive in modo più dettagliato il comportamento di filtraggio. Rappresentazione JSON { "reason" : enum ( BlockedReason ) , "message" : string } BlockedReason Un elenco dei motivi per cui i contenuti potrebbero essere stati bloccati. Enum BLOCKED_REASON_UNSPECIFIED Non è stato specificato un motivo di blocco. SAFETY I contenuti sono stati bloccati dalle impostazioni di sicurezza. OTHER I contenuti sono stati bloccati, ma il motivo non è classificato. Incorporamento Rappresentazione JSON Un elenco di numeri in virgola mobile che rappresentano l'incorporamento. Campi value[] number I valori di incorporamento. Rappresentazione JSON { "value" : [ number ] } Messaggio Rappresentazione JSON L'unità di base del testo strutturato. Un Message include un author e il content del Message . Il author viene utilizzato per taggare i messaggi quando vengono inseriti nel modello come testo. Campi author string (Facoltativo) L'autore di questo messaggio. che funge da chiave per taggare i contenuti di questo messaggio quando vengono inseriti nel modello come testo. L'autore può essere qualsiasi stringa alfanumerica. content string Obbligatorio. Il contenuto testuale di Message strutturato. citationMetadata object ( CitationMetadata ) Solo output. Informazioni sulle citazioni per content generato dal modello in questo Message . Se questo Message è stato generato come output dal modello, questo campo potrebbe essere compilato con le informazioni sull'attribuzione per qualsiasi testo incluso in content . Questo campo viene utilizzato solo nell'output. Rappresentazione JSON { "author" : string , "content" : string , "citationMetadata" : { object ( CitationMetadata ) } } MessagePrompt Rappresentazione JSON Esempio Rappresentazione JSON Tutto il testo di input strutturato passato al modello come prompt. Un MessagePrompt contiene un insieme strutturato di campi che forniscono il contesto della conversazione, esempi di coppie di messaggi di input dell'utente/output del modello che preparano il modello a rispondere in modi diversi e la cronologia della conversazione o l'elenco dei messaggi che rappresentano i turni alternati della conversazione tra l'utente e il modello. Campi context string (Facoltativo) Testo che deve essere fornito per primo al modello per basare la risposta. Se non è vuoto, questo context verrà fornito prima al modello, prima di examples e messages . Quando utilizzi un context , assicurati di fornirlo con ogni richiesta per mantenere la continuità. Questo campo può contenere una descrizione del prompt per il modello, in modo da fornire contesto e guidare le risposte. Esempi: "Traduci la frase dall'inglese al francese" o "Data un'affermazione, classifica il sentimento come felice, triste o neutro". Qualsiasi elemento incluso in questo campo avrà la precedenza sulla cronologia dei messaggi se le dimensioni totali dell'input superano il valore inputTokenLimit del modello e la richiesta di input viene troncata. examples[] object ( Example ) (Facoltativo) Esempi di ciò che il modello deve generare. Sono inclusi sia l'input dell'utente sia la risposta che il modello deve emulare. Questi examples vengono trattati in modo identico ai messaggi della conversazione, tranne per il fatto che hanno la precedenza sulla cronologia in messages : se le dimensioni totali dell'input superano il inputTokenLimit del modello, l'input verrà troncato. Gli articoli verranno eliminati da messages prima del giorno examples . messages[] object ( Message ) Obbligatorio. Uno snapshot della cronologia delle conversazioni recenti ordinata cronologicamente. I turni si alternano tra due autori. Se le dimensioni totali dell'input superano inputTokenLimit del modello, l'input verrà troncato: gli elementi più vecchi verranno eliminati da messages . Rappresentazione JSON { "context" : string , "examples" : [ { object ( Example ) } ] , "messages" : [ { object ( Message ) } ] } Esempio Un esempio di input/output utilizzato per istruire il modello. Mostra come il modello dovrebbe rispondere o formattare la risposta. Campi input object ( Message ) Obbligatorio. Un esempio di input Message dell'utente. output object ( Message ) Obbligatorio. Un esempio di ciò che il modello dovrebbe restituire dato l'input. Rappresentazione JSON { "input" : { object ( Message ) } , "output" : { object ( Message ) } } GenerateTextResponse Rappresentazione JSON TextCompletion Rappresentazione JSON SafetyFeedback Rappresentazione JSON La risposta del modello, inclusi i completamenti candidati. Campi candidates[] object ( TextCompletion ) Risposte candidate del modello. filters[] object ( ContentFilter ) Un insieme di metadati di filtraggio dei contenuti per il testo del prompt e della risposta. Indica quali SafetyCategory hanno bloccato un candidato da questa risposta, il HarmProbability più basso che ha attivato un blocco e l'impostazione HarmThreshold per quella categoria. Indica la più piccola modifica al SafetySettings necessaria per sbloccare almeno una risposta. Il blocco viene configurato da SafetySettings nella richiesta (o da SafetySettings predefinito dell'API). safetyFeedback[] object ( SafetyFeedback ) Restituisce eventuali feedback sulla sicurezza relativi al filtro dei contenuti. Rappresentazione JSON { "candidates" : [ { object ( TextCompletion ) } ] , "filters" : [ { object ( ContentFilter ) } ] , "safetyFeedback" : [ { object ( SafetyFeedback ) } ] } TextCompletion Testo di output restituito da un modello. Campi output string Solo output. Il testo generato restituito dal modello. safetyRatings[] object ( SafetyRating ) Valutazioni della sicurezza di una risposta. È presente al massimo una classificazione per categoria. citationMetadata object ( CitationMetadata ) Solo output. Informazioni sulle citazioni per output generato dal modello in questo TextCompletion . Questo campo può essere compilato con le informazioni sull'attribuzione per qualsiasi testo incluso in output . Rappresentazione JSON { "output" : string , "safetyRatings" : [ { object ( SafetyRating ) } ] , "citationMetadata" : { object ( CitationMetadata ) } } SafetyFeedback Feedback sulla sicurezza per un'intera richiesta. Questo campo viene compilato se i contenuti nell'input e/o nella risposta vengono bloccati a causa delle impostazioni di sicurezza. SafetyFeedback potrebbe non esistere per ogni HarmCategory. Ogni SafetyFeedback restituirà le impostazioni di sicurezza utilizzate dalla richiesta, nonché la probabilità di danno più bassa che deve essere consentita per restituire un risultato. Campi rating object ( SafetyRating ) Valutazione della sicurezza valutata in base ai contenuti. setting object ( SafetySetting ) Impostazioni di sicurezza applicate alla richiesta. Rappresentazione JSON { "rating" : { object ( SafetyRating ) } , "setting" : { object ( SafetySetting ) } } TextPrompt Rappresentazione JSON Testo fornito al modello come prompt. Il modello utilizzerà questo TextPrompt per generare il completamento del testo. Campi text string Obbligatorio. Il testo del prompt. Rappresentazione JSON { "text" : string } Invia feedback Salvo quando diversamente specificato, i contenuti di questa pagina sono concessi in base alla licenza Creative Commons Attribution 4.0 , mentre gli esempi di codice sono concessi in base alla licenza Apache 2.0 . Per ulteriori dettagli, consulta le norme del sito di Google Developers . Java è un marchio registrato di Oracle e/o delle sue consociate. Ultimo aggiornamento 2025-07-24 UTC. Vuoi dirci altro? [[["Facile da capire","easyToUnderstand","thumb-up"],["Il problema è stato risolto","solvedMyProblem","thumb-up"],["Altra","otherUp","thumb-up"]],[["Mancano le informazioni di cui ho bisogno","missingTheInformationINeed","thumb-down"],["Troppo complicato/troppi passaggi","tooComplicatedTooManySteps","thumb-down"],["Obsoleti","outOfDate","thumb-down"],["Problema di traduzione","translationIssue","thumb-down"],["Problema relativo a esempi/codice","samplesCodeIssue","thumb-down"],["Altra","otherDown","thumb-down"]],["Ultimo aggiornamento 2025-07-24 UTC."],[],[]] Termini Privacy Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:56
https://www.androidauthority.com/chromebooks-google-play-store-android-device-manager-708363/feed
Android Authority: Tech Reviews, News, Buyer&#x27;s Guides, Deals, How-To Search results for All search results Best daily deals Login Affiliate links on Android Authority may earn us a commission. Learn more. Features I never expected an AI app to replace my keyboard, but I was wrong Karandeep Singh • 0 News Galaxy S25 series is doing something Samsung phones almost never do Adamya Sharma • 0 News Google Photos may finally add a long-awaited video playback feature Aamir Siddiqui • 0 Top stories 1 Features Best of CES 2026: Android Authority’s top products from the show! Bogdan Petrovan 0 2 Promoted 10 of the coolest tech products we saw at CES 2026 3 Promoted The technology that finally gave robot lawn mowers their autonomy 4 Promoted Beatbot’s AquaSense X shows how far robotic pool care has come at CES 2026 5 Promoted CES 2026: Segway Navimow’s latest robotic lawn mowers are “drop and mow” ready News Features Latest deals Latest poll Reviews From our Partners Our videos Subscribe to our newsletter Guides What&#x27;s coming next? Apps Authority Insights In case you missed it More news Andy Walker January 5, 2026 0 5 of the best new Android apps you need to try this January Top settings to tweak on your portable projector for streaming sports Kaitlyn Cimino December 24, 2025 0 My 18 favorite Android apps of 2025 Andy Walker December 23, 2025 0 No time, no problem: 5 last-minute digital gifts that actually feel personal Mitja Rutnik December 22, 2025 0 Watching video on Android Auto is far more complicated than it should be Andy Walker December 21, 2025 0 Apple confirms: Gemini will power a new and improved Siri this year Taylor Kerns 15 hours ago 0 Amazon is forcibly upgrading Prime members to Alexa Plus, and users are not happy Ryan McNeal 15 hours ago 0 Anker SOLIX&#x27;s new power backup system merges renewable and fossil fuel power for the best results Tushar Mehta 15 hours ago 0 T-Mobile will soon start using holograms to sell you Samsung Galaxy devices Ryan McNeal 17 hours ago 0 As fans threaten a boycott, AYANEO reveals a &#x27;Service Improvement Plan&#x27; to turn things around Nick Fernandez 18 hours ago 0 Apple beat Samsung to be the top phone seller in the world, and here&#x27;s why Matt Horne 19 hours ago 0 Galaxy Z Flip 8 camera specs might look a little too familiar Aamir Siddiqui 20 hours ago 0 Microsoft sets a final date to kill off its beloved Lens PDF Scanner Aamir Siddiqui 21 hours ago 0 PSA: Here&#x27;s why you shouldn&#x27;t let strangers with smart glasses use your phone Hadlee Simons 21 hours ago 0 We asked if YouTube&#x27;s unskippable ads have gone too far, and readers didn&#x27;t hold back Adamya Sharma 23 hours ago 0 Load more
2026-01-13T09:29:56
https://ai.google.dev/api/palm?hl=th
PaLM (decommissioned) &nbsp;|&nbsp; Gemini API &nbsp;|&nbsp; Google AI for Developers ข้ามไปที่เนื้อหาหลัก / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 รับคีย์ API ตำราอาหาร ชุมชน ลงชื่อเข้าใช้ เอกสาร การอ้างอิง API Gemini API เอกสาร การอ้างอิง API รับคีย์ API ตำราอาหาร ชุมชน ภาพรวม เวอร์ชัน API ความสามารถ โมเดล กำลังสร้างเนื้อหา API ที่เผยแพร่อยู่ Live Music API Interactions API โทเค็น ไฟล์ Batch API การแคช การฝัง ค้นหาไฟล์ ร้านค้าที่ค้นหาไฟล์ เอกสาร ทุกวิธี เลิกใช้งานแล้ว PaLM (แยกส่วน) การอ้างอิง SDK Python Go TypeScript Java C# หน้าแรก Gemini API การอ้างอิง API ส่งความคิดเห็น PaLM (decommissioned) เมธอด: models.generateText ปลายทาง พารามิเตอร์เส้นทาง เนื้อความของคำขอ การแสดง JSON เนื้อหาการตอบกลับ ขอบเขตการให้สิทธิ์ สร้างคำตอบจากโมเดลเมื่อได้รับข้อความอินพุต ปลายทาง post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:generateText พารามิเตอร์เส้นทาง model string ต้องระบุ ชื่อของ Model หรือ TunedModel ที่จะใช้ในการสร้างข้อความที่สมบูรณ์ ตัวอย่าง: models/text-bison-001 tunedModels/sentence-translator-u3b7m โดยจะอยู่ในรูปแบบ models/{model} เนื้อความของคำขอ เนื้อหาของคำขอมีข้อมูลซึ่งมีโครงสร้างดังต่อไปนี้ ฟิลด์ prompt object ( TextPrompt ) ต้องระบุ ข้อความอินพุตรูปแบบอิสระที่ป้อนให้กับโมเดลเป็นพรอมต์ เมื่อได้รับพรอมต์ โมเดลจะสร้างการตอบกลับ TextCompletion ที่คาดการณ์ว่าเป็นการเติมข้อความที่ป้อน safetySettings[] object ( SafetySetting ) ไม่บังคับ รายการ SafetySetting อินสแตนซ์ที่ไม่ซ้ำกันสำหรับการบล็อกเนื้อหาที่ไม่ปลอดภัย ซึ่งจะมีผลบังคับใช้กับ GenerateTextRequest.prompt และ GenerateTextResponse.candidates ไม่ควรมีการตั้งค่ามากกว่า 1 รายการสำหรับ SafetyCategory แต่ละประเภท API จะบล็อกพรอมต์และการตอบกลับที่ไม่เป็นไปตามเกณฑ์ที่กำหนดโดยการตั้งค่าเหล่านี้ รายการนี้จะลบล้างการตั้งค่าเริ่มต้นสำหรับแต่ละรายการที่ SafetyCategory ระบุไว้ใน safetySettings หากไม่มี SafetySetting สำหรับ SafetyCategory ที่ระบุในรายการ API จะใช้การตั้งค่าความปลอดภัยเริ่มต้นสำหรับหมวดหมู่นั้น ระบบรองรับหมวดหมู่ที่เป็นอันตราย HARM_CATEGORY_DEROGATORY, HARM_CATEGORY_TOXICITY, HARM_CATEGORY_VIOLENCE, HARM_CATEGORY_SEXUAL, HARM_CATEGORY_MEDICAL, HARM_CATEGORY_DANGEROUS ในบริการข้อความ stopSequences[] string ชุดลำดับอักขระ (สูงสุด 5 รายการ) ที่จะหยุดการสร้างเอาต์พุต หากระบุไว้ API จะหยุดที่ลำดับหยุดแรกที่ปรากฏ ระบบจะไม่รวมลำดับการหยุดเป็นส่วนหนึ่งของคำตอบ temperature number ไม่บังคับ ควบคุมความสุ่มของเอาต์พุต หมายเหตุ: ค่าเริ่มต้นจะแตกต่างกันไปตามรุ่น โปรดดูแอตทริบิวต์ Model.temperature ของ Model ที่แสดงผลโดยฟังก์ชัน getModel ค่าที่ใช้ได้อยู่ในช่วง [0.0,1.0] ค่าที่ใกล้เคียงกับ 1.0 จะสร้างคำตอบที่หลากหลายและสร้างสรรค์มากขึ้น ในขณะที่ค่าที่ใกล้เคียงกับ 0.0 โดยทั่วไปจะทำให้โมเดลสร้างคำตอบที่ตรงไปตรงมามากขึ้น candidateCount integer ไม่บังคับ จำนวนคำตอบที่สร้างขึ้นที่จะแสดงผล ค่านี้ต้องอยู่ระหว่าง [1, 8] (รวมค่าแรกและค่าสุดท้าย) หากไม่ได้ตั้งค่าไว้ ระบบจะใช้ค่าเริ่มต้นเป็น 1 maxOutputTokens integer ไม่บังคับ จำนวนโทเค็นสูงสุดที่จะรวมไว้ในคำตอบ หากไม่ได้ตั้งค่าไว้ ระบบจะใช้ค่าเริ่มต้นเป็น outputTokenLimit ที่ระบุไว้ในข้อกำหนด Model topP number ไม่บังคับ ความน่าจะเป็นสะสมสูงสุดของโทเค็นที่ต้องพิจารณาเมื่อทำการสุ่มตัวอย่าง โมเดลใช้การรวมการสุ่มตัวอย่าง Top-k และนิวเคลียส ระบบจะจัดเรียงโทเค็นตามความน่าจะเป็นที่กำหนด เพื่อให้พิจารณาเฉพาะโทเค็นที่มีแนวโน้มมากที่สุด การสุ่มตัวอย่าง Top-k จะจำกัดจำนวนโทเค็นสูงสุดที่จะพิจารณาโดยตรง ในขณะที่การสุ่มตัวอย่างนิวเคลียสจะจำกัดจำนวนโทเค็นตามความน่าจะเป็นสะสม หมายเหตุ: ค่าเริ่มต้นจะแตกต่างกันไปตามรุ่น โปรดดูแอตทริบิวต์ Model.top_p ของ Model ที่แสดงผลโดยฟังก์ชัน getModel topK integer ไม่บังคับ จำนวนโทเค็นสูงสุดที่ต้องพิจารณาเมื่อทำการสุ่มตัวอย่าง โมเดลใช้การรวมการสุ่มตัวอย่าง Top-k และนิวเคลียส การสุ่มตัวอย่าง Top-k จะพิจารณาชุดโทเค็นที่มี topK ความน่าจะเป็นสูงสุด ค่าเริ่มต้นคือ 40 หมายเหตุ: ค่าเริ่มต้นจะแตกต่างกันไปตามรุ่น โปรดดูแอตทริบิวต์ Model.top_k ของ Model ที่แสดงผลโดยฟังก์ชัน getModel เนื้อหาการตอบกลับ หากทำสำเร็จ เนื้อหาการตอบกลับจะมีอินสแตนซ์ GenerateTextResponse เมธอด: models.countTextTokens ปลายทาง พารามิเตอร์เส้นทาง เนื้อความของคำขอ การแสดง JSON เนื้อหาการตอบกลับ การแสดง JSON ขอบเขตการให้สิทธิ์ เรียกใช้โทเค็นไนเซอร์ของโมเดลในข้อความและแสดงผลจำนวนโทเค็น ปลายทาง post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:countTextTokens พารามิเตอร์เส้นทาง model string ต้องระบุ ชื่อทรัพยากรของโมเดล ซึ่งจะใช้เป็นรหัสเพื่อให้โมเดลใช้ ชื่อนี้ควรตรงกับชื่อโมเดลที่เมธอด models.list แสดงผล รูปแบบ: models/{model} มีรูปแบบเป็น models/{model} เนื้อความของคำขอ เนื้อหาของคำขอมีข้อมูลซึ่งมีโครงสร้างดังต่อไปนี้ ฟิลด์ prompt object ( TextPrompt ) ต้องระบุ ข้อความอินพุตรูปแบบอิสระที่ป้อนให้กับโมเดลเป็นพรอมต์ เนื้อหาการตอบกลับ คำตอบจาก models.countTextTokens โดยจะแสดง tokenCount ของโมเดลสำหรับ prompt หากทำสำเร็จ เนื้อหาการตอบกลับจะมีข้อมูลซึ่งมีโครงสร้างดังต่อไปนี้ ฟิลด์ tokenCount integer จำนวนโทเค็นที่โทเค็น model โทเค็น prompt เป็นค่าที่ไม่เป็นลบเสมอ การแสดง JSON { "tokenCount" : integer } เมธอด: models.generateMessage ปลายทาง พารามิเตอร์เส้นทาง เนื้อความของคำขอ การแสดง JSON เนื้อหาการตอบกลับ การแสดง JSON ขอบเขตการให้สิทธิ์ สร้างคำตอบจากโมเดลเมื่อได้รับอินพุต MessagePrompt ปลายทาง post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:generateMessage พารามิเตอร์เส้นทาง model string ต้องระบุ ชื่อของโมเดลที่จะใช้ รูปแบบ: name=models/{model} ซึ่งจะอยู่ในรูปแบบ models/{model} เนื้อความของคำขอ เนื้อหาของคำขอมีข้อมูลซึ่งมีโครงสร้างดังต่อไปนี้ ฟิลด์ prompt object ( MessagePrompt ) ต้องระบุ อินพุตข้อความที่มีโครงสร้างซึ่งป้อนให้กับโมเดลเป็นพรอมต์ เมื่อได้รับพรอมต์ โมเดลจะแสดงข้อความที่คาดการณ์ว่าจะเป็นข้อความถัดไปในการสนทนา temperature number ไม่บังคับ ควบคุมความสุ่มของเอาต์พุต ค่าที่ใช้ได้อยู่ในช่วง [0.0,1.0] ค่าที่ใกล้เคียงกับ 1.0 จะสร้างคำตอบที่หลากหลายมากขึ้น ในขณะที่ค่าที่ใกล้เคียงกับ 0.0 โดยทั่วไปจะทำให้โมเดลสร้างคำตอบที่น่าประหลาดใจน้อยลง candidateCount integer ไม่บังคับ จำนวนข้อความตอบกลับที่สร้างขึ้นที่จะแสดงผล ค่านี้ต้องอยู่ระหว่าง [1, 8] โดยรวม หากไม่ได้ตั้งค่าไว้ ระบบจะใช้ 1 เป็นค่าเริ่มต้น topP number ไม่บังคับ ความน่าจะเป็นสะสมสูงสุดของโทเค็นที่ต้องพิจารณาเมื่อทำการสุ่มตัวอย่าง โมเดลใช้การรวมการสุ่มตัวอย่าง Top-k และนิวเคลียส การสุ่มตัวอย่างนิวเคลียสจะพิจารณาชุดโทเค็นที่เล็กที่สุดซึ่งมีผลรวมความน่าจะเป็นอย่างน้อย topP topK integer ไม่บังคับ จำนวนโทเค็นสูงสุดที่ต้องพิจารณาเมื่อทำการสุ่มตัวอย่าง โมเดลใช้การรวมการสุ่มตัวอย่าง Top-k และนิวเคลียส การสุ่มตัวอย่าง Top-k จะพิจารณาชุดโทเค็นที่มี topK ความน่าจะเป็นสูงสุด เนื้อหาการตอบกลับ คำตอบจากโมเดล ซึ่งรวมถึงข้อความของผู้สมัครและประวัติการสนทนาในรูปแบบของข้อความที่เรียงตามลำดับเวลา หากทำสำเร็จ เนื้อหาการตอบกลับจะมีข้อมูลซึ่งมีโครงสร้างดังต่อไปนี้ ฟิลด์ candidates[] object ( Message ) ข้อความตอบกลับของผู้สมัครจากโมเดล messages[] object ( Message ) ประวัติการสนทนาที่โมเดลใช้ filters[] object ( ContentFilter ) ชุดข้อมูลเมตาการกรองเนื้อหาสำหรับข้อความพรอมต์และคำตอบ ซึ่งจะระบุ SafetyCategory ที่บล็อกผู้สมัครจากการตอบกลับนี้ HarmProbability ต่ำสุดที่ทริกเกอร์การบล็อก และการตั้งค่า HarmThreshold สำหรับหมวดหมู่นั้น การแสดง JSON { "candidates" : [ { object ( Message ) } ] , "messages" : [ { object ( Message ) } ] , "filters" : [ { object ( ContentFilter ) } ] } เมธอด: models.countMessageTokens ปลายทาง พารามิเตอร์เส้นทาง เนื้อความของคำขอ การแสดง JSON เนื้อหาการตอบกลับ การแสดง JSON ขอบเขตการให้สิทธิ์ เรียกใช้โทเค็นไนเซอร์ของโมเดลในสตริงและแสดงผลจำนวนโทเค็น ปลายทาง post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:countMessageTokens พารามิเตอร์เส้นทาง model string ต้องระบุ ชื่อทรัพยากรของโมเดล ซึ่งจะใช้เป็นรหัสเพื่อให้โมเดลใช้ ชื่อนี้ควรตรงกับชื่อโมเดลที่เมธอด models.list แสดงผล รูปแบบ: models/{model} มีรูปแบบเป็น models/{model} เนื้อความของคำขอ เนื้อหาของคำขอมีข้อมูลซึ่งมีโครงสร้างดังต่อไปนี้ ฟิลด์ prompt object ( MessagePrompt ) ต้องระบุ พรอมต์ที่จะแสดงจำนวนโทเค็น เนื้อหาการตอบกลับ คำตอบจาก models.countMessageTokens โดยจะแสดง tokenCount ของโมเดลสำหรับ prompt หากทำสำเร็จ เนื้อหาการตอบกลับจะมีข้อมูลซึ่งมีโครงสร้างดังต่อไปนี้ ฟิลด์ tokenCount integer จำนวนโทเค็นที่โทเค็น model โทเค็น prompt เป็นค่าที่ไม่เป็นลบเสมอ การแสดง JSON { "tokenCount" : integer } เมธอด: models.embedText ปลายทาง พารามิเตอร์เส้นทาง เนื้อความของคำขอ การแสดง JSON เนื้อหาการตอบกลับ การแสดง JSON ขอบเขตการให้สิทธิ์ สร้างการฝังจากโมเดลเมื่อได้รับข้อความอินพุต ปลายทาง post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:embedText พารามิเตอร์เส้นทาง model string ต้องระบุ ชื่อโมเดลที่จะใช้กับรูปแบบ model=models/{model} ซึ่งจะอยู่ในรูปแบบ models/{model} เนื้อความของคำขอ เนื้อหาของคำขอมีข้อมูลซึ่งมีโครงสร้างดังต่อไปนี้ ฟิลด์ text string ไม่บังคับ ข้อความอินพุตแบบอิสระที่โมเดลจะเปลี่ยนเป็น Embedding เนื้อหาการตอบกลับ การตอบกลับ EmbedTextRequest หากทำสำเร็จ เนื้อหาการตอบกลับจะมีข้อมูลซึ่งมีโครงสร้างดังต่อไปนี้ ฟิลด์ embedding object ( Embedding ) เอาต์พุตเท่านั้น การฝังที่สร้างจากข้อความอินพุต การแสดง JSON { "embedding" : { object ( Embedding ) } } เมธอด: models.batchEmbedText ปลายทาง พารามิเตอร์เส้นทาง เนื้อความของคำขอ การแสดง JSON เนื้อหาการตอบกลับ การแสดง JSON ขอบเขตการให้สิทธิ์ EmbedTextRequest การแสดง JSON สร้างการฝังหลายรายการจากโมเดลโดยใช้ข้อความอินพุตในการเรียกแบบซิงโครนัส ปลายทาง post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:batchEmbedText พารามิเตอร์เส้นทาง model string ต้องระบุ ชื่อของ Model ที่จะใช้ในการสร้างการฝัง ตัวอย่าง: models/embedding-gecko-001 โดยจะอยู่ในรูปแบบ models/{model} เนื้อความของคำขอ เนื้อหาของคำขอมีข้อมูลซึ่งมีโครงสร้างดังต่อไปนี้ ฟิลด์ texts[] string ไม่บังคับ ข้อความอินพุตแบบอิสระที่โมเดลจะเปลี่ยนเป็น Embedding ปัจจุบันจำกัดไว้ที่ 100 ข้อความ หากเกินกว่านี้ ระบบจะแสดงข้อผิดพลาด requests[] object ( EmbedTextRequest ) ไม่บังคับ ฝังคำขอสำหรับกลุ่ม ตั้งค่าได้เพียง texts หรือ requests อย่างใดอย่างหนึ่งเท่านั้น เนื้อหาการตอบกลับ การตอบกลับ EmbedTextRequest หากทำสำเร็จ เนื้อหาการตอบกลับจะมีข้อมูลซึ่งมีโครงสร้างดังต่อไปนี้ ฟิลด์ embeddings[] object ( Embedding ) เอาต์พุตเท่านั้น การฝังที่สร้างจากข้อความอินพุต การแสดง JSON { "embeddings" : [ { object ( Embedding ) } ] } EmbedTextRequest ขอรับการฝังข้อความจากโมเดล ฟิลด์ model string ต้องระบุ ชื่อโมเดลที่จะใช้กับรูปแบบ model=models/{model} text string ไม่บังคับ ข้อความอินพุตแบบอิสระที่โมเดลจะเปลี่ยนเป็น Embedding การแสดง JSON { "model" : string , "text" : string } ContentFilter การแสดง JSON BlockedReason ข้อมูลเมตาการกรองเนื้อหาที่เชื่อมโยงกับการประมวลผลคำขอเดียว ContentFilter มีเหตุผลและสตริงเสริมที่ไม่บังคับ โดยอาจไม่ได้ระบุเหตุผล ฟิลด์ reason enum ( BlockedReason ) เหตุผลที่เนื้อหาถูกบล็อกระหว่างการประมวลผลคำขอ message string สตริงที่อธิบายลักษณะการกรองโดยละเอียด การแสดง JSON { "reason" : enum ( BlockedReason ) , "message" : string } BlockedReason รายการเหตุผลที่ระบบอาจบล็อกเนื้อหา Enum BLOCKED_REASON_UNSPECIFIED ไม่ได้ระบุเหตุผลที่ถูกบล็อก SAFETY การตั้งค่าความปลอดภัยบล็อกเนื้อหา OTHER เนื้อหาถูกบล็อก แต่ไม่ได้ระบุเหตุผล การฝัง การแสดง JSON รายการของจำนวนทศนิยมที่แสดงการฝัง ฟิลด์ value[] number ค่าการฝัง การแสดง JSON { "value" : [ number ] } ข้อความ การแสดง JSON หน่วยพื้นฐานของข้อความที่มีโครงสร้าง Message ประกอบด้วย author และ content ของ Message author ใช้เพื่อติดแท็กข้อความเมื่อป้อนข้อความลงในโมเดล ฟิลด์ author string ไม่บังคับ ผู้เขียนข้อความนี้ ซึ่งจะเป็นคีย์สำหรับการติดแท็กเนื้อหาของข้อความนี้เมื่อป้อนไปยังโมเดลเป็นข้อความ ผู้เขียนอาจเป็นสตริงที่มีตัวอักษรและตัวเลขคละกัน content string ต้องระบุ เนื้อหาข้อความของ Message ที่มีโครงสร้าง citationMetadata object ( CitationMetadata ) เอาต์พุตเท่านั้น ข้อมูลการอ้างอิงสำหรับ content ที่โมเดลสร้างขึ้น Message หาก Message นี้สร้างขึ้นเป็นเอาต์พุตจากโมเดล ระบบอาจป้อนข้อมูลการระบุแหล่งที่มาสำหรับข้อความใดๆ ที่รวมอยู่ใน content ลงในช่องนี้ ฟิลด์นี้ใช้ในเอาต์พุตเท่านั้น การแสดง JSON { "author" : string , "content" : string , "citationMetadata" : { object ( CitationMetadata ) } } MessagePrompt การแสดง JSON ตัวอย่าง การแสดง JSON ข้อความอินพุตที่มีโครงสร้างทั้งหมดจะส่งไปยังโมเดลเป็นพรอมต์ MessagePrompt ประกอบด้วยชุดฟิลด์ที่มีโครงสร้างซึ่งให้บริบทสำหรับการสนทนา ตัวอย่างคู่ข้อความอินพุตของผู้ใช้/เอาต์พุตของโมเดลที่เตรียมโมเดลให้ตอบสนองในรูปแบบต่างๆ และประวัติการสนทนาหรือรายการข้อความที่แสดงถึงการสนทนาสลับกันระหว่างผู้ใช้กับโมเดล ฟิลด์ context string ไม่บังคับ ข้อความที่ควรระบุให้กับโมเดลก่อนเพื่ออ้างอิงคำตอบ หากไม่ว่างเปล่า ระบบจะส่ง context นี้ไปยังโมเดลก่อน examples และ messages เมื่อใช้ context โปรดระบุในคำขอทุกครั้งเพื่อรักษาความต่อเนื่อง ฟิลด์นี้อาจเป็นคำอธิบายของพรอมต์ที่คุณป้อนให้กับโมเดลเพื่อช่วยให้บริบทและเป็นแนวทางในการตอบกลับ ตัวอย่างเช่น "แปลวลีจากภาษาอังกฤษเป็นภาษาฝรั่งเศส" หรือ "เมื่อได้รับข้อความ ให้จัดประเภทความรู้สึกเป็นมีความสุข เศร้า หรือเป็นกลาง" ข้อมูลใดก็ตามที่รวมอยู่ในช่องนี้จะมีลำดับความสำคัญเหนือกว่าประวัติข้อความ หากขนาดอินพุตทั้งหมดเกิน inputTokenLimit ของโมเดลและระบบตัดคำขออินพุต examples[] object ( Example ) ไม่บังคับ ตัวอย่างสิ่งที่โมเดลควรสร้าง ซึ่งรวมถึงอินพุตของผู้ใช้และการตอบกลับที่โมเดลควรเลียนแบบ examples เหล่านี้จะได้รับการปฏิบัติเช่นเดียวกับข้อความการสนทนา ยกเว้นว่าจะมีลำดับความสำคัญเหนือประวัติใน messages : หากขนาดอินพุตทั้งหมดเกิน inputTokenLimit ของโมเดล ระบบจะตัดอินพุต ระบบจะนำรายการออกจาก messages ก่อน examples messages[] object ( Message ) ต้องระบุ สแนปชอตของประวัติการสนทนาล่าสุดที่จัดเรียงตามลำดับเวลา โดยผู้เขียน 2 คนจะสลับกันเขียน หากขนาดอินพุตทั้งหมดเกิน inputTokenLimit ของโมเดล ระบบจะตัดอินพุต โดยจะนำรายการที่เก่าที่สุดออกจาก messages การแสดง JSON { "context" : string , "examples" : [ { object ( Example ) } ] , "messages" : [ { object ( Message ) } ] } ตัวอย่าง ตัวอย่างอินพุต/เอาต์พุตที่ใช้เพื่อสั่งให้โมเดลทำงาน ซึ่งจะแสดงให้เห็นว่าโมเดลควรตอบกลับหรือจัดรูปแบบคำตอบอย่างไร ฟิลด์ input object ( Message ) ต้องระบุ ตัวอย่างอินพุต Message จากผู้ใช้ output object ( Message ) ต้องระบุ ตัวอย่างสิ่งที่โมเดลควรแสดงเมื่อได้รับอินพุต การแสดง JSON { "input" : { object ( Message ) } , "output" : { object ( Message ) } } GenerateTextResponse การแสดง JSON TextCompletion การแสดง JSON SafetyFeedback การแสดง JSON คำตอบจากโมเดล รวมถึงการเติมข้อความที่เป็นไปได้ ฟิลด์ candidates[] object ( TextCompletion ) คำตอบที่เป็นตัวเลือกจากโมเดล filters[] object ( ContentFilter ) ชุดข้อมูลเมตาการกรองเนื้อหาสำหรับข้อความพรอมต์และคำตอบ ซึ่งจะระบุ SafetyCategory ที่บล็อกผู้สมัครจากการตอบกลับนี้ HarmProbability ต่ำสุดที่ทริกเกอร์การบล็อก และการตั้งค่า HarmThreshold สำหรับหมวดหมู่นั้น ซึ่งแสดงถึงการเปลี่ยนแปลงที่เล็กที่สุดใน SafetySettings ที่จำเป็นต่อการเลิกบล็อกการตอบกลับอย่างน้อย 1 รายการ SafetySettings ในคำขอ (หรือ SafetySettings เริ่มต้นของ API) จะกำหนดค่าการบล็อก safetyFeedback[] object ( SafetyFeedback ) แสดงความคิดเห็นด้านความปลอดภัยที่เกี่ยวข้องกับการกรองเนื้อหา การแสดง JSON { "candidates" : [ { object ( TextCompletion ) } ] , "filters" : [ { object ( ContentFilter ) } ] , "safetyFeedback" : [ { object ( SafetyFeedback ) } ] } TextCompletion ข้อความเอาต์พุตที่โมเดลแสดงผล ฟิลด์ output string เอาต์พุตเท่านั้น ข้อความที่สร้างขึ้นซึ่งส่งคืนจากโมเดล safetyRatings[] object ( SafetyRating ) คะแนนความปลอดภัยของคำตอบ มีการจัดประเภทได้สูงสุด 1 รายการต่อหมวดหมู่ citationMetadata object ( CitationMetadata ) เอาต์พุตเท่านั้น ข้อมูลการอ้างอิงสำหรับ output ที่โมเดลสร้างขึ้น TextCompletion ช่องนี้อาจมีข้อมูลการระบุแหล่งที่มาสำหรับข้อความใดๆ ที่รวมอยู่ใน output การแสดง JSON { "output" : string , "safetyRatings" : [ { object ( SafetyRating ) } ] , "citationMetadata" : { object ( CitationMetadata ) } } SafetyFeedback ความคิดเห็นด้านความปลอดภัยสำหรับคำขอทั้งหมด ระบบจะป้อนข้อมูลในช่องนี้หากเนื้อหาในอินพุตและ/หรือการตอบกลับถูกบล็อกเนื่องจากการตั้งค่าความปลอดภัย SafetyFeedback อาจไม่มีสำหรับ HarmCategory บางรายการ SafetyFeedback แต่ละรายการจะแสดงการตั้งค่าความปลอดภัยที่คำขอใช้ รวมถึง HarmProbability ต่ำสุดที่ควรอนุญาตเพื่อแสดงผลลัพธ์ ฟิลด์ rating object ( SafetyRating ) คะแนนความปลอดภัยที่ประเมินจากเนื้อหา setting object ( SafetySetting ) การตั้งค่าความปลอดภัยที่ใช้กับคำขอ การแสดง JSON { "rating" : { object ( SafetyRating ) } , "setting" : { object ( SafetySetting ) } } TextPrompt การแสดง JSON ข้อความที่ส่งให้โมเดลเป็นพรอมต์ โมเดลจะใช้ TextPrompt นี้เพื่อสร้างข้อความที่เติมให้สมบูรณ์ ฟิลด์ text string ต้องระบุ ข้อความพรอมต์ การแสดง JSON { "text" : string } ส่งความคิดเห็น เนื้อหาของหน้าเว็บนี้ได้รับอนุญาตภายใต้ ใบอนุญาตที่ต้องระบุที่มาของครีเอทีฟคอมมอนส์ 4.0 และตัวอย่างโค้ดได้รับอนุญาตภายใต้ ใบอนุญาต Apache 2.0 เว้นแต่จะระบุไว้เป็นอย่างอื่น โปรดดูรายละเอียดที่ นโยบายเว็บไซต์ Google Developers Java เป็นเครื่องหมายการค้าจดทะเบียนของ Oracle และ/หรือบริษัทในเครือ อัปเดตล่าสุด 2025-07-24 UTC หากต้องการบอกให้เราทราบเพิ่มเติม [[["เข้าใจง่าย","easyToUnderstand","thumb-up"],["แก้ปัญหาของฉันได้","solvedMyProblem","thumb-up"],["อื่นๆ","otherUp","thumb-up"]],[["ไม่มีข้อมูลที่ฉันต้องการ","missingTheInformationINeed","thumb-down"],["ซับซ้อนเกินไป/มีหลายขั้นตอนมากเกินไป","tooComplicatedTooManySteps","thumb-down"],["ล้าสมัย","outOfDate","thumb-down"],["ปัญหาเกี่ยวกับการแปล","translationIssue","thumb-down"],["ตัวอย่าง/ปัญหาเกี่ยวกับโค้ด","samplesCodeIssue","thumb-down"],["อื่นๆ","otherDown","thumb-down"]],["อัปเดตล่าสุด 2025-07-24 UTC"],[],[]] ข้อกำหนด ความเป็นส่วนตัว Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:56
https://github.com/awslabs/amazon-bedrock-agentcore-samples/tree/main?tab=readme-ov-file
GitHub - awslabs/amazon-bedrock-agentcore-samples: Amazon Bedrock Agentcore accelerates AI agents into production with the scale, reliability, and security, critical to real-world deployment. Skip to content Navigation Menu Toggle navigation Sign in Appearance settings Platform AI CODE CREATION GitHub Copilot Write better code with AI GitHub Spark Build and deploy intelligent apps GitHub Models Manage and compare prompts MCP Registry New Integrate external tools DEVELOPER WORKFLOWS Actions Automate any workflow Codespaces Instant dev environments Issues Plan and track work Code Review Manage code changes APPLICATION SECURITY GitHub Advanced Security Find and fix vulnerabilities Code security Secure your code as you build Secret protection Stop leaks before they start EXPLORE Why GitHub Documentation Blog Changelog Marketplace View all features Solutions BY COMPANY SIZE Enterprises Small and medium teams Startups Nonprofits BY USE CASE App Modernization DevSecOps DevOps CI/CD View all use cases BY INDUSTRY Healthcare Financial services Manufacturing Government View all industries View all solutions Resources EXPLORE BY TOPIC AI Software Development DevOps Security View all topics EXPLORE BY TYPE Customer stories Events &amp; webinars Ebooks &amp; reports Business insights GitHub Skills SUPPORT &amp; SERVICES Documentation Customer support Community forum Trust center Partners Open Source COMMUNITY GitHub Sponsors Fund open source developers PROGRAMS Security Lab Maintainer Community Accelerator Archive Program REPOSITORIES Topics Trending Collections Enterprise ENTERPRISE SOLUTIONS Enterprise platform AI-powered developer platform AVAILABLE ADD-ONS GitHub Advanced Security Enterprise-grade security features Copilot for Business Enterprise-grade AI features Premium Support Enterprise-grade 24/7 support Pricing Search or jump to... Search code, repositories, users, issues, pull requests... --> Search Clear Search syntax tips Provide feedback --> We read every piece of feedback, and take your input very seriously. Include my email address so I can be contacted Cancel Submit feedback Saved searches Use saved searches to filter your results more quickly --> Name Query To see all available qualifiers, see our documentation . Cancel Create saved search Sign in Sign up Appearance settings Resetting focus You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert {{ message }} awslabs / amazon-bedrock-agentcore-samples Public generated from amazon-archives/__template_Apache-2.0 Notifications You must be signed in to change notification settings Fork 754 Star 2.1k Amazon Bedrock Agentcore accelerates AI agents into production with the scale, reliability, and security, critical to real-world deployment. aws.amazon.com/bedrock/agentcore/ License Apache-2.0 license 2.1k stars 754 forks Branches Tags Activity Star Notifications You must be signed in to change notification settings Code Issues 108 Pull requests 94 Discussions Actions Projects 0 Security Uh oh! There was an error while loading. Please reload this page . Insights Additional navigation options Code Issues Pull requests Discussions Actions Projects Security Insights awslabs/amazon-bedrock-agentcore-samples   main Branches Tags Go to file Code Open more actions menu Folders and files Name Name Last commit message Last commit date Latest commit   History 383 Commits .github .github     01-tutorials 01-tutorials     02-use-cases 02-use-cases     03-integrations 03-integrations     04-infrastructure-as-code 04-infrastructure-as-code     05-blueprints 05-blueprints     .gitignore .gitignore     CODE_OF_CONDUCT.md CODE_OF_CONDUCT.md     CONTRIBUTING.md CONTRIBUTING.md     CONTRIBUTORS.md CONTRIBUTORS.md     LICENSE LICENSE     NOTICE NOTICE     README.md README.md     requirements.txt requirements.txt     View all files Repository files navigation README Code of conduct Contributing Apache-2.0 license Security Amazon Bedrock AgentCore Samples Deploy and operate AI agents securely at scale - using any framework and model Documentation ◆ Python SDK ◆ Starter Toolkit ◆ Discord Welcome to the Amazon Bedrock AgentCore Samples repository! Amazon Bedrock AgentCore is both framework-agnostic and model-agnostic, giving you the flexibility to deploy and operate advanced AI agents securely and at scale. Whether you’re building with Strands Agents , CrewAI , LangGraph , LlamaIndex , or any other framework—and running them on any Large Language Model (LLM)—Amazon Bedrock AgentCore provides the infrastructure to support them. By eliminating the undifferentiated heavy lifting of building and managing specialized agent infrastructure, Amazon Bedrock AgentCore lets you bring your preferred framework and model, and deploy without rewriting code. This collection provides examples and tutorials to help you understand, implement, and integrate Amazon Bedrock AgentCore capabilities into your applications. 🎥 Video Build your first production-ready AI agent with Amazon Bedrock AgentCore. We’ll take you beyond prototyping and show you how to productionize your first agentic AI application using Amazon Bedrock AgentCore. 📁 Repository Structure 📚 01-tutorials/ Interactive Learning &amp; Foundation This folder contains notebook-based tutorials that teach you the fundamentals of Amazon Bedrock AgentCore capabilities through hands-on examples. The structure is divided by AgentCore component: Runtime : Amazon Bedrock AgentCore Runtime is a secure, serverless runtime capability that empowers organizations to deploy and scale both AI agents and tools, regardless of framework, protocol, or model choice—enabling rapid prototyping, seamless scaling, and accelerated time to market Gateway : AI agents need tools to perform real-world tasks—from searching databases to sending messages. Amazon Bedrock AgentCore Gateway automatically converts APIs, Lambda functions, and existing services into MCP-compatible tools so developers can quickly make these essential capabilities available to agents without managing integrations. Memory : Amazon Bedrock AgentCore Memory makes it easy for developer to build rich, personalized agent experiences with fully-manged memory infrastructure and the ability to customize memory for your needs. Identity : Amazon Bedrock AgentCore Identity provides seamless agent identity and access management across AWS services and third-party applications such as Slack and Zoom while supporting any standard identity providers such as Okta, Entra, and Amazon Cognito. Tools : Amazon Bedrock AgentCore provides two built-in tools to simplify your agentic AI application development: Amazon Bedrock AgentCore Code Interpreter tool enables AI agents to write and execute code securely, enhancing their accuracy and expanding their ability to solve complex end-to-end tasks. Amazon Bedrock AgentCore Browser Tool is an enterprise-grade capability that enables AI agents to navigate websites, complete multi-step forms, and perform complex web-based tasks with human-like precision within a fully managed, secure sandbox environment with low latency Observability : Amazon Bedrock AgentCore Observability helps developers trace, debug, and monitor agent performance through unified operational dashboards. With support for OpenTelemetry compatible telemetry and detailed visualizations of each step of the agent workflow, Amazon Bedrock AgentCore Observability enables developers to easily gain visibility into agent behavior and maintain quality standards at scale. AgentCore end-to-end : In this tutorial we will move a customer support agent from prototype to production using Amazon Bedrock AgentCore services. The examples provided as perfect for beginners and those looking to understand the underlying concepts before building AI Agents applications. 💡 02-use-cases/ End-to-end Applications Explore practical use case implementations that demonstrate how to apply Amazon Bedrock AgentCore capabilities to solve real business problems. Each use case includes complete implementation focused on the AgentCore components with detailed explanations. 🔌 03-integrations/ Framework &amp; Protocol Integration Learn how to integrate Amazon Bedrock AgentCore capabilities with popular Agentic frameworks such as Strands Agents, LangChain and CrewAI. Set agent-to-agent communication with A2A and different multi-agent collaboration patterns. Integrate agentic interfaces and learn how to use Amazon Bedrock AgentCore with different entry points. 🏗️ 04-infrastructure-as-code/ Deployment Automation &amp; Infrastructure Deploy Amazon Bedrock AgentCore resources Infrastructure as code. We are providing examples using CloudFormation, AWS CDK, or Terraform. Automate infrastructure provisioning with production-ready templates for basic runtimes, MCP servers, multi-agent systems, and complete agent solutions with tools and memory. 🚀 05-blueprints/ Full-Stack Reference Applications Jump-start your development with complete, deployment-ready agentic applications built on Amazon Bedrock AgentCore. Each blueprint provides a comprehensive foundation with integrated services, authentication, and business logic that you can customize and deploy for your use case. Running a Notebook Create and activate a virtual environment python -m venv .venv source .venv/bin/activate Install dependencies pip install -r requirements.txt Export/Activate required AWS Credentials for the notebook to run Register your virtual environment as a kernel for Jupyter notebook to use python -m ipykernel install --user --name=notebook-venv --display-name= " Python (notebook-venv) " You can list your kernels using: jupyter kernelspec list Run the notebook and ensure the correct kernel is selected jupyter notebook path/to/your/notebook.ipynb Important: After opening the notebook in Jupyter, make sure to select the correct kernel by going to Kernel → Change kernel → select "Python (notebook-venv)" to ensure your virtual environment packages are available. Quick Start - Amazon Bedrock AgentCore Runtime Step 1: Prerequisites An AWS account with credentials configured ( aws configure ) Python 3.10 or later Docker or Finch installed and running - only for local development Model Access: Anthropic Claude 4.0 enabled in Amazon Bedrock console AWS Permissions: BedrockAgentCoreFullAccess managed policy AmazonBedrockFullAccess managed policy Caller permissions : See detailed policy here Step 2: Install and Create Your Agent # Install both packages pip install bedrock-agentcore strands-agents bedrock-agentcore-starter-toolkit Create my_agent.py : from bedrock_agentcore import BedrockAgentCoreApp from strands import Agent app = BedrockAgentCoreApp () agent = Agent () @ app . entrypoint def invoke ( payload ): """Your AI agent function""" user_message = payload . get ( "prompt" , "Hello! How can I help you today?" ) result = agent ( user_message ) return { "result" : result . message } if __name__ == "__main__" : app . run () Create requirements.txt : cat &gt; requirements.txt &lt;&lt; EOF bedrock-agentcore strands-agents EOF Step 3: Test Locally # Start your agent python my_agent.py # Test it (in another terminal) curl -X POST http://localhost:8080/invocations \ -H " Content-Type: application/json " \ -d ' {"prompt": "Hello!"} ' Success: You should see a response like {"result": "Hello! I'm here to help..."} Step 4: Deploy to AWS # Configure and deploy (auto-creates all required resources) agentcore configure -e my_agent.py agentcore launch # Test your deployed agent agentcore invoke ' {"prompt": "tell me a joke"} ' Congratulations! Your agent is now running on Amazon Bedrock AgentCore Runtime! Follow quickstart guides for Gateway , Identity , Memory , Observability , and builtin-tools . 🔗 Related Links: Getting started with Amazon Bedrock AgentCore - Workshop Diving Deep into Bedrock AgentCore - Workshop Amazon Bedrock AgentCore pricing Amazon Bedrock AgentCore FAQs 🤝 Contributing We welcome contributions! Please see our Contributing Guidelines for details on: Adding new samples Improving existing examples Reporting issues Suggesting enhancements 📄 License This project is licensed under the Apache License 2.0 - see the LICENSE file for details. Contributors About Amazon Bedrock Agentcore accelerates AI agents into production with the scale, reliability, and security, critical to real-world deployment. aws.amazon.com/bedrock/agentcore/ Topics agent authentication runtime core gateway bedrock memory-management identity-management agents production-code agentic-ai Resources Readme License Apache-2.0 license Code of conduct Code of conduct Contributing Contributing Security policy Security policy Uh oh! There was an error while loading. Please reload this page . Activity Custom properties Stars 2.1k stars Watchers 19 watching Forks 754 forks Report repository Releases No releases published Packages 0 No packages published Uh oh! There was an error while loading. Please reload this page . Contributors 136 Uh oh! There was an error while loading. Please reload this page . + 122 contributors Languages Jupyter Notebook 58.0% Python 30.0% TypeScript 4.6% Shell 3.3% JavaScript 1.4% HTML 1.3% Other 1.4% Footer &copy; 2026 GitHub,&nbsp;Inc. Footer navigation Terms Privacy Security Status Community Docs Contact Manage cookies Do not share my personal information You can’t perform that action at this time.
2026-01-13T09:29:56
https://shows.acast.com/frontier/episodes/ep-44-sabber-ahamed-founder-of-xoolooloo
Ep. 44: Sabber Ahamed, Founder of xoolooloo - Frontier Podcast by Gun.io | Acast Follow Share Play Frontier Podcast by Gun.io Ep. 44: Sabber Ahamed, Founder of xoolooloo Season 4 , Ep. 44 • Thursday, February 29, 2024 This week, Teja talks with Sabber Ahamed, Founder of Xoolooloo and Data Scientist at Bridgestone. They discuss the proliferation of data science, the joys of working on your own projects outside of the 9-5, and the different things career goals of a computational geophysicist can really shake up. Show more RSS More episodes View all episodes 46. Ep. 46: Matt Genovese, CEO and Founder of Planorama 54:36 | Thursday, April 11, 2024 | Season 4 , Ep. 46 This week, Teja sits down with Matt Genovese, CEO and Founder of Planorama, a company that designs UX/UI flows for products with complete enablement for software teams. They discuss the intricacies of living abroad, the importance of incorporating design, and how de-risking early on in the life of a new product can make it more successful in the long run.https://planorama.design/matthttps://aiproducthive.com Play 45. Ep. 45: Brian Pontarelli, CEO and Founder of FusionAuth 44:05 | Thursday, March 28, 2024 | Season 4 , Ep. 45 On this week's episode, Teja sits down with Brian Pontarelli, Founder and CEO of both FusionAuth and Cleanspeak. They discuss the complexities of growing two businesses at the same time, making progress without using AI, and the subtle clues in an interview process that let you know someone's a great culture fit.https://fusionauth.io/https://cleanspeak.com/ Play 43. Ep. 43: Harpreet Singh, CEO and Co-Founder at Launchable 39:22 | Thursday, February 15, 2024 | Season 4 , Ep. 43 This week, Teja talks with Harpreet Singh, Co-CEO and Co-Founder of Launchable, a company that's on a mission to make software testing faster and smarter. They discuss the DACI framework and the importance of intentionality in decision-making, what it's like to bring a behemoth like Jenkins to life, and the power of slowing down to meditate.https://www.launchableinc.com/ Play 42. Ep. 42: Brian Douglas, CEO and Founder at OpenSauced 36:55 | Thursday, February 1, 2024 | Season 4 , Ep. 42 In this week's episode, Teja talks with Brian Douglas, CEO and Founder at OpeSauced. They talk about how a good open source portfolio is more than just getting your name on big projects, the natural progression from developer advocacy to building an open source marketplace, and the trials and tribulations of learning to lead as you grow.opensauced.pizza Play 41. Ep. 41: Ian Villa, COO and Co-founder at Whisper Aero 37:33 | Thursday, January 18, 2024 | Season 4 , Ep. 41 Joining Teja on this week's episode is Ian Villa, COO and Co-founder of Whisper Aero, a company that is developing cleaner, quieter, and more efficient propulsion solutions. They discuss the pros and cons of a campus with on-site housing, the burgeoning Nashville tech scene, and how a 5 am trip to Kinko's can, in hindsight, be a lesson in entrepreneurship.whisper.aero Play 40. Ep. 40: Kate O&#x27;Neil, CEO and Co-founder at Teaming 58:40 | Thursday, January 11, 2024 | Season 4 , Ep. 40 This week, Teja sits down for round two with Kate O'Neil, who has moved into the CEO position at Teaming since the last time they talked. They discuss the differences that come with the transition to becoming a CEO, the importance of incorporating movement into your life, and why getting the best sleep comes down to the perfect sheets.teaming.com Play 39. Ep. 39: Jeremy Snyder, CEO and Founder at FireTail 50:32 | Thursday, January 4, 2024 | Season 4 , Ep. 39 After a brief holiday hiatus, Teja is back this week with Jeremy Snyder, the Founder and CEO of FireTail, an API security platform that provides application layer visibility, real-time, inline inspection, and blocking of malicious API calls. They talk about being a less technical founder, how being a polyglot helps you understand more than language, and the importance of taking the time to find your own adventure.https://www.firetail.io/ Play 38. Ep. 38: Stefan Avram, Head of Growth and Co-Founder at WunderGraph 34:16 | Thursday, December 21, 2023 | Season 4 , Ep. 38 Teja sits down with Stefan Avram, Head of Growth and Co-founder at WunderGraph, an open-source GraphQL federation. They discuss how injuries can change your life trajectory, the complexities of working with distributed teams, and how sometimes getting fired can be the best thing that's ever happened to you. www.wundergraph.com Play Instagram X.com TikTok Copyright Gun.io Hosted with ❤️ by Acast
2026-01-13T09:29:56
https://shows.acast.com/frontier/episodes/ep-42-brian-douglas-ceo-and-founder-at-opensauced
Ep. 42: Brian Douglas, CEO and Founder at OpenSauced - Frontier Podcast by Gun.io | Acast Follow Share Play Frontier Podcast by Gun.io Ep. 42: Brian Douglas, CEO and Founder at OpenSauced Season 4 , Ep. 42 • Thursday, February 1, 2024 In this week's episode, Teja talks with Brian Douglas, CEO and Founder at OpeSauced. They talk about how a good open source portfolio is more than just getting your name on big projects, the natural progression from developer advocacy to building an open source marketplace, and the trials and tribulations of learning to lead as you grow. opensauced.pizza Show more RSS More episodes View all episodes 46. Ep. 46: Matt Genovese, CEO and Founder of Planorama 54:36 | Thursday, April 11, 2024 | Season 4 , Ep. 46 This week, Teja sits down with Matt Genovese, CEO and Founder of Planorama, a company that designs UX/UI flows for products with complete enablement for software teams. They discuss the intricacies of living abroad, the importance of incorporating design, and how de-risking early on in the life of a new product can make it more successful in the long run.https://planorama.design/matthttps://aiproducthive.com Play 45. Ep. 45: Brian Pontarelli, CEO and Founder of FusionAuth 44:05 | Thursday, March 28, 2024 | Season 4 , Ep. 45 On this week's episode, Teja sits down with Brian Pontarelli, Founder and CEO of both FusionAuth and Cleanspeak. They discuss the complexities of growing two businesses at the same time, making progress without using AI, and the subtle clues in an interview process that let you know someone's a great culture fit.https://fusionauth.io/https://cleanspeak.com/ Play 44. Ep. 44: Sabber Ahamed, Founder of xoolooloo 28:31 | Thursday, February 29, 2024 | Season 4 , Ep. 44 This week, Teja talks with Sabber Ahamed, Founder of Xoolooloo and Data Scientist at Bridgestone. They discuss the proliferation of data science, the joys of working on your own projects outside of the 9-5, and the different things career goals of a computational geophysicist can really shake up. Play 43. Ep. 43: Harpreet Singh, CEO and Co-Founder at Launchable 39:22 | Thursday, February 15, 2024 | Season 4 , Ep. 43 This week, Teja talks with Harpreet Singh, Co-CEO and Co-Founder of Launchable, a company that's on a mission to make software testing faster and smarter. They discuss the DACI framework and the importance of intentionality in decision-making, what it's like to bring a behemoth like Jenkins to life, and the power of slowing down to meditate.https://www.launchableinc.com/ Play 41. Ep. 41: Ian Villa, COO and Co-founder at Whisper Aero 37:33 | Thursday, January 18, 2024 | Season 4 , Ep. 41 Joining Teja on this week's episode is Ian Villa, COO and Co-founder of Whisper Aero, a company that is developing cleaner, quieter, and more efficient propulsion solutions. They discuss the pros and cons of a campus with on-site housing, the burgeoning Nashville tech scene, and how a 5 am trip to Kinko's can, in hindsight, be a lesson in entrepreneurship.whisper.aero Play 40. Ep. 40: Kate O&#x27;Neil, CEO and Co-founder at Teaming 58:40 | Thursday, January 11, 2024 | Season 4 , Ep. 40 This week, Teja sits down for round two with Kate O'Neil, who has moved into the CEO position at Teaming since the last time they talked. They discuss the differences that come with the transition to becoming a CEO, the importance of incorporating movement into your life, and why getting the best sleep comes down to the perfect sheets.teaming.com Play 39. Ep. 39: Jeremy Snyder, CEO and Founder at FireTail 50:32 | Thursday, January 4, 2024 | Season 4 , Ep. 39 After a brief holiday hiatus, Teja is back this week with Jeremy Snyder, the Founder and CEO of FireTail, an API security platform that provides application layer visibility, real-time, inline inspection, and blocking of malicious API calls. They talk about being a less technical founder, how being a polyglot helps you understand more than language, and the importance of taking the time to find your own adventure.https://www.firetail.io/ Play 38. Ep. 38: Stefan Avram, Head of Growth and Co-Founder at WunderGraph 34:16 | Thursday, December 21, 2023 | Season 4 , Ep. 38 Teja sits down with Stefan Avram, Head of Growth and Co-founder at WunderGraph, an open-source GraphQL federation. They discuss how injuries can change your life trajectory, the complexities of working with distributed teams, and how sometimes getting fired can be the best thing that's ever happened to you. www.wundergraph.com Play Instagram X.com TikTok Copyright Gun.io Hosted with ❤️ by Acast
2026-01-13T09:29:56
https://www.telegraph.co.uk/global-health/women-and-girls/
Women &amp; Girls - The Telegraph Jump to content UK News Website of the Year 2024 Search Icon News Sport Business Money Travel Calculators Opinion Ukraine Health Recommended Lifestyle Culture Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Search Icon Subscribe now Log in See all News UK news UK news home Scotland Wales Northern Ireland Politics Conservatives Labour Lib Dems Reform UK SNP US politics World US News Europe Middle East Asia Australasia Africa South America Donald Trump Health news Defence Science Education Environment Investigations Investigations home Signals Network Contact us Global Health Security Global Health Security home Climate &amp; People Science &amp; Disease Terror &amp; Security Women &amp; Girls Opinion &amp; Analysis Royals King Charles III Queen Camilla Prince William Princess of Wales Prince Harry Duchess of Sussex Sections UK Edition US Edition News News home UK news Politics World Donald Trump Health news Defence Science Education Environment Investigations Global Health Security Royals Sport Sport home Football Rugby Union Cricket Golf F1 Tennis Racing Women&#39;s Sport Cycling Boxing Betting More... Business Business home Economy Companies Markets Tech Money Money home Property Tax Pensions Banking Investing Net Zero Calculators Guides Travel Travel home Europe UK Worldwide City breaks Hotels Cruise Ski Advice Calculators Opinion Opinion home Obituaries Letters to the Editor Telegraph View Our columnists Cartoons Ukraine Ukraine home Daily podcast Weekly newsletter Health Health home Diet Fitness Conditions Wellbeing Parenting Guides Tools Recommended Recommended home Home Garden Sleep Tech Health &amp; Fitness Beauty &amp; Grooming Travel &amp; Outdoors Parenting Lifestyle Lifestyle home Recipes Food &amp; Drink Fashion Beauty Luxury Cars Gardening Culture Culture home TV Film Music Books Theatre Comedy Dance Opera Classical Art Telegraph Tickets Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Subscribe now Log in Login icon Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon More from The Telegraph Download our app Help and support Newsletters Recommended Financial Solutions Events Dating Offers Travel offers Shop Garden shop Bookshop Tickets Puzzles Fantasy Football Work at The Telegraph Telegraph Corporate Announcements The Chelsea Magazine Company Voucher codes See top shops Samsung Nike ASOS eBay Currys Wayfair TUI JD Sports Travelodge Adidas Women &amp; Girls Inside the covert mission to save Filipino children from British paedophiles Joseph Watt 31 Dec 2025, 1:58pm Infant mortality soars in Cuba as US terror designation hits public health Lilia Sebouai 19 Dec 2025, 12:39pm Dozens of women and children raped fleeing Sudan massacre Lilia Sebouai 9 Dec 2025, 2:08pm UK to end flagship anti-FGM programme Maeve Cullinan 2 Dec 2025, 12:01am Almost a third of all women experience physical or sexual violence in their lifetime Maeve Cullinan 19 Nov 2025, 2:00pm How Brazil reversed its teenage pregnancy epidemic Luke Taylor 23 Oct 2025, 4:03pm $10 million contraceptive stockpile bound for Africa destroyed Maeve Cullinan 12 Sep 2025, 4:36pm Advertisement ‘They raped us one by one’: East Timor’s forgotten women of war Allegra Mendelson 11 Sep 2025, 6:00am The British flat pack washing machines transforming lives Maeve Cullinan 14 Aug 2025, 3:13pm Baby FGM death in the Gambia ‘should shame us all’ Maeve Cullinan 12 Aug 2025, 5:12pm The oyster farmers paving the way for women in West Africa Jessamy Calkin 30 Jul 2025, 9:56am Ukraine has a problem no one is talking about – young women are leaving in droves Gabriella Jozwiak 19 Jun 2025, 6:00am ‘Historic milestone’ as court hears the horrors of Peru’s forced sterilisation programme Harriet Barber 29 May 2025, 1:57pm Women’s health is under attack – protecting it is the smart investment for everyone Pio Smith 19 May 2025, 2:47pm Domestic violence Read more How South Africa lost control of its crisis of violence against women Ben Farmer 1 Apr 2025, 2:29pm ‘I poured gasoline then set fire to my clothes – the flames shot up my body’ Tom Parry 13 May 2024, 8:00am ‘My husband beat me over and over – I still can’t legally divorce him’ Sarah Newey 28 Dec 2023, 10:23am Women trapped with abusers because of cost of living crisis Harriet Barber 3 Sep 2022, 11:00am Advertisement Female Genital Mutilation Read more UK to end flagship anti-FGM programme Maeve Cullinan 2 Dec 2025, 12:01am Baby FGM death in the Gambia ‘should shame us all’ Maeve Cullinan 12 Aug 2025, 5:12pm The dream of ending FGM is within reach – thanks to Mama Efua Nimco Ali 18 Oct 2024, 1:43pm ‘Designer vagina’ surgeries turn Harley Street into hub for FGM Maeve Cullinan 24 Sep 2024, 11:37am More stories Trump spurs global rollback on the rights of women and girls Heather Barr 7 May 2025, 10:28am One woman dies in childbirth every two minutes Maeve Cullinan 6 Apr 2025, 11:30pm Thousands of women and girls in the West Bank exposed to gender based violence Melanie Swan 25 Mar 2025, 12:33pm Girls miss out on life saving surgery under Taliban ‘gender apartheid’ Arthur Scott-Geddes 28 Feb 2025, 6:00am Ukrainian female POWs tortured and paraded naked through the snow by Russian troops Verity Bowman 20 Feb 2025, 6:00am As Japan starts compensation payments, forced sterilisation continues around the world Ewan Bolton 18 Feb 2025, 7:00am Trump has reinstated the ‘global gag rule’ on abortion aid – this time, it’s different Maeve Cullinan 29 Jan 2025, 12:29pm ‘They marry off girls because they are a burden’: The battle to save Bangladesh’s child brides Tom Parry 20 Jan 2025, 5:00am An invisible threat lurking in the water is slowly destroying these women’s lives Tom Parry 10 Jan 2025, 4:00am Sudan’s RSF militia ‘target minorities with campaign of gang rape’ Lilia Sebouai 23 Dec 2024, 7:00am Prostitution can never be a job like any other – the ‘occupational hazards’ involve criminal acts Julie Bindel 20 Dec 2024, 4:01pm ‘I just want to be a kid’: Mozambique’s child brides forced to marry at 13 Tom Gould 26 Nov 2024, 12:15pm Libya introduces morality police to crack down on women’s dress and ‘strange’ haircuts Lilia Sebouai 11 Nov 2024, 6:02pm Iraq to lower the ‘age of consent’ for girls to nine Lilia Sebouai 7 Nov 2024, 3:48pm Pagination Previous Next The Telegraph Back to top Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon Download the Telegraph App Recommended Podcasts Syndication and Commissioning Help Centre Betting Branded Content Privacy Reader Prints Theatre Tickets Careers About us Announcements Puzzles Guidelines Terms &amp; Conditions Newsletters Crosswords Tax Strategy Advertising terms Subscribe Cryptic Crossword Modern Slavery Subscription Terms &amp; Conditions Gift Subscriptions Plusword The Chelsea Magazine Company &copy; Telegraph Media Group Holdings Limited 2026
2026-01-13T09:29:56
https://snyk.io/es/platform/security-intelligence/
Investigaciones propias y plataforma de inteligencia en seguridad líder de la industria | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API &amp; Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API &amp; Web - Todos los clientes Snyk API &amp; Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo La plataforma de Snyk Plataforma DeepCode AI Snyk CLI Complementos IDE Seguridad y gobernanza Opciones de implementación Cumplimiento Select Plataforma DeepCode AI Snyk CLI Complementos IDE Seguridad y gobernanza Opciones de implementación Cumplimiento Snyk descubre nuevas vulnerabilidades críticas en contenedores Inteligencia en materia de seguridad Inteligencia avanzada en seguridad durante todo el SDLC Gracias a la inteligencia en materia de seguridad de Snyk, los desarrolladores reciben los datos más recientes sobre vulnerabilidades y correcciones prácticas en las herramientas y ecosistemas que usan. Reserva una demostración en vivo Comienza sin pagar nada Play Video Security intelligence across the SDLC Snyk’s security intelligence combines public sources, data from the developer community, proprietary expert research, machine learning, and human-in-the-loop AI. Play Video BASE DE DATOS DE SNYK SOBRE VULNERABILIDADES Seguridad de contenedores y código abierto líder del sector Nuestros investigadores seleccionan manualmente datos actualizados sobre seguridad y metadatos enriquecidos para alimentar la Base de datos de Snyk sobre vulnerabilidades , de modo que tú puedas identificar los riesgos con precisión, aprender sobre nuevas vulnerabilidades de código abierto y contenedores más rápido y corregirlas con velocidad gracias a información contextual práctica. Play Video BASE DE CONOCIMIENTOS DE SNYK CODE Escaneos de código precisos y rápidos con tecnología de IA Con la ayuda de DeepCode AI , cada especialista en seguridad de Snyk puede mantener una amplia base de conocimientos repleta de patrones de código vulnerables y correcciones sugeridas, de modo que los desarrolladores puedan corregir el código en tiempo real con las recomendaciones en línea directamente desde el IDE. Play Video MOTOR DE POLÍTICAS UNIFICADAS Políticas y reglas codificadas en las configuraciones de IaC El equipo de investigación de Snyk convierte políticas, estándares y prácticas recomendadas líderes en un proceso de política como código. Luego, los aplican a diversos casos de uso, como AWS, Azure, Terraform y muchos otros, de modo que puedas mantener la seguridad de los ecosistemas y la IaC desde antes de la implementación y durante el tiempo de ejecución. Con la confianza de toda la industria Comienza a aprovechar la inteligencia integral en materia de seguridad Descubre cómo puedes usar la inteligencia de vanguardia en seguridad de Snyk para encontrar y corregir vulnerabilidades más rápido en las aplicaciones. Reserva una demostración en vivo Comienza sin pagar nada Inteligencia de seguridad líder en la industria El equipo global de investigación dedicada a la seguridad de Snyk supervisa las amenazas, analiza paquetes maliciosos y rastrea a diario las vulnerabilidades en tendencia. De este modo, en las investigaciones resultantes se exhiben los datos que impulsan los escaneos de Snyk y les permiten a los usuarios corregir vulnerabilidades críticas con rapidez. Más información La Base de datos de Snyk sobre vulnerabilidades cubre el triple de vulnerabilidades que la siguiente base de datos pública más grande. Entérate antes Snyk suele ser el primero en dar a conocer las vulnerabilidades : Snyk informó el 92 % de las vulnerabilidades de JavaScript antes que la NVD (Base de datos de vulnerabilidades de Estados Unidos).  Corrige más rápido Detecta y corrige problemas 47 días antes (en promedio) que si usas la siguiente base de datos de vulnerabilidades más grande. Más recursos Blog Snyk descubre más de 200 paquetes npm maliciosos, que incluyen ataques de confusión de dependencias de Cobalt Strike Hace poco tiempo, Snyk descubrió más de 200 paquetes maliciosos en el registro de npm. Aunque reconocemos que el agotamiento como consecuencia de las vulnerabilidades es un problema para los desarrolladores, este artículo no es el típico caso de errores tipográficos (typosquatting) o paquetes maliciosos aleatorios. Mencionaremos los ataques selectivos orientados a empresas y corporaciones que Snyk pudo detectar y compartiremos información relevante. Blog Protestware, tendencia en código abierto: 4 tipos diferentes y su impacto En Snyk, queremos ayudar a la comunidad a llegar a un consenso sobre cómo abordar los diversos protestware que están surgiendo y a diferenciar los diferentes tipos. Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:56
https://infisical.com/docs/integrations/platforms/certificate-agent#universal-auth
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let&#x27;s Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;./client-id&quot; # Path to file containing client ID client-secret : &quot;./client-secret&quot; # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : &quot;kubernetes-auth&quot; config : identity-id : &quot;your-kubernetes-identity-id&quot; service-account-token-path : &quot;/var/run/secrets/kubernetes.io/serviceaccount/token&quot; Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : &quot;azure-auth&quot; config : identity-id : &quot;your-azure-identity-id&quot; Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;gcp-id-token&quot; config : identity-id : &quot;your-gcp-identity-id&quot; GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : &quot;gcp-iam&quot; config : identity-id : &quot;your-gcp-identity-id&quot; service-account-key : &quot;/path/to/service-account-key.json&quot; Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;aws-iam&quot; config : identity-id : &quot;your-aws-identity-id&quot; ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : [ &quot;api.example.com&quot; , &quot;api-v2.example.com&quot; ] ttl : &quot;90d&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; # Enable automatic certificate renewal lifecycle : renew-before-expiry : &quot;30d&quot; status-check-interval : &quot;6h&quot; # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : &quot;/etc/ssl/private/web.key&quot; permission : &quot;0600&quot; # Read/write for owner only certificate : path : &quot;/etc/ssl/certs/web.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner chain : path : &quot;/etc/ssl/certs/web-chain.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo &quot;Certificate issued for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-failure : command : | echo &quot;Certificate operation failed: ${ERROR_MESSAGE}&quot; mail -s &quot;Certificate Alert&quot; [email&#160;protected] &lt; /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., [&quot;www.example.com&quot;, &quot;api.example.com&quot;] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger &#x27;Certificate renewal failed&#x27; , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo &quot;New certificate issued for ${CERT_COMMON_NAME}&quot; chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d &quot;{&#x27;text&#x27;: &#x27;Certificate for ${CERT_COMMON_NAME} renewed successfully&#x27;}&quot; timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo &quot;Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}&quot; # Send alert mail -s &quot;Certificate Failure Alert&quot; [email&#160;protected] &lt; /dev/null # Log to syslog logger -p daemon.error &quot;Certificate agent failure: ${ERROR_MESSAGE}&quot; timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : &quot;https://app.infisical.com&quot; retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; csr-path : &quot;/etc/ssl/requests/api.csr&quot; file-output : certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; lifecycle : renew-before-expiry : &quot;14d&quot; # Renew 14 days before expiration status-check-interval : &quot;6h&quot; # Check certificate status every 6 hours file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; post-hooks : on-issuance : command : &quot;systemctl reload nginx&quot; timeout : 30 on-renewal : command : &quot;systemctl reload nginx &amp;&amp; logger &#x27;Certificate renewed&#x27;&quot; timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:56
https://play.google.com/store/apps/details?id=notion.id&amp;hl=es_CR
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M1
2026-01-13T09:29:56
https://shows.acast.com/frontier/episodes/ep-41-ian-villa-coo-and-co-founder-at-whisper-aero
Ep. 41: Ian Villa, COO and Co-founder at Whisper Aero - Frontier Podcast by Gun.io | Acast Follow Share Play Frontier Podcast by Gun.io Ep. 41: Ian Villa, COO and Co-founder at Whisper Aero Season 4 , Ep. 41 • Thursday, January 18, 2024 Joining Teja on this week's episode is Ian Villa, COO and Co-founder of Whisper Aero, a company that is developing cleaner, quieter, and more efficient propulsion solutions. They discuss the pros and cons of a campus with on-site housing, the burgeoning Nashville tech scene, and how a 5 am trip to Kinko's can, in hindsight, be a lesson in entrepreneurship. whisper.aero Show more RSS More episodes View all episodes 46. Ep. 46: Matt Genovese, CEO and Founder of Planorama 54:36 | Thursday, April 11, 2024 | Season 4 , Ep. 46 This week, Teja sits down with Matt Genovese, CEO and Founder of Planorama, a company that designs UX/UI flows for products with complete enablement for software teams. They discuss the intricacies of living abroad, the importance of incorporating design, and how de-risking early on in the life of a new product can make it more successful in the long run.https://planorama.design/matthttps://aiproducthive.com Play 45. Ep. 45: Brian Pontarelli, CEO and Founder of FusionAuth 44:05 | Thursday, March 28, 2024 | Season 4 , Ep. 45 On this week's episode, Teja sits down with Brian Pontarelli, Founder and CEO of both FusionAuth and Cleanspeak. They discuss the complexities of growing two businesses at the same time, making progress without using AI, and the subtle clues in an interview process that let you know someone's a great culture fit.https://fusionauth.io/https://cleanspeak.com/ Play 44. Ep. 44: Sabber Ahamed, Founder of xoolooloo 28:31 | Thursday, February 29, 2024 | Season 4 , Ep. 44 This week, Teja talks with Sabber Ahamed, Founder of Xoolooloo and Data Scientist at Bridgestone. They discuss the proliferation of data science, the joys of working on your own projects outside of the 9-5, and the different things career goals of a computational geophysicist can really shake up. Play 43. Ep. 43: Harpreet Singh, CEO and Co-Founder at Launchable 39:22 | Thursday, February 15, 2024 | Season 4 , Ep. 43 This week, Teja talks with Harpreet Singh, Co-CEO and Co-Founder of Launchable, a company that's on a mission to make software testing faster and smarter. They discuss the DACI framework and the importance of intentionality in decision-making, what it's like to bring a behemoth like Jenkins to life, and the power of slowing down to meditate.https://www.launchableinc.com/ Play 42. Ep. 42: Brian Douglas, CEO and Founder at OpenSauced 36:55 | Thursday, February 1, 2024 | Season 4 , Ep. 42 In this week's episode, Teja talks with Brian Douglas, CEO and Founder at OpeSauced. They talk about how a good open source portfolio is more than just getting your name on big projects, the natural progression from developer advocacy to building an open source marketplace, and the trials and tribulations of learning to lead as you grow.opensauced.pizza Play 40. Ep. 40: Kate O&#x27;Neil, CEO and Co-founder at Teaming 58:40 | Thursday, January 11, 2024 | Season 4 , Ep. 40 This week, Teja sits down for round two with Kate O'Neil, who has moved into the CEO position at Teaming since the last time they talked. They discuss the differences that come with the transition to becoming a CEO, the importance of incorporating movement into your life, and why getting the best sleep comes down to the perfect sheets.teaming.com Play 39. Ep. 39: Jeremy Snyder, CEO and Founder at FireTail 50:32 | Thursday, January 4, 2024 | Season 4 , Ep. 39 After a brief holiday hiatus, Teja is back this week with Jeremy Snyder, the Founder and CEO of FireTail, an API security platform that provides application layer visibility, real-time, inline inspection, and blocking of malicious API calls. They talk about being a less technical founder, how being a polyglot helps you understand more than language, and the importance of taking the time to find your own adventure.https://www.firetail.io/ Play 38. Ep. 38: Stefan Avram, Head of Growth and Co-Founder at WunderGraph 34:16 | Thursday, December 21, 2023 | Season 4 , Ep. 38 Teja sits down with Stefan Avram, Head of Growth and Co-founder at WunderGraph, an open-source GraphQL federation. They discuss how injuries can change your life trajectory, the complexities of working with distributed teams, and how sometimes getting fired can be the best thing that's ever happened to you. www.wundergraph.com Play Instagram X.com TikTok Copyright Gun.io Hosted with ❤️ by Acast
2026-01-13T09:29:56
https://shows.acast.com/frontier/episodes/ep-41-ian-villa-coo-and-co-founder-at-whisper-aero
Ep. 41: Ian Villa, COO and Co-founder at Whisper Aero - Frontier Podcast by Gun.io | Acast Follow Share Play Frontier Podcast by Gun.io Ep. 41: Ian Villa, COO and Co-founder at Whisper Aero Season 4 , Ep. 41 • Thursday, January 18, 2024 Joining Teja on this week's episode is Ian Villa, COO and Co-founder of Whisper Aero, a company that is developing cleaner, quieter, and more efficient propulsion solutions. They discuss the pros and cons of a campus with on-site housing, the burgeoning Nashville tech scene, and how a 5 am trip to Kinko's can, in hindsight, be a lesson in entrepreneurship. whisper.aero Show more RSS More episodes View all episodes 46. Ep. 46: Matt Genovese, CEO and Founder of Planorama 54:36 | Thursday, April 11, 2024 | Season 4 , Ep. 46 This week, Teja sits down with Matt Genovese, CEO and Founder of Planorama, a company that designs UX/UI flows for products with complete enablement for software teams. They discuss the intricacies of living abroad, the importance of incorporating design, and how de-risking early on in the life of a new product can make it more successful in the long run.https://planorama.design/matthttps://aiproducthive.com Play 45. Ep. 45: Brian Pontarelli, CEO and Founder of FusionAuth 44:05 | Thursday, March 28, 2024 | Season 4 , Ep. 45 On this week's episode, Teja sits down with Brian Pontarelli, Founder and CEO of both FusionAuth and Cleanspeak. They discuss the complexities of growing two businesses at the same time, making progress without using AI, and the subtle clues in an interview process that let you know someone's a great culture fit.https://fusionauth.io/https://cleanspeak.com/ Play 44. Ep. 44: Sabber Ahamed, Founder of xoolooloo 28:31 | Thursday, February 29, 2024 | Season 4 , Ep. 44 This week, Teja talks with Sabber Ahamed, Founder of Xoolooloo and Data Scientist at Bridgestone. They discuss the proliferation of data science, the joys of working on your own projects outside of the 9-5, and the different things career goals of a computational geophysicist can really shake up. Play 43. Ep. 43: Harpreet Singh, CEO and Co-Founder at Launchable 39:22 | Thursday, February 15, 2024 | Season 4 , Ep. 43 This week, Teja talks with Harpreet Singh, Co-CEO and Co-Founder of Launchable, a company that's on a mission to make software testing faster and smarter. They discuss the DACI framework and the importance of intentionality in decision-making, what it's like to bring a behemoth like Jenkins to life, and the power of slowing down to meditate.https://www.launchableinc.com/ Play 42. Ep. 42: Brian Douglas, CEO and Founder at OpenSauced 36:55 | Thursday, February 1, 2024 | Season 4 , Ep. 42 In this week's episode, Teja talks with Brian Douglas, CEO and Founder at OpeSauced. They talk about how a good open source portfolio is more than just getting your name on big projects, the natural progression from developer advocacy to building an open source marketplace, and the trials and tribulations of learning to lead as you grow.opensauced.pizza Play 40. Ep. 40: Kate O&#x27;Neil, CEO and Co-founder at Teaming 58:40 | Thursday, January 11, 2024 | Season 4 , Ep. 40 This week, Teja sits down for round two with Kate O'Neil, who has moved into the CEO position at Teaming since the last time they talked. They discuss the differences that come with the transition to becoming a CEO, the importance of incorporating movement into your life, and why getting the best sleep comes down to the perfect sheets.teaming.com Play 39. Ep. 39: Jeremy Snyder, CEO and Founder at FireTail 50:32 | Thursday, January 4, 2024 | Season 4 , Ep. 39 After a brief holiday hiatus, Teja is back this week with Jeremy Snyder, the Founder and CEO of FireTail, an API security platform that provides application layer visibility, real-time, inline inspection, and blocking of malicious API calls. They talk about being a less technical founder, how being a polyglot helps you understand more than language, and the importance of taking the time to find your own adventure.https://www.firetail.io/ Play 38. Ep. 38: Stefan Avram, Head of Growth and Co-Founder at WunderGraph 34:16 | Thursday, December 21, 2023 | Season 4 , Ep. 38 Teja sits down with Stefan Avram, Head of Growth and Co-founder at WunderGraph, an open-source GraphQL federation. They discuss how injuries can change your life trajectory, the complexities of working with distributed teams, and how sometimes getting fired can be the best thing that's ever happened to you. www.wundergraph.com Play Instagram X.com TikTok Copyright Gun.io Hosted with ❤️ by Acast
2026-01-13T09:29:56
https://www.notion.com/de/security
Sicherheit und Datenschutz von Notion: DSGVO- und SOC-2-konform Notion Funktionen Notion-KI Erschaffen, schreiben, automatisieren Agenten Übernehmen manuelle Aufgaben Enterprise Suche Finde Antworten in Sekundenschnelle Smart Notes Perfekt geschrieben von der KI Dokumente Einfach und leistungsstark Wissensdatenbank Bündle dein Wissen Projekte Verwalte jede Art von Projekt Websites Veröffentliche alles Mögliche im Handumdrehen Loslegen KI-Anwendungsfälle entdecken Schau dir an, wozu die Notion-KI in der Lage ist Marktplatz durchstöbern Vorlagen für alles Mögliche Einbindungen anzeigen Verbinde deine Apps mit Notion Web Clipper herunterladen Speichere Inhalte aus dem Web in Notion Teste die Desktop-App von Notion für mehr Geschwindigkeit App herunterladen Mail Calendar KI Enterprise Tarife Erkunden Teams Entwicklung und Produkt Design Marketing IT Teamgröße Start-ups KMUs Konzerne Bildungswesen Lernen Hilfe-Center Notion Academy Erfahrungsberichte von Kund/-innen Blog Community Partnerprogramme Entwickeln API Vorlagen Sicherheit Beratung Fordere eine Demo an Anmelden Sicherheit und Datenschutz Sicherheit und Datenschutz haben für uns oberste Priorität – darauf ist Notion von Grund auf ausgelegt. Sicherheit Notion gewährleistet den Schutz deiner Daten über einen Secure-by-Design-Ansatz. Unser Team investiert fortlaufend in die Sicherheit, damit du Notion sorglos nutzen kannst. Unsere Sicherheitsverfahren → Sicherheitsinfrastruktur Die Infrastruktur von Notion verfügt über mehrere Schutzebenen, sodass deine Daten bei der Übermittlung, Speicherung und Verarbeitung bestmöglich geschützt sind. Zu den Schutzvorkehrungen zählen insbesondere die Verschlüsselung, das Prinzip der minimalen Rechtevergabe, die sichere Softwareentwicklung und ein öffentliches Bug-Bounty-Programm . Operative Sicherheit Unser Team für die Informationssicherheit führt kontinuierlich neue Sicherheitskontrollen durch und überwacht die gesamte Infrastruktur sowie die Netzwerke von Notion auf schädliche Aktivitäten. Produktsicherheit Notion verfügt über solide Datenschutz- und Verwaltungskontrollen für eine größere Sichtbarkeit und Kontrolle unserer Daten. In Unternehmen lässt sich Notion über SAML 2.0 mit SSO einsetzen, Bereitstellungsnutzer/-innen über SCIM und Rückverfolgungstätigkeiten mit den Audit-Protokollierungsfunktionen. Die Berechtigungskontrollen sowie Gäste lassen sich ebenfalls genau einstellen und die Teamorganisationen lassen sich verwalten. Datenschutz Notion verfügt über ein umfassendes Datenschutzprogramm und arbeitet eng mit Kund/-innen und Lieferanten beim Datenschutz zusammen. Diese Seite enthält einige der wichtigsten Bestandteile unseres Programms. So handhaben wir deine Daten Unser Team bei Notion entwickelt und implementiert Datenschutzprozesse und Schutzvorkehrungen, die den Branchenstandards und bewährten Vorgehensweisen entsprechen. Unsere Teams werden regelmäßig geschult, sodass sie über die neusten rechtlichen Entwicklungen und alle wichtigen Datenschutz- und Sicherheitspraktiken stets informiert sind. Alle Mitarbeiter/-innen und Dienstleister von Notion unterzeichnen eine Geheimhaltungsvereinbarung, sodass die Vertraulichkeit und Sicherheit deiner Daten stets gewährleistet sind. Zudem verpflichtet Notion alle Lieferanten zu einem verantwortungsbewussten Umgang mit personenbezogenen Daten unter Anwendung der Praktiken und Standards zum Datenmanagement und Datenschutz. Vereinbarungen Bei Notion sind wir bestrebt, all unsere Vereinbarungen auf dem neuesten Stand zu halten, sodass sie den aktuellen Vorschriften und Branchenstandards entsprechen. In unserem Master Subscription Agreement und Data Processing Addendum werden die Datenschutzprozesse, -standards und -vorkehrungen von Notion sowie unsere Einhaltung von Datenschutzgesetzen ausführlich beschrieben. Um sicherzustellen, dass unsere Bedingungen der DSGVO, dem CCPA und anderen weltweit geltenden Datenschutzstandards entsprechen, lassen wir sie kontinuierlich von führenden Datenschutzexperten in verschiedenen Ländern überprüfen. Data Governance Data Governance bezieht sich auf die Richtlinien und Verfahren, die vorgeben, wie Daten während ihres gesamten Lebenszyklus zu beschaffen und zu verwenden sind – von der Erstellung und Erfassung bis hin zur Verarbeitung, Verteilung, Speicherung und Löschung. Notion verpflichtet sich zur Implementierung von Data Governance, um sicherzustellen, dass die Daten unserer Benutzer/-innen sicher, geschützt, korrekt und abrufbar sind. Richtlinien Bei Notion möchten wir unseren Kundinnen und Kunden größtmögliche Transparenz bezüglich der Erfassung, Verarbeitung, Speicherung und Nutzung ihrer personenbezogenen Daten bieten. Um dies zu erreichen, befolgt Notion umfassende und detaillierte Richtlinien dazu, wie wir mit deinen personenbezogenen Daten umgehen. In diesen Richtlinien wird detailliert beschrieben, wie unsere Benutzer/-innen ihre Rechte in Bezug auf ihre Daten wahrnehmen können. DSGVO Die Datenschutz-Grundverordnung (DSGVO) ist ein umfassendes Datenschutzgesetz, das die Erhebung und Verwendung personenbezogener Daten von Einwohner/-innen der EU regelt und den betroffenen Personen Kontrolle über ihre Daten gibt. Da die DSGVO weithin als weltweit strengster Datenschutzstandard gilt, haben wir unser Datenschutzprogramm auf die DSGVO und andere weltweite Datenschutzregelungen ausgerichtet. Compliance Notion betreibt ein umfassendes Sicherheits- und Datenschutzprogramm, um erweiterte Sicherheitsfunktionen für unseren Enterprise Plan bereitzustellen, die darauf ausgelegt sind, deine Daten in Übereinstimmung mit verschiedenen gesetzlichen und branchenspezifischen Standards zu schützen. Notion wurde von unabhängigen externen Auditoren überprüft und zertifiziert. Du kannst ein Exemplar unserer Compliance-Berichte bei unserem Trust-Portal unter  [email&#160;protected]  anfordern. SOC 2 Type 2 Der SOC 2 Type 2 ist ein Auditbericht eines unabhängigen Dritten mit einer Zertifizierung des American Institute of Certified Public Accountants (AICPA), um die Kontrollen eines Dienstleistungsunternehmens in Bezug auf Trust Services Criteria (TSC) zu bewerten. Der SOC 2 Type 2-Bericht bewertet die Wirksamkeit dieser Kontrollen über einen bestimmten Zeitraum. Außerdem erhalten die Kund/-innen und sonstige Beteiligte so die Sicherheit, dass das Unternehmen angemessene Kontrollen zum Schutz ihrer Daten implementiert hat. ISO 27001, ISO 27701, ISO 27017, ISO 27018 ISO ist eine internationale Organisation für die Entwicklung von Normen. Notion ist nach den folgenden ISO-Normen zertifiziert: ISO 27001, ISO 27701, ISO 27017 und ISO 27018. Diese Normen beschreiben die Anforderungen für die Einrichtung, Umsetzung, Aufrechterhaltung und fortlaufende Verbesserung des Informationssicherheits-Managementsystems (ISMS) und Privacy Information Management Systems (PIMS) von Notion. HIPAA Der Health Insurance Portability and Accountability Act (HIPAA) ist ein 1996 erlassenes US-Bundesgesetz, das den Schutz und die vertrauliche Behandlung geschützter Gesundheitsinformationen durch betroffene Organisationen wie Gesundheitsdienstleister, Krankenversicherungen und Clearingstellen für das Gesundheitswesen sowie deren Geschäftspartner vorschreibt. Sofern Unternehmen, die dem HIPAA unterliegen, die hier in unserem Hilfe-Center beschriebenen Notion-Sicherheitsfunktionen im Enterprise Plan nutzen und das Business Associate Agreement (BAA) von Notion unterzeichnen, dürfen sie Gesundheitsinformationen in ihrem Notion-Workspace verarbeiten. BSI C5 (Cloud Computing Compliance Controls Catalogue)  BSI C5 is a security standard developed by the German Federal Office for Information Security. It outlines baseline security controls for cloud service providers. C5 includes additional control requirements relating to data location, service provisioning, place of jurisdiction, existing certifications, information disclosure obligations, and a full-service description. Governance für künstliche Intelligenz (KI) Notion nutzt KI, um das Erlebnis für unser Kernprodukt zu verbessern und unseren Nutzenden bei ihren täglichen Arbeitsabläufen einen echten Mehrwert zu bieten. Dabei kommt es uns besonders auf Vertrauenswürdigkeit, Zuverlässigkeit und Benutzerorientiertheit an. Sicher und geschützt: Notion verfolgt einen sicherheitsorientierten Ansatz für künstliche Intelligenz. Unsere KI-Funktionen und Partner werden auf sicherheits- und rechtsbezogene Aspekte überprüft, bevor Notion die entsprechenden Dienste nutzt. Diese Sicherheitsverfahren gelten für unsere KI-Funktionen und unseren KI-Entwicklungsprozess. Unsere Sicherheitsverfahren → Transparenz: Transparenz gegenüber unserer Kundschaft hinsichtlich unserer KI-Produkte hat für uns bei Notion höchste Priorität. Um diese sicherzustellen, stellt Notion ein Hilfe-Center sowie eine Seite mit Nutzungsbedingungen und Informationen zum Datenschutz bereit, auf der die Funktionalität und Datenschutzverfahren für unserer KI-Produkte erläutert werden. Nutzungsbedingungen und Datenschutzrichtlinie → Unterstützung: Unser Ziel ist es, KI-optimierte Erlebnisse zu gestalten, die nicht nur interessant sind, sondern deine täglichen Arbeitsabläufe nachhaltig verbessern. Um dies zu erreichen, beruht die Entwicklung unserer KI-gestützten Funktionen auf umfassender Forschung, die uns ein besseres Verständnis der Benutzerbedürfnisse vermittelt. Data Governance: Deine Daten gehören dir. Unseren KI-Auftragsverarbeitenden ist die Nutzung von Kundendaten zum Trainieren von Modellen untersagt.  Der Zugriff auf und die Nutzung von Kundendaten wird durch Zugriffssteuerungen und -berechtigungen geregelt. Zuverlässigkeit Von Kreativen bis hin zu Kooperationen: Sie alle vertrauen auf Notion – Alle verdienen eine Plattform, auf die sie sich verlassen können. Aufgrund der soliden garantierten Betriebszeiten und mehrstufigen Redundanz von Notion kannst du darauf zählen, dass wir da sind, wenn du uns brauchst. Infrastruktur der Enterprise-Klasse Wir arbeiten mit AWS und Cloudflare zusammen, um eine erstklassige Architektur aufzubauen und für unsere Benutzerinnen und Benutzer sicherzustellen, dass Notion auf maximale geschäftliche Resilienz ausgelegt ist. Hohe Verfügbarkeit und Failover Notion schützt deine Daten durch mehrere Redundanzzonen, ein umfassendes Backup-Programm und regelmäßige Tests unseres Disaster-Recovery- und Business-Continuity-Programms. Wir bieten eine garantierte Betriebszeit von 99,9 %, sodass unsere Benutzerinnen und Benutzer darauf vertrauen können, dass wir da sind, wenn sie uns brauchen. Die Service-Level-Bedingungen von Notion findest du hier . Dienststatus Über die Statusseite von Notion lassen sich transparent und einfach Echtzeitinformationen zur Verfügbarkeit anzeigen. Informationen zu unserem Enterprise Plan. Du möchtest mehr Sicherheit und Kontrolle? Nenne uns deine Anforderungen und wir helfen dir bei der Umsetzung! Dialog schließen Erfolgreich übermittelt Vorname * Nachname * Geschäftliche E-Mail-Adresse * Position * Unternehmensname * Unternehmensgröße * Auswählen… 1-99 Beschäftigte 100-299 Beschäftigte 300-1999 Beschäftigte 2000+ Beschäftigte Land oder Region * Auswählen… Telefonnummer (optional) Grund für Kontaktaufnahme * Auswählen… Ich möchte einen Anwendungsfall für Unternehmen besprechen Ich möchte mehr über die Tarifoptionen erfahren Ich möchte mir gerne eine Produktdemo ansehen Ich suche nach Tarifen für Studierende / gemeinnützige Organisationen Ich benötige Support bei einem Produkt oder der Abrechnung Sonstiges (bitte unten näher erläutern) Mache genauere Angaben (optional) Vertriebsteam kontaktieren Passwort Deutsch Cookie-Einstellungen © 2026 Notion Labs, Inc. Unternehmen Über uns Karriere Sicherheit Status Nutzungsbedingungen und Datenschutz Deine Datenschutzrechte Download iOS und Android Mac und Windows Calendar Web Clipper Ressourcen Hilfe-Center Preise Blog Community Einbindungen Vorlagen Partnerprogramme Notion für Unternehmen Kleine Unternehmen Persönlich Mehr entdecken →
2026-01-13T09:29:56
https://ai.google.dev/api/models?hl=vi
Models &nbsp;|&nbsp; Gemini API &nbsp;|&nbsp; Google AI for Developers Chuyển ngay đến nội dung chính / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 Lấy khoá API Sổ tay nấu ăn Cộng đồng Đăng nhập Tài liệu Tài liệu tham khảo API Gemini API Tài liệu Tài liệu tham khảo API Lấy khoá API Sổ tay nấu ăn Cộng đồng Tổng quan Phiên bản API Chức năng Mô hình Đang tạo nội dung API trực tiếp Live Music API Interactions API Mã Tệp API xử lý hàng loạt Lưu vào bộ nhớ đệm Mục nhúng Tìm kiếm tệp Lưu trữ nội dung tìm kiếm tệp Tài liệu Tất cả phương pháp Không dùng nữa PaLM (đã loại bỏ) Tài liệu tham khảo về SDK Python Go TypeScript Java C# Trang chủ Gemini API Tài liệu tham khảo API Gửi ý kiến phản hồi Models Điểm cuối models cung cấp cho bạn cách liệt kê các mô hình hiện có theo phương thức lập trình và truy xuất siêu dữ liệu mở rộng, chẳng hạn như chức năng được hỗ trợ và kích thước cửa sổ theo bối cảnh. Đọc thêm trong hướng dẫn về Mô hình . Phương thức: models.get Điểm cuối Tham số đường dẫn Nội dung yêu cầu Nội dung phản hồi Phạm vi uỷ quyền Ví dụ về yêu cầu Nhận Lấy thông tin về một Model cụ thể, chẳng hạn như số phiên bản, hạn mức mã thông báo, tham số và siêu dữ liệu khác. Hãy tham khảo hướng dẫn về các mô hình Gemini để biết thông tin chi tiết về mô hình. Điểm cuối get https: / /generativelanguage.googleapis.com /v1beta /{name=models /*} Tham số đường dẫn name string Bắt buộc. Tên tài nguyên của mô hình. Tên này phải khớp với tên mô hình do phương thức models.list trả về. Định dạng: models/{model} . Tên này có dạng models/{model} . Nội dung yêu cầu Nội dung yêu cầu phải trống. Ví dụ về yêu cầu Python from google import genai client = genai . Client () model_info = client . models . get ( model = "gemini-2.0-flash" ) print ( model_info ) models . py Go ctx := context . Background () client , err := genai . NewClient ( ctx , &amp; genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } modelInfo , err := client . Models . Get ( ctx , "gemini-2.0-flash" , nil ) if err != nil { log . Fatal ( err ) } fmt . Println ( modelInfo ) models . go Vỏ curl https://generativelanguage.googleapis.com/v1beta/models/gemini-2.0-flash?key = $GEMINI_API_KEY models .sh Nội dung phản hồi Nếu thành công, nội dung phản hồi sẽ chứa một phiên bản của Model . Phương thức: models.list Điểm cuối Tham số truy vấn Nội dung yêu cầu Nội dung phản hồi Biểu diễn dưới dạng JSON Phạm vi uỷ quyền Ví dụ về yêu cầu List (Danh sách) Liệt kê Model s có sẵn thông qua Gemini API. Điểm cuối get https: / /generativelanguage.googleapis.com /v1beta /models Tham số truy vấn pageSize integer Số lượng Models tối đa cần trả về (trên mỗi trang). Nếu không chỉ định, 50 mô hình sẽ được trả về trên mỗi trang. Phương thức này trả về tối đa 1.000 mô hình trên mỗi trang, ngay cả khi bạn truyền một pageSize lớn hơn. pageToken string Mã thông báo trang nhận được từ một lệnh gọi models.list trước đó. Cung cấp pageToken do một yêu cầu trả về làm đối số cho yêu cầu tiếp theo để truy xuất trang tiếp theo. Khi phân trang, tất cả các tham số khác được cung cấp cho models.list phải khớp với lệnh gọi đã cung cấp mã thông báo trang. Nội dung yêu cầu Nội dung yêu cầu phải trống. Ví dụ về yêu cầu Python from google import genai client = genai . Client () print ( "List of models that support generateContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "generateContent" : print ( m . name ) print ( "List of models that support embedContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "embedContent" : print ( m . name ) models . py Go ctx := context . Background () client , err := genai . NewClient ( ctx , &amp; genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } // Retrieve the list of models. models , err := client . Models . List ( ctx , &amp; genai . ListModelsConfig {}) if err != nil { log . Fatal ( err ) } fmt . Println ( "List of models that support generateContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "generateContent" { fmt . Println ( m . Name ) break } } } fmt . Println ( "\nList of models that support embedContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "embedContent" { fmt . Println ( m . Name ) break } } } models . go Vỏ curl https://generativelanguage.googleapis.com/v1beta/models?key = $GEMINI_API_KEY models .sh Nội dung phản hồi Phản hồi từ ListModel chứa danh sách Mô hình được phân trang. Nếu thành công, phần nội dung phản hồi sẽ chứa dữ liệu có cấu trúc sau: Trường models[] object ( Model ) Các Mô hình được trả về. nextPageToken string Một mã thông báo có thể được gửi dưới dạng pageToken để truy xuất trang tiếp theo. Nếu bạn bỏ qua trường này, thì sẽ không còn trang nào nữa. Biểu diễn dưới dạng JSON { "models" : [ { object ( Model ) } ] , "nextPageToken" : string } Tài nguyên REST: models Tài nguyên: Mô hình Biểu diễn dưới dạng JSON Phương thức Tài nguyên: Mô hình Thông tin về Mô hình ngôn ngữ tạo sinh. Trường name string Bắt buộc. Tên tài nguyên của Model . Hãy tham khảo Biến thể mô hình để biết tất cả các giá trị được phép. Định dạng: models/{model} có quy ước đặt tên {model} như sau: "{baseModelId}-{version}" Ví dụ: models/gemini-1.5-flash-001 baseModelId string Bắt buộc. Tên của mô hình cơ sở, hãy truyền tên này vào yêu cầu tạo. Ví dụ: gemini-1.5-flash version string Bắt buộc. Số phiên bản của mô hình. Đây là phiên bản chính ( 1.0 hoặc 1.5 ) displayName string Tên dễ đọc của mô hình. Ví dụ: "Gemini 1.5 Flash". Tên có thể dài tối đa 128 ký tự và có thể chứa mọi ký tự UTF-8. description string Nội dung mô tả ngắn về mô hình. inputTokenLimit integer Số lượng mã thông báo đầu vào tối đa được phép cho mô hình này. outputTokenLimit integer Số lượng mã thông báo đầu ra tối đa mà mô hình này có thể tạo ra. supportedGenerationMethods[] string Các phương thức tạo được mô hình hỗ trợ. Tên phương thức API tương ứng được xác định là các chuỗi PascalCase, chẳng hạn như generateMessage và generateContent . thinking boolean Liệu mô hình có hỗ trợ tư duy hay không. temperature number Kiểm soát tính ngẫu nhiên của kết quả. Giá trị có thể nằm trong khoảng [0.0,maxTemperature] , bao gồm cả giá trị này. Giá trị càng cao thì câu trả lời càng đa dạng, trong khi giá trị càng gần 0.0 thì câu trả lời của mô hình thường ít gây bất ngờ hơn. Giá trị này chỉ định giá trị mặc định mà phần phụ trợ sẽ sử dụng trong khi gọi đến mô hình. maxTemperature number Nhiệt độ tối đa mà mô hình này có thể sử dụng. topP number Đối với Lấy mẫu hạt nhân . Lấy mẫu hạt nhân xem xét tập hợp mã thông báo nhỏ nhất có tổng xác suất ít nhất là topP . Giá trị này chỉ định giá trị mặc định mà phần phụ trợ sẽ sử dụng trong khi gọi đến mô hình. topK integer Đối với phương pháp lấy mẫu Top-k. Phương pháp lấy mẫu k hàng đầu xem xét tập hợp topK mã thông báo có khả năng xảy ra nhất. Giá trị này chỉ định giá trị mặc định mà phần phụ trợ sẽ sử dụng trong khi gọi đến mô hình. Nếu trống, tức là mô hình không sử dụng phương pháp lấy mẫu top-k và topK không được phép làm tham số tạo. Biểu diễn dưới dạng JSON { "name" : string , "baseModelId" : string , "version" : string , "displayName" : string , "description" : string , "inputTokenLimit" : integer , "outputTokenLimit" : integer , "supportedGenerationMethods" : [ string ] , "thinking" : boolean , "temperature" : number , "maxTemperature" : number , "topP" : number , "topK" : integer } Phương thức: models.predict Điểm cuối Tham số đường dẫn Nội dung yêu cầu Biểu diễn dưới dạng JSON Nội dung phản hồi Biểu diễn dưới dạng JSON Phạm vi uỷ quyền Thực hiện một yêu cầu dự đoán. Điểm cuối post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predict Tham số đường dẫn model string Bắt buộc. Tên của mô hình để dự đoán. Định dạng: name=models/{model} . Tên này có dạng models/{model} . Nội dung yêu cầu Nội dung yêu cầu chứa dữ liệu với cấu trúc sau: Trường instances[] value ( Value format) Bắt buộc. Các thực thể là dữ liệu đầu vào cho lệnh gọi dự đoán. parameters value ( Value format) Không bắt buộc. Các thông số chi phối lệnh gọi dự đoán. Nội dung phản hồi Thông báo phản hồi cho [PredictionService.Predict]. Nếu thành công, phần nội dung phản hồi sẽ chứa dữ liệu có cấu trúc sau: Trường predictions[] value ( Value format) Đầu ra của lệnh gọi dự đoán. Biểu diễn dưới dạng JSON { "predictions" : [ value ] } Phương thức: models.predictLongRunning Điểm cuối Tham số đường dẫn Nội dung yêu cầu Biểu diễn dưới dạng JSON Nội dung phản hồi Phạm vi uỷ quyền Tương tự như models.predict nhưng trả về một LRO. Điểm cuối post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predictLongRunning Tham số đường dẫn model string Bắt buộc. Tên của mô hình để dự đoán. Định dạng: name=models/{model} . Nội dung yêu cầu Nội dung yêu cầu chứa dữ liệu với cấu trúc sau: Trường instances[] value ( Value format) Bắt buộc. Các thực thể là dữ liệu đầu vào cho lệnh gọi dự đoán. parameters value ( Value format) Không bắt buộc. Các thông số chi phối lệnh gọi dự đoán. Nội dung phản hồi Nếu thành công, nội dung phản hồi sẽ chứa một phiên bản của Operation . Gửi ý kiến phản hồi Trừ phi có lưu ý khác, nội dung của trang này được cấp phép theo Giấy phép ghi nhận tác giả 4.0 của Creative Commons và các mẫu mã lập trình được cấp phép theo Giấy phép Apache 2.0 . Để biết thông tin chi tiết, vui lòng tham khảo Chính sách trang web của Google Developers . Java là nhãn hiệu đã đăng ký của Oracle và/hoặc các đơn vị liên kết với Oracle. Cập nhật lần gần đây nhất: 2025-12-16 UTC. Bạn muốn chia sẻ thêm với chúng tôi? [[["Dễ hiểu","easyToUnderstand","thumb-up"],["Giúp tôi giải quyết được vấn đề","solvedMyProblem","thumb-up"],["Khác","otherUp","thumb-up"]],[["Thiếu thông tin tôi cần","missingTheInformationINeed","thumb-down"],["Quá phức tạp/quá nhiều bước","tooComplicatedTooManySteps","thumb-down"],["Đã lỗi thời","outOfDate","thumb-down"],["Vấn đề về bản dịch","translationIssue","thumb-down"],["Vấn đề về mẫu/mã","samplesCodeIssue","thumb-down"],["Khác","otherDown","thumb-down"]],["Cập nhật lần gần đây nhất: 2025-12-16 UTC."],[],[]] Điều khoản Quyền riêng tư Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:56
https://wp.me/Pe9aAK-2s
Contact Us &#8211; Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Contact us We&#8217;re here to help. Please tell us more: &nbsp;I have a question about signing up or subscribing. &nbsp;I have a billing question. &nbsp;I have a technical support question. &nbsp;I think Akismet is catching my comments by mistake. &nbsp;I have an enterprise or large-scale question. &nbsp;I have a question about nonprofit accounts. &nbsp;Privacy: I want to opt my email address out of all long term tracking. &nbsp;You all are great! &nbsp;I have a question about developing an application or library with Akismet. &nbsp;I have a press/interview request. &nbsp;My site has been incorrectly classified as commercial. Your name Your email Company (optional) Your site URL (optional if you enter your API key below) API key (required only for paid priority support) Your message What is 14+7? * Submit * You might wonder: if these guys are so good at blocking spam, why would they put a stupid question like this on their contact form to keep spam out? Well, Akismet is great at protecting contact forms; we use it on all our other sites, but on Akismet.com, sometimes people use the contact form to tell us they’re being blocked by Akismet. If you think about that, blocking people when they’re trying to tell us they’re wrongly blocked would probably frustrate them, hence the math question. Immediate responses I need to update my credit card. I forgot my API key. I need to reset my password. I need to cancel my subscription. Priority support Want to get help even faster? Don’t forget that our Pro subscription includes priority email support. Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:56
https://www.notion.com/de/teams
Notion für Teams und Unternehmen Notion Funktionen Notion-KI Erschaffen, schreiben, automatisieren Agenten Übernehmen manuelle Aufgaben Enterprise Suche Finde Antworten in Sekundenschnelle Smart Notes Perfekt geschrieben von der KI Dokumente Einfach und leistungsstark Wissensdatenbank Bündle dein Wissen Projekte Verwalte jede Art von Projekt Websites Veröffentliche alles Mögliche im Handumdrehen Loslegen KI-Anwendungsfälle entdecken Schau dir an, wozu die Notion-KI in der Lage ist Marktplatz durchstöbern Vorlagen für alles Mögliche Einbindungen anzeigen Verbinde deine Apps mit Notion Web Clipper herunterladen Speichere Inhalte aus dem Web in Notion Teste die Desktop-App von Notion für mehr Geschwindigkeit App herunterladen Mail Calendar KI Enterprise Tarife Erkunden Teams Entwicklung und Produkt Design Marketing IT Teamgröße Start-ups KMUs Konzerne Bildungswesen Lernen Hilfe-Center Notion Academy Erfahrungsberichte von Kund/-innen Blog Community Partnerprogramme Entwickeln API Vorlagen Sicherheit Beratung Fordere eine Demo an Anmelden Nutze Notion kostenlos Wo Teams besser zusammenarbeiten Deine Projekte, Wikis und Dokumente, alle an einem Ort. Für kleine Teams und große Unternehmen. Nutze Notion kostenlos Fordere eine Demo an Schließe Projekte schneller ab Sorge dafür, dass alle vom Entwurf bis zum Launch an einem Strang ziehen. Verwalte anspruchsvolle Projekte und spezifische Aufgaben mit benutzerdefinierten Gantt- und Kanban-Konfigurationen. Teilen Notion hilft uns dabei, den Überblick zu behalten über die mehr als 30 Projekte, die wir gleichzeitig stemmen. Wir können jedes anklicken und sind sofort über den vollen Stand der Dinge informiert. Justin Watt Director of Ops &amp; Marketing, MetaLab Dein digitales Büro Chaotische Ordner und verschiedene Versionen des gleichen Dokuments gehören ab jetzt der Vergangenheit an. Verwalte alles an einem zentralen Ort, damit alle das finden können, was sie brauchen, um ihre Arbeit bestmöglich zu erledigen. Alle Teamspaces Teamspaces suchen... Your teamspaces General Engineering Sales Marketing Managers More teamspaces Kyoto Office 32 Mitglieder London Office 44 Mitglieder HR &amp; Legal 22 Mitglieder Conference Planning 96 Mitglieder Neuer Teamspace Teilen Bevor wir Notion hatten, hatten nur wenige im Team einen Überblick. Jetzt können alle selbstbestimmter arbeiten und die nötigen Informationen finden, um schnell voranzukommen. Sanjay Nand Innovation Strategist, Capgemini Damit alle wissen, wo es langgeht Meeting-Notizen, Zielplanungen, Ablaufpläne – protokolliere alle wichtigen Entscheidungen und verschaffe allen Beteiligten einen Überblick darüber, wer was wann tut. Teilen Wir haben sonst immer E-Mails mit Meeting-Protokollen verschickt. Jetzt wissen alle im Team, wo sie Informationen über den Umfang des Projekts oder Ähnliches finden. Zoe Bachman Produktmanagerin, Curriculum, Codecademy Beginne mit dem Free Plan Lade dein Team ein und bringe Ordnung in eure Abläufe. Es gibt keine Zeitbegrenzung und wir brauchen auch keine Kreditkartendaten – erst in Ruhe ausprobieren, später kaufen. Nutze Notion kostenlos Funktionen Notion für Teams Zusammenarbeit in Echtzeit Anpassbare Berechtigungen API-Einbindungen Gantt, Kanban-Board und Kalender-Ansichten Aufgaben und Projekte verwalten Wiki/interne Wissensdatenbank aufbauen Ansprechende Notizen und Dokumente Einfaches Bearbeiten per Drag &amp;amp; Drop Volle Funktionalität in der mobilen App Passend für jedes Team Notion löst die individuellen Probleme jeder Rolle 🛠 Entwicklung Bringe Features schneller an den Start mit Express-Aufgaben, Code-Richtlinien, Bug-Fixes und mehr – alles an einem Ort. Weitere Informationen 🎒 Produkt Mache dein Produkt schneller zugänglich dank Nutzerforschung und funktionsübergreifenden Projekten in Notion. Weitere Informationen 🎨 Design Sorge für ein einheitliches Design, indem du Assets, Anleitungen und Prototypen mit Notion zusammenführst. Weitere Informationen Vorlagen – erste Schritte Füge dem Workspace deines Teams ein vorgefertigtes Setup hinzu und passe es dann auf die spezifischen Workflows deines Teams an. Das Design-System von Headspace Mit dieser Vorlage kannst du mit deinem Team an geteilten Design-Ressourcen arbeiten. Diese Vorlage nutzen → Fahrplan der Match Group Setze Prioritäten für deine großen Aufträge in diesem Jahr, damit du den Überblick behältst und dich voll darauf konzentrieren kannst. Diese Vorlage nutzen → Deshalb lieben Unternehmen Notion Notion hat die beste Bewertung auf G2 Notion ist laut Hunderten von Kundenrezensionen auf G2 der absolute Branchenführer. Du glaubst uns nicht? Schau dir den Vergleich von G2 an, um mehr zu erfahren. 86% Leicht zu benutzen 90% Leicht zu verwalten 91% Erfüllt die Anforderungen 86% Leicht einzurichten Teste Notion noch heute Steige kostenlos ein und füge dann so viele Leute hinzu, wie du magst. Nutze Notion kostenlos Deutsch Cookie-Einstellungen © 2026 Notion Labs, Inc. Unternehmen Über uns Karriere Sicherheit Status Nutzungsbedingungen und Datenschutz Deine Datenschutzrechte Download iOS und Android Mac und Windows Calendar Web Clipper Ressourcen Hilfe-Center Preise Blog Community Einbindungen Vorlagen Partnerprogramme Notion für Unternehmen Kleine Unternehmen Persönlich Mehr entdecken →
2026-01-13T09:29:56
https://infisical.com/docs/integrations/platforms/certificate-agent#workflow
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let&#x27;s Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;./client-id&quot; # Path to file containing client ID client-secret : &quot;./client-secret&quot; # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : &quot;kubernetes-auth&quot; config : identity-id : &quot;your-kubernetes-identity-id&quot; service-account-token-path : &quot;/var/run/secrets/kubernetes.io/serviceaccount/token&quot; Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : &quot;azure-auth&quot; config : identity-id : &quot;your-azure-identity-id&quot; Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;gcp-id-token&quot; config : identity-id : &quot;your-gcp-identity-id&quot; GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : &quot;gcp-iam&quot; config : identity-id : &quot;your-gcp-identity-id&quot; service-account-key : &quot;/path/to/service-account-key.json&quot; Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;aws-iam&quot; config : identity-id : &quot;your-aws-identity-id&quot; ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : [ &quot;api.example.com&quot; , &quot;api-v2.example.com&quot; ] ttl : &quot;90d&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; # Enable automatic certificate renewal lifecycle : renew-before-expiry : &quot;30d&quot; status-check-interval : &quot;6h&quot; # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : &quot;/etc/ssl/private/web.key&quot; permission : &quot;0600&quot; # Read/write for owner only certificate : path : &quot;/etc/ssl/certs/web.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner chain : path : &quot;/etc/ssl/certs/web-chain.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo &quot;Certificate issued for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-failure : command : | echo &quot;Certificate operation failed: ${ERROR_MESSAGE}&quot; mail -s &quot;Certificate Alert&quot; [email&#160;protected] &lt; /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., [&quot;www.example.com&quot;, &quot;api.example.com&quot;] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger &#x27;Certificate renewal failed&#x27; , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo &quot;New certificate issued for ${CERT_COMMON_NAME}&quot; chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d &quot;{&#x27;text&#x27;: &#x27;Certificate for ${CERT_COMMON_NAME} renewed successfully&#x27;}&quot; timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo &quot;Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}&quot; # Send alert mail -s &quot;Certificate Failure Alert&quot; [email&#160;protected] &lt; /dev/null # Log to syslog logger -p daemon.error &quot;Certificate agent failure: ${ERROR_MESSAGE}&quot; timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : &quot;https://app.infisical.com&quot; retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; csr-path : &quot;/etc/ssl/requests/api.csr&quot; file-output : certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; lifecycle : renew-before-expiry : &quot;14d&quot; # Renew 14 days before expiration status-check-interval : &quot;6h&quot; # Check certificate status every 6 hours file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; post-hooks : on-issuance : command : &quot;systemctl reload nginx&quot; timeout : 30 on-renewal : command : &quot;systemctl reload nginx &amp;&amp; logger &#x27;Certificate renewed&#x27;&quot; timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:56
https://infisical.com/docs/integrations/platforms/certificate-agent#retrying-mechanism
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let&#x27;s Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;./client-id&quot; # Path to file containing client ID client-secret : &quot;./client-secret&quot; # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : &quot;kubernetes-auth&quot; config : identity-id : &quot;your-kubernetes-identity-id&quot; service-account-token-path : &quot;/var/run/secrets/kubernetes.io/serviceaccount/token&quot; Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : &quot;azure-auth&quot; config : identity-id : &quot;your-azure-identity-id&quot; Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;gcp-id-token&quot; config : identity-id : &quot;your-gcp-identity-id&quot; GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : &quot;gcp-iam&quot; config : identity-id : &quot;your-gcp-identity-id&quot; service-account-key : &quot;/path/to/service-account-key.json&quot; Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;aws-iam&quot; config : identity-id : &quot;your-aws-identity-id&quot; ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : [ &quot;api.example.com&quot; , &quot;api-v2.example.com&quot; ] ttl : &quot;90d&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; # Enable automatic certificate renewal lifecycle : renew-before-expiry : &quot;30d&quot; status-check-interval : &quot;6h&quot; # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : &quot;/etc/ssl/private/web.key&quot; permission : &quot;0600&quot; # Read/write for owner only certificate : path : &quot;/etc/ssl/certs/web.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner chain : path : &quot;/etc/ssl/certs/web-chain.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo &quot;Certificate issued for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-failure : command : | echo &quot;Certificate operation failed: ${ERROR_MESSAGE}&quot; mail -s &quot;Certificate Alert&quot; [email&#160;protected] &lt; /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., [&quot;www.example.com&quot;, &quot;api.example.com&quot;] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger &#x27;Certificate renewal failed&#x27; , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo &quot;New certificate issued for ${CERT_COMMON_NAME}&quot; chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d &quot;{&#x27;text&#x27;: &#x27;Certificate for ${CERT_COMMON_NAME} renewed successfully&#x27;}&quot; timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo &quot;Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}&quot; # Send alert mail -s &quot;Certificate Failure Alert&quot; [email&#160;protected] &lt; /dev/null # Log to syslog logger -p daemon.error &quot;Certificate agent failure: ${ERROR_MESSAGE}&quot; timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : &quot;https://app.infisical.com&quot; retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; csr-path : &quot;/etc/ssl/requests/api.csr&quot; file-output : certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; lifecycle : renew-before-expiry : &quot;14d&quot; # Renew 14 days before expiration status-check-interval : &quot;6h&quot; # Check certificate status every 6 hours file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; post-hooks : on-issuance : command : &quot;systemctl reload nginx&quot; timeout : 30 on-renewal : command : &quot;systemctl reload nginx &amp;&amp; logger &#x27;Certificate renewed&#x27;&quot; timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:56
https://shows.acast.com/frontier/episodes/ep-43-harpreet-singh-ceo-and-co-founder-at-launchable
Ep. 43: Harpreet Singh, CEO and Co-Founder at Launchable - Frontier Podcast by Gun.io | Acast Follow Share Play Frontier Podcast by Gun.io Ep. 43: Harpreet Singh, CEO and Co-Founder at Launchable Season 4 , Ep. 43 • Thursday, February 15, 2024 This week, Teja talks with Harpreet Singh, Co-CEO and Co-Founder of Launchable, a company that's on a mission to make software testing faster and smarter. They discuss the DACI framework and the importance of intentionality in decision-making, what it's like to bring a behemoth like Jenkins to life, and the power of slowing down to meditate. https://www.launchableinc.com/ Show more RSS More episodes View all episodes 46. Ep. 46: Matt Genovese, CEO and Founder of Planorama 54:36 | Thursday, April 11, 2024 | Season 4 , Ep. 46 This week, Teja sits down with Matt Genovese, CEO and Founder of Planorama, a company that designs UX/UI flows for products with complete enablement for software teams. They discuss the intricacies of living abroad, the importance of incorporating design, and how de-risking early on in the life of a new product can make it more successful in the long run.https://planorama.design/matthttps://aiproducthive.com Play 45. Ep. 45: Brian Pontarelli, CEO and Founder of FusionAuth 44:05 | Thursday, March 28, 2024 | Season 4 , Ep. 45 On this week's episode, Teja sits down with Brian Pontarelli, Founder and CEO of both FusionAuth and Cleanspeak. They discuss the complexities of growing two businesses at the same time, making progress without using AI, and the subtle clues in an interview process that let you know someone's a great culture fit.https://fusionauth.io/https://cleanspeak.com/ Play 44. Ep. 44: Sabber Ahamed, Founder of xoolooloo 28:31 | Thursday, February 29, 2024 | Season 4 , Ep. 44 This week, Teja talks with Sabber Ahamed, Founder of Xoolooloo and Data Scientist at Bridgestone. They discuss the proliferation of data science, the joys of working on your own projects outside of the 9-5, and the different things career goals of a computational geophysicist can really shake up. Play 42. Ep. 42: Brian Douglas, CEO and Founder at OpenSauced 36:55 | Thursday, February 1, 2024 | Season 4 , Ep. 42 In this week's episode, Teja talks with Brian Douglas, CEO and Founder at OpeSauced. They talk about how a good open source portfolio is more than just getting your name on big projects, the natural progression from developer advocacy to building an open source marketplace, and the trials and tribulations of learning to lead as you grow.opensauced.pizza Play 41. Ep. 41: Ian Villa, COO and Co-founder at Whisper Aero 37:33 | Thursday, January 18, 2024 | Season 4 , Ep. 41 Joining Teja on this week's episode is Ian Villa, COO and Co-founder of Whisper Aero, a company that is developing cleaner, quieter, and more efficient propulsion solutions. They discuss the pros and cons of a campus with on-site housing, the burgeoning Nashville tech scene, and how a 5 am trip to Kinko's can, in hindsight, be a lesson in entrepreneurship.whisper.aero Play 40. Ep. 40: Kate O&#x27;Neil, CEO and Co-founder at Teaming 58:40 | Thursday, January 11, 2024 | Season 4 , Ep. 40 This week, Teja sits down for round two with Kate O'Neil, who has moved into the CEO position at Teaming since the last time they talked. They discuss the differences that come with the transition to becoming a CEO, the importance of incorporating movement into your life, and why getting the best sleep comes down to the perfect sheets.teaming.com Play 39. Ep. 39: Jeremy Snyder, CEO and Founder at FireTail 50:32 | Thursday, January 4, 2024 | Season 4 , Ep. 39 After a brief holiday hiatus, Teja is back this week with Jeremy Snyder, the Founder and CEO of FireTail, an API security platform that provides application layer visibility, real-time, inline inspection, and blocking of malicious API calls. They talk about being a less technical founder, how being a polyglot helps you understand more than language, and the importance of taking the time to find your own adventure.https://www.firetail.io/ Play 38. Ep. 38: Stefan Avram, Head of Growth and Co-Founder at WunderGraph 34:16 | Thursday, December 21, 2023 | Season 4 , Ep. 38 Teja sits down with Stefan Avram, Head of Growth and Co-founder at WunderGraph, an open-source GraphQL federation. They discuss how injuries can change your life trajectory, the complexities of working with distributed teams, and how sometimes getting fired can be the best thing that's ever happened to you. www.wundergraph.com Play Instagram X.com TikTok Copyright Gun.io Hosted with ❤️ by Acast
2026-01-13T09:29:56
https://www.telegraph.co.uk/politics/
Politics: Latest news &amp; updates - The Telegraph - The Telegraph Jump to content UK News Website of the Year 2024 Search Icon News Sport Business Money Travel Calculators Opinion Ukraine Health Recommended Lifestyle Culture Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Search Icon Subscribe now Log in See all News UK news UK news home Scotland Wales Northern Ireland Politics Conservatives Labour Lib Dems Reform UK SNP US politics World US News Europe Middle East Asia Australasia Africa South America Donald Trump Health news Defence Science Education Environment Investigations Investigations home Signals Network Contact us Global Health Security Global Health Security home Climate &amp; People Science &amp; Disease Terror &amp; Security Women &amp; Girls Opinion &amp; Analysis Royals King Charles III Queen Camilla Prince William Princess of Wales Prince Harry Duchess of Sussex Sections UK Edition US Edition News News home UK news Politics World Donald Trump Health news Defence Science Education Environment Investigations Global Health Security Royals Sport Sport home Football Rugby Union Cricket Golf F1 Tennis Racing Women&#39;s Sport Cycling Boxing Betting More... Business Business home Economy Companies Markets Tech Money Money home Property Tax Pensions Banking Investing Net Zero Calculators Guides Travel Travel home Europe UK Worldwide City breaks Hotels Cruise Ski Advice Calculators Opinion Opinion home Obituaries Letters to the Editor Telegraph View Our columnists Cartoons Ukraine Ukraine home Daily podcast Weekly newsletter Health Health home Diet Fitness Conditions Wellbeing Parenting Guides Tools Recommended Recommended home Home Garden Sleep Tech Health &amp; Fitness Beauty &amp; Grooming Travel &amp; Outdoors Parenting Lifestyle Lifestyle home Recipes Food &amp; Drink Fashion Beauty Luxury Cars Gardening Culture Culture home TV Film Music Books Theatre Comedy Dance Opera Classical Art Telegraph Tickets Christmas Charity Appeal Puzzles Podcasts UK Edition US Edition Subscribe now Log in Login icon Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon More from The Telegraph Download our app Help and support Newsletters Recommended Financial Solutions Events Dating Offers Travel offers Shop Garden shop Bookshop Tickets Puzzles Fantasy Football Work at The Telegraph Telegraph Corporate Announcements The Chelsea Magazine Company Voucher codes See top shops Samsung Nike ASOS eBay Currys Wayfair TUI JD Sports Travelodge Adidas Telegraph View Phillipson’s educational vandalism Rather than raising the lowest, Labour prefers to scythe down the tall poppies Save Michael Deacon How have so many young women become brainwashed by the far Left? Save Net zero costs will be worse than feared, report finds Save Why a business rates U-turn won’t save our pubs Save Hermer ‘paved the way for payout to Guantanamo terror suspect’ Save Pete Hegseth sued by Democrat he demoted for criticising military Save Politics extra Our essential political digest from the corridors of Westminster - every weekday The Telegraph Politics Newsletter The Telegraph’s Peterborough diary reveals what&#39;s really going on in Westminster and beyond Weekly column Listen to our Planet Normal podcast for news from beyond the bubble, with Allison Pearson and Liam Halligan Podcast Advertisement Comment Michael Deacon How have so many young women become brainwashed by the far Left? Save Silkie Carlo A social media ban for youngsters won’t actually work, but it will destroy vital freedoms Save Stephen Pollard Zahawi is a catch but Reform needs actual MPs to break through Save Paul Morland Immigration cannot and should not be the solution to our demographic woes Save Jake Wallis Simons If Starmer bans X, we are joining the ranks of tyranny Save Stephen Daisley Rory Stewart is wrong about everything, but he gets away with it because he is posh Save Ephraim Mirvis Genocide is humanity’s gravest crime. It should not be used as a political insult Save Advertisement In depth: Strikes Hospitals went ahead with 95pc of appointments despite doctors’ strikes Save James Le Fanu Much of medicine is little more than applied common sense Save Letters to the Editor The NHS will remain in permanent crisis unless the shortage of beds is addressed Save Celia Walden Calling train drivers on £80k ‘working class’ reeks of Labour’s self-interest Save Train drivers on £80k are ‘working class’ Save Surgeon caught drunk on shift ‘blamed stress of doctors’ strike’ Save Flu surge piles pressure on hospitals Save Advertisement Around the world China plots Battersea Power Station swoop as embassy decision looms Save Luke de Pulford This spineless Government is poised to let China build a huge spy bunker in the heart of London Save Iran threatens Trump with ‘unforgettable lesson’ if US attacks Save Military doesn’t have enough money for defence plans, admits chief Save Telegraph View Starmer should be asking why China needs 208 underground rooms at its new embassy Save Uncovered: Secret room beneath Chinese embassy that poses threat to City Save Russian shadow fleet ships could be seized by British forces Save In depth Conservatives Tories pledge to sack underperforming civil servants Zahawi’s defection sets an example for disillusioned Conservatives The Daily T: Tory ‘has-been’ Zahawi defects to Reform after comparing Farage to Goebbels Labour The British taxpayer is being squeezed to pay for the world’s malcontents Labour triggers biggest hiring slump since pandemic Mandelson apologises ‘unequivocally’ to Epstein victims Lib Dems Lib Dem council fixes 4ft pothole twice in a week Lib Dem council makes beach hut owners pay 100pc council tax What’s the point of the Liberal Democrats? Reform UK Zahawi’s defection sets an example for disillusioned Conservatives Zahawi almost pulled off a PR coup... but unfortunately for him, there’s Google The Daily T: Tory ‘has-been’ Zahawi defects to Reform after comparing Farage to Goebbels US politics Iran threatens Trump with ‘unforgettable lesson’ if US attacks Federal Reserve chief under criminal investigation ‘Make a deal before it’s too late,’ Trump tells Cuba Brexit Farage: I won’t pay EU’s Reform penalty It’s time for a Brexit from Nato Reeves’s Budget triggers stock market exodus twice as big as Brexit Pagination Previous Next Politics Latest news and breaking stories on UK politics. Find updates, comment and expert analysis on government policies and bills.  Sign up  to the  Telegraph Politics Newsletter  to receive your essential political digest from the corridors of Westminster The Telegraph Back to top Follow us on: Facebook icon Instagram icon X icon Snapchat icon LinkedIn icon YouTube icon Download the Telegraph App Recommended Podcasts Syndication and Commissioning Help Centre Betting Branded Content Privacy Reader Prints Theatre Tickets Careers About us Announcements Puzzles Guidelines Terms &amp; Conditions Newsletters Crosswords Tax Strategy Advertising terms Subscribe Cryptic Crossword Modern Slavery Subscription Terms &amp; Conditions Gift Subscriptions Plusword The Chelsea Magazine Company &copy; Telegraph Media Group Holdings Limited 2026
2026-01-13T09:29:56
https://www.notion.com/es-es/product
El espacio de trabajo con IA hecho para ti | Notion Notion Funciones IA de Notion Crea, escribe y automatiza Agentes Gestiona las tareas manuales Búsqueda Enterprise Encuentra respuestas al instante Anotador con IA Registra a la perfección las notas de tus reuniones Documentos Sencillos y potentes Base de conocimiento Centraliza el conocimiento Proyectos Gestiona cualquier proyecto Sitios Publica lo que quieras en un pispás Primeros pasos Explora casos prácticos de la IA Descubre todo lo que puede hacer la IA de Notion Explora Notion Marketplace Plantillas para todo Descubre las integraciones Conecta tus aplicaciones con Notion Descargar Web Clipper Guarda páginas de la web en Notion Prueba la app de escritorio de Notion para una mejor experiencia Descarga la app Correo Calendario IA Enterprise Precios Explora Equipos Desarrollo y producto Diseño Marketing TI Tamaño del equipo Startups Pymes Empresa Educación Lecciones Centro de ayuda Notion Academy Historias de clientes Blog Comunidad Programas para socios Crear API Plantillas Seguridad Consultores Solicita una demo Inicia sesión Consigue Notion gratis Un espacio de trabajo único y sin tareas repetitivas Donde tus equipos y agentes de IA guardan el conocimiento, encuentran respuestas y automatizan proyectos. Ahora, un equipo de 7 personas trabaja como uno de 70. Consigue Notion gratis Solicita una demo Los mejores equipos confían en Notion Presentamos Notion 3.0 Agente personal Nuevo Tú asignas las tareas. Tu agente las ejecuta. → Delega las tareas rutinarias Lo que antes llevaba días, ahora en minutos. Cuéntale tu objetivo y míralo trabajar. Colabora con tu equipo Es como contar con un experto incorporado que apoya a tu equipo. Sabe todo lo que tú sabes Busca en todas tus páginas, mensajes, archivos y en la web para encontrar exactamente lo que necesitas. Personalizado para ti Tu agente aprende cómo trabajas. Tú controlas todo: desde su comportamiento hasta su apariencia. Agentes personalizados Próximamente Automatiza tareas repetitivas. → Búsqueda Enterprise Encuéntralo todo con una búsqueda. → Anotador con IA Notas de diez, siempre → Flujos de trabajo flexibles Gestiona cualquier proyecto, grande o pequeño. → Una app capaz de hacerlo todo, ahora con IA Más productividad. Menos apps. Reúne todas tus herramientas y equipos bajo un mismo techo. Calcula cuánto ahorrarás a continuación. Ver planes de precios → Búsqueda con IA 35 USD/usuario Chatbot con IA 20 USD/usuario Anotador con IA 18 USD/usuario Asistente de redacción con IA 20 USD/usuario App de correo electrónico con IA 30 USD/usuario Investigación con IA 40 USD/usuario Programación del calendario 15 USD/usuario Wiki del equipo 10 USD/usuario Herramienta de gestión de proyectos 24 USD/usuario CRM básico 20 USD/usuario Creador de sitios web 20 USD/usuario Formularios 15 USD/usuario Tamaño del equipo Ahorro mensual 0 US$ Ahorro anual 0 US$ La opción de los equipos que entregan resultados. Todo cambia cuando puedes trabajar desde un solo sitio. Para nosotros, ese sitio es Notion. Lee el artículo completo → Ver el vídeo Flujos de trabajo simplificados que reducen plazos hasta tres veces. → «Con Notion, cada persona en Ramp tiene un agente de IA». → «En Notion, comprenden que puedes resolver muchos problemas con una sola herramienta». → «Notion fue la forma más efectiva y potente que encontramos para optimizar nuestro flujo de trabajo». → «El uso de las herramientas más nativas de IA, como Notion, supone una importante ventaja competitiva para nosotros». → Un único espacio para el trabajo y la IA, donde todos están al tanto y el trabajo no se detiene. → Cerrar cuadro de diálogo Reproducir ¡Vaya! Parece que tu bloqueador de anuncios está impidiendo que se reproduzca el vídeo. Dirígete a YouTube para verlo Lee el artículo completo → Más de 100 millones de usuarios en todo el mundo #La base de conocimiento n.º 1 durante 3 años consecutivos (G2) #1 Búsqueda Enterprise con IA (G2) #1 escritura clasificada de IA (G2) El 62 % de las empresas de la lista Fortune 100 Más del 50 % de las empresas de Y Combinator (YC) Más de 1,4 millones en nuestra comunidad global Más de 100 millones de usuarios en todo el mundo #La base de conocimiento n.º 1 durante 3 años consecutivos (G2) #1 Búsqueda Enterprise con IA (G2) #1 escritura clasificada de IA (G2) El 62 % de las empresas de la lista Fortune 100 Más del 50 % de las empresas de Y Combinator (YC) Más de 1,4 millones en nuestra comunidad global Más de 100 millones de usuarios en todo el mundo #La base de conocimiento n.º 1 durante 3 años consecutivos (G2) #1 Búsqueda Enterprise con IA (G2) #1 escritura clasificada de IA (G2) El 62 % de las empresas de la lista Fortune 100 Más del 50 % de las empresas de Y Combinator (YC) Más de 1,4 millones en nuestra comunidad global Deja que la IA de Notion se encargue del trabajo rutinario. Elige un ejemplo para ver cómo Notion hace el trabajo por ti. Más información → De lluvia de ideas a hoja de ruta → Convierte las reuniones en publicaciones para redes sociales → Organiza tu espacio de trabajo → Incorpora a una nueva persona al equipo → Revisa una landing page → Organiza un evento de empresa → Lleva un registro de tus restaurantes favoritos → Transforma notas en tareas → Pruébalo gratis. Primeros pasos en Notion Tu espacio de trabajo con IA y agentes integrados. Descárgalo para Mac Notion Mail La bandeja de entrada con IA que piensa como tú. Descárgalo Notion Calendar Horarios, eventos, tareas: todo junto. Descárgalo Siempre puedes acceder a Notion desde tu navegador . Español (España) Configuración de cookies © 2026 Notion Labs, Inc. Empresa Conócenos Únete a nuestro equipo Seguridad Estado Términos de uso y privacidad Tus derechos de privacidad Descargar iOS y Android Mac y Windows Notion Calendar Web Clipper Recursos Centro de ayuda Precios Blog Comunidad Integraciones Plantillas Programas para socios Notion para Enterprise Pequeña empresa Uso personal Explorar más →
2026-01-13T09:29:56
https://www.cisco.com/site/hk/en/products/networking/index.html
Cisco Networking Products and Solutions - Cisco Skip to main content Skip to search Skip to footer Cisco.com Hong Kong Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Explore Cisco How to buy Partners EN HK Log in Explore Cisco Search MENU CLOSE How to buy Partners Log in EN HK Close Close Close Close Close Products Cisco Networking Take your network as seriously as your business Whether you&#39;re with a Global 2000 or a local school district, build a future-ready network with the industry leader in networking.   Overview Build a network that gives you peace of mind 1:21 Blaze new paths to tomorrow. Your journey, your way. Keep users happy and business running smoothly with software and hardware that work best together. Automation, analytics, and security work hard for you, so you don&#39;t have to. Simplify onboarding and provisioning Use automated workflows to quickly configure and provision new devices on the network according to your network policies. Control access with ease Use artificial intelligence and machine learning (AI/ML) to identify and classify endpoints, implement security policies, and display the most critical alerts for action.  Maintain network health Use telemetry data and simple management tools to show client, network, and application health insights. Scale your network to match demand Simplify scalability with flexible router-port configuration to meet demand dynamically. And with Cisco Smart Licensing, it&#39;s easy to activate ports when and where you need them. Find what you&#39;re looking for Access networking Data center and cloud networking Industrial IoT networking Network security Network software Silicon and optics Visibility Wide-area networking (WAN) Access software for switching Benefit from the latest switching and management innovations as soon as they&#39;re released. Explore switching software Switches Build a network with multigigabit switches that constantly learn, adapt, and protect. Explore switching Access software for wireless Get continual feature innovations delivered by subscription.  Explore wireless software Wireless Provide an immersive Wi-Fi 6/6E experience with secure, fast, and reliable products. ​ Explore wireless WAN software Take advantage of the latest WAN innovations delivered continually by subscription.   Explore WAN software Routers Simplify your WAN architecture and make it easier to deploy, manage, and operate.  Explore routing Edge platforms Enhance multicloud application experiences across your cloud, data center, and WAN edge.  Explore edge platforms Data center and cloud software Expand your hybrid cloud operations without increasing your management complexity.  Explore data center switching software Data center switches and infrastructure Build for scale, industry-leading automation, programmability, and real-time visibility. Explore data center switches Service provider software Enable automation, subscriber management, and telco cloud solutions for the services edge. Explore service provider software Service provider routers, wireless, and infrastructure Break free from proprietary mobile technologies with infrastructure designed for open systems. Explore service provider infrastructure Industrial software Unlock the full value of your industrial infrastructure with Cisco DNA Software subscriptions. Explore IoT software Industrial switching Digitize your operations with ruggedized, purpose-built switches for your industrial network. Explore industrial switching Industrial wireless Enjoy reliable and secure connectivity for mission-critical, low-latency, and low-power IoT devices. Explore industrial wireless Industrial routers Connect your industrial edge securely and at scale to external users and applications. Explore industrial routers Industrial security Gain OT visibility, extend zero-trust security, and develop a converged IT/OT security strategy. Explore industrial security Silicon Deploy industry-leading silicon that unifies high-performance routing and switching networks.  Explore Cisco Silicon One technology Optics Increase capacity, reach, and speed with optical transceivers for your network connections.  Explore optics Show more Platforms to control your network Cisco Crosswork Network Automation Simplify services management and operations with advanced automation for service providers. Explore advanced automation Cisco Catalyst Center Automate, secure, and optimize your wireless and switching access networks. Explore platform Cisco Meraki platform Scale and secure your entire network with the Meraki cloud networking platform. Get started Cisco Catalyst SD-WAN Manager Centrally manage your SD-WAN for optimized security, application experience, and cloud connectivity. See dashboard Cisco Nexus Dashboard Configure, operate, and analyze—all from one place—across data center and public cloud. Explore dashboard IoT Control Center Deliver innovation at scale with our industry-leading IoT cellular connectivity platform. Take control Show more Find a solution, solve your challenge Easily find the right combination of software and hardware to meet specific business needs. See all networking solutions Network-enabled business outcomes Cisco Routed Optical Networking Converge IP and optical layers to streamline lifecycle operations. Explore details Hybrid work Help your users return to the workplace safely and work from home securely. Explore hybrid work solution Software-defined WAN Secure your users&#39; access to any cloud from any location by getting on board with SASE. Explore SD-WAN and SASE Hybrid cloud Quickly connect to the clouds and services of your choice.  Explore hybrid cloud Sustainable workplaces Create intuitive, trusted facilities that help enhance health, safety, and energy efficiencies. Explore smart buildings Industry 4.0 Digitize manufacturing with easy-to-deploy validated network designs. Explore Cisco IoT Previous Next Services and support Business Critical Services Move your business forward Build modern IT environments and enhance agility with advisory services for resilient, adaptive, and transformative IT.   View Lifecycle Services Cisco Services Drive results with an optimized network Deploy faster, help enable NetOps excellence, and improve security and visibility. Explore all services Business works best in the cloud Join Cisco Catalyst and Meraki experts for a real-time demonstration of cloud monitoring with Cisco Catalyst switches and cloud management with Cisco Catalyst Wi-Fi 6E access points.  Watch now Hello, how can I help? Trials and Demos --> Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Statement Cookies Trademarks Supply Chain Transparency Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:56
https://aws.amazon.com/blogs/storage/category/learning-levels/intermediate-200/
Intermediate (200) | AWS Storage Blog Skip to Main Content Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account AWS Blogs Home Blogs Editions AWS Storage Blog Category: Intermediate (200) Automated extraction of compressed files on Amazon S3 using AWS Batch and Amazon ECS by Shirin Bano and Pratik Jain on 18 DEC 2025 in Amazon Elastic Block Store (Amazon EBS) , Amazon EventBridge , Amazon Simple Storage Service (S3) , AWS Batch , Intermediate (200) , Technical How-to Permalink Comments Share Organizations frequently upload compressed TAR files to Amazon S3 for efficient data transfer, but downstream applications often need extracted files for processing. Although AWS Glue excels at processing splittable files across worker nodes, TAR files need single-node processing, traditionally forcing teams to manually provision servers, monitor extraction jobs, and manage resource cleanup. This post demonstrates […] How TUI modernized their backup strategy with AWS: Driving clarity and scale by Joseph Demetrios , Peter Frodin , Sabith Venkitachalapathy , and Walid Alkassabgy on 26 NOV 2025 in AWS Backup , Customer Solutions , Intermediate (200) , Resilience , Storage Permalink Comments Share TUI, Europe’s leading travel company, operates across 180 holiday destinations with development teams managing diverse Amazon Web Services (AWS) workloads across multiple accounts—from customer-facing applications to internal analytics platforms. The company processes millions of customer transactions daily, necessitating robust systems with reliable data protection and backup capabilities to ensure business continuity. As TUI’s cloud footprint […] Advanced notice: Amazon S3 to disable the use of SSE-C encryption by default for all new buckets and select existing buckets in April 2026 by Will Cavin on 19 NOV 2025 in Amazon Simple Storage Service (S3) , Announcements , AWS CloudFormation , AWS CloudTrail , AWS Identity and Access Management (IAM) , AWS Key Management Service , Intermediate (200) Permalink Comments Share Starting on April 6, 2026, we will be changing how server-side encryption with customer-provided keys (SSE-C) is enabled for Amazon S3 buckets. With this change, SSE-C will be disabled by default on all new S3 general purpose buckets. Furthermore, SSE-C will also be disabled for all existing buckets in Amazon Web Services (AWS) Accounts that […] Derive intelligent storage insights using S3 Metadata and Model Context Protocol (MCP) by Lee Kear , Roohi Sood , and Harsha Battapady on 15 OCT 2025 in Amazon Q , Amazon Q Developer , Amazon S3 Tables , Amazon Simple Storage Service (S3) , Analytics , AWS CLI , AWS Identity and Access Management (IAM) , Intermediate (200) , Storage , Technical How-to Permalink Comments Share Organizations face mounting challenges in managing and operationalizing their ever-growing data assets for machine learning and analytics workflows. When dealing with billions and trillions of objects, teams struggle to find what data they have and how to efficiently find specific datasets. Without proper data discovery and metadata management, teams spend valuable time searching for relevant […] How Zeta Global scales multi-tenant data ingestion with Amazon S3 Tables by Soumil Shah , Varad Ram , Ananth Packkildurai , and Manoj Agarwal on 22 SEP 2025 in Amazon Athena , Amazon EMR , Amazon S3 Tables , Amazon Simple Storage Service (S3) , Customer Solutions , Intermediate (200) Permalink Comments Share Zeta Global is a data-driven marketing technology company that uses consumer insights to empower brands in customer acquisition, growth, and retention. At the core of its operations is the Zeta Marketing Platform, an advanced system that applies sophisticated AI and machine learning (ML) capabilities on proprietary data from over 245 million U.S. consumer profiles. This […] Enforcing organization-wide Amazon S3 bucket-tagging policies by Pavel Rabinovich , Avinash Pala , Reema Bali , Ruby Siddiqui , and Sri Gudavalli on 04 SEP 2025 in Amazon Simple Storage Service (S3) , AWS Cloud Financial Management , Customer Solutions , Enterprise governance and control , Intermediate (200) Permalink Comments Share In today’s complex cloud environments, maintaining consistent resource tagging is a critical challenge faced by organizations of all sizes. Proper resource tagging is essential for cost allocation, security compliance, operational management, and maintaining governance at scale. However, enforcing tagging standards across distributed teams and numerous resources can be difficult, especially when dealing with rapid deployment […] How Anuttacon scaled AI-enhanced gaming workloads for “Whispers from the Star” by Andrew (Qingjie) Ren , Ding Xiao , Nathan Winter , Qiang Li , and Qing Xing Liu on 14 AUG 2025 in Amazon Elastic Block Store (Amazon EBS) , Customer Solutions , Games , Intermediate (200) , Storage Permalink Comments Share The gaming industry is undergoing significant growth, with AI-driven interactive experiences setting new standards. Anuttacon, an independent research lab, is committed to developing humanistic general intelligence that enables seamless, real-time interactions across text, voice, visuals, and more. Their mission is to create multimodal AI capable of genuine emotional understanding and expressive communication—technology that both thinks […] Cross-Region disaster recovery using AWS Elastic Disaster Recovery by Sravan Rachiraju and Ahmed Mansouri on 08 AUG 2025 in AWS Elastic Disaster Recovery (DRS) , Intermediate (200) , Storage , Technical How-to Permalink Comments Share As businesses evolve, critical applications must remain highly available whether running on traditional virtualized infrastructure or more modern cloud- based environments. These workloads need to be resilient against ransomware attacks, data corruption, infrastructure failures, and regional impairments. Organizations must focus on defining the appropriate recovery objectives, while also minimizing costs. However, implementing disaster recovery can […] Protect Amazon Aurora DSQL clusters using AWS Backup by Hana Do on 29 JUL 2025 in Amazon Aurora , AWS Backup , DSQL , Intermediate (200) , Technical How-to Permalink Comments Share In today’s data-driven world, organizations are migrating mission-critical databases to the cloud for better performance, scalability, and cost-efficiency. Amazon Aurora DSQL, a serverless distributed SQL database, is purpose-built for always available applications with virtually unlimited scale, the highest availability, and zero infrastructure management. As customers adopt Aurora DSQL, ensuring comprehensive data protection becomes critical to […] Faster threat detection at scale: Real-time cybersecurity graph analytics with PuppyGraph and Amazon S3 Tables by Eric Stouffer , Aritra Gupta , Danfeng Xu , Indira Balakrishnan , and Jani Syed on 28 JUL 2025 in Amazon Athena , Amazon EC2 , Amazon Redshift , Amazon S3 Tables , Amazon Simple Storage Service (S3) , AWS CLI , AWS CloudTrail , AWS Glue , AWS Identity and Access Management (IAM) , AWS Lake Formation , Intermediate (200) , Partner solutions , Technical How-to Permalink Comments Share Modern cybersecurity teams are facing unprecedented challenges in data analysis by the scale, complexity, and velocity of data. Cloud environments continuously generate massive amounts information in form of access logs, configuration changes, alerts, and telemetry. Traditional analysis methods of looking at these data points in isolation can’t effectively detect threats such as lateral movement and […] ← Older posts <a role="button" href="https://portal.aws.amazon.com/gp/aws/developer/registration/index.html?nc1=f_ct&amp;src=footer_signup" rel="noopener noreferrer" target="_blank" data-testid="footer-create-account-button" data-rigel-analytics="{&quot;name&quot;:&quot;But
2026-01-13T09:29:56
https://ai.google.dev/api/models#body.request_body
Models &nbsp;|&nbsp; Gemini API &nbsp;|&nbsp; Google AI for Developers Skip to main content / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 Get API key Cookbook Community Sign in Docs API reference Gemini API Docs API reference Get API key Cookbook Community Overview API versions Capabilities Models Generating content Live API Live Music API Interactions API Tokens Files Batch API Caching Embeddings File search File search stores Document All methods Deprecated PaLM (decomissioned) SDK references Python Go TypeScript Java C# Home Gemini API API reference Send feedback Models The models endpoint provides a way for you to programmatically list the available models, and retrieve extended metadata such as supported functionality and context window sizing. Read more in the Models guide . Method: models.get Endpoint Path parameters Request body Response body Authorization scopes Example request Get Gets information about a specific Model such as its version number, token limits, parameters and other metadata. Refer to the Gemini models guide for detailed model information. Endpoint get https: / /generativelanguage.googleapis.com /v1beta /{name=models /*} Path parameters name string Required. The resource name of the model. This name should match a model name returned by the models.list method. Format: models/{model} It takes the form models/{model} . Request body The request body must be empty. Example request Python from google import genai client = genai . Client () model_info = client . models . get ( model = "gemini-2.0-flash" ) print ( model_info ) models . py Go ctx := context . Background () client , err := genai . NewClient ( ctx , &amp; genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } modelInfo , err := client . Models . Get ( ctx , "gemini-2.0-flash" , nil ) if err != nil { log . Fatal ( err ) } fmt . Println ( modelInfo ) models . go Shell curl https://generativelanguage.googleapis.com/v1beta/models/gemini-2.0-flash?key = $GEMINI_API_KEY models .sh Response body If successful, the response body contains an instance of Model . Method: models.list Endpoint Query parameters Request body Response body JSON representation Authorization scopes Example request List Lists the Model s available through the Gemini API. Endpoint get https: / /generativelanguage.googleapis.com /v1beta /models Query parameters pageSize integer The maximum number of Models to return (per page). If unspecified, 50 models will be returned per page. This method returns at most 1000 models per page, even if you pass a larger pageSize. pageToken string A page token, received from a previous models.list call. Provide the pageToken returned by one request as an argument to the next request to retrieve the next page. When paginating, all other parameters provided to models.list must match the call that provided the page token. Request body The request body must be empty. Example request Python from google import genai client = genai . Client () print ( "List of models that support generateContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "generateContent" : print ( m . name ) print ( "List of models that support embedContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "embedContent" : print ( m . name ) models . py Go ctx := context . Background () client , err := genai . NewClient ( ctx , &amp; genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } // Retrieve the list of models. models , err := client . Models . List ( ctx , &amp; genai . ListModelsConfig {}) if err != nil { log . Fatal ( err ) } fmt . Println ( "List of models that support generateContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "generateContent" { fmt . Println ( m . Name ) break } } } fmt . Println ( "\nList of models that support embedContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "embedContent" { fmt . Println ( m . Name ) break } } } models . go Shell curl https://generativelanguage.googleapis.com/v1beta/models?key = $GEMINI_API_KEY models .sh Response body Response from ListModel containing a paginated list of Models. If successful, the response body contains data with the following structure: Fields models[] object ( Model ) The returned Models. nextPageToken string A token, which can be sent as pageToken to retrieve the next page. If this field is omitted, there are no more pages. JSON representation { "models" : [ { object ( Model ) } ] , "nextPageToken" : string } REST Resource: models Resource: Model JSON representation Methods Resource: Model Information about a Generative Language Model. Fields name string Required. The resource name of the Model . Refer to Model variants for all allowed values. Format: models/{model} with a {model} naming convention of: "{baseModelId}-{version}" Examples: models/gemini-1.5-flash-001 baseModelId string Required. The name of the base model, pass this to the generation request. Examples: gemini-1.5-flash version string Required. The version number of the model. This represents the major version ( 1.0 or 1.5 ) displayName string The human-readable name of the model. E.g. "Gemini 1.5 Flash". The name can be up to 128 characters long and can consist of any UTF-8 characters. description string A short description of the model. inputTokenLimit integer Maximum number of input tokens allowed for this model. outputTokenLimit integer Maximum number of output tokens available for this model. supportedGenerationMethods[] string The model's supported generation methods. The corresponding API method names are defined as Pascal case strings, such as generateMessage and generateContent . thinking boolean Whether the model supports thinking. temperature number Controls the randomness of the output. Values can range over [0.0,maxTemperature] , inclusive. A higher value will produce responses that are more varied, while a value closer to 0.0 will typically result in less surprising responses from the model. This value specifies default to be used by the backend while making the call to the model. maxTemperature number The maximum temperature this model can use. topP number For Nucleus sampling . Nucleus sampling considers the smallest set of tokens whose probability sum is at least topP . This value specifies default to be used by the backend while making the call to the model. topK integer For Top-k sampling. Top-k sampling considers the set of topK most probable tokens. This value specifies default to be used by the backend while making the call to the model. If empty, indicates the model doesn't use top-k sampling, and topK isn't allowed as a generation parameter. JSON representation { "name" : string , "baseModelId" : string , "version" : string , "displayName" : string , "description" : string , "inputTokenLimit" : integer , "outputTokenLimit" : integer , "supportedGenerationMethods" : [ string ] , "thinking" : boolean , "temperature" : number , "maxTemperature" : number , "topP" : number , "topK" : integer } Method: models.predict Endpoint Path parameters Request body JSON representation Response body JSON representation Authorization scopes Performs a prediction request. Endpoint post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predict Path parameters model string Required. The name of the model for prediction. Format: name=models/{model} . It takes the form models/{model} . Request body The request body contains data with the following structure: Fields instances[] value ( Value format) Required. The instances that are the input to the prediction call. parameters value ( Value format) Optional. The parameters that govern the prediction call. Response body Response message for [PredictionService.Predict]. If successful, the response body contains data with the following structure: Fields predictions[] value ( Value format) The outputs of the prediction call. JSON representation { "predictions" : [ value ] } Method: models.predictLongRunning Endpoint Path parameters Request body JSON representation Response body Authorization scopes Same as models.predict but returns an LRO. Endpoint post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predictLongRunning Path parameters model string Required. The name of the model for prediction. Format: name=models/{model} . Request body The request body contains data with the following structure: Fields instances[] value ( Value format) Required. The instances that are the input to the prediction call. parameters value ( Value format) Optional. The parameters that govern the prediction call. Response body If successful, the response body contains an instance of Operation . Send feedback Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License , and code samples are licensed under the Apache 2.0 License . For details, see the Google Developers Site Policies . Java is a registered trademark of Oracle and/or its affiliates. Last updated 2025-10-30 UTC. Need to tell us more? [[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-10-30 UTC."],[],[]] Terms Privacy Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:56
https://shows.acast.com/frontier/episodes/ep-38-stefan-avram-head-of-growth-and-co-founder-at-wundergr
Ep. 38: Stefan Avram, Head of Growth and Co-Founder at WunderGraph - Frontier Podcast by Gun.io | Acast Follow Share Play Frontier Podcast by Gun.io Ep. 38: Stefan Avram, Head of Growth and Co-Founder at WunderGraph Season 4 , Ep. 38 • Thursday, December 21, 2023 Teja sits down with Stefan Avram, Head of Growth and Co-founder at WunderGraph, an open-source GraphQL federation. They discuss how injuries can change your life trajectory, the complexities of working with distributed teams, and how sometimes getting fired can be the best thing that's ever happened to you. www.wundergraph.com Show more RSS More episodes View all episodes 46. Ep. 46: Matt Genovese, CEO and Founder of Planorama 54:36 | Thursday, April 11, 2024 | Season 4 , Ep. 46 This week, Teja sits down with Matt Genovese, CEO and Founder of Planorama, a company that designs UX/UI flows for products with complete enablement for software teams. They discuss the intricacies of living abroad, the importance of incorporating design, and how de-risking early on in the life of a new product can make it more successful in the long run.https://planorama.design/matthttps://aiproducthive.com Play 45. Ep. 45: Brian Pontarelli, CEO and Founder of FusionAuth 44:05 | Thursday, March 28, 2024 | Season 4 , Ep. 45 On this week's episode, Teja sits down with Brian Pontarelli, Founder and CEO of both FusionAuth and Cleanspeak. They discuss the complexities of growing two businesses at the same time, making progress without using AI, and the subtle clues in an interview process that let you know someone's a great culture fit.https://fusionauth.io/https://cleanspeak.com/ Play 44. Ep. 44: Sabber Ahamed, Founder of xoolooloo 28:31 | Thursday, February 29, 2024 | Season 4 , Ep. 44 This week, Teja talks with Sabber Ahamed, Founder of Xoolooloo and Data Scientist at Bridgestone. They discuss the proliferation of data science, the joys of working on your own projects outside of the 9-5, and the different things career goals of a computational geophysicist can really shake up. Play 43. Ep. 43: Harpreet Singh, CEO and Co-Founder at Launchable 39:22 | Thursday, February 15, 2024 | Season 4 , Ep. 43 This week, Teja talks with Harpreet Singh, Co-CEO and Co-Founder of Launchable, a company that's on a mission to make software testing faster and smarter. They discuss the DACI framework and the importance of intentionality in decision-making, what it's like to bring a behemoth like Jenkins to life, and the power of slowing down to meditate.https://www.launchableinc.com/ Play 42. Ep. 42: Brian Douglas, CEO and Founder at OpenSauced 36:55 | Thursday, February 1, 2024 | Season 4 , Ep. 42 In this week's episode, Teja talks with Brian Douglas, CEO and Founder at OpeSauced. They talk about how a good open source portfolio is more than just getting your name on big projects, the natural progression from developer advocacy to building an open source marketplace, and the trials and tribulations of learning to lead as you grow.opensauced.pizza Play 41. Ep. 41: Ian Villa, COO and Co-founder at Whisper Aero 37:33 | Thursday, January 18, 2024 | Season 4 , Ep. 41 Joining Teja on this week's episode is Ian Villa, COO and Co-founder of Whisper Aero, a company that is developing cleaner, quieter, and more efficient propulsion solutions. They discuss the pros and cons of a campus with on-site housing, the burgeoning Nashville tech scene, and how a 5 am trip to Kinko's can, in hindsight, be a lesson in entrepreneurship.whisper.aero Play 40. Ep. 40: Kate O&#x27;Neil, CEO and Co-founder at Teaming 58:40 | Thursday, January 11, 2024 | Season 4 , Ep. 40 This week, Teja sits down for round two with Kate O'Neil, who has moved into the CEO position at Teaming since the last time they talked. They discuss the differences that come with the transition to becoming a CEO, the importance of incorporating movement into your life, and why getting the best sleep comes down to the perfect sheets.teaming.com Play 39. Ep. 39: Jeremy Snyder, CEO and Founder at FireTail 50:32 | Thursday, January 4, 2024 | Season 4 , Ep. 39 After a brief holiday hiatus, Teja is back this week with Jeremy Snyder, the Founder and CEO of FireTail, an API security platform that provides application layer visibility, real-time, inline inspection, and blocking of malicious API calls. They talk about being a less technical founder, how being a polyglot helps you understand more than language, and the importance of taking the time to find your own adventure.https://www.firetail.io/ Play Instagram X.com TikTok Copyright Gun.io Hosted with ❤️ by Acast
2026-01-13T09:29:56
https://play.google.com/store/apps/details?id=notion.id&amp;hl=es_US
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M0 0h24v24H0z
2026-01-13T09:29:56
https://snyk.io/es/product/dast-api-web/
Herramienta DAST | Herramientas de análisis DAST | Seguridad web y de API | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API &amp; Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API &amp; Web - Todos los clientes Snyk API &amp; Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo Snyk API &amp; Web DAST orientado a los desarrolladores para proteger los riesgos generados por la IA, con casi cero falsos positivos Descubre y comprueba la seguridad de todas tus API y aplicaciones web, incluso de aquellas cuyo código fue generado por IA, y obtén instrucciones detalladas sobre cómo solucionar los problemas detectados. Reserva una demostración en vivo Regístrate Demostración DAST a pedido Mira nuestra demostración grabada para ver cómo puedes escanear rápidamente aplicaciones web en ejecución, descubrir vulnerabilidades ocultas y obtener información procesable. Mirar ahora Reducir el ruido, evitar la fatiga por alerta Aprovecha nuestra baja tasa de falsos positivos, líder en el sector. El escáner de vulnerabilidades de API y aplicaciones web de Snyk ofrece casi cero falsos positivos (0,08 %), lo que garantiza que solo te centrarás en los hallazgos relevantes. Mantén bajo control la creciente superficie de ataque generada por la IA con toda tu atención. Tasa de falsos positivos del 0,08 % El escáner de Snyk API &amp; Web puede detectar más de 30 000 vulnerabilidades potenciales. Con una tasa de falsos positivos del 0,08 %, encuentra las vulnerabilidades de seguridad que importan. Informes basados en pruebas El tiempo es muy valioso tanto para los equipos de desarrollo como para los de seguridad. Obtén contexto y pruebas de todos los hallazgos relevantes. Orientación fija Obtén instrucciones detalladas sobre cómo solucionar las vulnerabilidades en función de la tecnología identificada en las aplicaciones y API de tu sitio web. Base de datos de vulnerabilidades Snyk mantiene y posee una extensa lista de vulnerabilidades propias detectables por su motor DAST, que incluye 115 tipos diferentes aplicables específicamente a las API. Escaneo de API de última generación El motor de pruebas de seguridad de API impulsado por IA de Snyk API &amp; Web ayuda a revolucionar la forma en que se prueban las API, para ayudar a mapear mejor la creciente superficie de ataque de API y automatizar el escaneo de vulnerabilidades. El escáner de vulnerabilidades de Snyk puede detectar grandes cantidades de vulnerabilidades potenciales, lo que permite a tus equipos ejecutar activamente pruebas de seguridad como parte de su proceso de desarrollo de API. Potente escaneado de aplicaciones web Aprovecha funciones como las configuraciones de escaneado personalizables, el escaneado programado, el escaneado parcial, el escaneado detrás del cortafuegos y los períodos de bloqueo del escaneado. Realiza escaneos autenticados, para escanear aplicaciones que utilizan SSO u OpenID Connect. Apuntar y disparar activos Discovery No se puede proteger lo que no se conoce. Busca, cataloga y prioriza las pruebas de seguridad de tu inventario de API y aplicaciones web en busca de vulnerabilidades. Discovery identifica los FQDN y los servicios que se ejecutan en tus infraestructuras, y comenzará a realizar exploraciones de detección periódicas para identificar los activos que componen tu superficie de ataque, de modo que no quede ningún inventario sin explorar. Spider de nueva generación El revolucionario Spider de Snyk API &amp; Web, basado en Headless-Chrome, rastrea e indexa tus aplicaciones JavaScript interactivas y sofisticadas SPA con facilidad. Integración con tu pila Obtén información sobre problemas de vulnerabilidad y orientación para solucionarlos a través de tus herramientas cotidianas. Integra perfectamente Snyk API &amp; Web con tus herramientas de CI/CD, gestores de incidencias y aplicaciones de mensajería preferidas. Cumplimiento de certificaciones de seguridad Cumple de forma fácil y eficaz con los requisitos relacionados con las pruebas de seguridad de aplicaciones de PCI DSS , SOC 2 , HIPAA, ISO 27001 , GDPR y otras normas de leyes de privacidad específicas locales mediante una serie de informes de requisitos detallados que pueden utilizarse como prueba para demostrar tu cumplimiento. Pruebas de seguridad de DAST precisas, automatizadas y escalables Desde la detección hasta la remediación, Snyk API &amp; Web te ayuda a escalar las pruebas de seguridad de las aplicaciones y a evitar que se repitan futuros problemas identificados en el tiempo de ejecución. Tasa de falsos positivos del 0,08 % Los falsos positivos pueden consumir mucho tiempo, con la consiguiente pérdida de tiempo y recursos. Nuestro escáner DAST solo detecta las vulnerabilidades que son amenazas reales y deben abordarse. Escaneos recurrentes En Snyk, nos centramos en la eficiencia del proceso, tanto si integras nuestro escáner DAST en tus pipelines CI/CD, como si programas escaneos recurrentes de tus aplicaciones.  Lanzamientos frecuentes A medida que tu empresa crece, también lo hace la presión para proteger los activos web críticos. El desarrollo ágil da lugar a lanzamientos más frecuentes y a la automatización del proceso de lanzamiento. Integraciones para todo el SDLC Snyk API &amp; Web admite varias integraciones listas para usar, como algunas de las herramientas de CI/CD más populares, o gestores de incidencias para una integración bidireccional que no interrumpa tus flujos de trabajo existentes. Para las integraciones a medida, también hay una API con todas las funciones, así como una versión CLI. Descubre todas las integraciones y documentos API Adoptar una cultura de seguridad continua Desde Desarrollo hasta DevOps, creemos que la seguridad es el valor vinculante en todos los equipos. Desarrolla una experiencia y una cultura de seguridad únicas dentro de tu organización. Ayuda a tus equipos de AppSec a ahorrar tiempo Delega las pruebas de seguridad automatizadas a los desarrolladores y otorga más tiempo a tu equipo de seguridad para realizar evaluaciones exhaustivas sobre proyectos críticos y gestión de vulnerabilidades. Dar más independencia a los desarrolladores Prueba las aplicaciones que estás diseñando en una fase más temprana del proceso de desarrollo. Configura los escaneos para que se ejecuten con frecuencia y automáticamente. La agilidad contribuye a un proceso de desarrollo más rápido, al tiempo que mejora tu postura de seguridad. Pasar de DevOps a DevSecOps Snyk te permite cambiar el enfoque de DevOps a DevSecOps en cuestión de minutos. Si estás buscando una herramienta de escaneo de vulnerabilidades de API y aplicaciones web que se pueda operar completamente a través de una API o CLI, estás en el lugar correcto. Alcanzar los estándares de cumplimiento Logra el cumplimiento de las normas SOC 2 , PCI DSS , OWASP Top 10, ISO 27001 , HIPAA y GDPR mediante una serie de informes de gestión detallados con listas de comprobación de requisitos y resúmenes.  “Los equipos de desarrollo y seguridad pueden estar alineados en materia de ciberseguridad. Desarrollamos nuestra propia solución para organizar las herramientas de seguridad, evaluar los riesgos, escalar las prioridades y gestionar nuestro pipeline CI/CD. Snyk API &amp; Web era la pieza que nos faltaba, lo que nos permitió integrarnos perfectamente con su servicio a través de su completa API. También acabamos haciendo menos trabajo de análisis, ya que Snyk API &amp; Web solo informa vulnerabilidades reales. Y agradecemos el increíble servicio de atención al cliente. ¡Buen trabajo, chicos!” Luís Gomes CISO , AUTODOC Empezar a utilizar Snyk API &amp; Web Descubre todas tus incógnitas y comprueba si son vulnerables. Independientemente de tu función laboral, departamento o equipo, Snyk puede ayudarte a trabajar para reducir los riesgos de ciberseguridad con concentración, eficacia y rapidez. Compara todos los planes Gratis por siempre Excelente para un escaneo mensual de una sola aplicación. Con todas las funciones básicas: Escaneado web y de API API con todas las funciones Hasta 3 usuarios Escaneos parciales e incrementales Informes estándar Empezar ahora Empresarial Ideal para organizaciones con más de 5 objetivos que valoran la eficacia y la flexibilidad. Todo lo de la versión gratis, además: Activo Discovery Usuarios ilimitados Funciones y permisos personalizados Agente para escanear objetivos internos Integraciones (Slack, Jira, otros) Funciones y permisos integrados Perfiles de escaneo personalizados Pausar y reanudar los escaneos Equipos y cuotas Inicio de sesión único (SSO) Informes de cumplimiento Gestor de cuentas específico Asistencia prioritaria Reserva una demostración en vivo Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:56
https://www.telerik.com/blogs/tag/accessibility?page=2#skip-to-content
Accessibility Tag - Telerik Blogs - Page 2 skip navigation All Products Product Bundles DevCraft All Telerik .NET tools and Kendo UI JavaScript components in one package. Now enhanced with: MCP Servers Embedded Reporting Document Processing Libraries SSO Account Sign-in Web Kendo UI UI for Angular UI for Vue UI for jQuery KendoReact UI for Blazor UI for ASP.NET Core UI for ASP.NET MVC UI for ASP.NET AJAX Mobile UI for .NET MAUI Document Management Telerik Document Processing Desktop UI for .NET MAUI UI for WinUI UI for WinForms UI for WPF Reporting Telerik Reporting Telerik Report Server Testing &amp; Mocking Test Studio Telerik JustMock CMS Sitefinity AI Productivity Tools MCP Servers UI/UX Tools ThemeBuilder Design System Kit Templates and Building Blocks Debugging Fiddler Fiddler Everywhere Fiddler Classic Fiddler Everywhere Reporter FiddlerCore Free Tools KendoReact Free VB.NET to C# Converter Testing Framework View all products Demos Services Blogs Docs &amp; Support Pricing Shopping cart Your Account Account Overview Your Licenses Downloads Support Center Forum Profile Payment Methods Edit Profile Log out Login Contact Us Get A Free Trial close mobile menu Tag: Accessibility People Accessibility What Does the European Accessibility Act Mean for Developers? European Accessibility Act (EAA) compliance is mandatory by June 28, 2025, for any digital product used in Europe. Here’s what you need to know to make that happen. by Hassan Djirdeh March 05, 2025 5 min read Share Web React KendoReact Charts Case Study: The Designer-Developer Collaboration Survey Report If you want a quick and easy way to start integrating beautiful, responsive and fully accessible charts into your React apps, look no further than KendoReact. by Kathryn Grayson Nanz June 17, 2025 6 min read Share Web People Accessibility Why Semantic HTML Matters: An Introductory Guide for New Developers Let’s look at the basics of semantic HTML and see practical examples so you can start using it effectively. by Hassan Djirdeh November 15, 2024 6 min read Share People Accessibility A Guide to Image SEO Use these nine strategies for image SEO, which can increase the chances of your website visuals ranking in search results, while improving overall usability and accessibility of the site. by Suzanne Scacca September 27, 2024 13 min read Share Design UX People Accessibility UX Crash Course: Nielsen’s Usability Heuristics What makes a site especially usable (or especially difficult to use)? Try using Jakob Nielsen’s 10 Usability Heuristics as a basis for internal review—you might be surprised how much you’re able to improve the product before it’s ever touched by a user! by Kathryn Grayson Nanz March 05, 2024 12 min read Share Prev 1 2 3 4 5 6 7 8 9 10 ... Next All articles Topics Web Web Blazor ASP.NET Core ASP.NET MVC ASP.NET AJAX Angular React jQuery Vue Mobile Mobile .NET MAUI/Hybrid Desktop Desktop .NET MAUI/Blazor Hybrid WPF WinForms WinUI Design Design UX Design Systems Productivity Productivity Reporting Testing Debugging Document Processing People People Accessibility Humanity Release AI Follow us Most Popular Web Blazor Blazor Basics: Should You Migrate to .NET 10? January 06, 2026 Productivity Document Processing Cloud Integration with Telerik Document Processing December 17, 2025 AI Web React Building ChatGPT Apps with React Components: Introducing KendoReact + Apps SDK January 08, 2026 Latest Stories in Your Inbox Subscribe to be the first to get our expert-written articles and tutorials for developers! All fields are required Email Country/Territory Select country/territory United States Afghanistan Albania Algeria American Samoa Andorra Angola Anguilla Antarctica Antigua and Barbuda Argentina Armenia Aruba Australia Austria Azerbaijan Bahamas Bahrain Bangladesh Barbados Belgium Belize Benin Bermuda Bhutan Bolivia Bosnia and Herzegovina Botswana Bouvet Island Brazil British Indian Ocean Terr. Brunei Darussalam Bulgaria Burkina Faso Burundi Cambodia Cameroon Canada Cape Verde Cayman Islands Central African Republic Chad Chile China Christmas Island Cocos (Keeling) Islands Colombia Comoros Congo (Brazzaville) Congo, the democratic republic of the Cook Islands Costa Rica Cote d&#39;Ivoire Croatia (Hrvatska) Curacao Cyprus Czech Republic Denmark Djibouti Dominica Dominican Republic Ecuador Egypt El Salvador Equatorial Guinea Eritrea Estonia Eswatini Ethiopia Falkland Islands Faroe Islands Fiji Finland France French Guiana French Polynesia French Southern Terr. Gabon Gambia Georgia Germany Ghana Gibraltar Greece Greenland Grenada Guadeloupe Guam Guatemala Guernsey Guinea Guinea-Bissau Guyana Haiti Heard and McDonald Is. Honduras Hong Kong Hungary Iceland India Indonesia Iraq Ireland Israel Italy Jamaica Japan Jersey Jordan Kazakhstan Kenya Kiribati Kuwait Kyrgyzstan Lao People&#39;s Dem. Rep. Latvia Lebanon Lesotho Liberia Libya Liechtenstein Lithuania Luxembourg Macao Madagascar Malawi Malaysia Maldives Mali Malta Man, Isle of Marshall Islands Martinique Mauritania Mauritius Mayotte Mexico Micronesia Moldova Monaco Mongolia Montenegro Montserrat Morocco Mozambique Myanmar Namibia Nauru Nepal Netherlands New Caledonia New Zealand Nicaragua Niger Nigeria Niue Norfolk Island North Macedonia Northern Mariana Is. Norway Oman Pakistan Palau Palestine, State Of Panama Papua New Guinea Paraguay Peru Philippines Pitcairn Poland Portugal Puerto Rico Qatar Republic of Korea (South Korea) Reunion Romania Rwanda S.Georgia and S.Sandwich Is. Saint Kitts and Nevis Saint Lucia Samoa San Marino Sao Tome and Principe Saudi Arabia Senegal Serbia Seychelles Sierra Leone Singapore Slovakia Slovenia Solomon Islands Somalia South Africa South Sudan Spain Sri Lanka St. Helena St. Pierre and Miquelon St. Vincent and Grenadines Sudan Suriname Svalbard and Jan Mayen Is. Sweden Switzerland Taiwan Tajikistan Tanzania Thailand Timor-Leste Togo Tokelau Tonga Trinidad and Tobago Tunisia Turkey Turkmenistan Turks and Caicos Islands Tuvalu U.S. Minor Outlying Is. Uganda Ukraine United Arab Emirates United Kingdom Uruguay Uzbekistan Vanuatu Vatican (Holy See) Venezuela Viet Nam Virgin Islands (British) Virgin Islands (U.S.) Wallis and Futuna Is. Western Sahara Yemen Zambia Zimbabwe State/Province Select Progress collects the Personal Information set out in our Privacy Policy and the Supplemental Privacy notice for residents of California and other US States and uses it for the purposes stated in that policy. You can also ask us not to share your Personal Information to third parties here: Do Not Sell or Share My Info Blog By submitting this form, I understand and acknowledge my data will be processed in accordance with Progress' Privacy Policy . I agree to receive marketing communications from Progress Software or its Partners , containing information about Progress Software’s products, services and/or events. I understand I may opt out from marketing communication at any time. By submitting this form, you understand and agree that your personal data will be processed by Progress Software or its Partners as described in our Privacy Policy . You may opt out from marketing communication at any time here or through the opt out option placed in the e-mail communication sent by us or our Partners. We see that you have already chosen to receive marketing materials from us. If you wish to change this at any time you may do so by clicking here . Thank you for your continued interest in Progress. Based on either your previous activity on our websites or our ongoing relationship, we will keep you updated on our products, solutions, services, company news and events. If you decide that you want to be removed from our mailing lists at any time, you can change your contact preferences by clicking here . Subscribe Complete .NET Toolbox Telerik DevCraft Complete JavaScript Toolbox Kendo UI Get Products Free Trials Pricing Resources DX Hub Demos Documentation Release History Forums Blogs Webinars Videos Professional Services Partners Virtual Classroom Events FAQs Recognition Success Stories Testimonials Get in touch Contact Us USA: +1 888 679 0442 UK: +44 13 4483 8186 India: +91 406 9019447 Bulgaria: +359 2 8099850 Australia: +61 3 7068 8610 165k+ 50k+ 17k+ 4k+ 14k+ Contact Us 165k+ 50k+ 17k+ 4k+ 14k+ Telerik and Kendo UI are part of Progress product portfolio. Progress is the leading provider of application development and digital experience technologies. Company Technology Awards Press Releases Media Coverage Careers Offices Company Technology Awards Press Releases Media Coverage Careers Offices Copyright &copy; 2026 Progress Software Corporation and/or its subsidiaries or affiliates. All Rights Reserved. Progress and certain product names used herein are trademarks or registered trademarks of Progress Software Corporation and/or one of its subsidiaries or affiliates in the U.S. and/or other countries. See Trademarks for appropriate markings. All rights in any other trademarks contained herein are reserved by their respective owners and their inclusion does not imply an endorsement, affiliation, or sponsorship as between Progress and the respective owners. Terms of Use Site Feedback Privacy Center Trust Center Do Not Sell or Share My Personal Information Powered by Progress Sitefinity
2026-01-13T09:29:56
https://aws.amazon.com/ai/generative-ai/nova/
Generative foundation model – Amazon Nova – AWS Skip to main content Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account Amazon Nova Overview Nova Act Nova Forge Nova Models Pricing More Artificial Intelligence › Generative AI › Amazon Nova Amazon Nova Frontier intelligence and industry-leading price performance Try Amazon Nova Build with Amazon Nova What is Amazon Nova? Amazon Nova is a portfolio of AI offerings—including Nova models, fast and cost-effective foundation models for text and multimodal needs;&nbsp;Nova Forge, a new service to build your own frontier models; and Nova Act, a new service to build agents that automate browser-based UI workflows (such as computer use) powered by a custom Nova 2 Lite model. These are built on AI technologies originally developed for Amazon's internal applications, such as Alexa+, Amazon Ads, Amazon Catalog System Services, AWS Marketplace, and Amazon Stores,&nbsp;and are now available to AWS customers as Nova models and services. Play Models and services for all your AI experiences Loading Loading Loading Loading Loading What's new 1 / 4 Nova 2 Sonic Learn about our next-generation speech-to-speech model for conversational AI Read the blog Nova Act Read how you can build and manage fleets of reliable agents to automate production UI workflows at scale Read the blog Nova Forge Read how you can build your own frontier model using Nova Read the blog Nova 2 Lite Learn about Nova 2 Lite, a fast, cost-effective reasoning model for most everyday tasks Read the blog Built to deliver real impact Built for enterprise scale Designed to handle your largest workloads with high performance, predictable latency, and multimodal capabilities, so you can deploy, integrate, and innovate without compromise.&nbsp; Proven customer momentum Adopted by tens of thousands of customers across industries, delivering measurable impact with cost savings and gains in productivity, automation, and quality with real-world deployments. Learn more Safe, responsible AI Nova models and services have built-in controls for the safe and responsible use of AI, delivering robust protections, content filters, and policy-aligned behaviors to meet compliance requirements. Next steps Get started with Nova Read the guide Learn more about safety and commitment to responsible AI Read the service card Did you find what you were looking for today? Let us know so we can improve the quality of the content on our pages Yes No Create an AWS account Learn What Is AWS? What Is Cloud Computing? What Is Agentic AI? Cloud Computing Concepts Hub AWS Cloud Security What's New Blogs Press Releases Resources Getting Started Training AWS Trust Center AWS Solutions Library Architecture Center Product and Technical FAQs Analyst Reports AWS Partners Developers Builder Center SDKs &amp; Tools .NET on AWS Python on AWS Java on AWS PHP on AWS JavaScript on AWS Help Contact Us File a Support Ticket AWS re:Post Knowledge Center AWS Support Overview Get Expert Help AWS Accessibility Legal English Back to top Amazon is an Equal Opportunity Employer: Minority / Women / Disability / Veteran / Gender Identity / Sexual Orientation / Age. x facebook linkedin instagram twitch youtube podcasts email Privacy Site terms Cookie Preferences © 2026, Amazon Web Services, Inc. or its affiliates. All rights reserved.
2026-01-13T09:29:56
https://play.google.com/store/apps/details?id=notion.id&amp;hl=es_PE
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M12 17.27L1
2026-01-13T09:29:56
https://pages.awscloud.com/communication-preferences?sc_ichannel=ha&amp;sc_icampaign=acq_awsblogsb&amp;sc_icontent=maching-learning-social
AWS Email Preference Center Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account Email Unsubscribe Unsubscribe from all Amazon Web Services (AWS) marketing emails. If you'd like to sign up for AWS emails or customize your preferences, manage your preferences here . Enter the email you&#x27;d like to unsubscribe * Required field Email address * Why are you unsubscribing? Too many emails I&#x27;ve stopped using this email I don&#x27;t recall signing up for this email list Email content isn&#x27;t relevant to me I already receive notifications at another email By submitting this form, you will be unsubscribed from all marketing emails. You will still receive transactional emails related to your use of AWS services and related offerings. Submit Create an AWS account Learn What Is AWS? What Is Cloud Computing? What Is Generative AI? Cloud Computing Concepts Hub AWS Cloud Security What&#x27;s New Blogs Press Releases Resources Getting Started Training AWS Trust Center AWS Solutions Library Architecture Center Product and Technical FAQs Analyst Reports AWS Partners Developers Builder Center SDKs &amp; Tools .NET on AWS Python on AWS Java on AWS PHP on AWS JavaScript on AWS Help Contact Us File a Support Ticket AWS re:Post Knowledge Center AWS Support Overview Get Expert Help AWS Accessibility Legal English Back to top Amazon is an Equal Opportunity Employer: Minority / Women / Disability / Veteran / Gender Identity / Sexual Orientation / Age. x facebook linkedin instagram twitch youtube podcasts email Privacy Site terms Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon Cookie Preferences © 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
2026-01-13T09:29:56
https://apps.apple.com/app/notion-calendar/id1607562761#productRatings
‎Notion Calendar App - App Store for iPhone iPhone iPad Mac Vision Watch TV Today Games Apps Arcade Platform iPhone iPad Mac Vision Watch TV Notion Calendar For your work and life Only for iPhone Free Share 5.7K Ratings 4.7 Ages 4+ Years Category Productivity Developer Notion Labs, Incorporated Language EN + 16 More Size 40.4 MB iPhone Notion Calendar lets you schedule meetings and control your time like never before. It deeply integrates with Google Calendar accounts so that all your events are synced. Along with speed, beauty, and light/dark modes, Notion Calendar includes powerful features: - CONNECTED TO NOTION&nbsp;— add Notion docs, projects, and timelines. - MULTIPLE TIME ZONES — pull the time zone column to the right to “travel to any city” and add more time zones. - ALL IN ONE PLACE&nbsp;— see one unified view across multiple calendars and auto-sync events between them. - WIDGETS — select from 6 Home Screen Widgets featuring rich previews of upcoming events, month overviews, quick-add event buttons, and more! The Lock Screen Widget lets you see what’s coming at a glance when picking up your phone. - AVAILABLE IN 12 LANGUAGES —&nbsp;Japanese, Korean, French, German, Spanish, Portuguese, Danish, Dutch, Finnish, Norwegian, and Swedish. It’s time. more Ratings &amp; Reviews 4.7 out of 5 5.7K Ratings Lot of potential - love the design! 09/03/2024 Hikari There’s a lot of reviews that talk about the pros and cons of the app but let me just say my favorite thing is I don’t immediately create a new event if I just fat finger my phone and hit a random spot on the calendar. So much time wasted on hitting a random spot on Google calendar and I’m like no I didn’t mean to please - no event oh god! Love the design and the way information is presented it makes it feel less overwhelming. I would love a 5 day view - 3 days is great because it’s intentional but getting the work week in one viewable window would be helpful. I know Google calendar forces the whole week on you though which I don’t totally love either. Either way I’m excited to see where the app goes from here! Lot of potential - love the design! 09/03/2024 Hikari There’s a lot of reviews that talk about the pros and cons of the app but let me just say my favorite thing is I don’t immediately create a new event if I just fat finger my phone and hit a random spot on the calendar. So much time wasted on hitting a random spot on Google calendar and I’m like no I didn’t mean to please - no event oh god! Love the design and the way information is presented it makes it feel less overwhelming. I would love a 5 day view - 3 days is great because it’s intentional but getting the work week in one viewable window would be helpful. I know Google calendar forces the whole week on you though which I don’t totally love either. Either way I’m excited to see where the app goes from here! Nightmare of a time 6d ago DayOldEggs I’ve had a nightmare of a time with this app. It does not scale on iPad as it should. You have a desktop app that works great, why can’t it work the same on iPad? Furthermore on my phone it is not showing any of my events. I’ve reinstalled the app twice now, checked all my settings, and even went through trying to fix it using notion AI. Nothing has worked.When adding events through notion AI you have to specify in your AI settings that you want to use your own timezone, not the default on Notion.The views that are available have been buggy for me for weeks. I cannot scroll down all the way to midnight. Every calendar app I’ve ever used has the ability to show a full week, but this app does not. Scrolling through months is not intuitive. I’ve essentially resorted to only using my calendar on my computer, which is not practical. I’ve also had major issues getting the app to send me notifications. I’ve double checked my settings on my phone, and they are correct. I’m not sure what to do anymore. I pay for notion to use as an assistant, and at this point it only works in that manner fluidly on my laptop. Nightmare of a time 6d ago DayOldEggs I’ve had a nightmare of a time with this app. It does not scale on iPad as it should. You have a desktop app that works great, why can’t it work the same on iPad? Furthermore on my phone it is not showing any of my events. I’ve reinstalled the app twice now, checked all my settings, and even went through trying to fix it using notion AI. Nothing has worked.When adding events through notion AI you have to specify in your AI settings that you want to use your own timezone, not the default on Notion.The views that are available have been buggy for me for weeks. I cannot scroll down all the way to midnight. Every calendar app I’ve ever used has the ability to show a full week, but this app does not. Scrolling through months is not intuitive. I’ve essentially resorted to only using my calendar on my computer, which is not practical. I’ve also had major issues getting the app to send me notifications. I’ve double checked my settings on my phone, and they are correct. I’m not sure what to do anymore. I pay for notion to use as an assistant, and at this point it only works in that manner fluidly on my laptop. Close to Perfect 12/20/2025 Borrmu421 Overall the app is very clean and modern, much like the Notion app. The one thing I don’t understand is why there isn’t an Agenda or Monthly view for the calendar. I use the agenda view all the time in other apps and it’s a standard view in any calendar app I’ve used, so I’m not sure why it doesn’t exist within Notion’s calendar app. I’m trying to get used to the 3-day view but I typically like to see more of a schedule forecast in the days to come without scrolling all the time. Outside of adding a couple more views to enhance the user experience and appeal to everyone’s preferences, the app is great. It does exactly what you want it to. Having the ability to natively sync with my notion databases is awesome and helps me stay on task. I would certainly recommend any/all Notion products! Close to Perfect 12/20/2025 Borrmu421 Overall the app is very clean and modern, much like the Notion app. The one thing I don’t understand is why there isn’t an Agenda or Monthly view for the calendar. I use the agenda view all the time in other apps and it’s a standard view in any calendar app I’ve used, so I’m not sure why it doesn’t exist within Notion’s calendar app. I’m trying to get used to the 3-day view but I typically like to see more of a schedule forecast in the days to come without scrolling all the time. Outside of adding a couple more views to enhance the user experience and appeal to everyone’s preferences, the app is great. It does exactly what you want it to. Having the ability to natively sync with my notion databases is awesome and helps me stay on task. I would certainly recommend any/all Notion products! Helpful Tech Support 04/17/2025 The Game's a Foot I’m just starting out with Notion and Notion Calendar (NC) on iPad and iPhone and so far I like the features and functionality of the apps. I’m mainly here to talk about their tech support.I had a difficult time getting NC to sync with my Apple Calendar. I tried multiple attempts to sync, regardless of device. I carefully wrote a detailed explanation of everything I tried and the tech support guys were kind and helpful with their response, once I got past the initial response from the AI. Now it’s working and I can’t wait to get more organized and learn all the features of the app.I’m giving the app 4.5 stars rather than 5 because there are some areas for improvement I’m seeing, so far.Would prefer the app to recognize when my device is in landscape mode and automatically switch, since I rarely use portrait mode on my iPad and the tiny narrow calendar view is annoying.I would also prefer to get a real human response from tech support the first time. The AI assumes you know nothing and didn’t read the instructions or documentation before requesting help. It was a bit off-putting for someone with decades of experience working with computers. Helpful Tech Support 04/17/2025 The Game's a Foot I’m just starting out with Notion and Notion Calendar (NC) on iPad and iPhone and so far I like the features and functionality of the apps. I’m mainly here to talk about their tech support.I had a difficult time getting NC to sync with my Apple Calendar. I tried multiple attempts to sync, regardless of device. I carefully wrote a detailed explanation of everything I tried and the tech support guys were kind and helpful with their response, once I got past the initial response from the AI. Now it’s working and I can’t wait to get more organized and learn all the features of the app.I’m giving the app 4.5 stars rather than 5 because there are some areas for improvement I’m seeing, so far.Would prefer the app to recognize when my device is in landscape mode and automatically switch, since I rarely use portrait mode on my iPad and the tiny narrow calendar view is annoying.I would also prefer to get a real human response from tech support the first time. The AI assumes you know nothing and didn’t read the instructions or documentation before requesting help. It was a bit off-putting for someone with decades of experience working with computers. What’s New Version History Bug fixes and performance improvements 1.86.0 11/22/2025 Bug fixes and performance improvements 1.85.0 11/13/2025 Bug fixes and performance improvements 1.83.0 07/13/2025 Bug fixes and performance improvements 1.82.0 07/08/2025 Bug fixes and performance improvements 1.81.0 06/23/2025 Bug fixes and performance improvements. 1.80.0 06/05/2025 Bug fixes and performance improvements. 1.79.0 06/03/2025 Bug fixes and performance improvements. 1.78.0 06/01/2025 Bug fixes and performance improvements. 1.77.0 05/21/2025 Bug fixes and performance improvements. 1.76.0 05/15/2025 Bug fixes and performance improvements. 1.75.0 05/09/2025 Bug fixes and performance improvements. 1.74.0 05/07/2025 Bug fixes and performance improvements. 1.73.0 04/02/2025 Bug fixes and performance improvements. 1.72.0 03/18/2025 Bug fixes and performance improvements. 1.71.0 03/13/2025 Bug fixes and performance improvements. 1.70.0 03/04/2025 Bug fixes and performance improvements. 1.69.0 02/07/2025 Bug fixes and performance improvements. 1.68.0 01/31/2025 Bug fixes and performance improvements. 1.67.0 01/09/2025 Bug fixes and performance improvements. 1.66.0 12/16/2024 Bug fixes and performance improvements. 1.65.0 12/12/2024 Bug fixes and performance improvements. 1.64.0 12/11/2024 Bug fixes and performance improvements. 1.63.0 12/02/2024 Bug fixes and performance improvements. 1.62 11/25/2024 Bug fixes and performance improvements. 1.61.0 11/18/2024 Bug fixes and performance improvements more Version 1.86.0 11/22/2025 App Privacy App Privacy The developer, Notion Labs, Incorporated , indicated that the app’s privacy practices may include handling of data as described below. This information has not been verified by Apple. For more information, see the developer’s privacy policy . To help you better understand the developer’s responses, see Privacy Definitions and Examples . Privacy practices may vary, for example, based on the features you use or your age. Learn More Data Linked to You The following data, which may be collected and linked to your identity, may be used for the following purposes: Analytics Contact Info Email Address Name Identifiers User ID Device ID Usage Data Product Interaction App Functionality Contact Info Email Address Name Identifiers User ID Device ID Data Not Linked to You The following data, which may be collected but is not linked to your identity, may be used for the following purposes: App Functionality Diagnostics Crash Data Performance Data The developer, Notion Labs, Incorporated , indicated that the app’s privacy practices may include handling of data as described below. For more information, see the developer’s privacy policy . Data Linked to You The following data may be collected and linked to your identity: Contact Info Identifiers Usage Data Data Not Linked to You The following data may be collected but it is not linked to your identity: Diagnostics Privacy practices may vary, for example, based on the features you use or your age. Learn More Accessibility The developer has not yet indicated which accessibility features this app supports. Learn More Information Seller Notion Labs, Incorporated Size 40.4 MB Category Productivity Compatibility Requires iOS 15.0 or later. iPhone Requires iOS 15.0 or later. iPod&nbsp;touch Requires iOS 15.0 or later. Apple Vision Requires visionOS 1.0 or later. Languages English and 16 more English, Danish, Dutch, Finnish, French, German, Indonesian, Japanese, Korean, Norwegian Bokmål, Portuguese, Simplified Chinese, Spanish, Swedish, Thai, Traditional Chinese, Vietnamese Age Rating 4+ 4+ Learn More Copyright ©2025 Notion Labs, Incorporated Developer Website Privacy Policy More by Notion Labs, Incorporated Notion: Notes, Tasks, AI Plan, organize, track projects View Notion Mail Productivity View You Might Also Like To-Do List &amp; Tasks for Notion Calendar, Planner &amp; Reminders View Notion Widget Quick access to Notion. View TickTick:To-Do List &amp; Calendar Task remind, planner,countdown View Structured - Daily Planner Calendar, Reminder &amp; To Do View Todoist: To Do List &amp; Calendar Task manager &amp; Reminders View Tasks for Notion - To-Do List Calendar Planner &amp; Reminders View SyncTasks To-do list, syncs with Notion View Calendars: Schedule Planner 2026 Daily Organizer・Reminder View Fantastical Calendar Reminders &amp; Todo List View Tiimo: AI Planner &amp; To-do ADHD Task &amp; Planning assistant View United States Español (México) العربية Русский 简体中文 Français (France) 한국어 Português (Brazil) Tiếng Việt 繁體中文 (台灣) Select a country or region Africa, Middle East, and India See All Algeria Angola Armenia Azerbaijan Bahrain Benin Botswana Brunei Darussalam Burkina Faso Cameroun Cape Verde Chad Côte d’Ivoire Congo, The Democratic Republic Of The Egypt Eswatini Gabon Gambia Ghana Guinea-Bissau India Iraq Israel Jordan Kenya Kuwait Lebanon Liberia Libya Madagascar Malawi Mali Mauritania Mauritius Morocco Mozambique Namibia Niger (English) Nigeria Oman Qatar Congo, Republic of Rwanda São Tomé and Príncipe Saudi Arabia Senegal Seychelles Sierra Leone South Africa Sri Lanka Tajikistan Tanzania, United Republic Of Tunisia Turkmenistan United Arab Emirates Uganda Yemen Zambia Zimbabwe Asia Pacific See All Afghanistan Australia Bhutan Cambodia 中国大陆 Fiji 香港 Indonesia (English) 日本 Kazakhstan 대한민국 Kyrgyzstan Lao People's Democratic Republic 澳門 Malaysia (English) Maldives Micronesia, Federated States of Mongolia Myanmar Nauru Nepal New Zealand Pakistan Palau Papua New Guinea Philippines Singapore Solomon Islands 台灣 Thailand Tonga Turkmenistan Uzbekistan Vanuatu Vietnam Europe See All Albania Armenia Österreich Belarus Belgium Bosnia and Herzegovina Bulgaria Croatia Cyprus Czechia Denmark Estonia Finland France (Français) Georgia Deutschland Greece Hungary Iceland Ireland Italia Kosovo Latvia Lithuania Luxembourg (English) Malta Moldova, Republic Of Montenegro Nederland North Macedonia Norway Poland Portugal (Português) Romania Россия Serbia Slovakia Slovenia España Sverige Schweiz Türkiye (English) Ukraine United Kingdom Latin America and the Caribbean See All Anguilla Antigua and Barbuda Argentina (Español) Bahamas Barbados Belize Bermuda Bolivia (Español) Brasil Virgin Islands, British Cayman Islands Chile (Español) Colombia (Español) Costa Rica (Español) Dominica República Dominicana Ecuador (Español) El Salvador (Español) Grenada Guatemala (Español) Guyana Honduras (Español) Jamaica México Montserrat Nicaragua (Español) Panamá Paraguay (Español) Perú St. Kitts and Nevis Saint Lucia St. Vincent and The Grenadines Suriname Trinidad and Tobago Turks and Caicos Uruguay (English) Venezuela (Español) The United States and Canada See All Canada (English) Canada (Français) United States Estados Unidos (Español México) الولايات المتحدة США 美国 (简体中文) États-Unis (Français France) 미국 Estados Unidos (Português Brasil) Hoa Kỳ 美國 (繁體中文台灣) Copyright © 2026 Apple Inc. All rights reserved. Internet Service Terms App Store &amp; Privacy Cookie Warning Support
2026-01-13T09:29:56
https://snyk.io/es/plans/
Planes y precios de Snyk | Prueba gratis o desde $25/mes | Obtén una cotización personalizada | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API &amp; Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API &amp; Web - Todos los clientes Snyk API &amp; Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo Planes y precios Planes y precios de la plataforma Snyk AI Trust Los planes de Snyk se adecúan a desarrolladores y equipos de seguridad de todos los niveles, desde desarrolladores independientes a complejas organizaciones empresariales. Obtén acceso completo a la plataforma, que favorece la consolidación y optimiza la madurez de los programas de seguridad de aplicaciones (AppSec). Ignite For organizations with less than 100 developers looking for an Enterprise-grade platform to layer security into their AI development practices. Get started at $1,260/year per contributing developer Reserva una demostración en vivo Range of testing across SDLC Get up and running fast and easily Easy access to new capabilities Complete visibility into asset coverage 20 DAST targets included Includes SCA, SAST, IaC, and Container Advanced risk factors help prioritize Advanced analytics to assess programs Empresarial Para organizaciones que buscan una plataforma que unifique la seguridad de aplicaciones, reduzca riesgos, acelere la entrega y adopte la inteligencia artificial. Para comenzar, Comunícate con Ventas para conocer los precios Reserva una demostración en vivo Variedad de pruebas a lo largo del SDLC Ponte en marcha de forma rápida y sencilla Fácil acceso a nuevas funcionalidades Visibilidad total de la cobertura de activos Los factores de riesgo avanzados ayudan a establecer prioridades Analítica avanzada para evaluar los programas Complementos Gestión del aprendizaje de Snyk Snyk API &amp; Web Free Para desarrolladores independientes y equipos pequeños que buscan seguridad a medida que escriben código. Únete gratis. $0 por desarrollador colaborador Comienza sin pagar nada Desarrolladores colaboradores ilimitados Pruebas por producto limitadas Equipo Para equipos de desarrollo que desean integrar la confianza y la seguridad de la IA en su proceso de desarrollo. A partir de $25 al mes por desarrollador colaborador Adquiérelo ya Mínimo de 5 desarrolladores colaboradores. Máximo de 10. Los productos se adquieren por separado Facturación mensual. 1 mes gratis con la suscripción anual. Cumplimiento de licencias de código abierto Integración con Jira Complementos Gestión del programa Snyk Learn Mejora tu programa de formación de desarrolladores y simplifica el cumplimiento con las nuevas funciones de Snyk Learn. Más información Snyk API &amp; Web Amplía tu enfoque centrado en el desarrollo mediante el descubrimiento y las pruebas dinámicas de todas tus API y aplicaciones web. Más información Free Comienza sin pagar nada Equipo Adquiérelo ya Ignite Reserva una demostración en vivo Empresarial Reserva una demostración en vivo Funcionalidades de la plataforma de Snyk Desarrolladores colaboradores Ilimitados Hasta 10 desarrolladores colaboradores Up to 100 contributing developers Personalizable Puntuación por prioridad Included Included Included Included Complementos IDE Included Included Included Included Integración con administradores de código fuente en la nube, como GitHub, GitLab, Bitbucket y Azure Repos Included Included Included Included Integración con Jira Not included Included Included Included Informes y Reportes Not included Not included Included Included Registros de paquetes privados, que incluyen Artifactory y Nexus Not included Not included Included Included Administración auto-hospedada de código fuente, que incluye GitHub Enterprise Server, Bitbucket Server, GitLab Enterprise y Azure DevOps Server Not included Not included Included Included Snyk Open Source (SCA)* Pruebas por mes 200 1000 Unlimited Obtén una cotización personalizada Escaneo en todo el SDLC Included Included Included Included Supervisión de dependencias Included Included Included Included Compatibilidad con muchos lenguajes Included Included Included Included Cumplimiento de licencias Not included Included Included Included Asistencia de SBOM (lista de materiales de software) Not included Not included Included Included Snyk Code (SAST)* Pruebas por mes 100 Hasta 1000 Unlimited Obtén una cotización personalizada Escaneo en todo el SDLC Included Included Included Included Escaneo de código personalizado y en tiempo real Included Included Included Included Ejemplos de correcciones durante el desarrollo en el IDE de DeepCode AI Engine Included Included Included Included Integraciones durante el desarrollo, que incluyen IDE, CLI y repositorios Included Included Included Included Más de 14 lenguajes y marcos Included Included Included Included Correcciones automáticas en el IDE con DeepCode AI Fix Not included Not included Included Included Snyk Infrastructure as Code* Pruebas por mes 300 Ilimitados Unlimited Obtén una cotización personalizada Escaneo en todo el SDLC Included Included Included Included Integraciones durante el desarrollo, que incluyen IDE, SCM, CLI y Terraform Cloud o Enterprise Included Included Included Included Reglas de seguridad y gravedad personalizada de Snyk Included Included Included Included Gestión de desviaciones Included Included Included Included Reglas personalizadas Not included Not included Included Included Snyk Container\** Pruebas por mes 100 Ilimitados Unlimited Obtén una cotización personalizada Escaneo en todo el SDLC Included Included Included Included Supervisión de dependencias Included Included Included Included Recomendaciones de imágenes base Included Included Included Included Integración con registros de contenedores públicos, como Docker Hub, ECR, ACR y GCR Included Included Included Included Registros de contenedores auto-hospedados, como Docker Hub, ECR, ACR y GCR Not included Not included Included Included Priorización y supervisión en Kubernetes Not included Not included Included Included Recomendaciones de imágenes base personalizadas Not included Not included Included Included Visibilidad y priorización Detección de recursos de aplicaciones en el SDLC Not included Not included Included Included Priorización según el riesgo Not included Not included Included Included Gestión de la cobertura de seguridad de Snyk Not included Not included Included Included Elaboración avanzada de informes con Application Analytics Not included Not included Included Included Administración y elaboración de informes Elaboración de informes sobre problemas y dependencias Included Included Included Included Puntuación por prioridad Included Included Included Included Etiquetas de proyectos Not included Not included Included Included SSO: IdP de SAML Not included Not included Included Included SSO: asignación personalizada (solo disponible con asistencia y servicios premium) Not included Not included Included Included Gestión de un único grupo con varias organizaciones Not included Not included Included Included Gestión de varios grupos y organizaciones Not included Not included Included Included Roles de usuario personalizados Not included Not included Included Included Administración de licencias y políticas de seguridad Not included Not included Included Included Generación y enriquecimiento de SBOM (lista de materiales de software) Not included Not included Included Included Automatización Correcciones manuales y automáticas Included Included Included Included Cuentas de servicios Not included Not included Included Included API Robusta Not included Not included Included Included Complementos e integraciones Complementos IDE Included Included Included Included Integración con administradores de código fuente en la nube, como GitHub, GitLab, Bitbucket y Azure Repos Included Included Included Included Administración auto-hospedada de código fuente, que incluye GitHub Enterprise Server, Bitbucket Data Center, GitLab Enterprise y Azure DevOps Server Not included Not included Included Included Seguridad y cumplimiento Cifrado de datos en tránsito y en reposo Included Included Included Included Cumplimiento de SOC 2 tipo II, RGPD (Reglamento General de Protección de Datos) y las normas ISO 27001 e ISO 27017 Included Included Included Included FedRAMP Not included Not included Additional costs apply Included Registro de auditorías (por API) Not included Not included Included Included Snyk Broker Not included Not included Included Included Residencia de datos EE. UU. EE. UU. US/EU/AUS EE. UU., UE y Australia Asistencia y servicios Asistencia estándar Not included Included Included Included Tiempo de respuesta de asistencia Not included Siguiente día hábil 24x5 Las 24 horas, 5 días a la semana Mejora del tiempo de respuesta de asistencia Not included Not included Included Included Servicios de asistencia web Portal de asistencia del usuario Foros de debate sobre la asistencia de productos Documentación Aprendizaje auto-dirigido Acceso a recursos para los clientes Included Included Included Included Servicios y asistencia prémium también disponibles.  Más información . \* Los productos de Snyk pueden adquirirse de forma independiente. Todos los productos deben obtenerse con el mismo plan. El precio del plan varía según el producto. \*\* Snyk Container puede adquirirse en paquete junto con Snyk Open Source. Preguntas frecuentes ¿Cómo se cuentan los desarrolladores en Snyk? Para Snyk, los desarrolladores colaboradores son quienes, en los últimos 90 días, hicieron algún “commit” en un repositorio privado que supervisa Snyk. No se consideran las contribuciones en repositorios públicos (código abierto). La cantidad de colaboradores aparece en la Página de Uso de Snyk. ¿Cuales son las medidas de protección de datos de Snyk? Para Snyk, la seguridad de los datos es lo más importante y, por ello, brinda opciones flexibles de implementación. Nuestro modelo de SaaS ofrece facilidad de uso y una rápida rentabilidad; de todos modos, los usuarios pueden elegir emplear Broker si tienen requisitos más estrictos. Si buscas más información sobre cómo Snyk protege los datos, consulta nuestros documentos . ¿Cómo se cuentan las pruebas (test) en Snyk? El recuento de pruebas (tests) de Snyk es independiente según cada producto (Snyk Open Source, Snyk Code, Snyk Container y Snyk IaC) y cada plan de precios. ¿Quieres ver qué se considera una prueba (test)? Haz clic aquí para obtener más información . ¿Snyk almacena los datos de tarjetas de crédito? No. Stripe, nuestro proveedor externo, gestiona todos los datos y la actividad de las tarjetas de crédito (consulta Condiciones y servicios de Stripe ). ¿Cómo se cuentan los recursos de software en Snyk? Los recursos facturables administrados incluyen los recursos y archivos de configuración que gestiona y a los que accede el cliente en Snyk AppRisk. Los tipos de recursos facturables son los repositorios y las imágenes de contenedor. Obtén más información aquí . ¿Existe una cantidad máxima de licencias para cada plan? Snyk ofrece precios y planes según los requisitos y el tamaño de una organización. El plan Team (Equipo) está disponible para pequeñas empresas y equipos con un máximo de 10 licencias por organización. ¿Necesitas más de 10 licencias? Comunícate con un representante de Ventas de Snyk ahora mismo para obtener más información sobre cómo el plan Enterprise (Empresarial) puede satisfacer las necesidades y los requisitos de tu organización. Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:56
https://acast.com
Acast: The Best Podcast Monetization Platform Monetize Features Pricing Resources Advertise Advertise Log in: Podcasting Subheader Advertising Interesting topic Sign up Global Global USA Sverige Nederland Australia &amp; New Zealand United Kingdom France Deutschland Spanish (Mexico) Norsk Spanish (Spain) Log in Podcasting Subheader Advertising Interesting topic Acast+ subscriptions Find out Log in Sign up 90s Baby Show Your all-in-one podcasting powerhouse Getting paid to podcast made easy. Acast is as serious about your revenue as you are about podcasting. We consistently deliver more earnings than any other platform. Rated Excellent on Trustpilot Sign up $ 500 , 000 , 000 $500,000,000 The amount of revenue we&#x27;ve paid out to our creators since launching. Your professional podcast suite Acast’s all-in-one CMS gives you everything you need to manage, edit, distribute, and monetize your podcast, effortlessly. Monetize Monetize with premium ads, control placements, and choose your partners—no content mandates or IP grabs. Grow Track audience and revenue in real time with a simple, 360-degree dashboard. Manage Manage your podcast in one place with monetization at the core. Distribute Distribute your podcast to Apple Podcasts, Spotify, Amazon Music, and more with just one click. Monetize with premium ads, control placements, and choose your partners—no content mandates or IP grabs. Track audience and revenue in real time with a simple, 360-degree dashboard. Downloads by location Listens today Manage your podcast in one place with monetization at the core. Episode 1 Episode 2 Episode 3 Ad markers Name Podcast description Season Episode Distribute your podcast to Apple Podcasts, Spotify, Amazon Music, and more with just one click. Your professional podcasting suite Acast’s all-in-one platform gives you everything you need to manage, measure, and monetize your podcast effortlessly. Monetize Monetize with multiple ad formats, control ad placements, choose your brand partnerships, and track your earnings. Distribute Distribute your podcast to Apple Podcasts, Spotify, Amazon Music, and more with just one click. Analyze Get real-time, advanced listener analytics and revenue data through detailed dashboards. Manage &amp; Grow Powerful podcasting tools that streamline your workflow and amplify your audience growth. Explore All Features Our community Trusted by top creators With more than 140,000 podcasts globally, we power the world’s best independent creators, publishers, and media networks. There’s always room for one more. Get Started Investing Equity Mates &quot; Acast has a number of tools and resources on their Insights platform that help us understand more about our audience, and more about how our shows are performing to help us make better judgement calls, to grow, and become better podcasters. https://cdn.acast.com/web/Equity-Mates-Insights.mp3 Adam Buxton The Adam Buxton Podcast &quot; It&#x27;s been a great and productive relationship.  They allow me to make the show I want to make, without any  creative interference and they make the whole thing financially viable by securing excellent sponsors on a regular basis. I give Acast 10 thumbs up. https://cdn.acast.com/web/Adam-Buxton-Acast-2021_comp.mp3 Daily Tech News Show &quot; Acast has made it really easy to help build our wider audience. https://cdn.acast.com/web/Daily-Tech-News-Show-Growth_comp.mp3 The Lost Sci-Fi Podcast &quot; Customer service has always been excellent, my podcast has generated more revenue with Acast than I ever thought possible. It is rare to find a company filled with people who care as much as the people at Acast. https://cdn.acast.com/web/scott-miller-testimonial.mp3 Hubspot Join the Acast family I agree with the term and conditions Get started Thank you! Your submission has been received! Oops! Something went wrong while submitting the form. About us Advertise on Acast Newsroom Support Legal Careers Investor relations Privacy Acast Studios London © Acast. 2025 Do Not Sell Cookie Settings
2026-01-13T09:29:56
https://shows.acast.com/frontier/episodes/ep-42-brian-douglas-ceo-and-founder-at-opensauced
Ep. 42: Brian Douglas, CEO and Founder at OpenSauced - Frontier Podcast by Gun.io | Acast Follow Share Play Frontier Podcast by Gun.io Ep. 42: Brian Douglas, CEO and Founder at OpenSauced Season 4 , Ep. 42 • Thursday, February 1, 2024 In this week's episode, Teja talks with Brian Douglas, CEO and Founder at OpeSauced. They talk about how a good open source portfolio is more than just getting your name on big projects, the natural progression from developer advocacy to building an open source marketplace, and the trials and tribulations of learning to lead as you grow. opensauced.pizza Show more RSS More episodes View all episodes 46. Ep. 46: Matt Genovese, CEO and Founder of Planorama 54:36 | Thursday, April 11, 2024 | Season 4 , Ep. 46 This week, Teja sits down with Matt Genovese, CEO and Founder of Planorama, a company that designs UX/UI flows for products with complete enablement for software teams. They discuss the intricacies of living abroad, the importance of incorporating design, and how de-risking early on in the life of a new product can make it more successful in the long run.https://planorama.design/matthttps://aiproducthive.com Play 45. Ep. 45: Brian Pontarelli, CEO and Founder of FusionAuth 44:05 | Thursday, March 28, 2024 | Season 4 , Ep. 45 On this week's episode, Teja sits down with Brian Pontarelli, Founder and CEO of both FusionAuth and Cleanspeak. They discuss the complexities of growing two businesses at the same time, making progress without using AI, and the subtle clues in an interview process that let you know someone's a great culture fit.https://fusionauth.io/https://cleanspeak.com/ Play 44. Ep. 44: Sabber Ahamed, Founder of xoolooloo 28:31 | Thursday, February 29, 2024 | Season 4 , Ep. 44 This week, Teja talks with Sabber Ahamed, Founder of Xoolooloo and Data Scientist at Bridgestone. They discuss the proliferation of data science, the joys of working on your own projects outside of the 9-5, and the different things career goals of a computational geophysicist can really shake up. Play 43. Ep. 43: Harpreet Singh, CEO and Co-Founder at Launchable 39:22 | Thursday, February 15, 2024 | Season 4 , Ep. 43 This week, Teja talks with Harpreet Singh, Co-CEO and Co-Founder of Launchable, a company that's on a mission to make software testing faster and smarter. They discuss the DACI framework and the importance of intentionality in decision-making, what it's like to bring a behemoth like Jenkins to life, and the power of slowing down to meditate.https://www.launchableinc.com/ Play 41. Ep. 41: Ian Villa, COO and Co-founder at Whisper Aero 37:33 | Thursday, January 18, 2024 | Season 4 , Ep. 41 Joining Teja on this week's episode is Ian Villa, COO and Co-founder of Whisper Aero, a company that is developing cleaner, quieter, and more efficient propulsion solutions. They discuss the pros and cons of a campus with on-site housing, the burgeoning Nashville tech scene, and how a 5 am trip to Kinko's can, in hindsight, be a lesson in entrepreneurship.whisper.aero Play 40. Ep. 40: Kate O&#x27;Neil, CEO and Co-founder at Teaming 58:40 | Thursday, January 11, 2024 | Season 4 , Ep. 40 This week, Teja sits down for round two with Kate O'Neil, who has moved into the CEO position at Teaming since the last time they talked. They discuss the differences that come with the transition to becoming a CEO, the importance of incorporating movement into your life, and why getting the best sleep comes down to the perfect sheets.teaming.com Play 39. Ep. 39: Jeremy Snyder, CEO and Founder at FireTail 50:32 | Thursday, January 4, 2024 | Season 4 , Ep. 39 After a brief holiday hiatus, Teja is back this week with Jeremy Snyder, the Founder and CEO of FireTail, an API security platform that provides application layer visibility, real-time, inline inspection, and blocking of malicious API calls. They talk about being a less technical founder, how being a polyglot helps you understand more than language, and the importance of taking the time to find your own adventure.https://www.firetail.io/ Play 38. Ep. 38: Stefan Avram, Head of Growth and Co-Founder at WunderGraph 34:16 | Thursday, December 21, 2023 | Season 4 , Ep. 38 Teja sits down with Stefan Avram, Head of Growth and Co-founder at WunderGraph, an open-source GraphQL federation. They discuss how injuries can change your life trajectory, the complexities of working with distributed teams, and how sometimes getting fired can be the best thing that's ever happened to you. www.wundergraph.com Play Instagram X.com TikTok Copyright Gun.io Hosted with ❤️ by Acast
2026-01-13T09:29:56
https://aws.amazon.com/elasticloadbalancing/application-load-balancer/
Application Load Balancer | Elastic Load Balancing | Amazon Web Services Skip to main content Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account Elastic Load Balancing Overview Features Pricing Getting Started FAQs More Networking and Content Delivery › Elastic Load Balancing › Application Load Balancer Application Load Balancer Load balance HTTP and HTTPS traffic with advanced request routing targeted at the delivery of modern applications. Get started with Elastic Load Balancing Why Application Load Balancer? Application Load Balancer operates at the request level (layer 7), routing traffic to targets (EC2 instances, containers, IP addresses, and Lambda functions) based on the content of the request. Ideal for advanced load balancing of HTTP and HTTPS traffic, Application Load Balancer provides advanced request routing targeted at delivery of modern application architectures, including microservices and container-based applications. Application Load Balancer simplifies and improves the security of your application, by ensuring that the latest SSL/TLS ciphers and protocols are used at all times. Page topics Features 23 Features Open all Mutual TLS Support Mutual TLS is a protocol for two-way authentication between clients and servers that use x509 certificate based identities. With this feature, the ALB will authenticate client certs and perform revocation checks for certificates issued by both third party Certificate Authorities(CAs) or Private Certificate Authority (ACM PCA). The load balancer will also proxy client certificate information to the targets, which can be used for authorization decisions by the application.&nbsp; Automatic Target Weights Automatic target weights (ATW) use a new weighted random load balancing algorithm that improves the availability of applications even when the application’s targets are impaired. The algorithm analyzes HTTP status codes and TCP/TLS error rates to identify targets with higher error rates than peers in the same target group. When ATW identifies underperforming targets, this feature adjusts the volume of traffic directed to each target based on performance, helping distressed target to recover successfully. Layer-7 Load Balancing You can load balance HTTP/HTTPS traffic to targets - Amazon EC2 instances, microservices, and containers based on request attributes (such as X-Forwarded-For headers). Security Features When using Amazon Virtual Private Cloud (VPC), you can create and manage security groups associated with Elastic Load Balancing to provide additional networking and security options. You can configure an Application Load Balancer to be Internet facing or create a load balancer without public IP addresses to serve as an internal (non-internet-facing) load balancer. ALB supports implementation of Desync protections based on the http_desync_guardian library. With this new feature customer applications are protected from HTTP vulnerabilities due to Desync without making major compromises on availability and/or latency. Customers also have the capability to choose their level of tolerance to suspicious requests based on their application architecture. Outposts Support Application Load Balancer (ALB) supports&nbsp; AWS Outposts , a fully managed service that extends AWS infrastructure, services, and tools to virtually any datacenter, co-location space, or on-premises facility for a truly consistent hybrid experience. Customers can provision ALBs on supported instance types and the ALB will auto scale up to the capacity available on the rack to meet varying levels of application load without manual intervention. Customers can also get notifications to help them navigate their load balancing related capacity needs. Customers can use the same AWS Console, APIs, and CLI to provision and manage ALBs on Outposts as they do today with ALBs in the Region. HTTPS Support An Application Load Balancer supports HTTPS termination between the clients and the load balancer. Application Load Balancers also offer management of SSL certificates through AWS Identity and Access Management (IAM) and AWS Certificate Manager for pre-defined security policies. HTTP/2 and gRPC Support HTTP/2 is a new version of the HyperText Transfer Protocol (HTTP) that uses a single, multiplexed connection to allow multiple requests to be sent on the same connection. It also compresses header data before sending it out in binary format and supports SSL connections to clients. ALB can route and load balance gRPC traffic between microservices or between gRPC enabled clients and services. This allows seamless introduction of gRPC traffic management in the architectures without changing any of the underlying infrastructure on the customers’ clients or services. gRPC uses HTTP/2 for transport and is becoming the protocol of choice for inter-service communications in microservices architectures. It has features like efficient binary serialization and support for numerous languages in addition to the inherent benefits of HTTP/2 like lighter network footprint, compression, and bi-directional streaming making it better than the legacy protocols like REST. TLS Offloading You can create an HTTPS listener, which uses encrypted connections (also known as SSL offload). This feature enables traffic encryption between your load balancer and the clients that initiate SSL or TLS sessions. Application Load Balancer supports client TLS session termination. This enables you to offload TLS termination tasks to the load balancer, while preserving the source IP address for your back-end applications. You can choose from predefined security policies for your TLS listeners in order to meet compliance and security standards. AWS Certificate Manager (ACM) or AWS Identity and Access Management (IAM) can be used to manage your server certificates. You can use SNI to serve multiple secure websites using a single TLS listener. If the hostname in the client matches multiple certificates, the load balancer selects the best certificate to use based on a smart selection algorithm. Sticky Sessions Sticky sessions are a mechanism to route requests from the same client to the same target. Application Load Balancers support both duration-based cookies and application-based cookies. The key to managing sticky sessions is determining how long your load balancer should consistently route the user's request to the same target. Sticky sessions are enabled at the target group level. You can use a combination of duration-based stickiness, application-based stickiness, and no stickiness across all of your target groups. Native IPv6 Support Application Load Balancers support native Internet Protocol version 6 (IPv6) in a VPC. This will allow clients to connect to the Application Load Balancer via IPv4 or IPv6. Request Tracing The Application Load Balancer injects a new custom identifier “X-Amzn-Trace-Id” HTTP header on all requests coming into the load balancer. Request tracing allows you to track a request by its unique ID as it makes its way across various services that make up the bulk of traffic for your websites and distributed applications. You can use the unique trace identifier to uncover any performance or timing issues in your application stack at the granularity of an individual request. Redirects Application Load Balancer can redirect an incoming request from one URL to another URL. This includes the capability to redirect HTTP requests to HTTPS requests, which allows you to meet your compliance goal of secure browsing, while being able to achieve better search ranking and SSL/TLS score for your site. You can also use redirects to send users to a different web site; for example, redirecting from an old version of an application to a new version. Fixed Response Application Load Balancer can control which client requests are served by your applications. This enables you to respond to incoming requests with HTTP error response codes and custom error messages from the load balancer itself, without forwarding the request to the application. WebSockets Support WebSockets allows a server to exchange real-time messages with end-users without the end users having to request (or poll) the server for an update. The WebSockets protocol provides bi-directional communication channels between a client and a server over a long-running TCP connection. Server Name Indication (SNI) Server Name Indication (SNI) is an extension to the TLS protocol by which a client indicates the hostname to connect to at the start of the TLS handshake. The load balancer can present multiple certificates through the same secure listener, which enables it to support multiple secure websites using a single secure listener. Application Load Balancers also support a smart certificate selection algorithm with SNI. If the hostname indicated by a client matches multiple certificates, the load balancer determines the best certificate to use based on multiple factors including the capabilities of the client. IP addresses as Targets You can load balance any application hosted in AWS or on-premises using IP addresses of the application backends as targets. This allows load balancing to an application backend hosted on any IP address and any interface on an instance. Each application hosted on the same instance can have an associated security group and use the same port. You can also use IP addresses as targets to load balance applications hosted in on-premises locations (over a Direct Connect or VPN connection), peered VPCs and EC2-Classic (using ClassicLink). The ability to load balance across AWS and on-premises resources helps you migrate-to-cloud, burst-to-cloud or failover-to-cloud. Lambda functions as Targets Application Load Balancers support invoking Lambda functions to serve HTTP(S) requests enabling users to access serverless applications from any HTTP client, including web browsers. You can register Lambda functions as targets for a load balancer and leverage the support for content-based routing rules to route requests to different Lambda functions. You can use an Application Load Balancer as a common HTTP endpoint for applications that use servers and serverless computing. You can build an entire website using Lambda functions or combine EC2 instances, containers, on-premises servers and Lambda functions to build applications. Content-based Routing If your application is composed of several individual services, an Application Load Balancer can route a request to a service based on the content of the request such as Host field, Path URL, HTTP header, HTTP method, Query string or Source IP address. Host-based Routing : You can route a client request based on the Host field of the HTTP header allowing you to route to multiple domains from the same load balancer. Path-based Routing : You can route a client request based on the URL path of the HTTP header. HTTP header-based routing : You can route a client request based on the value of any standard or custom HTTP header. HTTP method-based routing : You can route a client request based on any standard or custom HTTP method. Query string parameter-based routing : You can route a client request based on query string or query parameters. Source IP address CIDR-based routing : You can route a client request based on source IP address CIDR from where the request originates. Containerized Application Support Application Load Balancer provides enhanced container support by load balancing across multiple ports on a single Amazon EC2 instance. Deep integration with the Amazon Elastic Container Service (ECS), provides a fully-managed container offering. ECS allows you to specify a dynamic port in the ECS task definition, giving the container an unused port when it is scheduled on the EC2 instance. The ECS scheduler automatically adds the task to the load balancer using this port. Web Application Firewall You can now use AWS WAF to protect your web applications on your Application Load Balancers. AWS WAF is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources. Slow Start Mode with Load-Balancing Algorithm Application Load Balancer supports a round-robin load-balancing algorithm. Additionally, Application Load Balancer supports a slow start mode with the round-robin algorithm that allows you to add new targets without overwhelming them with a flood of requests. With the slow start mode, targets warm up before accepting their fair share of requests based on a ramp-up period that you specify. Slow start is very useful for applications that depend on cache and need a warm-up period before being able to respond to requests with optimal performance. User Authentication You can offload the authentication functionality from your apps into Application Load Balancer. Application Load Balancer will securely authenticate users as they access cloud applications. Application Load Balancer is seamlessly integrated with Amazon Cognito, which allows end users to authenticate through social identity providers such as Google, Facebook, and Amazon, and through enterprise identity providers such as Microsoft Active Directory via SAML or any OpenID Connect-compliant identity provider (IdP). If you already have a custom IdP solution that is OpenID Connect-compatible, Application Load Balancer can also authenticate enterprise users by directly connecting with your identity provider. ALB Target Optimizer ALB Target Optimizer lets you enforce strict concurrency on targets. It works with the help of an agent that you install on your targets. On the agent, you can configure the maximum number of concurrent requests that the load balancer can send to the target, even as low as one request at a time. For low-concurrency workloads, target optimizer helps you achieve higher request success-rate and higher target efficiency. Get started Features page Discover more about Elastic Load Balancing Learn more Getting started Sign up for an AWS account Sign up Console Start building in the console Sign in Create an AWS account Learn What Is AWS? What Is Cloud Computing? What Is Agentic AI? Cloud Computing Concepts Hub AWS Cloud Security What's New Blogs Press Releases Resources Getting Started Training AWS Trust Center AWS Solutions Library Architecture Center Product and Technical FAQs Analyst Reports AWS Partners Developers Builder Center SDKs &amp; Tools .NET on AWS Python on AWS Java on AWS PHP on AWS JavaScript on AWS Help Contact Us File a Support Ticket AWS re:Post Knowledge Center AWS Support Overview Get Expert Help AWS Accessibility Legal English Back to top Amazon is an Equal Opportunity Employer: Minority / Women / Disability / Veteran / Gender Identity / Sexual Orientation / Age. x facebook linkedin instagram twitch youtube podcasts email Privacy Site terms Cookie Preferences © 2026, Amazon Web Services, Inc. or its affiliates. All rights reserved.
2026-01-13T09:29:56
https://shows.acast.com/frontier/episodes/ep-46-matt-genovese-ceo-and-founder-of-planorama
Ep. 46: Matt Genovese, CEO and Founder of Planorama - Frontier Podcast by Gun.io | Acast Follow Share Play Frontier Podcast by Gun.io Ep. 46: Matt Genovese, CEO and Founder of Planorama Season 4 , Ep. 46 • Thursday, April 11, 2024 This week, Teja sits down with Matt Genovese, CEO and Founder of Planorama, a company that designs UX/UI flows for products with complete enablement for software teams. They discuss the intricacies of living abroad, the importance of incorporating design, and how de-risking early on in the life of a new product can make it more successful in the long run. https://planorama.design/matt https://aiproducthive.com Show more RSS More episodes View all episodes 45. Ep. 45: Brian Pontarelli, CEO and Founder of FusionAuth 44:05 | Thursday, March 28, 2024 | Season 4 , Ep. 45 On this week's episode, Teja sits down with Brian Pontarelli, Founder and CEO of both FusionAuth and Cleanspeak. They discuss the complexities of growing two businesses at the same time, making progress without using AI, and the subtle clues in an interview process that let you know someone's a great culture fit.https://fusionauth.io/https://cleanspeak.com/ Play 44. Ep. 44: Sabber Ahamed, Founder of xoolooloo 28:31 | Thursday, February 29, 2024 | Season 4 , Ep. 44 This week, Teja talks with Sabber Ahamed, Founder of Xoolooloo and Data Scientist at Bridgestone. They discuss the proliferation of data science, the joys of working on your own projects outside of the 9-5, and the different things career goals of a computational geophysicist can really shake up. Play 43. Ep. 43: Harpreet Singh, CEO and Co-Founder at Launchable 39:22 | Thursday, February 15, 2024 | Season 4 , Ep. 43 This week, Teja talks with Harpreet Singh, Co-CEO and Co-Founder of Launchable, a company that's on a mission to make software testing faster and smarter. They discuss the DACI framework and the importance of intentionality in decision-making, what it's like to bring a behemoth like Jenkins to life, and the power of slowing down to meditate.https://www.launchableinc.com/ Play 42. Ep. 42: Brian Douglas, CEO and Founder at OpenSauced 36:55 | Thursday, February 1, 2024 | Season 4 , Ep. 42 In this week's episode, Teja talks with Brian Douglas, CEO and Founder at OpeSauced. They talk about how a good open source portfolio is more than just getting your name on big projects, the natural progression from developer advocacy to building an open source marketplace, and the trials and tribulations of learning to lead as you grow.opensauced.pizza Play 41. Ep. 41: Ian Villa, COO and Co-founder at Whisper Aero 37:33 | Thursday, January 18, 2024 | Season 4 , Ep. 41 Joining Teja on this week's episode is Ian Villa, COO and Co-founder of Whisper Aero, a company that is developing cleaner, quieter, and more efficient propulsion solutions. They discuss the pros and cons of a campus with on-site housing, the burgeoning Nashville tech scene, and how a 5 am trip to Kinko's can, in hindsight, be a lesson in entrepreneurship.whisper.aero Play 40. Ep. 40: Kate O&#x27;Neil, CEO and Co-founder at Teaming 58:40 | Thursday, January 11, 2024 | Season 4 , Ep. 40 This week, Teja sits down for round two with Kate O'Neil, who has moved into the CEO position at Teaming since the last time they talked. They discuss the differences that come with the transition to becoming a CEO, the importance of incorporating movement into your life, and why getting the best sleep comes down to the perfect sheets.teaming.com Play 39. Ep. 39: Jeremy Snyder, CEO and Founder at FireTail 50:32 | Thursday, January 4, 2024 | Season 4 , Ep. 39 After a brief holiday hiatus, Teja is back this week with Jeremy Snyder, the Founder and CEO of FireTail, an API security platform that provides application layer visibility, real-time, inline inspection, and blocking of malicious API calls. They talk about being a less technical founder, how being a polyglot helps you understand more than language, and the importance of taking the time to find your own adventure.https://www.firetail.io/ Play 38. Ep. 38: Stefan Avram, Head of Growth and Co-Founder at WunderGraph 34:16 | Thursday, December 21, 2023 | Season 4 , Ep. 38 Teja sits down with Stefan Avram, Head of Growth and Co-founder at WunderGraph, an open-source GraphQL federation. They discuss how injuries can change your life trajectory, the complexities of working with distributed teams, and how sometimes getting fired can be the best thing that's ever happened to you. www.wundergraph.com Play Instagram X.com TikTok Copyright Gun.io Hosted with ❤️ by Acast
2026-01-13T09:29:56
https://www.cisco.com/c/de_ch/solutions/index.html
Lösungen - Cisco Skip to content Zur Suche Skip to footer Cisco.com Schweiz Produkte und Services Lösungen Support Lernen Informationen zu Cisco Informationen zum Kauf Partner – Startseite Partnerprogramm Support Tools Cisco Partner suchen Unsere Partner Werden Sie ein Cisco Partner Lösungen Von Netzwerken über Rechenzentren bis hin zu Collaboration- und Sicherheitslösungen: Unsere IT-Lösungen erfüllen Ihre geschäftlichen Anforderungen. Erfahren Sie, wie wir Ihnen helfen können. Cisco kontaktieren Rückruf anfordern Telefon – Vertrieb: 0800 179 317 Technischer Support Vorgestellte Lösungen Hybride Arbeit Secure Access Service Edge (SASE) Full-Stack Observability Hybrid Cloud Lösungen nach Technologie Analytik und Automatisierung Künstliche Intelligenz Cloud Collaboration Kritische Netzwerkinfrastruktur Internet of Things Wireless und Mobility Security Netzwerkarchitektur Intent-based Networking Software Software-defined Networking Produktindex Design Zone: Cisco Designleitfäden Lösungen nach Unternehmenstyp Kleine und mittelständische Unternehmen Service-Provider CIO Insights & Digital Leadership Öffentlicher Sektor Lösungen nach Branche Städte und Gemeinden Bildungswesen Energieversorgung Finanzdienstleistungen Behörden/Verwaltung Gesundheit Versicherungswesen Fertigung Öl und Gas Einzelhandel Sport und Unterhaltung Transport- und Verkehrswesen Versorgungswesen Cisco on Cisco: Wir teilen unser IT-Wissen Durch die Weitergabe der eigenen IT-Erfahrungen hilft Cisco on Cisco Kunden und Partnern, die Technologie so einzusetzen, dass sie ihre Geschäftsziele erreichen. Verschaffen Sie sich Einblicke in die Welt der Cisco IT. Erfahren Sie, wie Cisco Unternehmen bei der Transformation durch Technologie unterstützt.&nbsp; Finden Sie heraus, wie wir Ihnen helfen können. Cisco Co-Innovation Center Cisco Co-Innovation Center arbeiten mit regionalen und globalen Partnern zusammen, um neue Technologielösungen zu entwickeln, branchenspezifische Schwierigkeiten zu überwinden und einen Beitrag zum Wohl der Wirtschaft, der Gesellschaft und des Planeten zu leisten. Entdecken Sie unsere Lösungen Cisco Partner machen den Unterschied Unsere Experten unterstützen Sie vor, während und nach einer Technologiebereitstellung.  Einstieg Unser umfangreiches Partnernetzwerk steht Ihnen bei der digitalen Transformation zur Seite.  Globale Partner anzeigen Unternehmen bei der Erreichung der Ziele zu unterstützen, ist die grösste Bereicherung. wir bieten vieles mehr.  Partner werden Wir machen das Marketing für kleine Unternehmen einfach.  Steigerung der Nachfrage bei kleinen Unternehmen (Anmeldung erforderlich) Kontaktieren Sie den Vertrieb Kostenlose Testversionen, Demos und Angebote Services
2026-01-13T09:29:56
https://infisical.com/docs/integrations/platforms/certificate-agent#agent-configuration
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let&#x27;s Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;./client-id&quot; # Path to file containing client ID client-secret : &quot;./client-secret&quot; # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : &quot;kubernetes-auth&quot; config : identity-id : &quot;your-kubernetes-identity-id&quot; service-account-token-path : &quot;/var/run/secrets/kubernetes.io/serviceaccount/token&quot; Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : &quot;azure-auth&quot; config : identity-id : &quot;your-azure-identity-id&quot; Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;gcp-id-token&quot; config : identity-id : &quot;your-gcp-identity-id&quot; GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : &quot;gcp-iam&quot; config : identity-id : &quot;your-gcp-identity-id&quot; service-account-key : &quot;/path/to/service-account-key.json&quot; Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;aws-iam&quot; config : identity-id : &quot;your-aws-identity-id&quot; ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : [ &quot;api.example.com&quot; , &quot;api-v2.example.com&quot; ] ttl : &quot;90d&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; # Enable automatic certificate renewal lifecycle : renew-before-expiry : &quot;30d&quot; status-check-interval : &quot;6h&quot; # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : &quot;/etc/ssl/private/web.key&quot; permission : &quot;0600&quot; # Read/write for owner only certificate : path : &quot;/etc/ssl/certs/web.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner chain : path : &quot;/etc/ssl/certs/web-chain.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo &quot;Certificate issued for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-failure : command : | echo &quot;Certificate operation failed: ${ERROR_MESSAGE}&quot; mail -s &quot;Certificate Alert&quot; [email&#160;protected] &lt; /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., [&quot;www.example.com&quot;, &quot;api.example.com&quot;] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger &#x27;Certificate renewal failed&#x27; , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo &quot;New certificate issued for ${CERT_COMMON_NAME}&quot; chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d &quot;{&#x27;text&#x27;: &#x27;Certificate for ${CERT_COMMON_NAME} renewed successfully&#x27;}&quot; timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo &quot;Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}&quot; # Send alert mail -s &quot;Certificate Failure Alert&quot; [email&#160;protected] &lt; /dev/null # Log to syslog logger -p daemon.error &quot;Certificate agent failure: ${ERROR_MESSAGE}&quot; timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : &quot;https://app.infisical.com&quot; retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; csr-path : &quot;/etc/ssl/requests/api.csr&quot; file-output : certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; lifecycle : renew-before-expiry : &quot;14d&quot; # Renew 14 days before expiration status-check-interval : &quot;6h&quot; # Check certificate status every 6 hours file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; post-hooks : on-issuance : command : &quot;systemctl reload nginx&quot; timeout : 30 on-renewal : command : &quot;systemctl reload nginx &amp;&amp; logger &#x27;Certificate renewed&#x27;&quot; timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:56
https://shows.acast.com/frontier/episodes/ep-40-kate-oneil-ceo-and-co-founder-at-teaming
Ep. 40: Kate O&#x27;Neil, CEO and Co-founder at Teaming - Frontier Podcast by Gun.io | Acast Follow Share Play Frontier Podcast by Gun.io Ep. 40: Kate O&#x27;Neil, CEO and Co-founder at Teaming Season 4 , Ep. 40 • Thursday, January 11, 2024 This week, Teja sits down for round two with Kate O'Neil, who has moved into the CEO position at Teaming since the last time they talked. They discuss the differences that come with the transition to becoming a CEO, the importance of incorporating movement into your life, and why getting the best sleep comes down to the perfect sheets. teaming.com Show more RSS More episodes View all episodes 46. Ep. 46: Matt Genovese, CEO and Founder of Planorama 54:36 | Thursday, April 11, 2024 | Season 4 , Ep. 46 This week, Teja sits down with Matt Genovese, CEO and Founder of Planorama, a company that designs UX/UI flows for products with complete enablement for software teams. They discuss the intricacies of living abroad, the importance of incorporating design, and how de-risking early on in the life of a new product can make it more successful in the long run.https://planorama.design/matthttps://aiproducthive.com Play 45. Ep. 45: Brian Pontarelli, CEO and Founder of FusionAuth 44:05 | Thursday, March 28, 2024 | Season 4 , Ep. 45 On this week's episode, Teja sits down with Brian Pontarelli, Founder and CEO of both FusionAuth and Cleanspeak. They discuss the complexities of growing two businesses at the same time, making progress without using AI, and the subtle clues in an interview process that let you know someone's a great culture fit.https://fusionauth.io/https://cleanspeak.com/ Play 44. Ep. 44: Sabber Ahamed, Founder of xoolooloo 28:31 | Thursday, February 29, 2024 | Season 4 , Ep. 44 This week, Teja talks with Sabber Ahamed, Founder of Xoolooloo and Data Scientist at Bridgestone. They discuss the proliferation of data science, the joys of working on your own projects outside of the 9-5, and the different things career goals of a computational geophysicist can really shake up. Play 43. Ep. 43: Harpreet Singh, CEO and Co-Founder at Launchable 39:22 | Thursday, February 15, 2024 | Season 4 , Ep. 43 This week, Teja talks with Harpreet Singh, Co-CEO and Co-Founder of Launchable, a company that's on a mission to make software testing faster and smarter. They discuss the DACI framework and the importance of intentionality in decision-making, what it's like to bring a behemoth like Jenkins to life, and the power of slowing down to meditate.https://www.launchableinc.com/ Play 42. Ep. 42: Brian Douglas, CEO and Founder at OpenSauced 36:55 | Thursday, February 1, 2024 | Season 4 , Ep. 42 In this week's episode, Teja talks with Brian Douglas, CEO and Founder at OpeSauced. They talk about how a good open source portfolio is more than just getting your name on big projects, the natural progression from developer advocacy to building an open source marketplace, and the trials and tribulations of learning to lead as you grow.opensauced.pizza Play 41. Ep. 41: Ian Villa, COO and Co-founder at Whisper Aero 37:33 | Thursday, January 18, 2024 | Season 4 , Ep. 41 Joining Teja on this week's episode is Ian Villa, COO and Co-founder of Whisper Aero, a company that is developing cleaner, quieter, and more efficient propulsion solutions. They discuss the pros and cons of a campus with on-site housing, the burgeoning Nashville tech scene, and how a 5 am trip to Kinko's can, in hindsight, be a lesson in entrepreneurship.whisper.aero Play 39. Ep. 39: Jeremy Snyder, CEO and Founder at FireTail 50:32 | Thursday, January 4, 2024 | Season 4 , Ep. 39 After a brief holiday hiatus, Teja is back this week with Jeremy Snyder, the Founder and CEO of FireTail, an API security platform that provides application layer visibility, real-time, inline inspection, and blocking of malicious API calls. They talk about being a less technical founder, how being a polyglot helps you understand more than language, and the importance of taking the time to find your own adventure.https://www.firetail.io/ Play 38. Ep. 38: Stefan Avram, Head of Growth and Co-Founder at WunderGraph 34:16 | Thursday, December 21, 2023 | Season 4 , Ep. 38 Teja sits down with Stefan Avram, Head of Growth and Co-founder at WunderGraph, an open-source GraphQL federation. They discuss how injuries can change your life trajectory, the complexities of working with distributed teams, and how sometimes getting fired can be the best thing that's ever happened to you. www.wundergraph.com Play Instagram X.com TikTok Copyright Gun.io Hosted with ❤️ by Acast
2026-01-13T09:29:56
https://www.cisco.com/site/hk/en/partners/cisco-partner-program/index.html?ccid=cc000864&dtid=odiprc001129
Cisco Partner Program - Cisco Skip to main content Skip to search Skip to footer Cisco.com Hong Kong Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Explore Cisco How to buy Partners EN HK Log in Explore Cisco Search MENU CLOSE How to buy Partners Log in EN HK Close Close Close Close Close Partners The Cisco Partner Program Get recognized and rewarded for delivering better business outcomes for your customers. Find a Cisco partner Explore partner ecosystem Are you a Cisco partner? Become a Cisco partner Already a partner? Log in Hello, how can I help? One program, four roles The Cisco Partner Program is flexibly structured around how you deliver value to customers. Participate in one or more roles— Integrator,   Provider,   Developer,  and Advisor —each at the level that fits your business: Select, Premier, or Gold. Watch video (01:29) View program details Benefits and incentives, aligned to your goals Build and differentiate your practice Take advantage of a wealth of training and co-creation opportunities. See benefits Market and generate demand Find resources and support to up-level your marketing and sales efforts. See benefits Grow your business and profit Access financial incentives and promotions to help you win throughout the customer lifecycle. See benefits View all benefits Which roles are right for you Depending on your needs, you can join one role or take advantage of all four. Requirements vary across roles, but your investment can count toward multiple roles, so you have more flexibility and better return on investment. Integrator Build solutions that solve customer business problems, according to your unique expertise. Learn about the Integrator role Provider Deliver as-a-service and managed solutions with flexible consumption options powered by Cisco. Learn about the Provider role Developer Build unique solutions and applications on Cisco platforms to deliver customer-specific business outcomes. Learn about the Developer role Advisor Provide our mutual customers with expert market and business consulting services across the sales cycle. Learn about the Advisor role Choose your level of engagement Select Access benefits and incentives tailored to your business model. Premier Qualify for expanded benefits and incentives to boost your success. Gold Gain the advantage of the industry-leading Gold brand and access additional incentives, plus all Select- and Premier-level benefits. Learn more about Select, Premier, and Gold levels for  Integrators ,  Providers ,  Developers , and  Advisors . Deliver expertise to your customers Show customers you have the expertise to implement solutions that help drive their digital transformations. Improve profitability with: • Specializations: Get recognized for your technical skills and business practices. • Career certifications: Set up your employees—and your business—for success. • Designations: Build strategic relationships and qualify for incentives. Get expertise Helping Fort Worth to bridge the digital divide Cisco IoT and partner Presidio help Fort Worth to bridge the digital divide with public Wi-Fi for underprivileged neighborhoods. Read blog Read customer story Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Statement Cookies Trademarks Supply Chain Transparency Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:56
https://akismet.com/developers/getting-started/
Getting started &#8211; Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Getting started Plugins and libraries Detailed docs Building your application Key verification Comment check Submit spam (missed&nbsp;spam) Submit ham (false&nbsp;positives) Key/sites activity Usage limit Response error codes Akismet Error #10001 Akismet Error #10003 Akismet Error #10402 Akismet Error #10011 Akismet Error #10010 Akismet Error #10009 Akismet Error #10006 Akismet Error #10005 Akismet Error #10404 Akismet Error #10403 Akismet Error #30001 Getting started If you are currently developing a web application and would like to integrate Akismet’s world-class spam protection, you’ve come to the right place. 1. Get a key You will first need to sign up for an Akismet key. This will give you access to our API, and will allow us to monitor its results to make sure things are running as smoothly as possible. Get an Akismet API key 2. Select integration type You can either start from scratch , or get up and running quickly with an existing class or library created by other developers. We also have an OpenAPI specification that you can use to generate your own library. Use a library Choose from PHP, Ruby, Python, and more. These libraries do all of the hard work for you. Custom integration Hand-roll your own integration based on your application specific needs. Related Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:56
https://akismet.com/developers/detailed-docs/
Detailed docs &#8211; Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Getting started Plugins and libraries Detailed docs Building your application Key verification Comment check Submit spam (missed&nbsp;spam) Submit ham (false&nbsp;positives) Key/sites activity Usage limit Response error codes Akismet Error #10001 Akismet Error #10003 Akismet Error #10402 Akismet Error #10011 Akismet Error #10010 Akismet Error #10009 Akismet Error #10006 Akismet Error #10005 Akismet Error #10404 Akismet Error #10403 Akismet Error #30001 Detailed docs Related Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:56
https://akismet.com/contact/
Contact Us &#8211; Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Contact us We&#8217;re here to help. Please tell us more: &nbsp;I have a question about signing up or subscribing. &nbsp;I have a billing question. &nbsp;I have a technical support question. &nbsp;I think Akismet is catching my comments by mistake. &nbsp;I have an enterprise or large-scale question. &nbsp;I have a question about nonprofit accounts. &nbsp;Privacy: I want to opt my email address out of all long term tracking. &nbsp;You all are great! &nbsp;I have a question about developing an application or library with Akismet. &nbsp;I have a press/interview request. &nbsp;My site has been incorrectly classified as commercial. Your name Your email Company (optional) Your site URL (optional if you enter your API key below) API key (required only for paid priority support) Your message What is 14+7? * Submit * You might wonder: if these guys are so good at blocking spam, why would they put a stupid question like this on their contact form to keep spam out? Well, Akismet is great at protecting contact forms; we use it on all our other sites, but on Akismet.com, sometimes people use the contact form to tell us they’re being blocked by Akismet. If you think about that, blocking people when they’re trying to tell us they’re wrongly blocked would probably frustrate them, hence the math question. Immediate responses I need to update my credit card. I forgot my API key. I need to reset my password. I need to cancel my subscription. Priority support Want to get help even faster? Don’t forget that our Pro subscription includes priority email support. Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:56
https://github.com/aws-samples/sample-aipowered-web-using-amazon-bedrock
GitHub - aws-samples/sample-aipowered-web-using-amazon-bedrock Skip to content Navigation Menu Toggle navigation Sign in Appearance settings Platform AI CODE CREATION GitHub Copilot Write better code with AI GitHub Spark Build and deploy intelligent apps GitHub Models Manage and compare prompts MCP Registry New Integrate external tools DEVELOPER WORKFLOWS Actions Automate any workflow Codespaces Instant dev environments Issues Plan and track work Code Review Manage code changes APPLICATION SECURITY GitHub Advanced Security Find and fix vulnerabilities Code security Secure your code as you build Secret protection Stop leaks before they start EXPLORE Why GitHub Documentation Blog Changelog Marketplace View all features Solutions BY COMPANY SIZE Enterprises Small and medium teams Startups Nonprofits BY USE CASE App Modernization DevSecOps DevOps CI/CD View all use cases BY INDUSTRY Healthcare Financial services Manufacturing Government View all industries View all solutions Resources EXPLORE BY TOPIC AI Software Development DevOps Security View all topics EXPLORE BY TYPE Customer stories Events &amp; webinars Ebooks &amp; reports Business insights GitHub Skills SUPPORT &amp; SERVICES Documentation Customer support Community forum Trust center Partners Open Source COMMUNITY GitHub Sponsors Fund open source developers PROGRAMS Security Lab Maintainer Community Accelerator Archive Program REPOSITORIES Topics Trending Collections Enterprise ENTERPRISE SOLUTIONS Enterprise platform AI-powered developer platform AVAILABLE ADD-ONS GitHub Advanced Security Enterprise-grade security features Copilot for Business Enterprise-grade AI features Premium Support Enterprise-grade 24/7 support Pricing Search or jump to... Search code, repositories, users, issues, pull requests... --> Search Clear Search syntax tips Provide feedback --> We read every piece of feedback, and take your input very seriously. Include my email address so I can be contacted Cancel Submit feedback Saved searches Use saved searches to filter your results more quickly --> Name Query To see all available qualifiers, see our documentation . Cancel Create saved search Sign in Sign up Appearance settings Resetting focus You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert {{ message }} aws-samples / sample-aipowered-web-using-amazon-bedrock Public generated from amazon-archives/__template_MIT-0 Notifications You must be signed in to change notification settings Fork 0 Star 1 License MIT-0 license 1 star 0 forks Branches Tags Activity Star Notifications You must be signed in to change notification settings Code Issues 0 Pull requests 0 Actions Projects 0 Security Uh oh! There was an error while loading. Please reload this page . Insights Additional navigation options Code Issues Pull requests Actions Projects Security Insights aws-samples/sample-aipowered-web-using-amazon-bedrock   main Branches Tags Go to file Code Open more actions menu Folders and files Name Name Last commit message Last commit date Latest commit   History 7 Commits customer-support-ai customer-support-ai     .gitignore .gitignore     CODE_OF_CONDUCT.md CODE_OF_CONDUCT.md     CONTRIBUTING.md CONTRIBUTING.md     LICENSE LICENSE     README.md README.md     View all files Repository files navigation README Code of conduct Contributing MIT-0 license Security 💡 Build an AI-powered website assistant with Amazon Bedrock ℹ️ Project Overview This project provides the reference implementation to use the Amazon Bedrock Knowledgbase to maintain the documents and also crawl the website data as knowledge base to provide the AI powered responses to user queries. It deploys a complete Customer Support AI Assistant solution powered by Amazon Bedrock. The application consists of three main components: Frontend : A Streamlit web application deployed on AWS Fargate with Application Load Balancer Backend : A Lambda function that processes user queries using Amazon Bedrock Knowledge Base : Amazon Bedrock Knowledge Base with S3 data sources for internal and external content ⚠️ Production Note : This is a reference implementation for demonstration purposes. The frontend application uses a simplified authentication model suitable for demos and prototypes. For production deployments, you should implement additional security controls, user management, and governance features aligned with your organization's specific requirements, such as: Integration with enterprise identity providers (SAML, OIDC) Advanced role-based access control (RBAC) Audit logging and compliance monitoring Session management and timeout policies Multi-factor authentication (MFA) Custom authorization logic for your use case 🎯 Business use case This project provides the reference implementation to explains how we can build a knowledge base and create a website assistant that gives relevant answers to user questions. It helps both internal and external users. For internal users, such as customer service agents, the website assistant fetches relevant information from the knowledge base. Agents can resolve customer queries efficiently, leading to a better overall customer experience. For external users, the website assistant serves as a fast tool to find information. Customers can ask questions and get information quickly without spending time on reading through product manuals and troubleshooting articles based on the company’s website. 🏗️ Solution Architecture The solution uses the following AWS services: Amazon Bedrock : For LLM capabilities and Knowledge Base for RAG (Retrieval Augmented Generation) AWS Lambda : For backend processing of user queries Amazon ECS/Fargate : For hosting the Streamlit frontend application AWS WAF : For web application security and rate limiting Application Load Balancer : For routing traffic to the Fargate service Amazon S3 : For storing knowledge base documents AWS IAM : For secure access control between services ⚙️ Project Structure customer-support-ai/ ├── backend/ │ └── functions/ │ └── cs_kb_handler/ # Lambda function for processing queries ├── frontend/ # Streamlit web application ├── iac/ │ ├── cdk/ # CDK infrastructure code │ ├── deploy/ # Deployment utilities (modular) │ ├── deploy.py # Main deployment script │ ├── cleanup.py # Cleanup script │ └── parameters.json # Environment configuration parameters 🔧 Prerequisites AWS CDK installed ( npm install -g aws-cdk ) Python 3.9 or later AWS credentials configured with appropriate permissions Docker installed and running (required for local development and deployment) Windows: https://docs.docker.com/desktop/setup/install/windows-install/ Mac: https://docs.docker.com/desktop/install/mac-install/ An existing Amazon Bedrock Knowledge Base with data sources (or you can create them manually) 🔧 Setup Update the parameters.json file with your configuration: { "Parameters" : { "DEV" : { "external_source_id" : " your-external-source-id " , "internal_source_id" : " your-internal-source-id " , "knowledge_base_id" : " your-knowledge-base-id " , "model_id" : " amazon.nova-lite-v1:0 " , "ssl_certificate_arn" : " " , "allowed_ip_ranges" : [ " your-ip/32 " ], "allow_all_ips" : false } } } SSL Certificate : Leave ssl_certificate_arn empty to auto-generate a self-signed certificate (for demo) Or provide an existing ACM certificate ARN for production use IP Access : Configure allowed_ip_ranges to restrict access to specific IPs Set allow_all_ips: true to allow access from anywhere (not recommended) 🚀 Deployment Quick Start (Recommended) cd iac ./deploy.sh The deployment script will: Set up Python virtual environment Install all dependencies Generate SSL certificate (if not provided) Deploy all CDK stacks Create demo users with passwords Manual Deployment cd iac python3 -m venv .venv source .venv/bin/activate # On Windows: .venv\Scripts\activate pip install -r requirements.txt python3 deploy.py Demo Users Two demo users are automatically created during deployment: internal_user : Access to all data sources (internal + external) external_user : Access to public data sources only Passwords are displayed in the deployment output. Save them securely! 📌 Components Frontend (Streamlit Application) Deployed on AWS Fargate with auto-scaling Protected by AWS WAF with IP restrictions and rate limiting Authentication : Amazon Cognito authentication with SSL certificate (required for security) Streamlit interface with user type selection (Internal/External) Backend (Lambda Function) Processes user queries using Amazon Bedrock Connects to Bedrock Knowledge Base for RAG capabilities Handles different user types (internal/external) with appropriate data source filtering Returns formatted responses to the frontend Infrastructure VPC with public and private subnets ECS Cluster with Fargate service Application Load Balancer with Cognito authentication (when SSL certificate provided) Amazon Cognito : User Pool for authentication with demo user AWS WAF for web application security and DDoS protection IAM roles with least privilege permissions ⭐ Key Features Multiple Datasource based RAG model Using Webcrawler as datasource Auto selection of data sources for RAG model, based on the user type (Internal vs External user) 🧹 Cleanup Quick Cleanup (Recommended) cd iac ./cleanup.sh This will: Empty all S3 buckets Delete ECR images Destroy all CDK stacks Delete SSL certificates Clean up local files Manual Cleanup cd iac cdk destroy --all ⚙️ Customization To modify the frontend, update the Streamlit code in the frontend/ directory To modify the backend logic, update the Lambda function in backend/functions/cs_kb_handler/ To change infrastructure settings, modify the CDK stack in iac/cdk/cdk_stack.py To update environment configurations, modify iac/parameters.json 🔐 Authentication Cognito Authentication The application uses Amazon Cognito for secure authentication: Internal User : internal_user - Access to all data sources External User : external_user - Access to public data only Passwords are generated during deployment Access via HTTPS with self-signed certificate (browser warning expected) Production Considerations : Replace the self-signed certificate with a valid ACM certificate Integrate with your organization's identity provider (SAML/OIDC) Implement additional authorization controls based on your governance requirements Add audit logging for compliance Configure session timeout policies according to your security standards ⚡ Troubleshooting CloudFormation Deployment Failures : Check CloudFormation events in the AWS Console Lambda Function Errors : Check CloudWatch Logs for the Lambda function Frontend Issues : Check ECS task logs in CloudWatch Knowledge Base Issues : Verify your Knowledge Base and data sources are properly configured in Amazon Bedrock Login Issues : Use internal_user or external_user with passwords from deployment output SSL Certificate Warning : Accept the browser warning for self-signed certificates (demo only) IP Access Denied : Verify your IP is in allowed_ip_ranges in parameters.json Security See CONTRIBUTING for more information. License This library is licensed under the MIT-0 License. See the LICENSE file. About No description, website, or topics provided. Resources Readme License MIT-0 license Code of conduct Code of conduct Contributing Contributing Security policy Security policy Uh oh! There was an error while loading. Please reload this page . Activity Custom properties Stars 1 star Watchers 0 watching Forks 0 forks Report repository Releases No releases published Packages 0 No packages published Uh oh! There was an error while loading. Please reload this page . Contributors 2 jshashankaws ranjjit Languages Python 98.5% Other 1.5% Footer &copy; 2026 GitHub,&nbsp;Inc. Footer navigation Terms Privacy Security Status Community Docs Contact Manage cookies Do not share my personal information You can’t perform that action at this time.
2026-01-13T09:29:56
https://www.cisco.com/c/pl_pl/support/index.html
Pomoc techniczna - Wsparcie Cisco i pliki do pobrania — dokumentacja, narzędzia, zgłoszenia - Cisco Skip to Main content Przejdź do szukania Skip to footer Cisco.com Polska Produkty i usługi Rozwiązania Pomoc techniczna Kształć się Poznaj rozwiązania Cisco Jak kupić Strona główna Partnerów Nowa program dla Partnerów Pomoc techniczna Narzędzia Znajdź Partnera Cisco Poznaj naszych Partnerów Zostań Partnerem Cisco Wsparcie i pliki do pobrania Znajdź produkty i pliki do pobrania Helpful Links Licensing Support Technology Support Support for Cisco Acquisitions Support Tools Cisco Community When autocomplete results are available use up and down arrows to review and enter to select Moje wsparcie Open/View Cases Do otwarcia lub wyświetlenia zgłoszenia jest potrzebna umowa o świadczenie usług TAC Connect Bot Otrzymuj natychmiastowe aktualizacje na temat zgłoszenia do asystenta TAC i nie tylko Zobacz otwarte zgłoszenia Zaloguj się Utwórz konto w firmie Cisco Zalety konta w firmie Cisco Oprogramowanie do pobrania Zaloguj się Utwórz konto w firmie Cisco Zalety konta w firmie Cisco Wszystkie pobrane programy Ostatnio wyświetlane produkty Moje zapisane treści Zaloguj się Możesz teraz zapisywać dokumenty i inne treści do wykorzystania w przyszłości. Zaloguj się , aby zobaczyć swoje zapisane treści. Opinie Moje urządzenia Log in to view or manage your My Devices inventory Skontaktuj się z TAC telefonicznie Produkty dla korporacji i dostawców usług Polska 00800 4411 932 Globalne numery telefonów Produkty dla małych firm Polska 00800 7020 43 Globalne numery telefonów Zwroty Portal zwrotów Produkty według kategorii Przełączniki Bezpieczeństwo Routery Łączność bezprzewodowa Ujednolicona komunikacja Oprogramowanie sieciowe (IOS i NX-OS) Terminale i telefony do współpracy Wszystkie wspierane produkty Narzędzia do sprawdzania statusu Porady dotyczące bezpieczeństwa W portalu Cisco Security znajdziesz informacje, które przekładają się na praktyczne działania w zakresie eliminacji luk i zagrożeń bezpieczeństwa w produktach i usługach Cisco oraz produktach firm trzecich. Powiadomienia o problemach Dowiedz się więcej o poważniejszych problemach niekoniecznie dotyczących luk w zabezpieczeniach, które jednak bezpośrednio dotyczą produktów Cisco i najczęściej wymagają uaktualnienia, znalezienia alternatywnego rozwiązania albo innego działania ze strony klienta. Status chmury Cisco Sprawdź bieżący status usług i składników w ramach ofert chmurowych firmy Cisco dla Webex, zabezpieczeń i Internetu rzeczy. TAC Connect Bot W przypadku istniejących zastosowań asystent TAC Connect Bot oferuje klientom i partnerom doświadczenie samoobsługowe w zakresie zapytań dotyczących typowych spraw i podstawowych transakcji, bez konieczności oczekiwania w kolejce. Więcej narzędzi Analizator rozwiązań z zakresu współpracy Zestaw narzędzi wspomagający Cię w codziennej obsłudze infrastruktury do współpracy. Cisco CLI Analyzer Cisco CLI Analyzer (poprzednio ASA CLI Analyzer) to inteligentny klient SSH ze zintegrowanymi narzędziami TAC i know-how. Służy do pomocy w rozwiązywaniu problemów ze wspieranym oprogramowaniem Cisco i sprawdzania jego ogólnej kondycji. Moje powiadomienia Usługa Moje powiadomienia pozwala użytkownikowi zapisać się do systemu powiadomień i odbierać powiadomienia dotyczące bezpieczeństwa, zakończenia wsparcia, problemów oraz aktualizacji oprogramowania i poprawek błędów określonych produktów i technologii Cisco. Wyświetl wszystkie narzędzia Więcej opcji pomocy technicznej Pomoc techniczna dla Partnerów Pomoc techniczna dotycząca produktów dla małych firm Usługi o krytycznym znaczeniu biznesowym Jakość obsługi klienta Pomoc techniczna DevNet Cisco Trust Portal Społeczności Cisco Społeczności Cisco — strona główna Społeczność Partnerów Społeczność wspierająca dla małych firm Społeczność Webex Grupa użytkowników Cisco Insider Licencje Tradycyjne licencjonowanie Generuj licencje PAK oraz licencje na inne urządzenia, w tym licencje demo, i zarządzaj nimi. Licencje Smart Software Licensing Śledź licencje Smart Software License i zarządzaj nimi. Umowy dla przedsiębiorstw Generuj licencje i zarządzaj nimi na podstawie umów Enterprise Agreement. Wsparcie licencjonowania Samodzielne rozwiązuj typowe problemy licencyjne. Oprogramowanie i pliki do pobrania Narzędzie do wyszukiwania błędów Znajdź błędy oprogramowania na podstawie wersji produktu i słowa kluczowego. Badania dotyczące oprogramowania Poznaj propozycje Cisco dotyczące obsługiwanych produktów. Cisco Software Checker Użyj narzędzia Cisco Software Checker, aby wyszukać porady dotyczące bezpieczeństwa, które odnoszą się do określonych wydań oprogramowania Cisco IOS, IOS XE, NX-OS oraz NX-OS w trybie ACI. Pobierz oprogramowanie Cisco Uzyskaj najnowsze aktualizacje, poprawki i wydania oprogramowania Cisco.
2026-01-13T09:29:56
https://www.cisco.com/site/pl/pl/partners/index.html
Partnerzy - Cisco Skip to main content Skip to search Skip to footer Cisco.com Polska Produkty i usługi Close Rozwiązania Close Wsparcie Close Edukacja Close Dlaczego Cisco? Close Partnerzy Close Poznaj rozwiązania Cisco Jak kupić Partnerzy PL PL Zaloguj się Poznaj rozwiązania Cisco Wyszukaj MENU ZAMKNIJ Jak kupić Partnerzy Zaloguj się PL PL Close Close Close Close Close Dziękujemy. Twój profil został zaktualizowany. Pomóż nam dbać o aktualność informacji w Twoim profilu. Potwierdź Twoje informacje zawodowe. Funkcja -- Wybierz -- Obsługa / wsparcie klienta Kadra kierownicza Finanse / rachunkowość Informatyka Produkcja Marketing / PR / reklama Logistyka / działalność operacyjna / administracja Inne (dział prawny, kadry, szkolenia, kierownik ds. dostawców, itd.) Zakupy / zaopatrzenie Badania i rozwój Kierownik ds. sprzedaży / opiekun klienta, rozwój rynku Inżynier systemu / sprzedaży Hierarchia stanowiska -- Wybierz -- Menedżer Współpracownik Dyrektor / pracownik starszej kadry menedżerskiej Członek wyższego kierownictwa Partnerstwa, dzięki którym wszystko jest możliwe Partnerstwo z firmą Cisco zapewnia wyjątkowe korzyści, takie jak programy i specjalizacje stworzone z myślą o nagrodach, szkoleniach i wsparciu, które stanowią modernizację Twoich praktyk, a także okazję do przekształcenia możliwości i procesów sprzedaży. Utwórz konto Cisco Jesteś już partnerem? Zaloguj się Zarejestruj się jako partner Cisco lub skojarz konto Dla nowych firm Zaloguj się na swoje konto Cisco i zarejestruj swoją firmę jako partnera Cisco, aby uzyskać dostęp do treści dostępnych wyłącznie dla partnerów. Dla osób indywidualnych Zaloguj się na swoje konto Cisco i skojarz to konto z istniejącą firmą partnerską Cisco, aby uzyskać dostęp do treści dostępnych wyłącznie dla partnerów. Twoja rentowność jest naszym celem nr 1 Program dla partnerów Program, który ma elastyczną strukturę zbudowaną wokół tego, jak dostarczasz wartość klientom. Marketing Velocity Szkolenia pomagające zmodernizować podejście marketingowe, konfigurowalne kampanie i dostęp do najwyższej klasy społeczności cyfrowej. Ścieżki transformacji Poznaj możliwości, dzięki którym Cisco może pomóc Ci w budowaniu nowych możliwości i rozwijaniu potrzeb klientów. Poznaj korzyści Partnerzy Cisco osiągają realne wyniki Stadium przyszłości Firmy odnoszące sukcesy nie zawsze grają według zasad. Partner Cisco, firma AmpThink, nie tylko bierze udział w grze, ale także definuje ją na nowo – i wygrywa. Modernizuj stadia rozwoju Wytyczaj drogi dla innych Jako jeden z pierwszych członków afroamerykańskiej społeczności partnerów Cisco, TGS pomaga otworzyć drzwi innym firmom z kapitałem należącym do czarnoskórych osób. Wspieraj integrację Previous Next Znajdź partnera Partnerzy współpracują z Tobą i pomagają w integracji, tworzeniu, zakupie i wyborze rozwiązań, oprogramowania i usług, których potrzebujesz. Lokalizator partnerów Skontaktuj się z partnerem @CiscoPartners Partner Cisco Partnerzy Cisco Partnerzy Cisco Blogi partnerów Społeczność Szybkie łącza O Cisco Kontakt Oferty pracy Skontaktuj się z partnerem Materiały i informacje prawne Opinia Pomoc Warunki Zasady zachowania poufności informacji Pliki cookie Znaki towarowe Przejrzystość łańcucha dostaw Mapa witryny &copy; Cisco Systems, Inc.
2026-01-13T09:29:56
https://www.cisco.com/site/us/en/products/networking/wireless/index.html
Cisco Wireless Networking - Wi-Fi and Mobility Solutions - Cisco Skip to main content Skip to search Skip to footer Cisco.com Worldwide Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Trials and demos How to buy Partners EN US Profile Log in Trials and demos MENU CLOSE How to buy Partners Profile Log in EN US Close Close Close Close Close Hello, how can I help? Products Networking Cisco wireless Wireless networking? Make it intelligent, secure, and assured. Get the lowdown on the cutting-edge advantage 6 GHz Wi-Fi brings. In this IDC study, sponsored by Cisco and Qualcomm Technologies, we unpack the strategic impact of this new spectrum with Wi-Fi 6E and Wi-Fi 7. Download study (PDF) Watch exclusive webinar Overview Resources Transform the potential of every workspace Explore all the possibilities of Wi-Fi 7 From offices to hospitals to factories to stadiums, support today&#39;s workplace transformation with intelligent, secure, and assured wireless networking solutions—with Cisco. Make every space smarter Optimize your network and workspaces with the most intelligent wireless platform, using the power of AI. Assure exceptional experiences Guarantee seamless performance for every connection, with AI insights across owned and unowned networks. Provide resilient, airtight security Protect every connection with one of the world&#39;s most advanced, always updated threat detection solutions—automatically monitoring unmanaged devices across campus and WAN. Go simple, yet sophisticated Deliver powerful experiences that blend physical spaces with digital smarts—without the need for complicated integrations, expensive overhead, or risky shadow networks. Make a seamless transition to Wi-Fi 7 Transformation, powered by Wi-Fi 7 Explore the future of wireless: faster, smarter connections that deliver secure and flawless experiences—every time. Read blog Design your Wi-Fi 7 Network Use this technical design guide to deploy a future-proof wireless Wi-Fi 7 network includes validated design tips for hardware, security, RF design, and AI-powered digital assurance. Download implementation guide Smarter Wi-Fi, smarter spaces Maximize wireless investments using sensor data to deliver cloud-based services like real-time location tracking, asset management, and environmental monitoring—with Cisco Spaces. View infographic Up to 25% off wireless and more Updating your wireless network? Get up to 25% off when you bundle with switching, routing, and software solutions. Save now Welcome to the future: Cisco wireless Get resilient connectivity, coverage density, seamless security, and AI-powered assurance to the rapidly evolving workplace—with Cisco wireless solutions. View all wireless products Access points Indoor access points Let your employees and guests quickly and securely access your Wi-Fi 7 network.   Explore indoor access points ​Outdoor and industrial access points​ Provide Wi-Fi network access anywhere.  ​Explore outdoor and industrial access points Cloud-managed access points Experience zero-touch deployment, innovative management, and full-stack visibility with Cisco Meraki. Explore cloud-managed access points Explore all access points Wireless controllers Wireless controllers Give your management capabilities a boost with intelligent wireless controllers. Explore wireless controllers View all Campus gateways Campus gateways Get seamless roaming and scale for your cloud campus network. Explore Campus Gateway Show more Network management Cisco Catalyst Center Get better performance and spend less time managing your network. Explore Cisco Catalyst Center Cisco Meraki dashboard Remotely configure and manage your wireless network with the cloud-managed Meraki dashboard. Explore Cisco Meraki Unlock the foundation for smart buildings Explore robust, easy-to-manage, scalable wireless solutions Cisco Spaces Create a smart, secure, and seamless workplace with data and insights from your network. Explore Cisco Spaces Digital Experience Assurance Assure user experience across any network with AI-driven insights and proactive network management. Explore Digital Experience Assurance Cisco Access Networking Simplify, automate, and secure your entire network experience from anywhere—anytime. Discover Access Networking Previous Next Mastering the course of wireless transformation World-class events hinge on smooth ticketing, hitch-free media coverage, and great fan experiences. At the 125th U.S. Open, Cisco built a high-density Wi-Fi 7 network across Oakmont Country Club&#39;s 191 acres, ensuring pristine connectivity for more than 40,000 devices.  Tee up the blog Redefining wireless connectivity Customer success Pioneering agritech with Wi-Fi 7 Nutrien future-proofs its remote and disparate workplaces with Cisco Wireless, ensuring secure connectivity and employee safety. Read customer story Wireless featured resources Cisco Wi-Fi 7 access points win 2025 Red Dot Design Award See why Cisco Wi-Fi 7 access points were recognized for their intuitive, scalable, eco-friendly design. Read blog Unlock a New Era in Access Networking Power smarter, more secure, and efficient work from anywhere with Cisco access networking solutions. Watch webinar Cisco tops ABI Research WLAN ranking Discover why Cisco was ranked overall leader in WLAN by ABI Research. Get report Smarter wireless networks start with Cisco innovation Explore how Cisco AI-powered solutions create seamless, secure, and reliable wireless experiences. Read blog Wireless you can trust, today and tomorrow Future-proof workplaces with intelligent, assured Wi-Fi Read about the future of business connectivity, Wi-Fi 7 access points, and how to simplify operations and deliver great experiences. Read blog Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Cookies / Do not sell or share my personal data Accessibility Trademarks Supply Chain Transparency Newsroom Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:56
https://www.notion.com/de/product/wikis
Dein vernetzter Workspace für Wikis, Dokumente und Projekte | Notion Notion Funktionen Notion-KI Erschaffen, schreiben, automatisieren Agenten Übernehmen manuelle Aufgaben Enterprise Suche Finde Antworten in Sekundenschnelle Smart Notes Perfekt geschrieben von der KI Dokumente Einfach und leistungsstark Wissensdatenbank Bündle dein Wissen Projekte Verwalte jede Art von Projekt Websites Veröffentliche alles Mögliche im Handumdrehen Loslegen KI-Anwendungsfälle entdecken Schau dir an, wozu die Notion-KI in der Lage ist Marktplatz durchstöbern Vorlagen für alles Mögliche Einbindungen anzeigen Verbinde deine Apps mit Notion Web Clipper herunterladen Speichere Inhalte aus dem Web in Notion Teste die Desktop-App von Notion für mehr Geschwindigkeit App herunterladen Mail Calendar KI Enterprise Tarife Erkunden Teams Entwicklung und Produkt Design Marketing IT Teamgröße Start-ups KMUs Konzerne Bildungswesen Lernen Hilfe-Center Notion Academy Erfahrungsberichte von Kund/-innen Blog Community Partnerprogramme Entwickeln API Vorlagen Sicherheit Beratung Fordere eine Demo an Anmelden Nutze Notion kostenlos Wikis Das Wiki, das „Wiki“ neu definiert. In einem unübersichtlichen und unorganisierten Workspace kannst du nicht effizient arbeiten. Zentralisiere all dein Wissen stattdessen in Notion. Nutze Notion kostenlos Demo anfordern Startseite des Unternehmens Markenrichtlinien IT-Hub Einarbeitung von Mitarbeitenden Startseite des Unternehmens Onboarding IT-Hub Onboarding Der neue Standard für Wissen und Dokumentation Unterstützt Start-ups und Fortune-500-Unternehmen auf der ganzen Welt. Auf G2 am besten bewertet Notion wird auf G2 von Hunderten Kund/-innen immer wieder als Branchenführer bewertet. Überzeuge dich selbst und schau dir die G2-Rezensionen an, um mehr zu erfahren. Loslegen -&gt; Notion passt sich an deine Bedürfnisse an: so minimalistisch oder leistungsstark, wie du es gerade brauchst. Rahim Makani Produktleitung, Match Group Suchen, bearbeiten, durchsuchen. Wir schaffen ein Erlebnis, das du lieben wirst. Alle Team-Dateien auf einen Blick Mit der Seitenleiste von Notion bleibt dein Workspace immer organisiert, egal wie schnell du wächst. Eine Suche, die wirklich funktioniert Mit leistungsstarken Filtern findest du teamübergreifend Daten und Entscheidungen in Sekundenschnelle. Schön und sofort einsatzbereit Wähle für jede Seite das perfekte Emoji und Titelbild, die das Markenbild deines Unternehmens zeigen. Organisieren per Drag-and-Drop Alle können zu deiner Wissensdatenbank beitragen. Technikkenntnisse sind zum Aktualisieren einer Seite nicht nötig. Verlinke ganz einfach zu anderen Seiten In deinem Workspace ist alles miteinander verbunden – gib einfach @ ein, um deine Notizen oder deine Roadmap in einem Dokument zu verlinken. Spare Zeit bei Rückfragen und der Pflege von Dokumenten. Synchronisierte Blöcke – Halte deine Inhalte automatisch aktuell. Identische Inhalte an mehreren Stellen? Bearbeite sie einmal, dann werden die Änderungen über die Funktion „Synchronisierte Blöcke“ überall übernommen. Verifizierung Du musst dich nie wieder fragen: „Ist das die richtige Version?“ Verlass dich darauf, dass die gefundenen Informationen immer aktuell und korrekt sind. Notion erspart neuen Mitarbeitenden Tage, wenn nicht sogar Wochen bei der Einarbeitung, da sie Informationen schneller finden und daraus lernen können. Scott Entwistle Senior Recruiter, Remote Willkommen auf deiner Startseite Ein zentraler Ort für deine wichtigsten Dokumente, Notizen und Aufgaben. Automatisch organisiert und immer aktuell. Teile Infos aus Slack, Figma und Jira ganz einfach. Alle Einbindungen anzeigen -&gt; Figma Teile stets die aktuellen Designs mit deinem Team. Jetzt testen -&gt; Amplitude Verfolge Release-Metriken, Versuchsergebnisse und mehr. Jetzt testen -&gt; GitHub Binde Pull Requests, Issues und sogar Repos direkt in Notion ein. Jetzt testen -&gt; Slack Füge einfach einen Link ein, um die vollständige Nachricht anzuzeigen, ohne die Tools wechseln zu müssen. Jetzt testen -&gt; Jira Zeige Updates zu Bugs an oder wandle ein ganzes Projekt in eine Datenbank um. Jetzt testen -&gt; Durchsuche alle Einbindungen Zur Galerie -&gt; Selbst für die größten Unternehmen skalierbar. Sprich mit dem Vertriebsteam -&gt; Analysen, um die nächsten Schritte zu planen Notions Enterprise Plan bietet Admins eine Reihe von Tools, um das Nutzerverhalten der Mitarbeitenden zu analysieren. Sicherheits- und Admin-Kontrolle Schütze deinen Workspace mit Sicherheits-, Compliance- und Audit-Tools Individuelle Admin-Rollen Ermögliche Admins die Verwaltung von Workspace-Mitgliedschaften. Erweiterte Berechtigungen Lege genau fest, wer was tun und erstellen darf. Single Sign-On mit SAML Mitarbeitenden erhalten über deinen Identitätsanbieter mit SAML-basiertem SSO Zugriff auf Notion. SCIM-Nutzungsbereitstellung Mitglieder und Gruppen ganz einfach erstellen, hinzufügen, entfernen, aktualisieren oder abrufen. Tools zur Domainverwaltung Registriere deine Domain und entscheide, wer damit Workspaces erstellen darf, um die Kontrolle zu behalten. Für jedes Team genau die richtige Lösung. Entwicklung Stelle neue Funktionen schneller bereit, indem du Sprints, Code-Richtlinien, Bug-Fixes und mehr zentral an einem Ort verwaltest. Sieh dir an, wie Entwickler/-innen Notion nutzen → Produkt Verbinde die Roadmap mit Zielen und sorge dafür, dass deine Teammitglieder wissen, was wann ansteht. Sieh dir an, wie PMs Notion nutzen → Design Bringe Überprüfungsdurchgänge voran, priorisiere Anfragen und halte die Fristen für deine kreativen Projekte ein. Sieh dir an, wie Design-Teams Notion nutzen → Projekte und Dokumente inbegriffen – zum selben Preis. Projekte Verwalte jede Art von Projekt – unabhängig von Team oder Größe. Mehr erfahren -&gt; Dokumente Einfach. Effektiv. Ansprechend. Kommuniziere effizienter mit flexiblen Bausteinen. Mehr erfahren -&gt; Mit nur einem Klick einrichten. Importiere oder starte mit einer Vorlage. Vorlagengalerie durchstöbern -&gt; Mit nur einem Klick einrichten. Importiere oder starte mit einer Vorlage. Starte durch mit dem Tool, auf das moderne Teams setzen, um Projekte noch schneller ans Ziel zu bringen. Deine Arbeit wird perfekt formatiert geliefert. Mehr erfahren → OKRs von Buffer Jetzt testen → Die Onboarding-Checkliste von Pitch Jetzt testen → Blinkist-Einstellungs-Wiki Jetzt testen → Richte dein Wiki schnell und einfach ein. Teste ganz in ruhe. Bezahlen und dein Team einladen kannst du später. Nutze Notion kostenlos Demo anfordern Deutsch Cookie-Einstellungen © 2026 Notion Labs, Inc. Unternehmen Über uns Karriere Sicherheit Status Nutzungsbedingungen und Datenschutz Deine Datenschutzrechte Download iOS und Android Mac und Windows Calendar Web Clipper Ressourcen Hilfe-Center Preise Blog Community Einbindungen Vorlagen Partnerprogramme Notion für Unternehmen Kleine Unternehmen Persönlich Mehr entdecken →
2026-01-13T09:29:56
https://shows.acast.com/frontier/episodes/ep-46-matt-genovese-ceo-and-founder-of-planorama
Ep. 46: Matt Genovese, CEO and Founder of Planorama - Frontier Podcast by Gun.io | Acast Follow Share Play Frontier Podcast by Gun.io Ep. 46: Matt Genovese, CEO and Founder of Planorama Season 4 , Ep. 46 • Thursday, April 11, 2024 This week, Teja sits down with Matt Genovese, CEO and Founder of Planorama, a company that designs UX/UI flows for products with complete enablement for software teams. They discuss the intricacies of living abroad, the importance of incorporating design, and how de-risking early on in the life of a new product can make it more successful in the long run. https://planorama.design/matt https://aiproducthive.com Show more RSS More episodes View all episodes 45. Ep. 45: Brian Pontarelli, CEO and Founder of FusionAuth 44:05 | Thursday, March 28, 2024 | Season 4 , Ep. 45 On this week's episode, Teja sits down with Brian Pontarelli, Founder and CEO of both FusionAuth and Cleanspeak. They discuss the complexities of growing two businesses at the same time, making progress without using AI, and the subtle clues in an interview process that let you know someone's a great culture fit.https://fusionauth.io/https://cleanspeak.com/ Play 44. Ep. 44: Sabber Ahamed, Founder of xoolooloo 28:31 | Thursday, February 29, 2024 | Season 4 , Ep. 44 This week, Teja talks with Sabber Ahamed, Founder of Xoolooloo and Data Scientist at Bridgestone. They discuss the proliferation of data science, the joys of working on your own projects outside of the 9-5, and the different things career goals of a computational geophysicist can really shake up. Play 43. Ep. 43: Harpreet Singh, CEO and Co-Founder at Launchable 39:22 | Thursday, February 15, 2024 | Season 4 , Ep. 43 This week, Teja talks with Harpreet Singh, Co-CEO and Co-Founder of Launchable, a company that's on a mission to make software testing faster and smarter. They discuss the DACI framework and the importance of intentionality in decision-making, what it's like to bring a behemoth like Jenkins to life, and the power of slowing down to meditate.https://www.launchableinc.com/ Play 42. Ep. 42: Brian Douglas, CEO and Founder at OpenSauced 36:55 | Thursday, February 1, 2024 | Season 4 , Ep. 42 In this week's episode, Teja talks with Brian Douglas, CEO and Founder at OpeSauced. They talk about how a good open source portfolio is more than just getting your name on big projects, the natural progression from developer advocacy to building an open source marketplace, and the trials and tribulations of learning to lead as you grow.opensauced.pizza Play 41. Ep. 41: Ian Villa, COO and Co-founder at Whisper Aero 37:33 | Thursday, January 18, 2024 | Season 4 , Ep. 41 Joining Teja on this week's episode is Ian Villa, COO and Co-founder of Whisper Aero, a company that is developing cleaner, quieter, and more efficient propulsion solutions. They discuss the pros and cons of a campus with on-site housing, the burgeoning Nashville tech scene, and how a 5 am trip to Kinko's can, in hindsight, be a lesson in entrepreneurship.whisper.aero Play 40. Ep. 40: Kate O&#x27;Neil, CEO and Co-founder at Teaming 58:40 | Thursday, January 11, 2024 | Season 4 , Ep. 40 This week, Teja sits down for round two with Kate O'Neil, who has moved into the CEO position at Teaming since the last time they talked. They discuss the differences that come with the transition to becoming a CEO, the importance of incorporating movement into your life, and why getting the best sleep comes down to the perfect sheets.teaming.com Play 39. Ep. 39: Jeremy Snyder, CEO and Founder at FireTail 50:32 | Thursday, January 4, 2024 | Season 4 , Ep. 39 After a brief holiday hiatus, Teja is back this week with Jeremy Snyder, the Founder and CEO of FireTail, an API security platform that provides application layer visibility, real-time, inline inspection, and blocking of malicious API calls. They talk about being a less technical founder, how being a polyglot helps you understand more than language, and the importance of taking the time to find your own adventure.https://www.firetail.io/ Play 38. Ep. 38: Stefan Avram, Head of Growth and Co-Founder at WunderGraph 34:16 | Thursday, December 21, 2023 | Season 4 , Ep. 38 Teja sits down with Stefan Avram, Head of Growth and Co-founder at WunderGraph, an open-source GraphQL federation. They discuss how injuries can change your life trajectory, the complexities of working with distributed teams, and how sometimes getting fired can be the best thing that's ever happened to you. www.wundergraph.com Play Instagram X.com TikTok Copyright Gun.io Hosted with ❤️ by Acast
2026-01-13T09:29:56
https://akismet.com/developers/detailed-docs/key-verification/
Key verification &#8211; Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Getting started Plugins and libraries Detailed docs Building your application Key verification Comment check Submit spam (missed&nbsp;spam) Submit ham (false&nbsp;positives) Key/sites activity Usage limit Response error codes Akismet Error #10001 Akismet Error #10003 Akismet Error #10402 Akismet Error #10011 Akismet Error #10010 Akismet Error #10009 Akismet Error #10006 Akismet Error #10005 Akismet Error #10404 Akismet Error #10403 Akismet Error #30001 Key verification Key verification authenticates your key before calling the comment-check , submit-spam , or submit-ham methods for the first time. This is the first call that you should make to Akismet and is especially useful if you will have multiple users with their own Akismet subscriptions using your application. Note that you do not need to call this method before every call to comment-check, submit-spam, or submit-ham; you should only make this request to confirm that an API key is valid before storing it locally. This method is called via a POST request to the following URL: https://rest.akismet.com/1.1/verify-key Required POST parameters api_key Your Akismet API key. You can find this on your account dashboard at&nbsp; https://akismet.com/account/ blog The front page or home URL of the instance making the request. For a blog, site, or wiki this would be the front page.&nbsp; Note: &nbsp;Must be a full URI, including http:// . PHP example // Call to verify key function akismet_verify_key('123YourAPIKey', 'http://www.yourblogdomainname.com/'); // Authenticates your Akismet API key function akismet_verify_key( $key, $blog ) { $blog = urlencode($blog); $request = 'api_key='. $key .'&blog='. $blog; $host = $http_host = 'rest.akismet.com'; $path = '/1.1/verify-key'; $port = 443; $akismet_ua = "WordPress/4.4.1 | Akismet/3.1.7"; $content_length = strlen( $request ); $http_request  = "POST $path HTTP/1.0\r\n"; $http_request .= "Host: $host\r\n"; $http_request .= "Content-Type: application/x-www-form-urlencoded\r\n"; $http_request .= "Content-Length: {$content_length}\r\n"; $http_request .= "User-Agent: {$akismet_ua}\r\n"; $http_request .= "\r\n"; $http_request .= $request; $response = ''; if( false != ( $fs = @fsockopen( 'ssl://' . $http_host, $port, $errno, $errstr, 10 ) ) ) {       fwrite( $fs, $http_request );      while( !feof( $fs ) ) {          $response .= fgets( $fs, 1160 ); // One TCP-IP packet }      fclose( $fs );      $response = explode( "\r\n\r\n", $response, 2 ); }   if ( 'valid' == $response&#91;1] ) {      return true; } else {      return false; } } Success response example The call returns&nbsp; valid &nbsp;if the key is valid. Array ( &#91;0] =&gt; HTTP/1.1 200 OK Server: nginx Date: Mon, 24 Feb 2014 16:31:55 GMT Content-Type: text/plain; charset=utf-8 Connection: close Content-length: 5 &#91;1] =&gt; valid ) Error response example If the verify-key call returns “ invalid ”, it usually includes an extra HTTP header with some debug information about what exactly was invalid about the call. Array ( &#91;0] =&gt; HTTP/1.1 200 OK Server: nginx Date: Mon, 24 Feb 2014 16:34:54 GMT Content-Type: text/plain; charset=utf-8 Connection: close X-akismet-debug-help: We were unable to parse your blog URI Content-length: 7 &#91;1] =&gt; invalid ) We’re here to help If you ever get stuck or need help troubleshooting something, please don’t hesitate to contact us . Related Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:56
https://www.cisco.com/c/en_hk/products/index.html#fw-footer-v2
Products, Solutions, and Services - Cisco Skip to Main Content Skip to search Skip to Footer Cisco.com Hong Kong Products and Services Solutions Support Learn Explore Cisco How to Buy Partners Home Partner Program Support Tools Find a Cisco Partner Meet our Partners Become a Cisco Partner Products, Solutions, and Services Want some help finding the Cisco products that fit your needs? You're in the right place. If you want troubleshooting help, documentation, other support, or downloads, visit our&nbsp; technical support area . Contact Cisco Get a call from Sales Contact Sales via Email Call Sales: (852) 3071 4911 9:00am-6:00pm Product / Technical Support Products by technology Networking Switches Routers Wireless Software-defined networking Cisco Silicon One Cloud and network management Interfaces and modules Optical networking See all Networking Wireless and Mobility Access points Outdoor and industrial access points Controllers See all Wireless and Mobility Security SecureX platform Secure Firewall Secure Endpoint Secure Email Cisco Duo Umbrella See all Security Collaboration Collaboration endpoints Conferencing Cisco Contact Center Unified communications Experience Management See all Collaboration Data Center Servers: Cisco Unified Computing System Management and automation Security Switches Hyperconverged infrastructure Storage networking Virtual networking See all Data Center Analytics Data center analytics and assurance Network analytics Cisco Secure Network Analytics (Stealthwatch) Video Video endpoints Video intelligence Cisco Vision See all Video Internet of Things (IoT) Industrial Networking Industrial Routers and Gateways Industrial Security Industrial Switching Industrial Wireless Industrial Connectivity Management Extended Enterprise Data Management See all IoT Software Cisco+ (as-a-service) IOS and NX-OS Cisco DNA Software for Wireless Cisco DNA Software for Switching Cisco DNA Software for SD-WAN and Routing Cisco ONE for Data Center Networking Cisco ONE for Data Center Compute and Cloud See all Software Product index Products by business type Service providers Small business Midsize business Solutions Cisco can provide your organization with solutions for everything from networking and data center to collaboration and security. Find the options best suited to your business needs. By technology By industry See all solutions Services from Cisco Customer Experience Advisory services Get expert advisory services with data-driven insights to architect and optimize your IT environment. Solution Support Experts provide centralized support across your multiproduct, multivendor Cisco solution environment. Hardware support Get expert technical support guided by insights from solving millions of cases worldwide. Software Support Unlock the full benefits of your Cisco software, both on-premises and in the cloud. Packaged services Our services package provides expertise, insights, learning, and support via our CX Cloud digital platform. Project-based consulting Our experts help you plan, design, and implement new project-based technology transformations. Managed services Have our experts directly manage your IT operations for you to accelerate your time to value. Learning services Training and certifications can enhance your skills and empower your workforce for the future. View all Cisco Services Design Zone: Cisco design guides by category Networking Cloud Security Industries Data center Collaboration See all Cisco design guides End-of-sale and end-of-life End-of-sale and end-of-life products End-of-Life Policy Tools Cisco Commerce Build & Price Cisco Software Central Cisco Feature Navigator See all product tools Resources Cisco Mobile Apps Design Zone: Cisco design guides Cisco DevNet Marketplace Solutions Catalog Product approvals Product identification standard Product warranties Cisco Security Advisories Security Vulnerability Policy Visio stencils Order Now Promotion Offer Contact Us
2026-01-13T09:29:56
https://snyk.io/es/solutions/risk-based-prioritization/
Risk-Based Prioritization: Focus on What Matters | Snyk AppSec Solutions | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API &amp; Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API &amp; Web - Todos los clientes Snyk API &amp; Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo Soluciones Seguridad de la aplicación Seguridad de la cadena de suministro de software Código seguro generado por IA Vulnerabilidades de día cero Secure at inception Select Seguridad de la aplicación Seguridad de la cadena de suministro de software Código seguro generado por IA Vulnerabilidades de día cero Secure at inception Focus on the Risks That Matter Most Snyk provides a risk-based approach to application security, giving AppSec teams the context to focus on the vulnerabilities that matter most. Prioritize based on actual business impact and empower your developers to remediate the highest-risk issues first, without slowing down innovation. Reserva una demostración en vivo Modern AppSec is overwhelmed by vulnerability noise Traditional prioritization methods based solely on static scores create endless backlogs and fail to address the actual risk to your business, leading to wasted effort and missed critical threats. Vulnerability overload Scanners generate thousands of alerts, making it impossible for security and development teams to know where to start. A lot of these &#x27;vulnerabilities&#x27; pose little to no real threat. Security guidelines lack context Traditional tools report on technical severity but lack the broader understanding of applications that’s required to truly grasp the risks businesses face. Developer friction slows progress When security interrupts workflows with low-context alerts, developers see it as a roadblock. In fact, 68% of developers feel that security slows them down. This friction hinders collaboration and slows business velocity. When everything is a priority, nothing is While the volume of new vulnerabilities grows exponentially, the resources to fix them do not. This forces a reliance on outdated prioritization models that create more noise than clarity, leaving organizations exposed to the risks that truly matter. 33k Average number of vulnerabilities discovered per month 60 days Average time to remediate critical vulnerabilities Only 5% Portion of vulnerabilities that are actively exploited It&#x27;s time to break this cycle by focusing on risk, not just volume Snyk provides the foundational capabilities to implement a risk-based security program. Move from reactive vulnerability patching to proactive risk management that aligns with your business objectives and maintains development velocity. Discover and map your assets The foundation for risk-based prioritization is knowing what assets you need to protect. Snyk automatically maps your complete application landscape — including code repositories, container images, third-party dependencies, and ownership — to build a comprehensive asset inventory. Enrich with holistic context Combine application, development, and business context with deep technical details about vulnerabilities linked to each asset, enabling teams to make smarter, more informed prioritization decisions. Prioritize with adaptive risk scoring Snyk’s Risk Score ingests a wide range of factors — exploit reachability, exploit maturity, business impact, EPSS, CVSS, transitive depth, and social trends — to rank vulnerabilities based on real-world risk. Act within your workflows Risk scoring is embedded across various interfaces, ensuring both developers and security teams can leverage it to prioritize issues directly within their workflows. Measure and improve continuously Track progress, coverage gaps, and risk trends via dashboards and reporting, giving stakeholders visibility into outcomes and opportunities for improvement. Prioritize risk on a platform designed to drive efficiency Snyk&#x27;s risk-based prioritization is built upon our market-leading developer security platform, which has already helped the world&#x27;s leading companies save time and reduce risk. 70% Increase in automated remediation by customers using the Snyk platform 100K+ Hours in developer efficiency gains from Fortune 500 customers with Snyk $5.08M Average savings Snyk customers realized in the past year based on risk avoidance and dev efficiency gains Ready to level up your security game? Book a demo and see how Snyk’s risk-based prioritization helps your team reduce risk faster, work smarter, and deliver business-aligned security. Reserva una demostración en vivo Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:56
https://akismet.com/developers/detailed-docs/errors/akismet-error-10005/
Akismet Error #10005 &#8211; Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Getting started Plugins and libraries Detailed docs Building your application Key verification Comment check Submit spam (missed&nbsp;spam) Submit ham (false&nbsp;positives) Key/sites activity Usage limit Response error codes Akismet Error #10001 Akismet Error #10003 Akismet Error #10402 Akismet Error #10011 Akismet Error #10010 Akismet Error #10009 Akismet Error #10006 Akismet Error #10005 Akismet Error #10404 Akismet Error #10403 Akismet Error #30001 Akismet Error #10005 Potential Abuse of your API Key Akismet Error #10005 Why am I receiving this error? It appears as though your API key may have been published online &#8211; in a blog post or tutorial &#8211; and subsequently used by other individuals in an unauthorized manner. Which should I do? Go to&nbsp; akismet.com/plans , register a new API key, and&nbsp; get in touch &nbsp;to let us know that you have done so. Moving forward, please make sure that you treat your API key like a password and do not give it to anybody else. Should I change any of my passwords? No. We have no reason to believe that this exposure of your API key has led to unauthorized access of any kind. It only allowed unauthorized individuals the ability to activate and use the Akismet service with your API key. But hey &#8211; it&#8217;s never a bad idea to update your passwords! Can we help with anything else? I need to update my credit card. I forgot my API key. I need to reset my password. I need to cancel my subscription. Priority support Want to get help even faster? Don&#8217;t forget that our Pro subscription includes priority email support. Related Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:56
https://play.google.com/store/apps/details?id=notion.id&amp;hl=kk
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M12 17.27L18.18
2026-01-13T09:29:56
https://www.cisco.com/site/th/th/about/sitemap.html
แผนผังเว็บไซต์ - Cisco Skip to main content Skip to search Skip to footer Cisco.com ประเทศไทย ผลิตภัณฑ์และบริการ Close โซลูชัน Close การสนับสนุน Close เรียนรู้ Close เหตุผลที่เลือก CISCO Close บริษัทคู่ค้า Close สำรวจ Cisco วิธีซื้อ บริษัทคู่ค้า TH TH เข้าสู่ระบบ สำรวจ Cisco ค้นหา เมนู ปิด วิธีซื้อ บริษัทคู่ค้า เข้าสู่ระบบ TH TH Close Close Close Close Close สวัสดี มีอะไรให้ฉันช่วยไหม แผนผังเว็บไซต์ ลิงก์ยอดนิยม ใบรับรองวิชาชีพ โอกาสด้านอาชีพ กรณีศึกษาและเรื่องราวของลูกค้า Cisco Commerce ชุมชน ติดต่อเรา Networking Academy การเข้าสู่ระบบบริษัทคู่ค้า หน้าหลักของผลิตภัณฑ์ ศูนย์ความเชื่อมั่น แสดงเพิ่มเติม เกี่ยวกับ Cisco บริษัท ภาพรวม ห้องข่าว ความเป็นผู้นำ วัตถุประสงค์และความยั่งยืน โอกาสด้านอาชีพ ศูนย์ความเชื่อมั่น ติดต่อเรา นักลงทุนสัมพันธ์ หล้าหลักของนักลงทุนสัมพันธ์ รายงานประจำปี ผลประกอบการ ข้อมูลหุ้น นักวิเคราะห์สัมพันธ์ มีส่วนร่วมกับเรา ชุมชน Cisco Cisco Insider Cisco Research Cisco Store Cisco Talos แผนผังอินเทอร์เน็ตหลุด (ThousandEyes) Outshift by Cisco แสดงเพิ่มเติม ผลิตภัณฑ์ ผลิตภัณฑ์ที่แนะนำ Cisco AI Defense แพลตฟอร์ม Cisco Intersight Cisco Networking Cloud Cisco Secure Client (รวมถึง AnyConnect) Cisco Secure Firewall Cisco Webex Suite ศูนย์ข้อมูลและระบบเครือข่ายระบบคลาวด์ สวิตช์ เราเตอร์และอุปกรณ์ SD-WAN ระบบไร้สาย ผลิตภัณฑ์ทั้งหมด หน้าหลักของผลิตภัณฑ์ ผลิตภัณฑ์ A-Z การทำงานร่วมกัน การประมวลผล ระบบเครือข่าย การรักษาความปลอดภัย Splunk AppDynamics ซอฟต์แวร์ การดาวน์โหลดแอปมือถือ แหล่งข้อมูล กรณีศึกษาและเรื่องราวของลูกค้า Cisco Power Calculator Cisco Validated การปฏิบัติตาม การสาธิต dCloud, การฝึกอบรม และแซนด์บ็อกซ์ ผลิตภัณฑ์ที่สิ้นสุดการขายและสิ้นสุดอายุ ภาพรวม การสาธิต และการสอนใช้งาน การทดลองใช้และการสาธิต Visio Stencil การรับประกัน แสดงเพิ่มเติม โซลูชัน โซลูชันที่แนะนำ ปัญญาประดิษฐ์ Cisco on Cisco Secure Access Services Edge (SASE) ผู้ให้บริการ ธุรกิจขนาดเล็กและขนาดกลาง อาคารอัจฉริยะ Zero Trust Access จาก Cisco โซลูชันทั้งหมด หน้าแรกของโซลูชัน การทำงานร่วมกัน การประมวลผล ระบบเครือข่าย การรักษาความปลอดภัย โซลูชันสำหรับกลุ่มธุรกิจ ตัวสำรวจพอร์ตโฟลิโอกลุ่มธุรกิจ เมืองและชุมชน การศึกษา บริการทางการเงิน ภาครัฐ บริการดูแลสุขภาพ การผลิต การเก็บข้อมูล น้ำมันและก๊าซ การค้าปลีก กีฬา สื่อ และความบันเทิง การคมนาคม อรรถประโยชน์ แสดงเพิ่มเติม บริการ บริการที่แนะนำ บริการขั้นสูง Cisco Lifecycle Services Smart Net Total Care การสนับสนุนด้านซอฟต์แวร์ การสนับสนุนโซลูชัน เส้นทางความสำเร็จ บริการทั้งหมด หน้าหลักของบริการ การทำงานร่วมกัน การประมวลผล ระบบเครือข่าย ความสามารถในการสังเกต (Splunk) การรักษาความปลอดภัย กรณีการใช้งาน ศูนย์ข้อมูลสมัยใหม่ แสดงเพิ่มเติม การสนับสนุน สำหรับผลิตภัณฑ์ ผลิตภัณฑ์ทั้งหมด การดาวน์โหลดซอฟต์แวร์ทั้งหมด อุปกรณ์ปลายทางสำหรับการประสานการทำงานร่วมกันและโทรศัพท์ เราเตอร์ การรักษาความปลอดภัย สวิตช์ ระบบการสื่อสารแบบครบวงจร ระบบไร้สาย ติดต่อฝ่ายสนับสนุน ชุมชน ฝ่ายสนับสนุนเรื่องใบอนุญาต พอร์ทัลการส่งคืน (RMA) ผู้จัดการกรณีศึกษาด้านการสนับสนุน การสนับสนุนสำหรับการพัฒนาทักษะ หมายเลขโทรศัพท์สำหรับธุรกิจขนาดเล็ก หมายเลขโทรศัพท์อื่นๆ (ทั่วโลก) เครื่องมือและแหล่งข้อมูล การให้คำปรึกษาเกี่ยวกับการรักษาความปลอดภัย การแจ้งเตือนไปยังไซต์งาน อุปกรณ์ของฉัน การแจ้งเตือนของฉัน เครื่องมือค้นหาจุดบกพร่อง การหาข้อมูลซอฟต์แวร์ เครื่องมือตรวจสอบความคุ้มครองอุปกรณ์ เครื่องมือสนับสนุนทั้งหมด แสดงเพิ่มเติม เรียนรู้ การเรียนรู้ที่ Cisco ใบรับรองวิชาชีพ การสอบใบรับรอง Cisco Learning Network Cisco Networking Academy Cisco U. DevNet Packet Tracer (การจำลองเครือข่าย) การฝึกอบรมและใบรับรองทั้งหมด กิจกรรมและการสัมมนาออนไลน์ หน้าหลักของกิจกรรม ปฏิทินกิจกรรม Cisco Live การสัมมนาทางเว็บด้านโซลูชัน การสัมมนาทางเว็บด้านเทคโนโลยี หัวข้อด้านเทคโนโลยี การรักษาความปลอดภัยของแอปพลิเคชัน AI วิธีติดตั้งเราเตอร์ วิธีติดตั้งสวิตช์เครือข่าย การรักษาความปลอดภัยทางไซเบอร์คืออะไร ศูนย์ข้อมูลคืออะไร ไฟร์วอลล์คืออะไร LAN คืออะไร Wi-Fi 7 คืออะไร หัวข้อด้านเทคโนโลยีทั้งหมด แสดงเพิ่มเติม วิธีสั่งซื้อ การสั่งซื้อจาก Cisco ศูนย์รวมวิธีสั่งซื้อ การจัดหาเงินทุนของ Cisco Capital Cisco Refresh (อุปกรณ์เทียบเท่า) กำหนดเวลาการโทร เริ่มแชท การสั่งซื้อผ่านตัวแทนจำหน่ายหรือทางออนไลน์ พบปะกับบริษัทคู่ค้าของเรา รหัสที่ตั้งของตัวแทนจำหน่าย การสั่งซื้อบริการและการจัดการสัญญา ธุรกิจขนาดเล็กและขนาดกลาง การให้สิทธิ์การใช้งาน Enterprise Agreement Licensing Hub Software Central แสดงเพิ่มเติม บริษัทคู่ค้า Cisco Partner Program ร่วมเป็นบริษัทคู่ค้า รางวัลจูงใจสำหรับบริษัทคู่ค้า ความเชี่ยวชาญสำหรับบริษัทคู่ค้า เครื่องมือและแหล่งข้อมูลสำหรับบริษัทคู่ค้า Cisco Commerce Cisco Partner Summit โปรไฟล์ของฉัน ข้อคิดเห็นของบริษัทคู่ค้า การฝึกอบรมบริษัทคู่ค้า SalesConnect เครื่องมือและแหล่งข้อมูลเพิ่มเติมสำหรับบริษัทคู่ค้า การสนับสนุนคู่ค้า การสนับสนุนก่อนการขาย ผู้จัดการกรณีศึกษาด้านการสนับสนุน ช่องทางการสนับสนุนคู่ค้าทั้งหมด แสดงเพิ่มเติม ลิงก์ด่วน เกี่ยวกับ Cisco ติดต่อเรา อาชีพ เชื่อมต่อกับคู่ค้า แหล่งข้อมูลและฝ่ายกฎหมาย ความคิดเห็น วิธีใช้ ข้อกำหนดและเงื่อนไข คำชี้แจงสิทธิ์ส่วนบุคคล คุกกี้ เครื่องหมายการค้า ความโปร่งใสของห่วงโซ่อุปทาน แผนผังเว็บไซต์ &copy; Cisco Systems, Inc.
2026-01-13T09:29:56
https://akismet.com/developers/detailed-docs/submit-spam-missed-spam/
Submit spam (missed spam) &#8211; Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Getting started Plugins and libraries Detailed docs Building your application Key verification Comment check Submit spam (missed&nbsp;spam) Submit ham (false&nbsp;positives) Key/sites activity Usage limit Response error codes Akismet Error #10001 Akismet Error #10003 Akismet Error #10402 Akismet Error #10011 Akismet Error #10010 Akismet Error #10009 Akismet Error #10006 Akismet Error #10005 Akismet Error #10404 Akismet Error #10403 Akismet Error #30001 Submit spam (missed&nbsp;spam) This call is for submitting comments that weren’t marked as spam but should have been. It is very important that the values you submit with this call match those of your comment-check calls as closely as possible. In order to learn from its mistakes, Akismet needs to match your missed spam and false positive reports to the original comment-check API calls made when the content was first posted. While it is normal for less information to be available for submit-spam and submit-ham calls (most comment systems and forums will not store all metadata), you should ensure that the values that you do send match those of the original content. This method is called with the following URL: https://rest.akismet.com/1.1/submit-spam This call takes the same arguments as the comment check call. Important: All parameters should be sent via the POST method. Parameters api_key &nbsp;(required) Your Akismet API key. You can find this on your account dashboard at&nbsp; https://akismet.com/account/ blog   (required) The front page or home URL of the instance making the request. For a blog or wiki this would be the front page.  Note:  Must be a full URI, including http:// . user_ip &nbsp;(required) IP address of the comment submitter. user_agent User agent string of the web browser submitting the comment &#8211; typically the HTTP_USER_AGENT cgi variable. Not to be confused with the user agent of your Akismet library. referrer   (note spelling) The content of the HTTP_REFERER header should be sent here. permalink The full permanent URL of the entry the comment was submitted to. comment_type A string that describes the type of content being sent. Examples: comment : A blog comment. forum-post : A top-level forum post. reply : A reply to a top-level forum post. blog-post : A blog post. contact-form : A contact form or feedback form submission. signup : A new user account. message : A message sent between just a few users. You may send a value not listed above if none of them accurately describe your content. This is further explained&nbsp; here . comment_author Name submitted with the comment. comment_author_email Email address submitted with the comment. comment_author_url URL submitted with comment. Only send a URL that was manually entered by the user, not an automatically generated URL like the user’s profile URL on your site. comment_content The content that was submitted. comment_date_gmt The UTC timestamp of the creation of the comment, in ISO 8601 format. May be omitted for comment-check requests if the comment is sent to the API at the time it is created. comment_post_modified_gmt The UTC timestamp of the publication time for the post, page or thread on which the comment was posted. blog_lang Indicates the language(s) in use on the blog or site, in ISO 639-1 format, comma-separated. A site with articles in English and French might use “en, fr_ca”. blog_charset The character encoding for the form values included in&nbsp; comment_* &nbsp;parameters, such as “UTF-8” or “ISO-8859-1”. user_role The user role of the user who submitted the comment. This is an optional parameter. If you set it to “administrator”, Akismet will always return false. is_test This is an optional parameter. You can use it when submitting test queries to Akismet. recheck_reason If you are sending content to Akismet to be rechecked, such as a post that has been edited or old pending comments that you’d like to recheck, include the parameter&nbsp; recheck_reason &nbsp;with a string describing why the content is being rechecked. For example,&nbsp; recheck_reason=edit . honeypot_field_name If you use a&nbsp; honeypot field &nbsp;in your implementation, include the name of the field in your request as well as the value of that field. For example, if you have a honeypot field that looks like&nbsp; &lt;input type="text" name="hidden_honeypot_field" style="display: none;" /&gt; , then you should include two extra parameters in your request:&nbsp; honeypot_field_name=hidden_honeypot_field &nbsp;and&nbsp; hidden_honeypot_field=[the value of the input] . comment_context The&nbsp; comment_context &nbsp;parameter provides context for the environment in which the comment was posted: a list of tags or categories applied to the parent blog post or the site on which the comment was posted. Specify&nbsp; comment_context &nbsp;using PHP-style array parameter notation:&nbsp; comment_context[]=cooking&amp;comment_context[]=recipes&amp;comment_context[]=bbq .&nbsp;Note that any tags or categories should be taken from the parent post or environment; they should not be supplied by the commenters themselves. Other server environmental variables In PHP, there is an array of environmental variables called&nbsp; $_SERVER &nbsp;that contains information about the Web server itself as well as a key/value for every HTTP header sent with the request. This data is highly useful to Akismet. How the submitted content interacts with the server can be very telling, so please include as much of it as possible. PHP example $data = array( &#039;blog&#039; =&gt; &#039;http://yourgroovydomain.com&#039;, &#039;user_ip&#039; =&gt; &#039;127.0.0.1&#039;, &#039;user_agent&#039; =&gt; &#039;Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6&#039;, &#039;referrer&#039; =&gt; &#039;http://www.google.com&#039;, &#039;permalink&#039; =&gt; &#039;http://yourgroovydomain.com/blog/post=1&#039;, &#039;comment_type&#039; =&gt; &#039;comment&#039;, &#039;comment_author&#039; =&gt; &#039;admin&#039;, &#039;comment_author_email&#039; =&gt; &#039;test@example.com&#039;, &#039;comment_author_url&#039; =&gt; &#039;http://spam.example.net&#039;, &#039;comment_content&#039; =&gt; &#039;It means a lot that you would take the time to review our software.Thanks again.&#039; ); akismet_submit_spam( &#039;123YourAPIKey&#039;, $data ); function akismet_submit_spam( $api_key, $data ) { $request = &#039;api_key=&#039; . urlencode( $api_key ) . &#039;&amp;blog=&#039; . urlencode($data&#91;&#039;blog&#039;]) . &#039;&amp;user_ip=&#039; . urlencode($data&#91;&#039;user_ip&#039;]) . &#039;&amp;user_agent=&#039; . urlencode($data&#91;&#039;user_agent&#039;]) . &#039;&amp;referrer=&#039; . urlencode($data&#91;&#039;referrer&#039;]) . &#039;&amp;permalink=&#039; . urlencode($data&#91;&#039;permalink&#039;]) . &#039;&amp;comment_type=&#039; . urlencode($data&#91;&#039;comment_type&#039;]) . &#039;&amp;comment_author=&#039; . urlencode($data&#91;&#039;comment_author&#039;]) . &#039;&amp;comment_author_email=&#039; . urlencode($data&#91;&#039;comment_author_email&#039;]) . &#039;&amp;comment_author_url=&#039; . urlencode($data&#91;&#039;comment_author_url&#039;]) . &#039;&amp;comment_content=&#039; . urlencode($data&#91;&#039;comment_content&#039;]); $host = $http_host = &#039;rest.akismet.com&#039;; $path = &#039;/1.1/submit-spam&#039;; $port = 443; $akismet_ua = &quot;WordPress/4.4.1 | Akismet/3.1.7&quot;; $content_length = strlen( $request ); $http_request = &quot;POST $path HTTP/1.0\r\n&quot;; $http_request .= &quot;Host: $host\r\n&quot;; $http_request .= &quot;Content-Type: application/x-www-form-urlencoded\r\n&quot;; $http_request .= &quot;Content-Length: {$content_length}\r\n&quot;; $http_request .= &quot;User-Agent: {$akismet_ua}\r\n&quot;; $http_request .= &quot;\r\n&quot;; $http_request .= $request; $response = &#039;&#039;; if ( false != ( $fs = @fsockopen( &#039;ssl://&#039; . $http_host, $port, $errno, $errstr, 10 ) ) ) { fwrite( $fs, $http_request ); while ( !feof( $fs ) ) { $response .= fgets( $fs, 1160 ); // One TCP-IP packet } fclose( $fs ); $response = explode( &quot;\r\n\r\n&quot;, $response, 2 ); } if ( &#039;Thanks for making the web a better place.&#039; == $response&#91;1] ) { return true; } else { return false; } } This call returns a single response: Array ( &#91;0] =&gt; HTTP/1.1 200 OK Server: nginx Date: Mon, 24 Feb 2014 20:41:15 GMT Content-Type: text/html; charset=utf-8 Connection: close Content-length: 41 &#91;1] =&gt; Thanks for making the web a better place. ) We’re here to help If you ever get stuck or need help troubleshooting something, please don’t hesitate to contact us . Related Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:56
https://www.cisco.com/c/en_hk/support/index.html
Cisco Support and Downloads - Documentation, Tools, Cases - Cisco Skip to Main Content Skip to search Skip to Footer Cisco.com Hong Kong Products and Services Solutions Support Learn Explore Cisco How to Buy Partners Home Partner Program Support Tools Find a Cisco Partner Meet our Partners Become a Cisco Partner Support & Downloads Find Products and Downloads Helpful Links Licensing Support Technology Support Support for Cisco Acquisitions Support Tools Cisco Community When autocomplete results are available use up and down arrows to review and enter to select My Support Open/View Cases To open or view a case, you need a service contract Cisco Support Assistant Get instant updates on your TAC Case and more View Open Cases Log In Create a Cisco Account Benefits of a Cisco Account Software Downloads Log In Create a Cisco Account Benefits of a Cisco Account All Software Downloads Recently Viewed Products My Saved Content Log In You can now save documents and other content for future use. Log in to see your Saved Content. Feedback My Devices Log in to view or manage your My Devices inventory Contact TAC by Phone Enterprise and Service Provider Products Hong Kong 852 3077 5555 Worldwide Phone Numbers Small Business Products Hong Kong 800 90 3154 Worldwide Phone Numbers Returns Returns Portal Products by Category Switches Security Routers Wireless Unified Communications Networking Software (IOS & NX-OS) Collaboration Endpoints and Phones All Supported Products Status Tools Security Advisories The Cisco Security portal provides actionable intelligence for security threats and vulnerabilities in Cisco products and services and third-party products. Field Notices Get to know any significant issues, other than security vulnerability-related issues, that directly involve Cisco products and typically require an upgrade, workaround, or other customer action. Cisco Cloud Status Check the current status of services and components for Cisco's cloud-based Webex, Security and IoT offerings. TAC Connect Bot For existing cases, the TAC Connect Bot offers customers and partners a self-service experience for common case inquiries and basic transactions without waiting in a queue. More Tools Collaboration Solution Analyzer Suite of tools to assist you in the day to day operations of your Collaboration infrastructure. Cisco CLI Analyzer The Cisco CLI Analyzer (formerly ASA CLI Analyzer) is a smart SSH client with internal TAC tools and knowledge integrated. It is designed to help troubleshoot and check the overall health of your Cisco supported software. My Notifications My Notifications allows an user to subscribe and receive notifications for Cisco Security Advisories, End of Life Announcements, Field Notices, and Software & Bug updates for specific Cisco products and technologies. View All Tools More Support Partner Support Small Business Product Support Business Critical Services Customer Experience DevNet Developer Support Cisco Trust Portal Cisco Communities Cisco Community Home Partner Community Small Business Support Community Webex Community Cisco Insider User Group Licenses Traditional Licensing Generate and manage PAK-based and other device licenses, including demo licenses. Smart Software Licensing Track and manage Smart Software Licenses. Enterprise Agreements Generate and manage licenses from Enterprise Agreements. Licensing Support Solve common licensing issues on your own. Software and Downloads Bug Search Tool Find software bugs based on product, release and keyword. Software Research View Cisco suggestions for supported products. Cisco Software Checker Use the Cisco Software Checker to search for Cisco Security Advisories that apply to specific Cisco IOS, IOS XE, NX-OS and NX-OS in ACI Mode software releases. Download Cisco Software Get the latest updates, patches and releases of Cisco Software.
2026-01-13T09:29:56
https://ai.google.dev/api/interactions-api?hl=fa
Gemini API &nbsp;|&nbsp; Google AI for Developers رد شدن و رفتن به محتوای اصلی / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 کلید API را دریافت کنید کتاب آشپزی انجمن ورود به برنامه اسناد مرجع API Gemini API اسناد مرجع API کلید API را دریافت کنید کتاب آشپزی انجمن نمای کلی نسخه های API قابلیت ها مدل ها تولید محتوا Live API Live Music API API تعاملات توکن ها فایل ها Batch API ذخیره سازی جاسازی‌ها جستجوی فایل فروشگاه‌های جستجوی فایل سند همه روش ها منسوخ پالم (از بین رفته) مراجع SDK Python Go TypeScript Java C# این صفحه به‌وسیله ‏Cloud Translation API‏ ترجمه شده است. صفحه اصلی Gemini API مرجع API ارسال بازخورد Gemini API رابط برنامه‌نویسی کاربردی Gemini Interactions یک رابط برنامه‌نویسی کاربردی آزمایشی است که به توسعه‌دهندگان اجازه می‌دهد تا با استفاده از مدل‌های Gemini، برنامه‌های هوش مصنوعی مولد بسازند. Gemini توانمندترین مدل ما است که از پایه برای چندوجهی بودن ساخته شده است. این مدل می‌تواند انواع مختلف اطلاعات از جمله زبان، تصاویر، صدا، ویدئو و کد را تعمیم داده و به طور یکپارچه درک کند، در میان آنها عمل کند و ترکیب کند. می‌توانید از API Gemini برای موارد استفاده مانند استدلال در متن و تصاویر، تولید محتوا، عامل‌های گفتگو، سیستم‌های خلاصه‌سازی و طبقه‌بندی و موارد دیگر استفاده کنید. مشاهده به صورت markdown مشاهده مشخصات OpenAPI ایجاد تعامل ارسال به آدرس https://generativelanguage.googleapis.com/v1beta/interactions یک تعامل جدید ایجاد می‌کند. درخواست بدنه پاسخ درخواست بدنه بدنه درخواست شامل داده‌هایی با ساختار زیر است: مدل ModelOption (اختیاری) نام «مدل» مورد استفاده برای تولید تعامل. در صورت عدم ارائه «عامل»، الزامی است. مقادیر ممکن: gemini-2.5-pro مدل چندمنظوره پیشرفته ما، که در کدنویسی و کارهای استدلالی پیچیده عالی عمل می‌کند. gemini-2.5-flash اولین مدل استدلال ترکیبی ما که از یک پنجره زمینه ۱ میلیون توکنی پشتیبانی می‌کند و دارای بودجه‌های تفکر است. gemini-2.5-flash-preview-09-2025 آخرین مدل مبتنی بر مدل فلش ۲.۵. پیش‌نمایش فلش ۲.۵ برای پردازش در مقیاس بزرگ، وظایف با تأخیر کم و حجم بالا که نیاز به تفکر دارند و موارد استفاده عامل‌محور بهترین گزینه است. gemini-2.5-flash-lite کوچکترین و مقرون به صرفه ترین مدل ما، ساخته شده برای استفاده در مقیاس بزرگ. gemini-2.5-flash-lite-preview-09-2025 جدیدترین مدل مبتنی بر Gemini 2.5 Flash lite که برای صرفه‌جویی در هزینه، توان عملیاتی بالا و کیفیت بالا بهینه شده است. gemini-2.5-flash-preview-native-audio-dialog مدل‌های صوتی بومی ما برای خروجی‌های صوتی با کیفیت بالاتر با ریتم بهتر، طبیعی بودن صدا، پرگویی و حس و حال بهتر بهینه شده‌اند. gemini-2.5-flash-image-preview مدل تولید تصویر بومی ما، که برای سرعت، انعطاف‌پذیری و درک متنی بهینه شده است. ورودی و خروجی متن با همان قیمت ۲.۵ فلش ارائه می‌شود. gemini-2.5-pro-preview-tts مدل صوتی متن به گفتار نسخه ۲.۵ پرو ما برای تولید گفتار قدرتمند و با تأخیر کم بهینه شده است تا خروجی‌های طبیعی‌تر و هدایت آسان‌تر دستورات را فراهم کند. gemini-3-pro-preview هوشمندترین مدل ما با استدلال SOTA و درک چندوجهی، و قابلیت‌های قدرتمند کدگذاری عاملی و ارتعاشی. مدلی که اعلان شما را تکمیل می‌کند.\n\nبرای جزئیات بیشتر به [models](https://ai.google.dev/gemini-api/docs/models) مراجعه کنید. گزینه عامل (اختیاری) نام «عامل» مورد استفاده برای ایجاد تعامل. در صورت عدم ارائه «مدل»، الزامی است. مقادیر ممکن: deep-research-pro-preview-12-2025 نماینده تحقیقات عمیق جمینی عاملی که باید با آن تعامل داشت. ورودی محتوا یا آرایه ( Content ) یا آرایه ( Turn ) یا رشته ( الزامی ) ورودی‌های تعامل (مشترک برای مدل و عامل). رشته system_instruction (اختیاری) دستورالعمل سیستم برای تعامل. آرایه ابزارها ( ابزار ) (اختیاری) فهرستی از اعلان‌های ابزار که مدل ممکن است در طول تعامل فراخوانی کند. شیء response_format (اختیاری) تأکید می‌کند که پاسخ تولید شده یک شیء JSON است که با طرحواره JSON مشخص شده در این فیلد مطابقت دارد. رشته response_mime_type (اختیاری) نوع MIME پاسخ. در صورت تنظیم response_format، این مورد الزامی است. جریان بولی (اختیاری) فقط ورودی. اینکه آیا تعامل پخش زنده خواهد شد یا خیر. ذخیره بولی (اختیاری) فقط ورودی. آیا پاسخ و درخواست برای بازیابی بعدی ذخیره شود یا خیر. مقدار بولی پس‌زمینه (اختیاری) اینکه آیا تعامل مدل در پس‌زمینه اجرا شود یا خیر. generation_config GenerationConfig (اختیاری) پیکربندی مدل پارامترهای پیکربندی برای تعامل مدل. جایگزینی برای `agent_config`. فقط زمانی قابل اجرا است که `model` تنظیم شده باشد. پارامترهای پیکربندی برای تعاملات مدل. فیلدها عدد دما (اختیاری) تصادفی بودن خروجی را کنترل می‌کند. شماره top_p (اختیاری) حداکثر احتمال تجمعی توکن‌ها که باید هنگام نمونه‌گیری در نظر گرفته شود. عدد صحیح اولیه (اختیاری) بذر مورد استفاده در رمزگشایی برای تکرارپذیری. آرایه stop_sequences (رشته) (اختیاری) فهرستی از توالی‌های کاراکتری که تعامل خروجی را متوقف می‌کنند. tool_choice انتخاب ابزار (اختیاری) انتخاب ابزار برای تعامل. پیکربندی برای انتخاب ابزار. انواع ممکن نوع انتخاب ابزار این نوع فیلد خاصی ندارد. پیکربندی انتخاب ابزار ابزارهای مجاز (اختیاری) هیچ توضیحی ارائه نشده است. پیکربندی ابزارهای مجاز. فیلدها حالت انتخاب ابزار (اختیاری) حالت انتخاب ابزار. مقادیر ممکن: auto any none validated آرایه ابزار (رشته) (اختیاری) نام ابزارهای مجاز سطح_فکریسطح_فکری ( اختیاری ) سطح توکن‌های فکری که مدل باید تولید کند. مقادیر ممکن: low high خلاصه‌های تفکر ( اختیاری) اینکه آیا خلاصه نظرات در پاسخ گنجانده شود یا خیر. مقادیر ممکن: auto none عدد صحیح max_output_tokens (اختیاری) حداکثر تعداد توکن‌هایی که باید در پاسخ گنجانده شوند. speech_config SpeechConfig (اختیاری) پیکربندی برای تعامل گفتاری. پیکربندی برای تعامل گفتاری. فیلدها رشته صدا (اختیاری) صدای گوینده. رشته زبان (اختیاری) زبان گفتار. سیم بلندگو (اختیاری) نام گوینده، باید با نام گوینده داده شده در سوال مطابقت داشته باشد. شیء agent_config (اختیاری) پیکربندی عامل پیکربندی برای عامل. جایگزینی برای `generation_config`. فقط زمانی قابل اجرا است که `agent` تنظیم شده باشد. انواع ممکن تفکیک‌کننده چندریختی: type پیکربندی DynamicAgent پیکربندی برای عامل‌های پویا نوع رشته (اختیاری) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;dynamic&quot; تنظیم شود. پیکربندی DeepResearchAgent پیکربندی برای عامل تحقیقات عمیق. نوع رشته (اختیاری) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;deep-research&quot; تنظیم شود. خلاصه‌های تفکر ( اختیاری) اینکه آیا خلاصه نظرات در پاسخ گنجانده شود یا خیر. مقادیر ممکن: auto none رشته‌ی previous_interaction_id (اختیاری) شناسه‌ی تعامل قبلی، در صورت وجود. روش_پاسخ ( اختیاری ) روش‌های درخواستی برای پاسخ (متن، تصویر، صدا). مقادیر ممکن: text image audio پاسخ یک منبع تعامل (Interaction) را برمی‌گرداند. درخواست ساده پاسخ نمونه { "created" : "2025-11-26T12:25:15Z" , "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "object" : "interaction" , "outputs" : [ { "text" : "Hello! I'm functioning perfectly and ready to assist you.\n\nHow are you doing today?" , "type" : "text" } ], "role" : "model" , "status" : "completed" , "updated" : "2025-11-26T12:25:15Z" , "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 7 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 7 , "total_output_tokens" : 20 , "total_reasoning_tokens" : 22 , "total_tokens" : 49 , "total_tool_use_tokens" : 0 } } چند نوبتی پاسخ نمونه { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "status" : "completed" , "object" : "interaction" , "created" : "2025-11-26T12:22:47Z" , "updated" : "2025-11-26T12:22:47Z" , "role" : "model" , "outputs" : [ { "type" : "text" , "text" : "The capital of France is Paris." } ], "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 50 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 50 , "total_output_tokens" : 10 , "total_reasoning_tokens" : 0 , "total_tokens" : 60 , "total_tool_use_tokens" : 0 } } ورودی تصویر پاسخ نمونه { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "status" : "completed" , "object" : "interaction" , "created" : "2025-11-26T12:22:47Z" , "updated" : "2025-11-26T12:22:47Z" , "role" : "model" , "outputs" : [ { "type" : "text" , "text" : "A white humanoid robot with glowing blue eyes stands holding a red skateboard." } ], "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 10 }, { "modality" : "image" , "tokens" : 258 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 268 , "total_output_tokens" : 20 , "total_reasoning_tokens" : 0 , "total_tokens" : 288 , "total_tool_use_tokens" : 0 } } فراخوانی تابع پاسخ نمونه { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "status" : "requires_action" , "object" : "interaction" , "created" : "2025-11-26T12:22:47Z" , "updated" : "2025-11-26T12:22:47Z" , "role" : "model" , "outputs" : [ { "type" : "function_call" , "function_call" : { "name" : "get_weather" , "arguments" : { "location" : "Boston, MA" } } } ], "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 100 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 100 , "total_output_tokens" : 25 , "total_reasoning_tokens" : 0 , "total_tokens" : 125 , "total_tool_use_tokens" : 50 } } تحقیقات عمیق پاسخ نمونه { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "agent" : "deep-research-pro-preview-12-2025" , "status" : "completed" , "object" : "interaction" , "created" : "2025-11-26T12:22:47Z" , "updated" : "2025-11-26T12:22:47Z" , "role" : "model" , "outputs" : [ { "type" : "text" , "text" : "Here is a comprehensive research report on the current state of cancer research..." } ], "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 20 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 20 , "total_output_tokens" : 1000 , "total_reasoning_tokens" : 500 , "total_tokens" : 1520 , "total_tool_use_tokens" : 0 } } بازیابی یک تعامل دریافت کنید https://generativelanguage.googleapis.com/v1beta/interactions/{id} جزئیات کامل یک تعامل واحد را بر اساس `Interaction.id` آن بازیابی می‌کند. پارامترهای مسیر/پرس‌وجو پاسخ پارامترهای مسیر/پرس‌وجو رشته شناسه (الزامی) شناسه منحصر به فرد تعاملی که قرار است بازیابی شود. جریان بولی (اختیاری) اگر روی درست تنظیم شود، محتوای تولید شده به صورت تدریجی پخش می‌شود. پیش‌فرض: False رشته last_event_id (اختیاری) اختیاری. در صورت تنظیم، جریان تعامل را از بخش بعدی پس از رویداد مشخص شده توسط شناسه رویداد از سر می‌گیرد. فقط در صورتی قابل استفاده است که `stream` برابر با true باشد. رشته api_version (اختیاری) از کدام نسخه API استفاده کنیم. پاسخ یک منبع تعامل (Interaction) را برمی‌گرداند. تعامل دریافت کنید پاسخ نمونه { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "status" : "completed" , "object" : "interaction" , "created" : "2025-11-26T12:25:15Z" , "updated" : "2025-11-26T12:25:15Z" , "role" : "model" , "outputs" : [ { "type" : "text" , "text" : "I'm doing great, thank you for asking! How can I help you today?" } ] } حذف یک تعامل https://generativelanguage.googleapis.com/v1beta/interactions/{id} را حذف کنید تعامل را بر اساس شناسه حذف می‌کند. پارامترهای مسیر/پرس‌وجو پاسخ پارامترهای مسیر/پرس‌وجو رشته شناسه (الزامی) شناسه منحصر به فرد تعاملی که باید حذف شود. رشته api_version (اختیاری) از کدام نسخه API استفاده کنیم. پاسخ در صورت موفقیت، پاسخ خالی است. حذف تعامل لغو یک تعامل ارسال https://generativelanguage.googleapis.com/v1beta/interactions/{id}/cancel یک تعامل را بر اساس شناسه لغو می‌کند. این فقط برای تعاملات پس‌زمینه‌ای که هنوز در حال اجرا هستند، اعمال می‌شود. پارامترهای مسیر/پرس‌وجو پاسخ پارامترهای مسیر/پرس‌وجو رشته شناسه (الزامی) شناسه منحصر به فرد تعاملی که قرار است بازیابی شود. رشته api_version (اختیاری) از کدام نسخه API استفاده کنیم. پاسخ یک منبع تعامل (Interaction) را برمی‌گرداند. لغو تعامل پاسخ نمونه { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "agent" : "deep-research-pro-preview-12-2025" , "status" : "cancelled" , "object" : "interaction" , "created" : "2025-11-26T12:25:15Z" , "updated" : "2025-11-26T12:25:15Z" , "role" : "model" } منابع تعامل منبع تعامل. فیلدها مدل ModelOption (اختیاری) نام «مدل» مورد استفاده برای تولید تعامل. مقادیر ممکن: gemini-2.5-pro مدل چندمنظوره پیشرفته ما، که در کدنویسی و کارهای استدلالی پیچیده عالی عمل می‌کند. gemini-2.5-flash اولین مدل استدلال ترکیبی ما که از یک پنجره زمینه ۱ میلیون توکنی پشتیبانی می‌کند و دارای بودجه‌های تفکر است. gemini-2.5-flash-preview-09-2025 آخرین مدل مبتنی بر مدل فلش ۲.۵. پیش‌نمایش فلش ۲.۵ برای پردازش در مقیاس بزرگ، وظایف با تأخیر کم و حجم بالا که نیاز به تفکر دارند و موارد استفاده عامل‌محور بهترین گزینه است. gemini-2.5-flash-lite کوچکترین و مقرون به صرفه ترین مدل ما، ساخته شده برای استفاده در مقیاس بزرگ. gemini-2.5-flash-lite-preview-09-2025 جدیدترین مدل مبتنی بر Gemini 2.5 Flash lite که برای صرفه‌جویی در هزینه، توان عملیاتی بالا و کیفیت بالا بهینه شده است. gemini-2.5-flash-preview-native-audio-dialog مدل‌های صوتی بومی ما برای خروجی‌های صوتی با کیفیت بالاتر با ریتم بهتر، طبیعی بودن صدا، پرگویی و حس و حال بهتر بهینه شده‌اند. gemini-2.5-flash-image-preview مدل تولید تصویر بومی ما، که برای سرعت، انعطاف‌پذیری و درک متنی بهینه شده است. ورودی و خروجی متن با همان قیمت ۲.۵ فلش ارائه می‌شود. gemini-2.5-pro-preview-tts مدل صوتی متن به گفتار نسخه ۲.۵ پرو ما برای تولید گفتار قدرتمند و با تأخیر کم بهینه شده است تا خروجی‌های طبیعی‌تر و هدایت آسان‌تر دستورات را فراهم کند. gemini-3-pro-preview هوشمندترین مدل ما با استدلال SOTA و درک چندوجهی، و قابلیت‌های قدرتمند کدگذاری عاملی و ارتعاشی. مدلی که اعلان شما را تکمیل می‌کند.\n\nبرای جزئیات بیشتر به [models](https://ai.google.dev/gemini-api/docs/models) مراجعه کنید. گزینه عامل (اختیاری) نام «عامل» مورد استفاده برای ایجاد تعامل. مقادیر ممکن: deep-research-pro-preview-12-2025 نماینده تحقیقات عمیق جمینی عاملی که باید با آن تعامل داشت. رشته شناسه (اختیاری) فقط خروجی. یک شناسه منحصر به فرد برای تکمیل تعامل. شمارش وضعیت (رشته) (اختیاری) فقط خروجی. وضعیت تعامل. مقادیر ممکن: in_progress requires_action completed failed cancelled رشته ایجاد شده (اختیاری) فقط خروجی. زمانی که پاسخ در قالب ISO 8601 (YYYY-MM-DDThh:mm:ssZ) ایجاد شده است. رشته به‌روزرسانی‌شده (اختیاری) فقط خروجی. زمانی که پاسخ آخرین بار در قالب ISO 8601 (YYYY-MM-DDThh:mm:ssZ) به‌روزرسانی شده است. رشته نقش (اختیاری) فقط خروجی. نقش تعامل. خروجی آرایه ( محتوا ) (اختیاری) فقط خروجی. پاسخ‌ها از مدل. رشته شیء (اختیاری) فقط خروجی. نوع شیء تعامل. همیشه روی `interaction` تنظیم شود. همیشه روی &quot;interaction&quot; تنظیم شود. کاربرد (اختیاری ) فقط خروجی. آمار مربوط به میزان استفاده از توکن درخواست تعامل. آمار مربوط به میزان استفاده از توکن درخواست تعامل. فیلدها عدد صحیح total_input_tokens (اختیاری) تعداد توکن‌ها در اعلان (زمینه). ورودی_توکن‌ها_براساس_مودالیتی توکن‌های مودالیتی (اختیاری) تفکیک استفاده از توکن ورودی بر اساس روش. تعداد توکن‌ها برای یک روش پاسخ واحد. فیلدها روش پاسخ (اختیاری) روش مرتبط با شمارش توکن‌ها. مقادیر ممکن: text image audio عدد صحیح توکن (اختیاری) تعداد توکن‌ها برای روش. عدد صحیح total_cached_tokens (اختیاری) تعداد توکن‌ها در بخش ذخیره‌شده‌ی اعلان (محتوای ذخیره‌شده). cached_tokens_by_modality توکن‌های مودالیتی (اختیاری) تفکیک میزان استفاده از توکن‌های ذخیره‌شده بر اساس روش. تعداد توکن‌ها برای یک روش پاسخ واحد. فیلدها روش پاسخ (اختیاری) روش مرتبط با شمارش توکن‌ها. مقادیر ممکن: text image audio عدد صحیح توکن (اختیاری) تعداد توکن‌ها برای روش. total_output_tokens عدد صحیح (اختیاری) تعداد کل توکن‌ها در تمام پاسخ‌های تولید شده. خروجی_توکن‌ها_براساس_مودالیتی توکن‌های مودالیتی (اختیاری) تفکیک استفاده از توکن خروجی بر اساس روش. تعداد توکن‌ها برای یک روش پاسخ واحد. فیلدها روش پاسخ (اختیاری) روش مرتبط با شمارش توکن‌ها. مقادیر ممکن: text image audio عدد صحیح توکن (اختیاری) تعداد توکن‌ها برای روش. عدد صحیح total_tool_use_tokens (اختیاری) تعداد توکن‌های موجود در اعلان(های) استفاده از ابزار. ابزار_استفاده_از_توکن‌ها_توسط_مودالیتی توکن‌های مودالیتی (اختیاری) تفکیک میزان استفاده از توکن‌های ابزار بر اساس روش. تعداد توکن‌ها برای یک روش پاسخ واحد. فیلدها روش پاسخ (اختیاری) روش مرتبط با شمارش توکن‌ها. مقادیر ممکن: text image audio عدد صحیح توکن (اختیاری) تعداد توکن‌ها برای روش. total_reasoning_tokens عدد صحیح (اختیاری) تعداد توکن‌های افکار برای مدل‌های تفکر. عدد صحیح total_tokens (اختیاری) تعداد کل توکن‌ها برای درخواست تعامل (درخواست + پاسخ‌ها + سایر توکن‌های داخلی). رشته‌ی previous_interaction_id (اختیاری) شناسه‌ی تعامل قبلی، در صورت وجود. مثال‌ها مثال { "created" : "2025-12-04T15:01:45Z" , "id" : "v1_ChdXS0l4YWZXTk9xbk0xZThQczhEcmlROBIXV0tJeGFmV05PcW5NMWU4UHM4RHJpUTg" , "model" : "gemini-2.5-flash" , "object" : "interaction" , "outputs" : [ { "text" : "Hello! I'm doing well, functioning as expected. Thank you for asking! How are you doing today?" , "type" : "text" } ] , "role" : "model" , "status" : "completed" , "updated" : "2025-12-04T15:01:45Z" , "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 7 } ] , "total_cached_tokens" : 0 , "total_input_tokens" : 7 , "total_output_tokens" : 23 , "total_reasoning_tokens" : 49 , "total_tokens" : 79 , "total_tool_use_tokens" : 0 } } مدل‌های داده محتوا محتوای پاسخ. انواع ممکن تفکیک‌کننده چندریختی: type محتوای متن یک بلوک محتوای متنی. رشته متن (اختیاری) محتوای متن. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;text&quot; تنظیم شود. حاشیه‌نویسی‌ها ( اختیاری ) اطلاعات استناد برای محتوای تولید شده توسط مدل. اطلاعات استناد برای محتوای تولید شده توسط مدل. فیلدها عدد صحیح start_index (اختیاری) شروع بخش پاسخی که به این منبع نسبت داده می‌شود. اندیس، شروع بخش را نشان می‌دهد که بر حسب بایت اندازه‌گیری می‌شود. عدد صحیح end_index (اختیاری) پایان بخش منسوب، منحصر به فرد. رشته منبع (اختیاری) منبعی که برای بخشی از متن ذکر شده است. می‌تواند یک URL، عنوان یا شناسه دیگری باشد. محتوای تصویر یک بلوک محتوای تصویر. رشته داده (اختیاری) هیچ توضیحی ارائه نشده است. رشته uri (اختیاری) هیچ توضیحی ارائه نشده است. mime_type ImageMimeTypeOption (اختیاری) هیچ توضیحی ارائه نشده است. مقادیر ممکن: image/png image/jpeg image/webp image/heic image/heif نوع مایم تصویر. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;image&quot; تنظیم شود. وضوح تصویر MediaResolution (اختیاری) قطعنامه رسانه‌ها. مقادیر ممکن: low medium high محتوای صوتی یک بلوک محتوای صوتی. رشته داده (اختیاری) هیچ توضیحی ارائه نشده است. رشته uri (اختیاری) هیچ توضیحی ارائه نشده است. گزینه mime_type AudioMimeType (اختیاری) هیچ توضیحی ارائه نشده است. مقادیر ممکن: audio/wav audio/mp3 audio/aiff audio/aac audio/ogg audio/flac نوع مایم صدا. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;audio&quot; تنظیم شود. محتوای سند یک بلوک محتوای سند. رشته داده (اختیاری) هیچ توضیحی ارائه نشده است. رشته uri (اختیاری) هیچ توضیحی ارائه نشده است. رشته mime_type (اختیاری) هیچ توضیحی ارائه نشده است. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;document&quot; تنظیم شود. محتوای ویدیویی یک بلوک محتوای ویدیویی. رشته داده (اختیاری) هیچ توضیحی ارائه نشده است. رشته uri (اختیاری) هیچ توضیحی ارائه نشده است. mime_type گزینه VideoMimeType (اختیاری) هیچ توضیحی ارائه نشده است. مقادیر ممکن: video/mp4 video/mpeg video/mov video/avi video/x-flv video/mpg video/webm video/wmv video/3gpp نوع میم (شبیه‌سازی) ویدیو. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;video&quot; تنظیم شود. وضوح تصویر MediaResolution (اختیاری) قطعنامه رسانه‌ها. مقادیر ممکن: low medium high محتوای فکری یک بلوک محتوای فکری. رشته امضا (اختیاری) امضا برای مطابقت با منبع backend تا بخشی از نسل باشد. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;thought&quot; تنظیم شود. خلاصه افکار (اختیاری) خلاصه‌ای از اندیشه. خلاصه‌ای از اندیشه. محتوای فراخوانی تابع یک بلوک محتوای فراخوانی ابزار تابع. رشته نام (الزامی) نام ابزاری که باید فراخوانی شود. شیء آرگومان‌ها (الزامی) آرگومان‌هایی که باید به تابع ارسال شوند. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;function_call&quot; تنظیم شود. رشته شناسه (الزامی) یک شناسه منحصر به فرد برای این فراخوانی ابزار خاص. محتوای نتیجه تابع یک بلوک محتوای نتیجه ابزار تابع. رشته نام (اختیاری) نام ابزاری که نامیده شد. is_error نوع داده بولی (اختیاری) اینکه آیا فراخوانی ابزار منجر به خطا شده است یا خیر. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;function_result&quot; تنظیم شود. شیء یا رشته نتیجه (الزامی) نتیجه فراخوانی ابزار. رشته call_id (الزامی) شناسه‌ای که با شناسه‌ی بلوک فراخوانی تابع مطابقت دارد. اجرای کدفراخوانی محتوا محتوای اجرای کد. آرگومان‌های CodeExecutionCallArguments (اختیاری) آرگومان‌هایی که باید به اجرای کد ارسال شوند. آرگومان‌هایی که باید به اجرای کد ارسال شوند. فیلدها شمارش زبان (رشته) (اختیاری) زبان برنامه‌نویسی «کد». مقادیر ممکن: python رشته کد (اختیاری) کدی که قرار است اجرا شود. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;code_execution_call&quot; تنظیم شود. رشته شناسه (اختیاری) یک شناسه منحصر به فرد برای این فراخوانی ابزار خاص. محتوای نتیجه اجرای کد محتوای نتیجه اجرای کد. رشته نتیجه (اختیاری) خروجی اجرای کد. is_error نوع داده بولی (اختیاری) اینکه آیا اجرای کد منجر به خطا شده است یا خیر. رشته امضا (اختیاری) یک هش امضا برای اعتبارسنجی backend. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;code_execution_result&quot; تنظیم شود. رشته‌ی call_id (اختیاری) شناسه‌ای که با شناسه‌ی بلوک فراخوانی اجرای کد مطابقت دارد. محتوا محتوای زمینه URL. آرگومان‌های UrlContextCallArguments (اختیاری) آرگومان‌هایی که باید به متن URL ارسال شوند. آرگومان‌هایی که باید به متن URL ارسال شوند. فیلدها آرایه آدرس‌های اینترنتی (رشته‌ای) (اختیاری) آدرس‌های اینترنتی (URL) برای دریافت. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;url_context_call&quot; تنظیم شود. رشته شناسه (اختیاری) یک شناسه منحصر به فرد برای این فراخوانی ابزار خاص. محتوای نتیجه‌ی URL محتوای نتیجه‌ی زمینه‌ی URL. رشته امضا (اختیاری) امضای نتیجه‌ی زمینه‌ی URL. نتیجه UrlContextResult (اختیاری) نتایج حاصل از متن URL. نتیجه‌ی زمینه‌ی URL. فیلدها رشته آدرس اینترنتی (اختیاری) آدرس اینترنتی (URL) که دریافت شده است. شمارش وضعیت (رشته) (اختیاری) وضعیت بازیابی URL. مقادیر ممکن: success error paywall unsafe is_error نوع داده بولی (اختیاری) اینکه آیا زمینه URL منجر به خطا شده است یا خیر. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;url_context_result&quot; تنظیم شود. رشته‌ی call_id (اختیاری) شناسه‌ای که با شناسه‌ی بلوک فراخوانی زمینه‌ی url مطابقت دارد. جستجوی گوگل، محتوای تماس محتوای جستجوی گوگل آرگومان‌های GoogleSearchCallArguments (اختیاری) آرگومان‌هایی که باید به جستجوی گوگل ارسال شوند. آرگومان‌هایی که باید به جستجوی گوگل ارسال شوند. فیلدها آرایه کوئری‌ها (رشته) (اختیاری) عبارت‌های جستجوی وب برای جستجوی وب بعدی. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;google_search_call&quot; تنظیم شود. رشته شناسه (اختیاری) یک شناسه منحصر به فرد برای این فراخوانی ابزار خاص. محتوای نتایج جستجوی گوگل محتوای نتایج جستجوی گوگل رشته امضا (اختیاری) امضای نتیجه جستجوی گوگل. نتیجه جستجوی گوگل (اختیاری) نتایج جستجوی گوگل. نتیجه جستجوی گوگل. فیلدها رشته آدرس اینترنتی (اختیاری) مرجع URI نتیجه جستجو. رشته عنوان (اختیاری) عنوان نتیجه جستجو. رشته rendered_content (اختیاری) قطعه محتوای وب که می‌تواند در یک صفحه وب یا نمای وب یک برنامه تعبیه شود. is_error نوع داده بولی (اختیاری) اینکه آیا جستجوی گوگل منجر به خطا شده است یا خیر. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;google_search_result&quot; تنظیم شود. رشته‌ی call_id (اختیاری) شناسه‌ای که با شناسه‌ی بلوک تماس جستجوی گوگل مطابقت دارد. McpServerToolCallContent محتوای فراخوانی ابزار MCPServer. رشته نام (الزامی) نام ابزاری که نامگذاری شده است. رشته نام سرور (الزامی) نام سرور MCP مورد استفاده. شیء آرگومان‌ها (الزامی) شیء JSON آرگومان‌های تابع. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;mcp_server_tool_call&quot; تنظیم شود. رشته شناسه (الزامی) یک شناسه منحصر به فرد برای این فراخوانی ابزار خاص. محتوای نتیجه ابزار McpServerTool محتوای نتایج ابزار MCPServer. رشته نام (اختیاری) نام ابزاری که برای این فراخوانی ابزار خاص فراخوانی می‌شود. رشته server_name (اختیاری) نام سرور MCP مورد استفاده. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;mcp_server_tool_result&quot; تنظیم شود. شیء یا رشته نتیجه (الزامی) نتیجه فراخوانی ابزار. رشته call_id (الزامی) شناسه‌ای که با شناسه‌ی بلوک فراخوانی ابزار سرور MCP مطابقت دارد. محتوای نتیجه جستجوی فایل محتوای نتیجه جستجوی فایل. نتیجه FileSearchResult (اختیاری) نتایج جستجوی فایل نتیجه جستجوی فایل فیلدها رشته عنوان (اختیاری) عنوان نتیجه جستجو. رشته متن (اختیاری) متن نتیجه جستجو. رشته file_search_store (اختیاری) نام فروشگاه جستجوی فایل. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;file_search_result&quot; تنظیم شود. مثال‌ها متن { "type" : "text" , "text" : "Hello, how are you?" } تصویر { "type" : "image" , "data" : "BASE64_ENCODED_IMAGE" , "mime_type" : "image/png" } صوتی { "type" : "audio" , "data" : "BASE64_ENCODED_AUDIO" , "mime_type" : "audio/wav" } سند { "type" : "document" , "data" : "BASE64_ENCODED_DOCUMENT" , "mime_type" : "application/pdf" } ویدئو { "type" : "video" , "uri" : "https://www.youtube.com/watch?v=9hE5-98ZeCg" } فکر { "type" : "thought" , "summary" : [ { "type" : "text" , "text" : "The user is asking about the weather. I should use the get_weather tool." } ], "signature" : "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" } فراخوانی تابع { "type" : "function_call" , "name" : "get_weather" , "id" : "gth23981" , "arguments" : { "location" : "Boston, MA" } } نتیجه تابع { "type" : "function_result" , "name" : "get_weather" , "call_id" : "gth23981" , "result" : { "weather" : "sunny" } } فراخوانی اجرای کد { "type" : "code_execution_call" , "id" : "call_123456" , "arguments" : { "language" : "python" , "code" : "print('hello world')" } } نتیجه اجرای کد { "type" : "code_execution_result" , "call_id" : "call_123456" , "result" : "hello world\n" } فراخوانی متن URL { "type" : "url_context_call" , "id" : "call_123456" , "arguments" : { "urls" : [ "https://www.example.com" ] } } نتیجه متن URL { "type" : "url_context_result" , "call_id" : "call_123456" , "result" : [ { "url" : "https://www.example.com" , "status" : "SUCCESS" } ] } تماس جستجوی گوگل { "type" : "google_search_call" , "id" : "call_123456" , "arguments" : { "queries" : [ "weather in Boston" ] } } نتیجه جستجوی گوگل { "type" : "google_search_result" , "call_id" : "call_123456" , "result" : [ { "url" : "https://www.google.com/search?q=weather+in+Boston" , "title" : "Weather in Boston" } ] } ابزار سرور مک‌پد { "type" : "mcp_server_tool_call" , "id" : "call_123456" , "name" : "get_forecast" , "server_name" : "weather_server" , "arguments" : { "city" : "London" } } نتیجه ابزار سرور مک‌پد { "type" : "mcp_server_tool_result" , "name" : "get_forecast" , "server_name" : "weather_server" , "call_id" : "call_123456" , "result" : "sunny" } نتیجه جستجوی فایل { "type" : "file_search_result" , "result" : [ { "text" : "search result chunk" , "file_search_store" : "file_search_store" } ] } ابزار انواع ممکن تفکیک‌کننده چندریختی: type عملکرد ابزاری که می‌تواند توسط مدل مورد استفاده قرار گیرد. رشته نام (اختیاری) نام تابع. رشته توضیحات (اختیاری) شرحی از تابع. پارامتر شیء (اختیاری) طرحواره JSON برای پارامترهای تابع. نوع رشته (الزامی) هیچ توضیحی ارائه نشده است. همیشه روی &quot;function&quot; تنظیم شود. جستجوی گوگل ابزاری که می‌تواند توسط مدل برای جستجو در گوگل استفاده شود. نوع رشته (الزامی) هیچ توضیحی ارائه نشده است. همیشه روی &quot;google_search&quot; تنظیم شود. اجرای کد ابزاری که می‌تواند توسط مدل برای اجرای کد استفاده شود. نوع رشته (الزامی) هیچ توضیحی ارائه نشده است. همیشه روی &quot;code_execution&quot; تنظیم شود. متن آدرس ابزاری که می‌تواند توسط مدل برای دریافت متن URL استفاده شود. نوع رشته (الزامی) هیچ توضیحی ارائه نشده است. همیشه روی &quot;url_context&quot; تنظیم شود. استفاده از کامپیوتر ابزاری که می‌تواند توسط مدل برای تعامل با کامپیوتر استفاده شود. نوع رشته (الزامی) هیچ توضیحی ارائه نشده است. همیشه روی &quot;computer_use&quot; تنظیم شود. enum محیطی (رشته‌ای) (اختیاری) محیطی که در حال اجرا است. مقادیر ممکن: browser آرایه excludePredefinedFunctions (رشته) (اختیاری) فهرست توابع از پیش تعریف شده‌ای که از فراخوانی مدل مستثنی شده‌اند. مک‌پ‌سرور MCPServer سروری است که می‌تواند توسط مدل برای انجام اقدامات فراخوانی شود. نوع رشته (الزامی) هیچ توضیحی ارائه نشده است. همیشه روی &quot;mcp_server&quot; تنظیم شود. رشته نام (اختیاری) نام سرور MCP. رشته آدرس اینترنتی (اختیاری) آدرس کامل URL برای نقطه پایانی MCPServer. مثال: &quot;https://api.example.com/mcp&quot; شیء هدر (اختیاری) اختیاری: در صورت نیاز، فیلدهایی برای هدرهای احراز هویت، زمان‌های انقضا و غیره. ابزارهای مجاز (اختیاری) ابزارهای مجاز. پیکربندی ابزارهای مجاز. فیلدها حالت انتخاب ابزار (اختیاری) حالت انتخاب ابزار. مقادیر ممکن: auto any none validated آرایه ابزار (رشته) (اختیاری) نام ابزارهای مجاز جستجوی فایل ابزاری که می‌تواند توسط مدل برای جستجوی فایل‌ها استفاده شود. آرایه file_search_store_names (رشته‌ای) (اختیاری) جستجوی فایل، نام‌های فروشگاه را برای جستجو ذخیره می‌کند. عدد صحیح top_k (اختیاری) تعداد تکه‌های بازیابی معنایی که باید بازیابی شوند. رشته metadata_filter (اختیاری) فیلتر فراداده برای اعمال روی اسناد و تکه‌های بازیابی معنایی. نوع رشته (الزامی) هیچ توضیحی ارائه نشده است. همیشه روی &quot;file_search&quot; تنظیم شود. مثال‌ها عملکرد جستجوی گوگل اجرای کد متن آدرس استفاده از کامپیوتر مک‌پ‌سرور جستجوی فایل نوبت فیلدها رشته نقش (اختیاری) آغازگر این نوبت. باید برای ورودی کاربر یا برای خروجی مدل مدل باشد. آرایه محتوا ( Content ) یا رشته (اختیاری) محتوای نوبت. مثال‌ها نوبت کاربر { "role" : "user" , "content" : [ { "type" : "text" , "text" : "user turn" } ] } مدل چرخش { "role" : "model" , "content" : [ { "type" : "text" , "text" : "model turn" } ] } رویداد تعامل انواع ممکن تفکیک‌کننده چندریختی: event_type رویداد تعاملی event_type enum (رشته) (اختیاری) هیچ توضیحی ارائه نشده است. مقادیر ممکن: interaction.start interaction.complete تعامل تعامل (اختیاری) هیچ توضیحی ارائه نشده است. رشته event_id (اختیاری) توکن event_id که برای از سرگیری جریان تعامل، از این رویداد، استفاده می‌شود. به‌روزرسانی وضعیت تعامل رشته‌ی interaction_id (اختیاری) هیچ توضیحی ارائه نشده است. شمارش وضعیت (رشته) (اختیاری) هیچ توضیحی ارائه نشده است. مقادیر ممکن: in_progress requires_action completed failed cancelled رشته event_type (اختیاری) هیچ توضیحی ارائه نشده است. همیشه روی &quot;interaction.status_update&quot; تنظیم شود. رشته event_id (اختیاری) توکن event_id که برای از سرگیری جریان تعامل، از این رویداد، استفاده می‌شود. شروع محتوا عدد صحیح شاخص (اختیاری) هیچ توضیحی ارائه نشده است. محتوا ( اختیاری) هیچ توضیحی ارائه نشده است. رشته event_type (اختیاری) هیچ توضیحی ارائه نشده است. همیشه روی &quot;content.start&quot; تنظیم شود. رشته event_id (اختیاری) توکن event_id که برای از سرگیری جریان تعامل، از این رویداد، استفاده می‌شود. کانتنت‌دلتا عدد صحیح شاخص (اختیاری) هیچ توضیحی ارائه نشده است. رشته event_type (اختیاری) هیچ توضیحی ارائه نشده است. همیشه روی &quot;content.delta&quot; تنظیم شود. رشته event_id (اختیاری) توکن event_id که برای از سرگیری جریان تعامل، از این رویداد، استفاده می‌شود. شیء دلتا (اختیاری) هیچ توضیحی ارائه نشده است. انواع ممکن تفکیک‌کننده چندریختی: type متن دلتا رشته متن (اختیاری) هیچ توضیحی ارائه نشده است. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;text&quot; تنظیم شود. حاشیه‌نویسی‌ها ( اختیاری ) اطلاعات استناد برای محتوای تولید شده توسط مدل. اطلاعات استناد برای محتوای تولید شده توسط مدل. فیلدها عدد صحیح start_index (اختیاری) شروع بخش پاسخی که به این منبع نسبت داده می‌شود. اندیس، شروع بخش را نشان می‌دهد که بر حسب بایت اندازه‌گیری می‌شود. عدد صحیح end_index (اختیاری) پایان بخش منسوب، منحصر به فرد. رشته منبع (اختیاری) منبعی که برای بخشی از متن ذکر شده است. می‌تواند یک URL، عنوان یا شناسه دیگری باشد. ایمیج‌دلتا رشته داده (اختیاری) هیچ توضیحی ارائه نشده است. رشته uri (اختیاری) هیچ توضیحی ارائه نشده است. mime_type ImageMimeTypeOption (اختیاری) هیچ توضیحی ارائه نشده است. مقادیر ممکن: image/png image/jpeg image/webp image/heic image/heif نوع مایم تصویر. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;image&quot; تنظیم شود. وضوح تصویر MediaResolution (اختیاری) قطعنامه رسانه‌ها. مقادیر ممکن: low medium high آدیودلتا رشته داده (اختیاری) هیچ توضیحی ارائه نشده است. رشته uri (اختیاری) هیچ توضیحی ارائه نشده است. گزینه mime_type AudioMimeType (اختیاری) هیچ توضیحی ارائه نشده است. مقادیر ممکن: audio/wav audio/mp3 audio/aiff audio/aac audio/ogg audio/flac نوع مایم صدا. نوع رشته (الزامی) به عنوان تفکیک‌کننده نوع OpenAPI برای محتوای oneof استفاده می‌شود. همیشه روی &quot;audio&quot; تنظیم شود. سند دلتا رشته داده (اخ
2026-01-13T09:29:56
https://shows.acast.com/frontier/episodes/ep-43-harpreet-singh-ceo-and-co-founder-at-launchable
Ep. 43: Harpreet Singh, CEO and Co-Founder at Launchable - Frontier Podcast by Gun.io | Acast Follow Share Play Frontier Podcast by Gun.io Ep. 43: Harpreet Singh, CEO and Co-Founder at Launchable Season 4 , Ep. 43 • Thursday, February 15, 2024 This week, Teja talks with Harpreet Singh, Co-CEO and Co-Founder of Launchable, a company that's on a mission to make software testing faster and smarter. They discuss the DACI framework and the importance of intentionality in decision-making, what it's like to bring a behemoth like Jenkins to life, and the power of slowing down to meditate. https://www.launchableinc.com/ Show more RSS More episodes View all episodes 46. Ep. 46: Matt Genovese, CEO and Founder of Planorama 54:36 | Thursday, April 11, 2024 | Season 4 , Ep. 46 This week, Teja sits down with Matt Genovese, CEO and Founder of Planorama, a company that designs UX/UI flows for products with complete enablement for software teams. They discuss the intricacies of living abroad, the importance of incorporating design, and how de-risking early on in the life of a new product can make it more successful in the long run.https://planorama.design/matthttps://aiproducthive.com Play 45. Ep. 45: Brian Pontarelli, CEO and Founder of FusionAuth 44:05 | Thursday, March 28, 2024 | Season 4 , Ep. 45 On this week's episode, Teja sits down with Brian Pontarelli, Founder and CEO of both FusionAuth and Cleanspeak. They discuss the complexities of growing two businesses at the same time, making progress without using AI, and the subtle clues in an interview process that let you know someone's a great culture fit.https://fusionauth.io/https://cleanspeak.com/ Play 44. Ep. 44: Sabber Ahamed, Founder of xoolooloo 28:31 | Thursday, February 29, 2024 | Season 4 , Ep. 44 This week, Teja talks with Sabber Ahamed, Founder of Xoolooloo and Data Scientist at Bridgestone. They discuss the proliferation of data science, the joys of working on your own projects outside of the 9-5, and the different things career goals of a computational geophysicist can really shake up. Play 42. Ep. 42: Brian Douglas, CEO and Founder at OpenSauced 36:55 | Thursday, February 1, 2024 | Season 4 , Ep. 42 In this week's episode, Teja talks with Brian Douglas, CEO and Founder at OpeSauced. They talk about how a good open source portfolio is more than just getting your name on big projects, the natural progression from developer advocacy to building an open source marketplace, and the trials and tribulations of learning to lead as you grow.opensauced.pizza Play 41. Ep. 41: Ian Villa, COO and Co-founder at Whisper Aero 37:33 | Thursday, January 18, 2024 | Season 4 , Ep. 41 Joining Teja on this week's episode is Ian Villa, COO and Co-founder of Whisper Aero, a company that is developing cleaner, quieter, and more efficient propulsion solutions. They discuss the pros and cons of a campus with on-site housing, the burgeoning Nashville tech scene, and how a 5 am trip to Kinko's can, in hindsight, be a lesson in entrepreneurship.whisper.aero Play 40. Ep. 40: Kate O&#x27;Neil, CEO and Co-founder at Teaming 58:40 | Thursday, January 11, 2024 | Season 4 , Ep. 40 This week, Teja sits down for round two with Kate O'Neil, who has moved into the CEO position at Teaming since the last time they talked. They discuss the differences that come with the transition to becoming a CEO, the importance of incorporating movement into your life, and why getting the best sleep comes down to the perfect sheets.teaming.com Play 39. Ep. 39: Jeremy Snyder, CEO and Founder at FireTail 50:32 | Thursday, January 4, 2024 | Season 4 , Ep. 39 After a brief holiday hiatus, Teja is back this week with Jeremy Snyder, the Founder and CEO of FireTail, an API security platform that provides application layer visibility, real-time, inline inspection, and blocking of malicious API calls. They talk about being a less technical founder, how being a polyglot helps you understand more than language, and the importance of taking the time to find your own adventure.https://www.firetail.io/ Play 38. Ep. 38: Stefan Avram, Head of Growth and Co-Founder at WunderGraph 34:16 | Thursday, December 21, 2023 | Season 4 , Ep. 38 Teja sits down with Stefan Avram, Head of Growth and Co-founder at WunderGraph, an open-source GraphQL federation. They discuss how injuries can change your life trajectory, the complexities of working with distributed teams, and how sometimes getting fired can be the best thing that's ever happened to you. www.wundergraph.com Play Instagram X.com TikTok Copyright Gun.io Hosted with ❤️ by Acast
2026-01-13T09:29:56
https://www.cisco.com/c/fr_be/solutions/index.html
Solutions - Cisco Passez au contenu principal Aller directement à la recherche Passez au bas de page Cisco.com Belgique et Luxembourg Produits et services Solutions Assistance Formation Explorer Acheter nos solutions Accueil partenaires Nouveau programme pour les partenaires Assistance Outils Rechercher un partenaire Cisco Rencontrer nos partenaires Devenir partenaire Cisco Solutions Du réseau à la sécurité en passant par le data center et la collaboration, nos solutions IT répondent à tous les besoins de votre entreprise. Découvrez comment nous pouvons vous aider. Contactez Cisco Demandez à être rappelé Appelez le 0800 94242 Belgium Call 352 26 43 33 11 Luxembourg Support technique Solutions phares Travail hybride La sécurité au niveau des points d'accès (SASE) Full-Stack Observability Hybrid Cloud Solutions par technologie Analytique et automatisation Intelligence artificielle Cloud Collaboration Infrastructure réseau essentielle Réseau intuitif Internet des objets Solutions sans fil et de mobilité Architecture réseau&nbsp;: Cisco&nbsp;DNA Solutions de sécurité Logiciels Réseau SDN Index des produits Zone de conception&nbsp;: Guides de conception Cisco Solutions par type d'entreprise PME Opérateurs télécoms Solutions par secteur Villes et communautés Éducation Énergie Services financiers Secteur public Santé Assurances Industrie Exploitation pétrolière et gazière Commerce Sports et divertissements Transports Eau et énergie Cisco on Cisco&nbsp;: nos témoignages sur l'IT En partageant son expérience IT de Cisco, Cisco on Cisco aide les clients et les partenaires à mieux utiliser la technologie pour atteindre leurs résultats. Découvrez les coulisses de l'informatique chez Cisco. Découvrez comment nous aidons les entreprises à se transformer grâce à la technologie.&nbsp; En savoir plus Centres d'innovation collaborative Cisco Les centres d'innovation collaborative Cisco font appel à des partenaires locaux et mondiaux pour créer de nouvelles solutions technologiques, résoudre les problématiques du secteur et avoir un impact positif sur les entreprises, la société et la planète. Découvrir les solutions Les partenaires Cisco font la différence Profitez des conseils d'experts avant, pendant et après vos déploiements technologiques.&nbsp; Faites le premier pas Vous pouvez compter sur nos partenaires de confiance qui vous accompagneront sur la voie du numérique.  Afficher les partenaires dans le monde entier Aider les entreprises à atteindre leurs objectifs constitue déjà une récompense en soi. Nous avons tant à vous offrir.  Devenir partenaire Nous simplifions le marketing pour les partenaires PME.  Générer de la demande auprès des PME (connexion requise) Contactez notre équipe commerciale Essais gratuits, démos et offres Services
2026-01-13T09:29:56
https://aws.amazon.com/what-is/retrieval-augmented-generation/
What is RAG? - Retrieval-Augmented Generation AI Explained - AWS Skip to main content Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account What is Cloud Computing? › Cloud Computing Concepts Hub › Artificial Intelligence › Generative AI What is RAG (Retrieval-Augmented Generation)? Create an AWS Account Page topics What is Retrieval-Augmented Generation? Why is Retrieval-Augmented Generation important? What are the benefits of Retrieval-Augmented Generation? How does Retrieval-Augmented Generation work? What is the difference between Retrieval-Augmented Generation and semantic search? How can AWS support your&nbsp;Retrieval-Augmented Generation requirements? What is Retrieval-Augmented Generation? Retrieval-Augmented Generation (RAG) is the process of optimizing the output of a large language model, so it references an authoritative knowledge base outside of its training data sources before generating a response. Large Language Models (LLMs) are trained on vast volumes of data and use billions of parameters to generate original output for tasks like answering questions, translating languages, and completing sentences. RAG extends the already powerful capabilities of LLMs to specific domains or an organization's internal knowledge base, all without the need to retrain the model. It is a cost-effective approach to improving LLM output so it remains relevant, accurate, and useful in various contexts. Why is Retrieval-Augmented Generation important? LLMs are a key artificial intelligence (AI) technology powering intelligent chatbots and other natural language processing (NLP) applications. The goal is to create bots that can answer user questions in various contexts by cross-referencing authoritative knowledge sources. Unfortunately, the nature of LLM technology introduces unpredictability in LLM responses. Additionally, LLM training data is static and introduces a cut-off date on the knowledge it has. Known challenges of LLMs include: Presenting false information when it does not have the answer. Presenting out-of-date or generic information when the user expects a specific, current response. Creating a response from non-authoritative sources. Creating inaccurate responses due to terminology confusion, wherein different training sources use the same terminology to talk about different things. You can think of the Large Language Model as an over-enthusiastic new employee who refuses to stay informed with current events but will always answer every question with absolute confidence. Unfortunately, such an attitude can negatively impact user trust and is not something you want your chatbots to emulate! RAG is one approach to solving some of these challenges. It redirects the LLM to retrieve relevant information from authoritative, pre-determined knowledge sources. Organizations have greater control over the generated text output, and users gain insights into how the LLM generates the response. What are the benefits of Retrieval-Augmented Generation? RAG technology brings several benefits to an organization's generative AI efforts. Cost-effective implementation Chatbot development typically begins using a foundation model . Foundation models (FMs) are API-accessible LLMs trained on a broad spectrum of generalized and unlabeled data. The computational and financial costs of retraining FMs for organization or domain-specific information are high. RAG is a more cost-effective approach to introducing new data to the LLM. It makes generative artificial intelligence (generative AI) technology more broadly accessible and usable. Current information Even if the original training data sources for an LLM are suitable for your needs, it is challenging to maintain relevancy. RAG allows developers to provide the latest research, statistics, or news to the generative models. They can use RAG to connect the LLM directly to live social media feeds, news sites, or other frequently-updated information sources. The LLM can then provide the latest information to the users. Enhanced user trust RAG allows the LLM to present accurate information with source attribution. The output can include citations or references to sources. Users can also look up source documents themselves if they require further clarification or more detail. This can increase trust and confidence in your generative AI solution. More developer control With RAG, developers can test and improve their chat applications more efficiently. They can control and change the LLM's information sources to adapt to changing requirements or cross-functional usage. Developers can also restrict sensitive information retrieval to different authorization levels and ensure the LLM generates appropriate responses. In addition, they can also troubleshoot and make fixes if the LLM references incorrect information sources for specific questions. Organizations can implement generative AI technology more confidently for a broader range of applications. How does Retrieval-Augmented Generation work? Without RAG, the LLM takes the user input and creates a response based on information it was trained on—or what it already knows. With RAG, an information retrieval component is introduced that utilizes the user input to first pull information from a new data source. The user query and the relevant information are both given to the LLM. The LLM uses the new knowledge and its training data to create better responses. The following sections provide an overview of the process. Create external data The new data outside of the LLM's original training data set is called external data . It can come from multiple data sources, such as a APIs, databases, or document repositories. The data may exist in various formats like files, database records, or long-form text. Another AI technique, called embedding language models , converts data into numerical representations and stores it in a vector database. This process creates a knowledge library that the generative AI models can understand. Retrieve relevant information The next step is to perform a relevancy search. The user query is converted to a vector representation and matched with the vector databases. For example, consider a smart chatbot that can answer human resource questions for an organization. If an employee searches, "How much annual leave do I have?" the system will retrieve annual leave policy documents alongside the individual employee's past leave record. These specific documents will be returned because they are highly-relevant to what the employee has input. The relevancy was calculated and established using mathematical vector calculations and representations. Augment the LLM prompt Next, the RAG model augments the user input (or prompts) by adding the relevant retrieved data in context. This step uses prompt engineering techniques to communicate effectively with the LLM. The augmented prompt allows the large language models to generate an accurate answer to user queries. Update external data The next question may be—what if the external data becomes stale? To maintain current information for retrieval, asynchronously update the documents and update embedding representation of the documents. You can do this through automated real-time processes or periodic batch processing. This is a common challenge in data analytics—different data-science approaches to change management can be used. The following diagram shows the conceptual flow of using RAG with LLMs. &nbsp; What is the difference between Retrieval-Augmented Generation and semantic search? Semantic search enhances RAG results for organizations wanting to add vast external knowledge sources to their LLM applications. Modern enterprises store vast amounts of information like manuals, FAQs, research reports, customer service guides, and human resource document repositories across various systems. Context retrieval is challenging at scale and consequently lowers generative output quality. Semantic search technologies can scan large databases of disparate information and retrieve data more accurately. For example, they can answer questions such as, "How much was spent on machinery repairs last year?” by mapping the question to the relevant documents and returning specific text instead of search results. Developers can then use that answer to provide more context to the LLM. Conventional or keyword search solutions in RAG produce limited results for knowledge-intensive tasks. Developers must also deal with word embeddings, document chunking, and other complexities as they manually prepare their data. In contrast, semantic search technologies do all the work of knowledge base preparation so developers don't have to. They also generate semantically relevant passages and token words ordered by relevance to maximize the quality of the RAG payload. How can AWS support your&nbsp;Retrieval-Augmented Generation requirements? Amazon Bedrock is a fully-managed service that offers a choice of high-performing foundation models—along with a broad set of capabilities—to build generative AI applications while simplifying development and maintaining privacy and security. With knowledge bases for Amazon Bedrock, you can connect FMs to your data sources for RAG in just a few clicks. Vector conversions, retrievals, and improved output generation are all handled automatically. For organizations managing their own RAG, Amazon Kendra is a highly-accurate enterprise search service powered by machine learning. It provides an optimized Kendra Retrieve API that you can use with Amazon Kendra’s high-accuracy semantic ranker as an enterprise retriever for your RAG workflows. For example, with the Retrieve API, you can: Retrieve up to 100 semantically-relevant passages of up to 200 token words each, ordered by relevance. Use pre-built connectors to popular data technologies like Amazon Simple Storage Service , SharePoint, Confluence, and other websites. Support a wide range of document formats such as HTML, Word, PowerPoint, PDF, Excel, and text files. Filter responses based on those documents that the end-user permissions allow. Amazon also offers options for organizations who want to build more custom generative AI solutions. Amazon SageMaker JumpStart is a ML hub with FMs, built-in algorithms, and prebuilt ML solutions that you can deploy with just a few clicks. You can speed up RAG implementation by referring to existing SageMaker notebooks and code examples. Get started with Retrieval-Augmented Generation on AWS by creating a free account today Next Steps on AWS Check out additional product-related resources Innovate faster with the most comprehensive set of Generative AI services Sign up for a free account Instant get access to the AWS Free Tier. Sign up Start building in the console Get started building in the AWS management console. Sign in Create an AWS account Learn What Is AWS? What Is Cloud Computing? What Is Agentic AI? Cloud Computing Concepts Hub AWS Cloud Security What's New Blogs Press Releases Resources Getting Started Training AWS Trust Center AWS Solutions Library Architecture Center Product and Technical FAQs Analyst Reports AWS Partners Developers Builder Center SDKs &amp; Tools .NET on AWS Python on AWS Java on AWS PHP on AWS JavaScript on AWS Help Contact Us File a Support Ticket AWS re:Post Knowledge Center AWS Support Overview Get Expert Help AWS Accessibility Legal English Back to top Amazon is an Equal Opportunity Employer: Minority / Women / Disability / Veteran / Gender Identity / Sexual Orientation / Age. x facebook linkedin instagram twitch youtube podcasts email Privacy Site terms Cookie Preferences © 2026, Amazon Web Services, Inc. or its affiliates. All rights reserved.
2026-01-13T09:29:56
https://shows.acast.com/frontier/episodes/ep-38-stefan-avram-head-of-growth-and-co-founder-at-wundergr
Ep. 38: Stefan Avram, Head of Growth and Co-Founder at WunderGraph - Frontier Podcast by Gun.io | Acast Follow Share Play Frontier Podcast by Gun.io Ep. 38: Stefan Avram, Head of Growth and Co-Founder at WunderGraph Season 4 , Ep. 38 • Thursday, December 21, 2023 Teja sits down with Stefan Avram, Head of Growth and Co-founder at WunderGraph, an open-source GraphQL federation. They discuss how injuries can change your life trajectory, the complexities of working with distributed teams, and how sometimes getting fired can be the best thing that's ever happened to you. www.wundergraph.com Show more RSS More episodes View all episodes 46. Ep. 46: Matt Genovese, CEO and Founder of Planorama 54:36 | Thursday, April 11, 2024 | Season 4 , Ep. 46 This week, Teja sits down with Matt Genovese, CEO and Founder of Planorama, a company that designs UX/UI flows for products with complete enablement for software teams. They discuss the intricacies of living abroad, the importance of incorporating design, and how de-risking early on in the life of a new product can make it more successful in the long run.https://planorama.design/matthttps://aiproducthive.com Play 45. Ep. 45: Brian Pontarelli, CEO and Founder of FusionAuth 44:05 | Thursday, March 28, 2024 | Season 4 , Ep. 45 On this week's episode, Teja sits down with Brian Pontarelli, Founder and CEO of both FusionAuth and Cleanspeak. They discuss the complexities of growing two businesses at the same time, making progress without using AI, and the subtle clues in an interview process that let you know someone's a great culture fit.https://fusionauth.io/https://cleanspeak.com/ Play 44. Ep. 44: Sabber Ahamed, Founder of xoolooloo 28:31 | Thursday, February 29, 2024 | Season 4 , Ep. 44 This week, Teja talks with Sabber Ahamed, Founder of Xoolooloo and Data Scientist at Bridgestone. They discuss the proliferation of data science, the joys of working on your own projects outside of the 9-5, and the different things career goals of a computational geophysicist can really shake up. Play 43. Ep. 43: Harpreet Singh, CEO and Co-Founder at Launchable 39:22 | Thursday, February 15, 2024 | Season 4 , Ep. 43 This week, Teja talks with Harpreet Singh, Co-CEO and Co-Founder of Launchable, a company that's on a mission to make software testing faster and smarter. They discuss the DACI framework and the importance of intentionality in decision-making, what it's like to bring a behemoth like Jenkins to life, and the power of slowing down to meditate.https://www.launchableinc.com/ Play 42. Ep. 42: Brian Douglas, CEO and Founder at OpenSauced 36:55 | Thursday, February 1, 2024 | Season 4 , Ep. 42 In this week's episode, Teja talks with Brian Douglas, CEO and Founder at OpeSauced. They talk about how a good open source portfolio is more than just getting your name on big projects, the natural progression from developer advocacy to building an open source marketplace, and the trials and tribulations of learning to lead as you grow.opensauced.pizza Play 41. Ep. 41: Ian Villa, COO and Co-founder at Whisper Aero 37:33 | Thursday, January 18, 2024 | Season 4 , Ep. 41 Joining Teja on this week's episode is Ian Villa, COO and Co-founder of Whisper Aero, a company that is developing cleaner, quieter, and more efficient propulsion solutions. They discuss the pros and cons of a campus with on-site housing, the burgeoning Nashville tech scene, and how a 5 am trip to Kinko's can, in hindsight, be a lesson in entrepreneurship.whisper.aero Play 40. Ep. 40: Kate O&#x27;Neil, CEO and Co-founder at Teaming 58:40 | Thursday, January 11, 2024 | Season 4 , Ep. 40 This week, Teja sits down for round two with Kate O'Neil, who has moved into the CEO position at Teaming since the last time they talked. They discuss the differences that come with the transition to becoming a CEO, the importance of incorporating movement into your life, and why getting the best sleep comes down to the perfect sheets.teaming.com Play 39. Ep. 39: Jeremy Snyder, CEO and Founder at FireTail 50:32 | Thursday, January 4, 2024 | Season 4 , Ep. 39 After a brief holiday hiatus, Teja is back this week with Jeremy Snyder, the Founder and CEO of FireTail, an API security platform that provides application layer visibility, real-time, inline inspection, and blocking of malicious API calls. They talk about being a less technical founder, how being a polyglot helps you understand more than language, and the importance of taking the time to find your own adventure.https://www.firetail.io/ Play Instagram X.com TikTok Copyright Gun.io Hosted with ❤️ by Acast
2026-01-13T09:29:56
https://akismet.com/developers/detailed-docs/key-sites-activity/
Key/sites activity &#8211; Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Getting started Plugins and libraries Detailed docs Building your application Key verification Comment check Submit spam (missed&nbsp;spam) Submit ham (false&nbsp;positives) Key/sites activity Usage limit Response error codes Akismet Error #10001 Akismet Error #10003 Akismet Error #10402 Akismet Error #10011 Akismet Error #10010 Akismet Error #10009 Akismet Error #10006 Akismet Error #10005 Akismet Error #10404 Akismet Error #10403 Akismet Error #30001 Key/sites activity An endpoint to keep track of the sites that are using your Akismet API key. https://rest.akismet.com/1.2/key-sites All parameters can be passed via the GET or POST methods. Required parameters api_key Your Akismet API key. You can find this on your account dashboard at  https://akismet.com/account/ Optional parameters month The month for which you would like to get the report (e.g. 2022-09 ). Defaults to the current month. filter Filter results by site URL or partial site URL. For example, a filter of &#8220;domain.tld&#8221; will return activity for all sites with &#8220;domain.tld&#8221; in their URL. format The format in which you would like the results to be returned. json &nbsp;(default): Return results as&nbsp; JavaScript Object Notation &nbsp;values. csv : Return results as&nbsp; comma separated values . order The column by which you would like the results to be sorted. total &nbsp;(default): Total number of API calls (spam + ham). spam : Order by the number of spam caught. ham : Order by the number of non-spam let through. missed_spam : Order by the number of reported missed spam. false_positives : Order by the number of reported false positives. limit The maximum number of results returned in the report (defaults to 500). offset The offset of the results returned in the report (defaults to 0). PHP example $data = file_get_contents( 'https://rest.akismet.com/1.2/key-sites?api_key=123YourAPIKey&month=2022-09&format=csv' ); var_dump( $data ); Sample results (json) { "2022-09":&#91; { "site":"site6735.domain.tld", "api_calls":"2072", "spam":"2069", "ham":"3", "missed_spam":"0", "false_positives":"4", "is_revoked":false },{ "site":"site4748.domain.tld", "api_calls":"1633", "spam":"3", "ham":"1630", "missed_spam":"0", "false_positives":"0", "is_revoked":true } ], "limit": 10, "offset": 0, "total": 2 } Sample results (csv) Active sites for 123YourAPIKey during 2022-09 (limit:10, offset: 0, total: 4) Site,Total API Calls,Spam,Ham,Missed Spam,False Positives,Is Revoked site6735.domain.tld,14446,33,13,0,9,false site3026.domain.tld,8677,101,6,0,0,false site3737.domain.tld,4230,65,5,2,0,true site5653.domain.tld,2921,30,1,2,6,false Results keys site The hostname of the site querying the API using your API key. api_calls The total number of API calls (spam + ham) the site has placed in the queried month. spam The number of times Akismet returned&nbsp; true &nbsp;for spam in the queried month. ham The number of times Akismet returned&nbsp; false &nbsp;for spam in the queried month. missed_spam The number of missed spam reports submitted by the site in the queried month. false_positives The number of false positive reports submitted by the site in the queried month. is_revoked Indicates if the site has been revoked from using your API key, or not. limit The maximum number of results returned in the report. Can be set using the&nbsp; limit &nbsp;parameter. offset The offset of the results returned in the report. Can be set using the&nbsp; offset &nbsp;parameter. total The total number of sites using the API key in the queried month. We&#8217;re here to help If you ever get stuck or need help troubleshooting something, please don’t hesitate to&nbsp; contact us . Related Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:56
https://infisical.com/docs/integrations/platforms/certificate-agent#one-time-certificate-issuance
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let&#x27;s Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;./client-id&quot; # Path to file containing client ID client-secret : &quot;./client-secret&quot; # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : &quot;kubernetes-auth&quot; config : identity-id : &quot;your-kubernetes-identity-id&quot; service-account-token-path : &quot;/var/run/secrets/kubernetes.io/serviceaccount/token&quot; Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : &quot;azure-auth&quot; config : identity-id : &quot;your-azure-identity-id&quot; Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;gcp-id-token&quot; config : identity-id : &quot;your-gcp-identity-id&quot; GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : &quot;gcp-iam&quot; config : identity-id : &quot;your-gcp-identity-id&quot; service-account-key : &quot;/path/to/service-account-key.json&quot; Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;aws-iam&quot; config : identity-id : &quot;your-aws-identity-id&quot; ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : [ &quot;api.example.com&quot; , &quot;api-v2.example.com&quot; ] ttl : &quot;90d&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; # Enable automatic certificate renewal lifecycle : renew-before-expiry : &quot;30d&quot; status-check-interval : &quot;6h&quot; # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : &quot;/etc/ssl/private/web.key&quot; permission : &quot;0600&quot; # Read/write for owner only certificate : path : &quot;/etc/ssl/certs/web.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner chain : path : &quot;/etc/ssl/certs/web-chain.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo &quot;Certificate issued for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-failure : command : | echo &quot;Certificate operation failed: ${ERROR_MESSAGE}&quot; mail -s &quot;Certificate Alert&quot; [email&#160;protected] &lt; /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., [&quot;www.example.com&quot;, &quot;api.example.com&quot;] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger &#x27;Certificate renewal failed&#x27; , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo &quot;New certificate issued for ${CERT_COMMON_NAME}&quot; chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d &quot;{&#x27;text&#x27;: &#x27;Certificate for ${CERT_COMMON_NAME} renewed successfully&#x27;}&quot; timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo &quot;Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}&quot; # Send alert mail -s &quot;Certificate Failure Alert&quot; [email&#160;protected] &lt; /dev/null # Log to syslog logger -p daemon.error &quot;Certificate agent failure: ${ERROR_MESSAGE}&quot; timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : &quot;https://app.infisical.com&quot; retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; csr-path : &quot;/etc/ssl/requests/api.csr&quot; file-output : certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; lifecycle : renew-before-expiry : &quot;14d&quot; # Renew 14 days before expiration status-check-interval : &quot;6h&quot; # Check certificate status every 6 hours file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; post-hooks : on-issuance : command : &quot;systemctl reload nginx&quot; timeout : 30 on-renewal : command : &quot;systemctl reload nginx &amp;&amp; logger &#x27;Certificate renewed&#x27;&quot; timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:56
https://play.google.com/store/apps/details?id=notion.id&amp;hl=gl
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M12 17.27L
2026-01-13T09:29:56
https://www.cisco.com/site/hk/en/partners/index.html
Partners - Cisco Skip to main content Skip to search Skip to footer Cisco.com Hong Kong Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Explore Cisco How to buy Partners EN HK Log in Explore Cisco Search MENU CLOSE How to buy Partners Log in EN HK Close Close Close Close Close Thank you. Your profile has been updated. Help us keep your profile up-to-date. Confirm your job details. Job Role -- Please Select -- Customer Service / Support Executive Management Finance / Accounting Information Technology Manufacturing Marketing / PR / Advertising Logistics / Operations / Administration Other (Legal, HR, Training, Vendor Manager, etc) Purchasing / Procurement Research / Development Sales / Account Manager, Business Development System / Sales Engineer Job Level -- Please Select -- Manager Contributor Director / Senior Mgr Executive Partnerships that make everything possible A Cisco partnership provides you exclusive benefits like programs and specializations made to reward you, training and enablement that modernize your practice, and opportunities to transform your capabilities and selling motions. Create a Cisco account Already a partner? Log in Register as a Cisco partner or affiliate your account For new companies Log in with your Cisco account and register your company as a Cisco partner to gain access to exclusive partner content. For individuals Log in with your Cisco account and associate that account with an existing Cisco partner company to gain access to exclusive partner content. Your profitability is our number 1 goal Partner Program A program that is flexibly structured around how you deliver value to customers. Marketing Velocity Training to help modernize your marketing approach, customizable campaigns, and access to a top-tier digital community. Paths to transformation Explore the possibilities of how Cisco can help you build new capabilities and evolving customer needs. See the benefits Cisco partners bring real results The stadium of the future Successful businesses don&#39;t always play by the rules. Cisco Partner AmpThink isn’t just playing the game, they’re redefining it—and they’re winning. Modernize stadiums Paving the way for others One of the first members of the African American Cisco Partner Community, TGS is helping to open doors for other black-owned companies. Promote inclusivity Previous Next Find a partner Partners work to integrate, build, buy, and consult on solutions, software, and services for their customers. Partner Locator Connect with a partner @CiscoPartners Cisco Partner Cisco Partners Cisco Partners Partner Blogs Community Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Statement Cookies Trademarks Supply Chain Transparency Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:56
https://www.cisco.com/site/hu/hu/about/sitemap.html
Webhelytérkép - Cisco Skip to main content Skip to search Skip to footer Cisco.com Magyarország Termékek és szolgáltatások Close Megoldások Close Támogatás Close Tanulás Close Érvek a Cisco mellett Close Partnerek Close A Cisco felfedezése Vásárlási útmutató Partnerek HU HU Bejelentkezés A Cisco felfedezése Keresés MENÜ BEZÁRÁS Vásárlási útmutató Partnerek Bejelentkezés HU HU Close Close Close Close Close Üdvözlöm, miben segíthetek? Webhelytérkép Népszerű linkek Karrierképesítések Álláslehetőségek Esettanulmányok/vásárlók történetei Cisco Commerce Közösség Lépjen kapcsolatba velünk Networking Academy Bejelentkezés partnereknek Termékek kezdőlapja Megbízhatósági központ Mutasson többet A Ciscóról Cég Áttekintés A legfontosabb hírek Vezető pozíció Cél és fenntarthatóság Álláslehetőségek Megbízhatósági központ Lépjen kapcsolatba velünk Befektetői kapcsolatok Befektetői kapcsolatok kezdőlapja Éves beszámolók Pénzügyi eredmények Részvényárfolyamok Piacelemzések Lépjen kapcsolatba velünk A Cisco közössége Cisco Insider Cisco Research Cisco Store Cisco Talos Internetkimaradások térképe (ThousandEyes) Outshift by Cisco Mutasson többet Termékek Kiemelt termékek Cisco AI Defense Cisco Intersight platform Cisco Networking Cloud Cisco Secure Client (az AnyConnectet is beleértve) Cisco Secure Firewall Cisco Webex Suite Adatközpont és felhőalapú hálózat Switch-ek Routerek és SD-WAN-készülékek Vezeték nélküli eszközök Összes termék Termékek kezdőlapja Termékek A–Z-ig Együttműködés Számítástechnika Hálózatok Biztonság Splunk AppDynamics Szoftverek Mobilalkalmazások letöltése Információforrások Esettanulmányok/vásárlók történetei Cisco Power Calculator Cisco Validated Megfelelőség dCloud-demók, -képzések és -sandboxok Megszüntetett forgalmazású és támogatású termékek Áttekintések, demók és oktatóanyagok Próbaverziók és demók Visio-sablongrafikák Jótállások Mutasson többet Megoldások Kiemelt megoldások Mesterséges intelligencia Cisco on Cisco Secure Access Service Edge (SASE) Szolgáltatók Kis- és középvállalkozások Intelligens épületek Zero Trust-hozzáférés a Cisco által Összes megoldás Megoldások kezdőlapja Együttműködés Számítástechnika Hálózatok Biztonság Ipari megoldások Industry Portfolio Explorer Települések és közösségek Oktatás Pénzügyi szolgáltatások Kormányzati szektor Egészségügy Gyártás Bányászat Olaj- és gázipar Kiskereskedelem Sport, média és szórakoztatóipar Szállítmányozás Közművek Mutasson többet Szolgáltatások Kiemelt szolgáltatások Speciális szolgáltatások Cisco Lifecycle Services Smart Net Total Care Szoftvertámogatás Megoldástámogatás Sikerkövetés Összes szolgáltatás Szolgáltatások kezdőlapja Együttműködés Számítástechnika Hálózatok Megfigyelhetőség (Splunk) Biztonság Felhasználási esetek Modern adatközpont Mutasson többet Támogatás A termékekhez Összes termék Összes szoftverletöltés Együttműködési végpontok és telefonok Routerek Biztonság Switch-ek Egységes kommunikáció Vezeték nélküli eszközök Kapcsolatfelvétel a támogatási csapattal Közösség Licencelési támogatás Termékvisszaküldési portál (RMA-k) Támogatásikérelem-kezelő Támogatás a beszerzésekhez Kisvállalkozások számára fenntartott telefonszámok Egyéb telefonszámok (világszerte) Eszközök és erőforrások Biztonsági segédletek Értesítés a termékeket érintő problémákról Saját eszközök Saját értesítések Szoftverhiba-kereső eszköz Szoftverkutatás Eszközlefedettség-ellenőrző Összes támogatási eszköz Mutasson többet Tanulás Tanulás a Ciscónál Karrierképesítések Tanúsítványvizsgák Cisco Learning Network Cisco Networking Academy Cisco U. DevNet Packet Tracer (hálózatszimuláció) Az összes képzés és tanúsítvány Események és webináriumok Események kezdőlapja Eseménynaptár Cisco Live Megoldásbemutató webináriumok Technológiai webináriumok Technológiai témakörök AI-alkalmazásbiztonság Hogyan kell beállítani egy routert? Hogyan kell beállítani egy hálózati switch-et? Mi az a kiberbiztonság? Mi az az adatközpont? Mi az a tűzfal? Mi az a LAN? Mi a Wi-Fi 7? Minden technológiai témakör Mutasson többet Vásárlási útmutató Vásárlás a Ciscótól Vásárlási információs központ Cisco Capital finanszírozás Cisco Refresh (felújított berendezések) Hívás ütemezése Csevegés indítása Vásárlás viszonteladókon keresztül vagy online Ismerje meg a partnereinket Viszonteladó-kereső Szolgáltatásrendelés és szerződéskezelés Kis- és középvállalkozások Licencelés Enterprise Agreement Licencelési információk Software Central Mutasson többet Partnerek Cisco partnerprogram Legyen Ön is partner Partnerösztönzők Partnerspecializációk Eszközök és erőforrások partnereknek Cisco Commerce Cisco Partner Summit Saját profil Partneri visszajelzés Képzés partnereknek SalesConnect További eszközök és erőforrások partnereknek Partnertámogatás Értékesítés előtti támogatás Támogatásikérelem-kezelő Összes partnertámogatási lehetőség Mutasson többet Gyorshivatkozások A Ciscóról Lépjen kapcsolatba velünk Álláslehetőségek Kapcsolatfelvétel egy partnerrel Források és jogi információk Visszajelzés Súgó Felhasználási feltételek Adatvédelmi nyilatkozat Cookie-k Védjegyek Beszállítói lánc átláthatósága Webhelytérkép &copy; Cisco Systems, Inc.
2026-01-13T09:29:56
https://infisical.com/docs/integrations/platforms/certificate-agent#example-agent-configuration-files
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let&#x27;s Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;./client-id&quot; # Path to file containing client ID client-secret : &quot;./client-secret&quot; # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : &quot;kubernetes-auth&quot; config : identity-id : &quot;your-kubernetes-identity-id&quot; service-account-token-path : &quot;/var/run/secrets/kubernetes.io/serviceaccount/token&quot; Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : &quot;azure-auth&quot; config : identity-id : &quot;your-azure-identity-id&quot; Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;gcp-id-token&quot; config : identity-id : &quot;your-gcp-identity-id&quot; GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : &quot;gcp-iam&quot; config : identity-id : &quot;your-gcp-identity-id&quot; service-account-key : &quot;/path/to/service-account-key.json&quot; Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;aws-iam&quot; config : identity-id : &quot;your-aws-identity-id&quot; ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : [ &quot;api.example.com&quot; , &quot;api-v2.example.com&quot; ] ttl : &quot;90d&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; # Enable automatic certificate renewal lifecycle : renew-before-expiry : &quot;30d&quot; status-check-interval : &quot;6h&quot; # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : &quot;/etc/ssl/private/web.key&quot; permission : &quot;0600&quot; # Read/write for owner only certificate : path : &quot;/etc/ssl/certs/web.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner chain : path : &quot;/etc/ssl/certs/web-chain.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo &quot;Certificate issued for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-failure : command : | echo &quot;Certificate operation failed: ${ERROR_MESSAGE}&quot; mail -s &quot;Certificate Alert&quot; [email&#160;protected] &lt; /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., [&quot;www.example.com&quot;, &quot;api.example.com&quot;] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger &#x27;Certificate renewal failed&#x27; , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo &quot;New certificate issued for ${CERT_COMMON_NAME}&quot; chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d &quot;{&#x27;text&#x27;: &#x27;Certificate for ${CERT_COMMON_NAME} renewed successfully&#x27;}&quot; timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo &quot;Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}&quot; # Send alert mail -s &quot;Certificate Failure Alert&quot; [email&#160;protected] &lt; /dev/null # Log to syslog logger -p daemon.error &quot;Certificate agent failure: ${ERROR_MESSAGE}&quot; timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : &quot;https://app.infisical.com&quot; retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; csr-path : &quot;/etc/ssl/requests/api.csr&quot; file-output : certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; lifecycle : renew-before-expiry : &quot;14d&quot; # Renew 14 days before expiration status-check-interval : &quot;6h&quot; # Check certificate status every 6 hours file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; post-hooks : on-issuance : command : &quot;systemctl reload nginx&quot; timeout : 30 on-renewal : command : &quot;systemctl reload nginx &amp;&amp; logger &#x27;Certificate renewed&#x27;&quot; timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:56
https://snyk.io/es/code-checker/
Verificador de códigos | Herramienta gratuita de seguridad para código con IA | Análisis de código con IA | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API &amp; Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API &amp; Web - Todos los clientes Snyk API &amp; Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo Escribe código que sea mejor y más seguro Verificador de códigos Escanea el código antes de hacer el Commit sobre una solicitud de cambios, identifica vulnerabilidades, mejora la calidad del código y recibe alertas de errores críticos mediante nuestro verificador de códigos gratuito, con la tecnología de Snyk Code. Regístrate gratis para descubrir todo el poder de Snyk. No se necesita tarjeta de crédito. Comienza gratis con GitHub Comienza gratis con Google Prueba, escribe, ejecuta y comparte código seguro con Snyk Code Play Video Cómo usar el verificador de códigos de Snyk Regístrate Crea una cuenta gratuita Escribe una consulta Usa la herramienta asistente de código con IA y escribe una consulta Verifícalo Escribe o pega el código Corrígelo Usa Snyk DeepCode AI para corregir el código Verificador de códigos con human-in-the-loop Snyk Code es un verificador de códigos con IA elaborado por especialistas que analiza el código en busca de problemas de seguridad y brinda sugerencias prácticas directamente desde el IDE para que puedas corregir las vulnerabilidades con rapidez. Real-time Scan and fix source code in seconds. Práctico Corrige vulnerabilidades con remediaciones ideales para desarrolladores. Integrado en el IDE Encuentra vulnerabilidades rápidamente para ahorrar tiempo y dinero Ecosistemas Se integra al flujo de trabajo existente. More than syntax errors Comprehensive semantic analysis across files. IA y personas ML moderno guiado por especialistas en seguridad. In-workflow testing Automatically scan every code change in IDE, CLI PR and repo. Puerta de seguridad CI/CD Escaneos integrados en el proceso de compilación. Disfruta de seguridad del código directamente desde el IDE Aumenta la seguridad de la aplicación con Snyk Code sin costo alguno directamente desde el IDE. Errores Archivos de E/S corruptos Infracciones de contratos de API Desreferenciamientos nulos Problemas de interbloqueos por procesos o subprocesos Verificación de tipos incorrectos Errores lógicos en expresiones Denegación de servicio con expresiones regulares Formato de fecha u hora no válido Filtraciones de recursos Vulnerabilidades Limpieza de datos de entrada faltantes Manejo de contraseñas poco seguras Protocolos poco seguros Permisos sin protección Ataques de intermediario Algoritmos criptográficos débiles Revelación de información Inyección de código inyección de SQL Seguridad del código con la tecnología de Snyk Code El verificador de códigos web gratuito cuenta con la tecnología de Snyk Code. Regístrate ahora para disfrutar de todas sus funcionalidades, que incluyen alertas de vulnerabilidades, resultados de escaneos en tiempo real y sugerencias de correcciones prácticas desde el IDE. Obtén más información sobre Snyk Code Preguntas frecuentes sobre el verificador de códigos con IA Why use the Snyk Code Checker? Quality &amp; security: Detect bugs, logic errors, and vulnerabilities early. Developer-friendly : Inline feedback + actionable fixes in your IDE, GitHub, or CLI. AI-powered accuracy : Smart detection with fewer false positives. Easy CI/CD integration : GitHub Actions, CLI workflows, build gating, threshold controls. Elevate your code quality and security with a modern, AI-backed tool that plays nicely with your workflow. ¿Qué es un verificador de códigos? Un verificador de códigos es un software automatizado que analiza estáticamente código fuente y detecta posibles problemas. La mayoría de los verificadores de códigos brindan información detallada con las razones por las que se marca una determinada línea de código para ayudar a los equipos de software a implementar las prácticas recomendadas para el código. Estas verificaciones a nivel de código suelen evaluar la sintaxis y el estilo del código fuente, y si su documentación está completa. ¿Cuáles son los beneficios de usar un verificador de códigos con IA? Un verificador de códigos con IA permite a las organizaciones detectar y remediar problemas más complejos en el código con anticipación durante el SSDLC (ciclo de vida de desarrollo de software seguro) . Los algoritmos de la IA se entrenaron con cientos de miles de proyectos de código abierto para registrar reglas de IA simbólicas sobre posibles problemas y remediación. Al utilizar el conocimiento aprendido por toda la comunidad global de desarrollo de código abierto, el motor de IA puede detectar problemas en la calidad y la seguridad que una revisión de código por pares o una programación en pareja puede no haber detectado. Esto quiere decir que un verificador de códigos con IA eficiente permite a los desarrolladores corregir problemas a tiempo, antes de que lleguen a producción y puedan afectar a los usuarios finales. ¿Por qué un verificador de códigos es crucial para proteger el desarrollo? Un componente crucial de DevSecOps es el desplazamiento a la izquierda , que implica detectar y remediar vulnerabilidades más temprano durante el proceso de desarrollo. Agregar un verificador de códigos en el pipeline CI/CD existente (integración y entrega continuas) es una de las prácticas recomendadas con mayor aceptación. Al integrar análisis estáticos al IDE, los desarrolladores reciben información sobre las vulnerabilidades lo antes posible, de modo que pueden eliminar los riesgos de seguridad en el código desde la fuente. How do you use a code checker? Integrating code checkers into existing developer workflows is a great way to fix code issues earlier, while also helping developers learn about best practices. This can make a significant impact on the quality and security of code that developers write going forward. More maintainable code can also improve the customer experience because there are fewer bugs and technical debt to deal with in the future. When it comes to static application security testing (SAST) with a code checker, it’s important to choose a developer-first tool that integrates into developer workflows and produces minimal false positives in scan results. A SAST tool also needs to take a comprehensive approach for scanning source code, and be able to combine with linters to check code syntax and style. ¿Cómo funciona un verificador de códigos? CONFIGURACIÓN: Se garantiza que los archivos de configuración de la aplicación cumplan con las políticas y las prácticas recomendadas de seguridad. ANÁLISIS SEMÁNTICO: Se examina el contexto del código para evaluar las intenciones del desarrollador y verificar si la sintaxis del código difiere en algún aspecto. FLUJO DE DATOS: Se hace un seguimiento del flujo de datos desde fuentes no seguras para garantizar que esté limpio antes de que lo consuma la aplicación. ANÁLISIS ESTRUCTURAL : Se determina si hay inconsistencias con la implementación de las prácticas recomendadas específicas de cada lenguaje y las técnicas criptográficas. How does a code checker improve code quality? A code checker elevates code quality by automatically scanning your source in real time to catch syntax, logic, and security flaws early in development. It provides actionable, developer-friendly fixes directly in your IDE or workflow. By integrating with your existing process (like pull requests and CI pipelines), it helps you &quot;shift left&quot;—detecting bugs and vulnerabilities before they ever reach production. Plus, with AI-powered insight, Snyk Code Checker reduces noise by minimizing false positives and delivering contextual recommendations that guide better coding practices over time. What is the difference between a code checker, linter, and formatter? These tools complement each other but serve distinct roles: Formatter : Automatically reformats your code for consistent style—spacing, indentation, line breaks—without altering behavior. Linter : Performs deeper static analysis to flag stylistic inconsistencies, programming errors, and suspicious constructs—like undeclared variables or code smells. They&#x27;re like enhanced validators that understand context beyond mere syntax Code Checker : Broadens the scope further—combining semantic analysis with security scanning. It catches real bugs, vulnerabilities, and potential exploits with AI-powered accuracy, then offers clear remediation guidance. Can I integrate a code checker into GitHub Actions? Absolutely! Snyk provides a range of GitHub Actions that seamlessly weave vulnerability scans and static application security testing (SAST) into your CI workflows. Whether you&#x27;re working with Node.js, Python, Java, Ruby, Docker, or Infrastructure-as-Code, you can: Run a snyk test on pushes to catch issues early. Use Snyk Monitor to get ongoing alerts when new vulnerabilities emerge. Integrate with GitHub Code Scanning to display results right in the Security tab. Fail builds or gate pull requests based on severity thresholds. This approach ensures you catch problems automatically, every time. Can a code checker detect security vulnerabilities? Yes. the Snyk Code Checker is built to spot vulnerabilities such as SQL injection, weak cryptography, insecure sanitization, API misuse, and more—all before code reaches production. Backed by an AI engine trained on millions of data flow cases, our Code Checker offers accurate detection with developer-friendly remediation steps right in your IDE or PRs. This makes it not just a bug catcher, but a security enforcer integrated into your development workflow. Can AI check my code for bugs? Yes. the Snyk Code Checker and its AI engine are informed by open source knowledge and curated by security experts, enabling it to detect complex bugs and security issues that may evade manual code review. With near real-time scanning and automated remediation suggestions, it accelerates development and elevates code safety. This human-in-the-loop AI approach ensures developers get not just flags but meaningful fixes in context, faster than ever. ¿Cómo puedes elegir el mejor verificador con IA para tu código? El verificador de códigos que utilices debería emplear una base de datos de vulnerabilidades integral para identificar problemas de seguridad  a nivel de código y las vulnerabilidades que aparecen a partir de las dependencias de código abierto . Con las bases de datos de vulnerabilidades, los desarrolladores están al corriente de las explotaciones de seguridad más recientes tan pronto se descubren, sin necesidad de dedicar horas interminables a investigar el panorama actual de las amenazas cibernéticas. Esta clase de seguridad impulsada por datos se utiliza en conjunto con inteligencia de amenazas para mejorar la postura general de seguridad de la organización. Por otro lado, detectar problemas de seguridad en el código es solo una cara de la moneda. Un verificador de códigos eficaz identificará fallas, pero también brindará la información necesaria para que los desarrolladores puedan remediarlas. Esta información debería incluir la fuente precisa del problema y cualquier corrección disponible públicamente para fallas de seguridad y antipatrones de diseño del código. ¿Cuáles son las prácticas recomendadas para evaluar la calidad del código? No importa si es la primera vez que te adentras en la seguridad del código o eres un desarrollador profesional con experiencia, existen algunas prácticas recomendadas que es bueno implementar: Para establecer una base de referencia, comienza escaneando el SDLC desde un principio. Escanea el código de forma regular durante las diversas etapas del SDLC para encontrar cualquier problema de seguridad nuevo o en desarrollo. Asegúrate de escanear las dependencias, los contenedores y las configuraciones de IaC de terceros, además del código propio. ¿A qué se hace referencia cuando se habla de “seguridad del código”? Para describir la seguridad del código , puede usarse el acrónimo CID: confidencialidad, integridad y disponibilidad. A menudo, el acrónimo CID puede utilizarse como modelo de sistemas seguros, y para identificar posibles vulnerabilidades y correcciones. Actualmente, las aplicaciones están compuestas en un 80 a 90 % por dependencias de código abierto. Sin embargo, el 10 a 20 % restante es crítico: el código refleja la dirección IP personal, y la comunidad de código abierto no lo protege. La práctica recomendada consiste en aceptar el trabajo de la comunidad de código abierto, y escanear y actualizar las dependencias de software en el proyecto mediante escáneres como Snyk Open Source , mientras escaneas y corriges tu código con Snyk Code . Confidencialidad Los sistemas de software seguros no revelan información a las partes que no deberían recibirla. Esto incluye tanto a personas externas con intenciones maliciosas como a partes interesadas internas sin autorización. Integridad Los sistemas de software seguros garantizan que los procesos y los datos no se manipulen, destruyan o modifiquen. Las transacciones tienen éxito si las subtransacciones se realizan correctamente, y los datos almacenados no se contradicen entre sí. Disponibilidad Un sistema seguro también debe estar disponible para usarse cuando sea necesario. Bloquear un sistema al sobrecargar algunas partes hace que el sistema se vuelva inservible y poco seguro. ¿A qué se hace referencia cuando se habla de “calidad del código”? La calidad del código es subjetiva y puede tener diferentes significados para cada equipo de desarrollo. Sin embargo, en general, la calidad del código hace referencia a en qué medida se siguen las prácticas recomendadas y los estándares de codificación comúnmente aceptados. A continuación, enumeramos cinco medidas para garantizar la calidad que se utilizan con frecuencia y que deben considerarse cuando un desarrollador se pregunta cómo verificar el código: Reusabilidad Lo ideal es escribir código que pueda reutilizarse. Por ejemplo, en programación orientada a objetos, es crucial que las clases y los métodos estén limpios y sean modulares, de modo que sea más sencillo depurar y escalar el código entre proyectos. Restringir el acceso a ciertos bloques de código reutilizables por encapsulación también puede mejorar la seguridad. Facilidad de mantenimiento Además de ser reutilizable, el código fuente debe poder mantenerse. A medida que crece el código base, suelen aumentar la complejidad y la deuda técnica, lo que puede traducirse en errores difíciles de identificar y, a largo plazo, en lentos procesos de desarrollo. Con análisis de código automatizado y revisiones por pares, se puede garantizar que los desarrolladores lleven a producción código cuyo mantenimiento sea realmente realizable. Pruebas El código de alta calidad debe admitir la realización de pruebas. Además de escribir código modular que facilite la realización automática de pruebas, los desarrolladores deben priorizar tener documentación clara y actualizada. De este modo, el equipo de ingeniería de pruebas comprenderá el objetivo de un fragmento de código con mayor facilidad. Coherencia El código debe ser lo suficientemente compatible para ejecutarse en cualquier entorno de desarrollo, ensayo o producción sin generar problemas de incompatibilidad. Con Docker y otras plataformas de contenedores, el código y las dependencias serán coherentes en todos los entornos de implementación. Confiabilidad El software debe estar diseñado desde un principio para que sea confiable. Es decir, los desarrolladores necesitan evitar cualquier deuda técnica de forma proactiva cuando envían código. De lo contrario, el software puede ser cada vez menos confiable y pueden disminuir la disponibilidad, la tolerancia a errores, la integridad de datos y la capacidad de recuperación ante interrupciones. Esta falta de confiabilidad también puede tener un impacto negativo en la postura de seguridad de la aplicación. Verifica la semántica y protege el código desde el IDE. Protege el código a medida que lo desarrollas. Los complementos gratuitos de Snyk para IDE escanean el código en tiempo real en busca de vulnerabilidades y ofrecen sugerencias de correcciones. How do I enforce coding standards in a CI/CD pipeline? Here’s how you can embed discipline into every build: Add the Snyk Code Checker as a CI/CD stage —either via CLI or GitHub Action. Set severity thresholds to reject or flag builds when critical or high-risk issues are found. Filter and triage findings —group by severity, language, or remediation readiness. Provide inline fixes or detailed guidance so developers can quickly resolve problems. Log and monitor issues over time to track code health and improvement. Using the Snyk Code Checker, you ensure that every pull request and repository gets automatically scanned, and builds are halted or marked if insecure code is detected—making security and quality enforcement part of the pipeline fabric. Protege el código a medida que lo escribes con pruebas de seguridad de aplicaciones estáticas creadas por y para desarrolladores. Comienza gratis con GitHub Comienza gratis con Google O inicia sesión con SSO Bitbucket Azure AD Docker ID Al iniciar sesión o registrarte, aceptas cumplir nuestras políticas, incluidas las  Condiciones del servicio  y la  Política de privacidad Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:56
https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.instagram.com%2F&amp;h=AT22U5gjSJqxIfrK1LoQCKQvHrgIAlq7JilRntvivzIRz9uG7PyXcVh5_5_VdmBCoaba7WG9iPRudQ-AeLcseBcYnGORuSQ5-zFK_SHCD8XTFdPrCYp9UjKxNIOrYDAD-A9XllNQY2YaTA0D
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:56
https://aws.amazon.com/blogs/storage/tag/amazon-s3-glacier-deep-archive/
Amazon S3 Glacier Deep Archive | AWS Storage Blog Skip to Main Content Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account AWS Blogs Home Blogs Editions AWS Storage Blog Tag: Amazon S3 Glacier Deep Archive How London Stock Exchange Group migrated 30 PB of market data using AWS DataSync by Aleksei Gorbunov , Darryl Diosomito , and Krishna Gogineni on 26 JUN 2024 in Amazon CloudWatch , Amazon DynamoDB , Amazon S3 Glacier , Amazon S3 Glacier Deep Archive , Amazon Simple Storage Service (S3) , AWS DataSync , AWS Identity and Access Management (IAM) , AWS Lambda , AWS Partner Network , AWS Secrets Manager , AWS Step Functions , AWS Systems Manager , Customer Solutions , Intermediate (200) , Migration &amp; Transfer Services , Multicloud , Storage Permalink Comments Share Update (5/29/2025): On May 29, 2025, AWS DataSync launched Enhanced mode support for cross-cloud transfers. Enhanced mode simplifies data transfers between AWS and other clouds by removing the need for a DataSync agent. It also provides higher performance and scalability when compared to Basic mode. For more details, see the&nbsp;What’s New announcement&nbsp;or review the&nbsp;documentation&nbsp;for guidance […] How AWS Storage partners utilize Amazon S3 Glacier Instant Retrieval to meet customers’ data archiving needs by Henry Axelrod on 19 DEC 2022 in Amazon S3 Glacier , Amazon Simple Storage Service (S3) , AWS Partner Network , Foundational (100) , Storage , Thought Leadership Permalink Comments Share Last year at re:Invent 2021 Amazon Simple Storage Service (Amazon S3) released a new storage class called Amazon S3 Glacier Instant Retrieval, as well as additional improvements to the Amazon S3 Glacier offerings. Many AWS Storage partners were excited about the new storage class as detailed in the blog “Storing data with AWS Partner solutions […] Restoring archived objects at scale from the Amazon S3 Glacier storage classes by Fabio Lattanzi and Nitish Pandey on 15 NOV 2022 in Amazon S3 Glacier , Amazon S3 Glacier Deep Archive , Amazon Simple Storage Service (S3) , Announcements , Intermediate (200) , Launch , Storage , Technical How-to Permalink Share Update (7/26/2024): You no longer need to optimize the S3 Inventory report using Amazon Athena. Amazon S3 will automatically optimize your S3 Batch Operations restore job to achieve the fastest retrieval throughput. For more guidance on using batch operations, learn more in the&nbsp;S3 User Guide. Every organization around the world has archival data. There is […] Restore data from Amazon S3 Glacier storage classes starting with partial object keys by Michael Hamilton , Samrat Lamichhane , and Ramkumar Nottath on 24 MAY 2022 in Advanced (300) , Amazon Athena , Amazon S3 Glacier , Amazon S3 Glacier Deep Archive , Amazon Simple Storage Service (S3) , AWS CloudTrail , Storage , Technical How-to Permalink Comments Share When managing data storage, it is important to optimize for cost by storing data in the most cost-effective manner based on how often data is used or accessed. For many enterprises, this means using some form of cold storage or archiving for data that is less frequently accessed or used while keeping more frequently used […] How to move and store your genomics sequencing data with AWS DataSync by Sam Castro and Ryan Ulaszek on 06 APR 2022 in Advanced (300) , Amazon S3 Glacier , Amazon S3 Glacier Deep Archive , AWS DataSync , AWS Lambda , Storage , Technical How-to Permalink Comments Share Genomics data is expanding at a rate exceeding Moore’s law according to the National Human Genome Research Institute. As more sequencing data is produced and researchers move from genotyping to whole genome sequencing, the amount of data produced is outpacing on-premises capacity. Organizations need cloud solutions that help manage data movement, storage, and analysis. The […] Aggregate and compress logs for archiving to the Amazon S3 Glacier storage classes by Ilir Iljazi on 07 MAR 2022 in Amazon S3 Glacier , Amazon S3 Glacier Deep Archive , Amazon Simple Queue Service (SQS) , Amazon Simple Storage Service (S3) , Customer Solutions , Intermediate (200) , Storage , Thought Leadership Permalink Comments Share In distributed architectures, there is often a need to preserve application logs, and for AWS customers preservation is often done via an Amazon S3 bucket. The logs may contain information on runtime transactions, error/failure states, or application metrics and statistics. These logs are later used in business intelligence to provide useful insights and generate dashboards, […] Modernizing NASCAR’s multi-PB media archive at speed with AWS Storage by Chris Wolford on 27 JAN 2022 in Amazon DynamoDB , Amazon S3 Glacier , Amazon S3 Glacier Deep Archive , Amazon Simple Storage Service (S3) , AWS Lambda , Compute , Customer Solutions , Database , Intermediate (200) , Sports , Storage Permalink Comments Share The National Association for Stock Car Auto Racing (NASCAR) is the sanctioning body for the No. 1 form of motor sports in the United States, and owns 15 of the nation’s major motorsports entertainment facilities. About 15 years ago NASCAR began to collect all the video, audio, and image assets from over the last 70+ […] Best practices for archiving large datasets with AWS by Eric Bowman on 26 JAN 2022 in Amazon S3 Glacier , Amazon S3 Glacier Deep Archive , Amazon Simple Storage Service (S3) , Best Practices , Foundational (100) , Storage Permalink Comments Share As companies grow, they often find themselves managing an ever-increasing amount of data. Customers often need to retain backups for business continuity or disaster recovery, as well as records for compliance and audits. In addition, some customers may need to retain backups to create a centralized repository of information that is heterogeneous in nature, with […] Collecting, archiving, and retrieving surveillance footage with AWS by Priyanka Kulkarni and Akhtar Khan on 19 JAN 2022 in Amazon DynamoDB , Amazon Kinesis , Amazon S3 Glacier , Amazon S3 Glacier Deep Archive , Amazon Simple Notification Service (SNS) , Amazon Simple Storage Service (S3) , AWS Snow Family , AWS Snowball , AWS Snowcone , AWS Storage Gateway , Database , Intermediate (200) , Kinesis Video Streams , Storage , Technical How-to Permalink Comments Share Video feeds and still images from judiciary locations are considered critical forms of evidence in the court of law. These locations can be police stations and government offices or even civil locations of importance like banks and hospitals. As governments, particularly in smart cities rely upon video surveillance, it is critical to design a cost […] How Pinterest uses Amazon S3 Glacier Deep Archive to manage storage for its visual discovery engine by Yi Yin , Bin Yang , and Xiaoning Kou on 10 DEC 2021 in Amazon S3 Glacier , Amazon S3 Glacier Deep Archive , Amazon Simple Storage Service (S3) , Customer Solutions , Intermediate (200) , Storage Permalink Comments Share Pinterest is the visual discovery engine with a mission to bring everyone the inspiration to create a life they love. It’s one of the biggest datasets of ideas ever assembled online, with over 300 billion Pins with ideas around home, food, style, beauty, travel, and more. More than 440 million people around the world use […] ← Older posts @charset "UTF-8";[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4{position:relative;transition:box-shadow .3s ease}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_3d631df0,[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003,[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_5962fadc:hover{box-shadow:var(--rg-shadow-gray-elevation-1, 1px 1px 20px rgba(0, 0, 0, .1))}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_3d631df0.rgft_e79955da,[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003.rgft_e79955da,[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_5962fadc:hover.rgft_e79955da{box-shadow:var(--rg-shadow-gray-elevation-2, 1px 1px 24px rgba(0, 0, 0, .25))}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003:hover{box-shadow:none}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde{position:relative;transform-style:preserve-3d;overflow:unset!important}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:before{content:"";position:absolute;inset:0;border-radius:inherit;transform:translateZ(-1px);pointer-events:none;transition-property:filter,inset;transition-duration:.3s;transition-timing-function:ease;background-clip:content-box!important;padding:1px}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_3d631df0:before{filter:blur(15px)}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_3d631df0.rgft_4df65418:hover:before{filter:blur(20px)}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_5962fadc:hover:before{filter:blur(15px)}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003:before{filter:blur(15px)}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003:hover:before{filter:none}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_e90ac70d:active:before{filter:blur(8px)!important}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_a4f580d2:before{filter:blur(8px)!important}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=fuchsia] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=fuchsia].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-fuchsia, linear-gradient(123deg, #fa6f00 0%, #e433ff 50%, #8575ff 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=fuchsia] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=fuchsia].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-fuchsia, linear-gradient(123deg, #d14600 0%, #c300e0 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=indigo] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=indigo].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-indigo, linear-gradient(123deg, #0099ff 0%, #5c7fff 50%, #8575ff 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=indigo] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=indigo].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-indigo, linear-gradient(123deg, #006ce0 0%, #295eff 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=orange] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=orange].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-orange, linear-gradient(123deg, #ff1ae0 0%, #ff386a 50%, #fa6f00 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=orange] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=orange].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-orange, linear-gradient(123deg, #d600ba 0%, #eb003b 50%, #d14600 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=teal] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=teal].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-teal, linear-gradient(123deg, #00bd6b 0%, #00a4bd 50%, #0099ff 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=teal] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=teal].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-teal, linear-gradient(123deg, #008559 0%, #007e94 50%, #006ce0 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=blue] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=blue].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-blue, linear-gradient(123deg, #00bd6b 0%, #0099ff 50%, #8575ff 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=blue] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=blue].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-blue, linear-gradient(123deg, #008559 0%, #006ce0 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=violet] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=violet].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-violet, linear-gradient(123deg, #ad5cff 0%, #0099ff 50%, #00a4bd 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=violet] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=violet].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-violet, linear-gradient(123deg, #962eff 0%, #006ce0 50%, #007e94 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=purple] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=purple].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-purple, linear-gradient(123deg, #ff1ae0 0%, #8575ff 50%, #00a4bd 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=purple] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=purple].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-purple, linear-gradient(123deg, #d600ba 0%, #6842ff 50%, #007e94 100%))}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:linear-gradient(123deg,#d14600,#c300e0,#6842ff)}[data-eb-6a8f3296] [data-rg-theme=fuchsia] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=fuchsia].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-fuchsia, linear-gradient(123deg, #d14600 0%, #c300e0 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-theme=indigo] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=indigo].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-indigo, linear-gradient(123deg, #006ce0 0%, #295eff 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-theme=orange] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=orange].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-orange, linear-gradient(123deg, #d600ba 0%, #eb003b 50%, #d14600 100%))}[data-eb-6a8f3296] [data-rg-theme=teal] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=teal].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-teal, linear-gradient(123deg, #008559 0%, #007e94 50%, #006ce0 100%))}[data-eb-6a8f3296] [data-rg-theme=blue] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=blue].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-blue, linear-gradient(123deg, #008559 0%, #006ce0 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-theme=violet] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=violet].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-violet, linear-gradient(123deg, #962eff 0%, #006ce0 50%, #007e94 100%))}[data-eb-6a8f3296] [data-rg-theme=purple] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=purple].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-purple, linear-gradient(123deg, #d600ba 0%, #6842ff 50%, #007e94 100%))}[data-eb-6a8f3296] a.rgft_f7822e54,[data-eb-6a8f3296] button.rgft_f7822e54{--button-size: 44px;--button-pad-h: 24px;--button-pad-borderless-h: 26px;border:2px solid var(--rg-color-background-page-inverted, #0F141A);padding:8px var(--button-pad-h, 24px);border-radius:40px!important;align-items:center;justify-content:center;display:inline-flex;height:var(--button-size, 44px);text-decoration:none!important;text-wrap:nowrap;cursor:pointer;position:relative;transition:all .3s ease}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_094d67e1,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_094d67e1{--button-size: 32px;--button-pad-h: 14px;--button-pad-borderless-h: 16px}[data-eb-6a8f3296] a.rgft_f7822e54>span,[data-eb-6a8f3296] button.rgft_f7822e54>span{color:var(--btn-text-color, inherit)!important}[data-eb-6a8f3296] a.rgft_f7822e54:focus-visible,[data-eb-6a8f3296] button.rgft_f7822e54:focus-visible{outline:2px solid var(--rg-color-focus-ring, #006CE0)!important;outline-offset:4px!important;transition:outline 0s}[data-eb-6a8f3296] a.rgft_f7822e54:focus:not(:focus-visible),[data-eb-6a8f3296] button.rgft_f7822e54:focus:not(:focus-visible){outline:none!important}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_303c672b,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_303c672b{--btn-text-color: var(--rg-color-text-utility-inverted, #FFFFFF);background-color:var(--rg-color-btn-primary-bg, #161D26);border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_18409398,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_18409398{--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-btn-secondary-bg, #FFFFFF);border-color:var(--rg-color-background-page-inverted, #0F141A)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_090951dc{--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-background-object, #F3F3F7);border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_15529d9f,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_15529d9f{--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-btn-secondary-bg, #FFFFFF);border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb950a4e{--btn-text-color: var(--rg-color-text-utility, #161D26);border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb950a4e{background-image:linear-gradient(97deg,#ffc0ad,#f8c7ff 37.79%,#d2ccff 75.81%,#c2d1ff)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb950a4e{--rg-gradient-angle:97deg;background-image:var(--rg-gradient-a, linear-gradient(120deg, #f8c7ff 20.08%, #d2ccff 75.81%))}[data-eb-6a8f3296] [data-rg-mode=dark] a.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] [data-rg-mode=dark] button.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] a[data-rg-mode=dark].rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] button[data-rg-mode=dark].rgft_f7822e54.rgft_bb950a4e{background-image:var(--rg-gradient-a, linear-gradient(120deg, #78008a 24.25%, #b2008f 69.56%))}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb419678,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb419678{--btn-text-color: var(--rg-color-text-utility-inverted, #FFFFFF);background-color:var(--rg-color-btn-visited-bg, #656871);border-color:var(--rg-color-btn-visited-bg, #656871)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb419678.rgft_18409398,[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb419678.rgft_15529d9f,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb419678.rgft_18409398,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb419678.rgft_15529d9f{--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-btn-secondary-visited-bg, #FFFFFF)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_badebaf5,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_badebaf5{--btn-text-color: var(--rg-color-btn-disabled-text, #B4B4BB);background-color:var(--rg-color-btn-disabled-bg, #F3F3F7);border-color:var(--rg-color-btn-disabled-bg, #F3F3F7);cursor:default}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_badebaf5.rgft_18409398,[data-eb-6a8f3296] a.rgft_f7822e54.rgft_badebaf5.rgft_15529d9f,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_badebaf5.rgft_18409398,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_badebaf5.rgft_15529d9f{border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_badebaf5.rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_badebaf5.rgft_090951dc{--btn-text-color: var(--rg-color-btn-tertiary-disabled-text, #B4B4BB);background-color:#0000}[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_18409398:not(.rgft_bb950a4e),[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_15529d9f:not(.rgft_bb950a4e),[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_18409398:not(.rgft_bb950a4e),[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_15529d9f:not(.rgft_bb950a4e){--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-btn-secondary-bg, #FFFFFF)}[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc{box-shadow:none}[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc{background-image:linear-gradient(97deg,#ffc0ad80,#f8c7ff80 37.79%,#d2ccff80 75.81%,#c2d1ff80)}[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc{--rg-gradient-angle:97deg;background-image:var(--rg-gradient-a-50, linear-gradient(120deg, #f8c7ff 20.08%, #d2ccff 75.81%))}[data-eb-6a8f3296] [data-rg-mode=dark] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] [data-rg-mode=dark] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] a[data-rg-mode=dark].rgft_f7822e54.rgft_090951dc:hover:not(.rgft_badebaf5),[data-eb-6a8f3296] button[data-rg-mode=dark].rgft_f7822e54.rgft_090951dc:hover:not(.rgft_badebaf5){background-image:var(--rg-gradient-a-50, linear-gradient(120deg, #78008a 24.25%, #b2008f 69.56%))}[data-eb-6a8f3296] a.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc{box-shadow:none}[data-eb-6a8f3296] a.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc{background-image:linear-gradient(97deg,#ffc0ad,#f8c7ff 37.79%,#d2ccff 75.81%,#c2d1ff)}[data-eb-6a8f3296] a.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc{--rg-gradient-angle:97deg;background-image:var(--rg-gradient-a-pressed, linear-gradient(120deg, rgba(248, 199, 255, .5) 20.08%, #d2ccff 75.81%))}[data-eb-6a8f3296] [data-rg-mode=dark] a.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] [data-rg-mode=dark] button.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] a[data-rg-mode=dark].rgft_f7822e54.rgft_090951dc:active:not(.rgft_badebaf5),[data-eb-6a8f3296] button[data-rg-mode=dark].rgft_f7822e54.rgft_090951dc:active:not(.rgft_badebaf5){background-image:var(--rg-gradient-a-pressed, linear-gradient(120deg, rgba(120, 0, 138, .5) 24.25%, #b2008f 69.56%))}[data-eb-6a8f3296] .rgft_8711ccd9{-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale;background:#0000;border:none;margin:0}[data-eb-6a8f3296] .rgft_8711ccd9.rgft_5e58a6df{text-align:center}[data-eb-6a8f3296] .rgft_8711ccd9.rgft_b7ada98b{display:block}[data-eb-6a8f3296] .rgft_8711ccd9.rgft_beb26dc7{font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}[data-eb-6a8f3296] .rgft_8711ccd9 a{display:inline;position:relative;cursor:pointer;text-decoration:none!important;color:var(--rg-color-link-default, #006CE0);background:linear-gradient(to right,currentcolor,currentcolor);background-size:100% .1em;background-position:0 100%;background-repeat:no-repeat}[data-eb-6a8f3296] .rgft_8711ccd9 a:focus-visible{color:var(--rg-color-link-focus, #006CE0)}[data-eb-6a8f3296] .rgft_8711ccd9 a:hover{color:var(--rg-color-link-hover, #003B8F);animation:rgft_d72bdead .3s cubic-bezier(0,0,.2,1)}[data-eb-6a8f3296] .rgft_8711ccd9 a:visited{color:var(--rg-color-link-visited, #6842FF)}@keyframes rgft_d72bdead{0%{background-size:0 .1em}to{background-size:100% .1em}}[data-eb-6a8f3296] .rgft_8711ccd9 b,[data-eb-6a8f3296] b.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 strong,[data-eb-6a8f3296] strong.rgft_8711ccd9{font-weight:700}[data-eb-6a8f3296] i.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 i,[data-eb-6a8f3296] em.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 em{font-style:italic}[data-eb-6a8f3296] u.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 u{text-decoration:underline}[data-eb-6a8f3296] code.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 code{font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace;border-radius:4px;border:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);color:var(--rg-color-text-secondary, #232B37);padding-top:var(--rg-padding-8);padding-right:var(--rg-padding-8);padding-bottom:var(--rg-padding-8);padding-left:var(--rg-padding-8)}[data-eb-6a8f3296] .rgft_12e1c6fa{display:inline!important;vertical-align:middle}[data-eb-6a8f3296] .rgft_8711ccd9 p img{aspect-ratio:16/9;height:100%;object-fit:cover;width:100%;border-radius:8px;order:1;margin-bottom:var(--rg-margin-4)}[data-eb-6a8f3296] .rgft_8711ccd9 table{table-layout:fixed;border-spacing:0;width:100%}[data-eb-6a8f3296] .rgft_8711ccd9 table td{font-size:14px;border-right:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-bottom:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);padding-top:var(--rg-padding-6);padding-right:var(--rg-padding-6);padding-bottom:var(--rg-padding-6);padding-left:var(--rg-padding-6)}[data-eb-6a8f3296] .rgft_8711ccd9 table td:first-of-type{border-left:1px solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_8711ccd9 table thead tr:first-of-type>*:first-of-type,[data-eb-6a8f3296] .rgft_8711ccd9 table:not(:has(thead)) tr:first-of-type>*:first-of-type{border-top-left-radius:16px}[data-eb-6a8f3296] .rgft_8711ccd9 table thead tr:first-of-type>*:last-of-type,[data-eb-6a8f3296] .rgft_8711ccd9 table:not(:has(thead)) tr:first-of-type>*:last-of-type{border-top-right-radius:16px}[data-eb-6a8f3296] .rgft_8711ccd9 table tr:last-of-type td:first-of-type{border-bottom-left-radius:16px}[data-eb-6a8f3296] .rgft_8711ccd9 table tr:last-of-type td:last-of-type{border-bottom-right-radius:16px}[data-eb-6a8f3296] .rgft_8711ccd9 table:not(:has(thead),:has(th)) tr:first-of-type td{border-top:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-right:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-bottom:1px solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_8711ccd9 table th{color:var(--rg-color-text-primary-inverted, #FFFFFF);min-width:280px;max-width:400px;padding:0;text-align:left;vertical-align:top;background-color:var(--rg-color-background-object-inverted, #232B37);border-left:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-right:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-bottom:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);padding-top:var(--rg-padding-6);padding-right:var(--rg-padding-6);padding-bottom:var(--rg-padding-6);padding-left:var(--rg-padding-6);row-gap:var(--rg-margin-5);column-gap:var(--rg-margin-5);max-width:100%;min-width:150px}@media (min-width: 480px) and (max-width: 767px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:100%;min-width:150px}}@media (min-width: 768px) and (max-width: 1023px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:240px;min-width:180px}}@media (min-width: 1024px) and (max-width: 1279px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:350px;min-width:240px}}@media (min-width: 1280px) and (max-width: 1599px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:400px;min-width:280px}}@media (min-width: 1600px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:400px;min-width:280px}}[data-eb-6a8f3296] .rgft_8711ccd9 table th:first-of-type{border-top-left-radius:16px;border-top:0 solid var(--rg-color-border-lowcontrast, #CCCCD1);border-left:0 solid var(--rg-color-border-lowcontrast, #CCCCD1);border-right:0 solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_8711ccd9 table th:nth-of-type(n+3){border-left:0 solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_8711ccd9 table th:last-of-type{border-top-right-radius:16px;border-top:0 solid var(--rg-color-border-lowcontrast, #CCCCD1);border-right:0 solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_a1b66739{display:inline-flex;flex-direction:column;align-items:center;justify-content:center;color:var(--rg-color-text-primary, #161D26);--icon-color: currentcolor}[data-eb-6a8f3296] .rgft_a1b66739.rgft_bc1a8743{height:16px;width:16px}[data-eb-6a8f3296] .rgft_a1b66739.rgft_c0cbb35d{height:20px;width:20px}[data-eb-6a8f3296] .rgft_a1b66739.rgft_bd40fe12{height:32px;width:32px}[data-eb-6a8f3296] .rgft_a1b66739.rgft_27320e58{height:48px;width:48px}[data-eb-6a8f3296] .rgft_a1b66739 svg{fill:none;stroke:none}[data-eb-6a8f3296] .rgft_a1b66739 path[data-fill]:not([fill]){fill:var(--icon-color)}[data-eb-6a8f3296] .rgft_a1b66739 path[data-stroke]{stroke-width:2}[data-eb-6a8f3296] .rgft_a1b66739 path[data-stroke]:not([stroke]){stroke:var(--icon-color)}[data-eb-6a8f3296] .rgft_3ed66ff4{display:inline-flex;flex-direction:column;align-items:center;justify-content:center;color:var(--rg-color-text-primary, #161D26)}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_9124b200{height:10px;width:10px}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_bc1a8743{height:16px;width:16px}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_c0cbb35d{height:20px;width:20px}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_bd40fe12{height:32px;width:32px}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_27320e58{height:48px;width:48px}[data-eb-6a8f3296] .rgft_98b54368{color:var(--rg-color-text-body, #232B37)}[data-eb-6a8f3296] .rgft_98b54368.rgft_275611e5{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_98b54368.rgft_275611e5{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_98b54368.rgft_275611e5{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_98b54368.rgft_275611e5{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_98b54368.rgft_275611e5{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_98b54368.rgft_275611e5{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_98b54368.rgft_275611e5{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_98b54368.rgft_275611e5{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_98b54368.rgft_007aef8b{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_98b54368.rgft_007aef8b{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_98b54368.rgft_007aef8b{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_98b54368.rgft_007aef8b{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_98b54368.rgft_007aef8b{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_98b54368.rgft_007aef8b{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_98b54368.rgft_007aef8b{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_98b54368.rgft_007aef8b{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_98b54368.rgft_ff19c5f9{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_98b54368.rgft_ff19c5f9{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_98b54368.rgft_ff19c5f9{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_98b54368.rgft_ff19c5f9{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_98b54368.rgft_ff19c5f9{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_98b54368.rgft_ff19c5f9{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_98b54368.rgft_ff19c5f9{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_98b54368.rgft_ff19c5f9{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_98b54368 ul{list-style-type:disc;margin-top:2rem}[data-eb-6a8f3296] .rgft_98b54368.rgft_2a7f98ee{display:inline;position:relative;cursor:pointer;text-decoration:none!important;color:var(--rg-color-link-default, #006CE0);background:linear-gradient(to right,currentcolor,currentcolor);background-size:100% .1em;background-position:0 100%;background-repeat:no-repeat}[data-eb-6a8f3296] .rgft_98b54368.rgft_2a7f98ee:focus-visible{color:var(--rg-color-link-focus, #006CE0)}[data-eb-6a8f3296] .rgft_98b54368.rgft_2a7f98ee:hover{color:var(--rg-color-link-hover, #003B8F);animation:rgft_9beb7cc5 .3s cubic-bezier(0,0,.2,1)}[data-eb-6a8f3296] .rgft_98b54368.rgft_2a7f98ee:visited{color:var(--rg-color-link-visited, #6842FF)}@keyframes rgft_9beb7cc5{0%{background-size:0 .1em}to{background-size:100% .1em}}[data-eb-6a8f3296] .rgft_d835af5c{color:var(--rg-color-text-title, #161D26)}[data-eb-6a8f3296] .rgft_d835af5c.rgft_3e9243e1{font-size:calc(4.5rem * var(--font-size-multiplier, 1.6));line-height:1.111;font-weight:500;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_3e9243e1{font-size:calc(3.75rem * var(--font-size-multiplier, 1.6));line-height:1.133;font-weight:500}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_3e9243e1{font-size:calc(3rem * var(--font-size-multiplier, 1.6));line-height:1.167;font-weight:500}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d835af5c.rgft_3e9243e1{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d835af5c.rgft_3e9243e1{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d835af5c.rgft_3e9243e1{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d835af5c.rgft_3e9243e1{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d835af5c.rgft_3e9243e1{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d835af5c.rgft_54816d41{font-size:calc(3.75rem * var(--font-size-multiplier, 1.6));line-height:1.133;font-weight:500;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_54816d41{font-size:calc(3rem * var(--font-size-multiplier, 1.6));line-height:1.167;font-weight:500}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_54816d41{font-size:calc(2.5rem * var(--font-size-multiplier, 1.6));line-height:1.2;font-weight:500}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d835af5c.rgft_54816d41{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d835af5c.rgft_54816d41{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d835af5c.rgft_54816d41{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d835af5c.rgft_54816d41{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d835af5c.rgft_54816d41{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d835af5c.rgft_852a8b78{font-size:calc(3rem * var(--font-size-multiplier, 1.6));line-height:1.167;font-weight:500;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_852a8b78{font-size:calc(2.5rem * var(--font-size-multiplier, 1.6));line-height:1.2;font-weight:500}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_852a8b78{font-size:calc(2rem * var(--font-size-multiplier, 1.6));line-height:1.25;font-weight:500}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d835af5c.rgft_852a8b78{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d835af5c.rgft_852a8b78{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d835af5c.rgft_852a8b78{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d835af5c.rgft_852a8b78{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d835af5c.rgft_852a8b78{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_286fbc8d{letter-spacing:1.6px;text-transform:uppercase;color:var(--rg-color-text-eyebrow, #161D26)}[data-eb-6a8f3296] .rgft_286fbc8d.rgft_cf5cdf86{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_286fbc8d.rgft_cf5cdf86{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.714;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_286fbc8d.rgft_cf5cdf86{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:2;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_286fbc8d.rgft_cf5cdf86{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_286fbc8d.rgft_cf5cdf86{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_286fbc8d.rgft_cf5cdf86{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_286fbc8d.rgft_cf5cdf86{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_286fbc8d.rgft_cf5cdf86{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_286fbc8d.rgft_c6f92487{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.714;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_286fbc8d.rgft_c6f92487{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:2;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_286fbc8d.rgft_c6f92487{font-size:calc(.625rem * var(--font-size-multiplier, 1.6));line-height:2.4;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_286fbc8d.rgft_c6f92487{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_286fbc8d.rgft_c6f92487{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_286fbc8d.rgft_c6f92487{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_286fbc8d.rgft_c6f92487{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_286fbc8d.rgft_c6f92487{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d27b4751{color:var(--rg-color-text-utility, #161D26)}[data-eb-6a8f3296] .rgft_d27b4751.rgft_927d7fd1{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_927d7fd1{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_927d7fd1{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d27b4751.rgft_927d7fd1{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d27b4751.rgft_927d7fd1{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d27b4751.rgft_927d7fd1{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d27b4751.rgft_927d7fd1{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d27b4751.rgft_927d7fd1{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d27b4751.rgft_100c8a76{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_100c8a76{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_100c8a76{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d27b4751.rgft_100c8a76{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d27b4751.rgft_100c8a76{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d27b4751.rgft_100c8a76{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d27b4751.rgft_100c8a76{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d27b4751.rgft_100c8a76{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d27b4751.rgft_453dc601{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_453dc601{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_453dc601{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d27b4751.rgft_453dc601{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d27b4751.rgft_453dc601{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d27b4751.rgft_453dc601{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d27b4751.rgft_453dc601{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d27b4751.rgft_453dc601{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d27b4751.rgft_949ed5ce{font-size:calc(.625rem * var(--font-size-multiplier, 1.6));line-height:1.2;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_949ed5ce{font-size:calc(.625rem * var(--font-size-multiplier, 1.6));line-height:1.2;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_949ed5ce{font-size:calc(.625rem * var(--font-size-multiplier, 1.6));line-height:1.2;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d27b4751.rgft_949ed5ce{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d27b4751.rgft_949ed5ce{font-family:ShinGo,\30d2\30e9\30ae\30ce
2026-01-13T09:29:56
https://wiki.creativecommons.org/wiki/Frequently_Asked_Questions#what-can-i-do-if-i-offer-my-material-under-a-creative-commons-license-and-i-do-not-like-the-way-someone-uses-it
Frequently Asked Questions - Creative Commons Skip to content Creative Commons Menu Who We Are What We Do Licenses and Tools Blog Support Us Search Donate Explore CC Global Network Join a global community working to strengthen the Commons Certificate Become an expert in creating and engaging with openly licensed materials Global Summit Attend our annual event, promoting the power of open licensing Chooser Get help choosing the appropriate license for your work Search Portal Find engines to search openly licensed material for creative and educational reuse Open Source Help us build products that maximize creativity and innovation Frequently Asked Questions English | Fran&#xE7;ais 2025-05-12 19:36:36 UTC About CC What is Creative Commons and what do you do? Is Creative Commons against copyright? What does &#x201C;Some Rights Reserved&#x201D; mean? Can Creative Commons give legal advice about its licenses or other tools, or help with CC license enforcement? Does Creative Commons collect or track material licensed under a CC license? What do the Creative Commons buttons do? May I use the Creative Commons logo and buttons? I love Creative Commons. How can I help? Why does Creative Commons run an annual fundraising campaign? What is the money used for and where does it go? General License Information What are Creative Commons licenses? How do CC licenses operate? Which is the latest version of the licenses offered by Creative Commons? Do Creative Commons licenses affect exceptions and limitations to copyright, such as fair dealing and fair use? Who gives permission to use material offered under Creative Commons licenses? Are Creative Commons licenses enforceable in a court of law? What happens if someone applies a Creative Commons license to my work without my knowledge or authorization? What are the international (&#x201C;unported&#x201D;) Creative Commons licenses, and why does CC offer &#x201C;ported&#x201D; licenses? Can I include a work licensed with CC BY in a Wikipedia article even though they use a CC BY-SA license? Can governments and intergovernmental organizations (&#x201C;IGOs&#x201D;) use CC licenses? Can children apply Creative Commons licenses to work they create? What are the official translations of the CC licenses and CC0? What is a BY-SA Compatible License? For Licensors Choosing a license What things should I think about before I apply a Creative Commons license? How should I decide which license to choose? Why should I use the latest version of the Creative Commons licenses? What if CC licenses have not been ported to my jurisdiction? Should I choose an international license or a ported license? Why should I use the license chooser? What if I don&#x2019;t? How do I apply a Creative Commons license to my material? Do I need to register with Creative Commons before I obtain a license? What do the terms and conditions of a CC license apply to? Can I apply a Creative Commons license to software? Can I apply a Creative Commons license to databases? Could I use a CC license to share my logo or trademark? May I apply a Creative Commons license to a work in the public domain? If I take a photograph of another work that is in the public domain, can I apply a CC license to my photo? May I apply a CC license to my work if it incorporates material used under fair use or another exception or limitation to copyright? Rights other than copyright Can I use CC licenses to license rights other than copyright? How do Creative Commons licenses affect my moral rights, if at all? Can I offer material under a CC license that has my trademark on it without also licensing or affecting rights in the trademark? How are publicity, privacy, and personality rights affected when I apply a CC license? What is the difference between plagiarism and copyright infringement? And what role do CC licenses play to address plagiarism? Business models Can I apply a CC license to low-resolution copies of a licensed work and reserve more rights in high-resolution copies? Can I use a Creative Commons license if I am a member of a collecting society? Can I still make money from a work I make available under a Creative Commons license? Alterations and additions to the license Can I insist on the exact placement of the attribution credit? Can I change the license terms or conditions? Can I waive license terms or conditions? Can I enter into separate or supplemental agreements with users of my work? After licensing What happens if I offer my material under a Creative Commons license and someone misuses them? What can I do if I offer my material under a Creative Commons license and I do not like the way someone uses it? Do I have to provide my name? Can I ask that my name be removed? What do I do if someone tries to place effective technological measures (such as DRM) on my CC-licensed material? When I release my work under a CC license in one format (e.g., .pdf), can I restrict licensees from changing it to or using it in other formats? What if I change my mind about using a CC license? For Licensees Before using CC-licensed material What should I think about before using material offered under a Creative Commons license? Does a Creative Commons license give me all the rights I need to use the work? What if there are sui generis database rights that apply to my use of a CC-licensed database? Where can I find material offered under a CC license? Are Creative Commons works really free to use? What should I know about differences between the international licenses and the ported licenses? General license compliance What happens if I want to use the material in a way that is not permitted by the license? Do I always have to comply with the license terms? If not, what are the exceptions? Attribution How do I properly attribute material offered under a Creative Commons license? Do I need to be aware of anything else when providing attribution? Do I always have to attribute the creator of the licensed material? Using licensed material Does my use violate the NonCommercial clause of the licenses? Can I take a CC-licensed work and use it in a different format? How do I know if a low-resolution photo and a high-resolution photo are the same work? Can I reuse an excerpt of a larger work that is licensed with the NoDerivs restriction? Can I use effective technological measures (such as DRM) when I share CC-licensed material? Can I share CC-licensed material on password-protected sites? Can I share CC-licensed material on file-sharing networks? Do I need to worry about website terms of service when I share CC-licensed content on social media platforms? Additional restrictions on licensed material What if I received CC-licensed material encumbered with effective technological measures (such as DRM)? What if I have received CC-licensed material with additional restrictions? Combining and adapting CC material When is my use considered an adaptation? Can I combine material under different Creative Commons licenses in my work? If I derive or adapt material offered under a Creative Commons license, which CC license(s) can I use? If I create a collection that includes a work offered under a CC license, which license(s) may I choose for the collection? License termination When do Creative Commons licenses expire? What happens if the author decides to revoke the CC license to material I am using? How can I lose my rights under a Creative Commons license? If that happens, how do I get them back? Technical Questions How do Creative Commons licenses and public domain tools work technically? What does it mean that Creative Commons licenses are &#x201C;machine-readable&#x201D;? What is RDFa? What is CC REL and why does Creative Commons recommend it? What does it mean for a search engine to be CC-enabled? How do I give users of my site the option to use CC licensing like Flickr does? How can I change or remove the Creative Commons search option built into the Firefox browser? Is Creative Commons involved in digital rights management (DRM)? Legal Background What is copyright and why does it matter? What is the public domain? What do I need to do to get a copyright? What is an adaptation? What are moral rights? What are neighboring rights? What are sui generis database rights? What are collecting societies? What are publicity, personality, and privacy rights? Data Frequently asked questions about data and CC licenses Can databases be released under CC licenses? When a CC license is applied to a database, what is being licensed? How do I apply a CC legal tool to a database? How do the different CC license elements operate for a CC-licensed database? Can I conduct text/data mining on a CC-licensed database? How does the treatment of sui generis database rights vary in prior versions of CC licenses? What is the difference between the Open Data Commons licenses and the CC 4.0 licenses? Frequently asked questions about data, generally Which components of databases are protected by copyright? How do I know whether a particular use of a database is restricted by copyright? If my use of a database is restricted by copyright, how do I comply with the license? Which components of a database are protected by sui generis database rights? How do I know whether a particular use of a database is restricted by sui generis database rights? What constitutes a &#x201C;substantial portion&#x201D; of a database? If my use of a database is restricted by sui generis database rights, how do I comply with the license? Artificial intelligence and CC licenses What are the limits on how CC-licensed works can be used in the development of new technologies, such as training of artificial intelligence software? But what about privacy laws, rules governing ethical research, and data protection laws? What attribution obligations exist when CC-licensed images are included in a published dataset? Is linking to the original image or URI required, and if so, is it adequate? If a for-profit company uses CC-licensed content under a Non Commercial license and releases the work under terms that allow only research purposes, is the NC restriction violated? If CC SA-licensed content is included in a database, does the entire database have to be licensed under an SA license? What, if any, remedies, do users have if they dislike how their photos or images have been reused? Notes These FAQs are designed to provide a better understanding of Creative Commons, our licenses, and our other legal and technical tools. They provide basic information, sometimes about fairly complex topics, and will often link to more detailed information. Other CC FAQs: CC0 Public Domain Dedication and Public Domain Mark . &#x201C;Licensor&#x201D;, &#x201C;rights holder&#x201D;, &#x201C;owner&#x201D;, and &#x201C;creator&#x201D; may be used interchangeably to refer to the person or entity applying a CC license. Information about the licenses is primarily made with reference to the 4.0 suite, but earlier license versions are mentioned where they differ. Have a question that isn&#x2019;t answered here? Contact info@creativecommons.org. Creative Commons does not provide legal advice. This FAQ is for informational purposes and is not a substitute for legal advice. It may not cover important issues that affect you. You should consult with your own lawyer if you have questions. About CC What is Creative Commons and what do you do? Creative Commons is a global nonprofit organization that enables sharing and reuse of creativity and knowledge through the provision of free legal tools. Our legal tools help those who want to encourage reuse of their works by offering them for use under generous, standardized terms; those who want to make creative uses of works; and those who want to benefit from this symbiosis. Our vision is to help others realize the full potential of the internet. CC has affiliates all over the world who help ensure our licenses work internationally and who raise awareness of our work. Although Creative Commons is best known for its licenses, our work extends beyond just providing copyright licenses. CC offers other legal and technical tools that also facilitate sharing and discovery of creative works, such as CC0 , a public domain dedication for rights holders who wish to put their work into the public domain before the expiration of copyright, and the Public Domain Mark , a tool for marking a work that is in the worldwide public domain. Creative Commons licenses and tools were designed specifically to work with the web, which makes content that is offered under their terms easy to search for, discover, and use. For more information about CC, our main website contains in-depth information about the organization , its staff and board of directors , its history , and its supporters . You can also read CC case studies to learn about some of the inspiring ways CC licenses and tools have been used to share works and support innovative business models. You can find regularly updated information about CC by visiting the blog . Is Creative Commons against copyright? Absolutely not. CC has responded to claims to the contrary . CC licenses are copyright licenses, and depend on the existence of copyright to work. CC licenses are legal tools that creators and other rights holders can use to offer certain usage rights to the public, while reserving other rights. Those who want to make their work available to the public for limited kinds of uses while preserving their copyright may want to consider using CC licenses. Others who want to reserve all of their rights under copyright law should not use CC licenses. That said, Creative Commons recognizes the need for change in copyright law, and many members of the Creative Commons community are active participants in the copyright reform movement. For more information, see our statement in support of copyright reform . What does &#x201C;Some Rights Reserved&#x201D; mean? Copyright grants to creators a bundle of exclusive rights over their creative works, which generally include, at a minimum, the right to reproduce, distribute, display, and make adaptations. The phrase &#x201C;All Rights Reserved&#x201D; is often used by owners to indicate that they reserve all of the rights granted to them under the law. When copyright expires, the work enters the public domain , and the rights holder can no longer stop others from engaging in those activities under copyright, with the exception of moral rights reserved to creators in some jurisdictions. Creative Commons licenses offer creators a spectrum of choices between retaining all rights and relinquishing all rights (public domain), an approach we call &#x201C;Some Rights Reserved.&#x201D; Can Creative Commons give legal advice about its licenses or other tools, or help with CC license enforcement? No.&#xA0;Creative Commons is not a law firm and does not provide legal advice or legal services. CC is similar to a self-help service that offers free, form-based legal documents for others to use. These FAQ answers many of the most common questions. There is also specialized information available on the following pages: Marking practices for creators Marking practices for reusers Data FAQ Differences between CC license versions Differences between jurisdiction ports of earlier license versions Public domain mark FAQ CC0 FAQ While CC does provide this informational guidance about its licenses and other tools, this information may not apply to your particular situation, and should never be taken as legal advice. If you&#x2019;re looking for legal advice about using CC licenses and other tools, we recommend contacting the Creative Commons affiliate in your jurisdiction . CC affiliates are highly connected to the communities of copyright lawyers in their countries. We also offer a list of lawyers and organizations who have identified themselves as willing to provide information to others about CC licensing issues. However, please note that CC does not provide referral services, and does not endorse or recommend any person on that list. Does Creative Commons collect or track material licensed under a CC license? No, CC does not collect content or track licensed material. However, CC builds technical tools that help the public search for and use works licensed under our licenses and other legal tools, and many others have built such tools as well. CC Search is one tool developed by CC to help the public discover works offered under Creative Commons licenses on the internet via CC-aware search engines and repositories. What do the Creative Commons buttons do? The CC buttons are a shorthand way to convey the basic permissions associated with material offered under CC licenses. Creators and owners who apply CC licenses to their material can download and apply those buttons to communicate to users the permissions granted in advance. When the material is offered online, the buttons should usually link out to the human-readable license deeds (which, in turn, link to the license itself). May I use the Creative Commons logo and buttons? You may download high resolution versions of the Creative Commons logos and use them in connection with your work or your website, provided you comply with our policies . Among other things, if you use the logos on a website or on your work, you may not alter the logos in any respect&#x2014;such as by changing the font, the proportions, or the colors. CC&#x2019;s buttons, name, and corporate logo (the &#x201C;CC&#x201D; in a circle) are trademarks of Creative Commons. You cannot use them in ways not permitted by our policies unless you first receive express, written permission. This means, for example, that you cannot (without our permission) print your own buttons and t-shirts using CC logos, although you can purchase them in CC&#x2019;s store . I love Creative Commons. How can I help? Please support CC by making a donation through our support page . Donations can be handled through PayPal or by credit card. You can also support CC by visiting our store . CC always welcomes your feedback, which you can provide by emailing &#x69;&#110;&#102;&#x6f;&#32;&#x61;&#116;&#32;&#x63;&#114;&#x65;&#x61;&#116;&#x69;&#118;&#x65;&#x63;&#x6f;&#x6d;&#x6d;&#x6f;&#110;&#x73;&#32;&#100;&#x6f;&#116;&#32;&#x6f;&#114;&#x67; . You can also participate in CC&#x2019;s email discussion lists and share feedback and ideas in one of those forums. If you are a software developer, sysadmin, or have other technical expertise, please join our developer community and help build the tools that build the commons. Finally, one of the best ways to support CC is by supporting our causes yourself. Follow our blog to find out about current issues where you can help get involved and spread the word, and advocate for free and open licensing in your own communities. Why does Creative Commons run an annual fundraising campaign? What is the money used for and where does it go? Creative Commons is a global nonprofit organization that enables sharing and reuse of creativity and knowledge through free legal tools, with affiliates all over the world who help ensure our licenses work internationally and raise awareness about our work. Our tools are free, and our reach is wide. In order to&#x2026; continue developing our licenses and public domain tools to make sure they are legally and technically up-to-date around the world, help creators implement these tools on websites through best practices and individual assistance, enable CC licensing on major content-sharing platforms, enhance CC-licensed resource search and discovery, advocate for CC licensing and open policies in education , science , and culture , and myriad other activities we&#x2019;re forgetting to mention, such as all the everyday boring but essential operations that go into running an organization &#x2026;we need $ to make it all happen! For more information, please take a look at our Annual Report . Creative Commons has always relied on the generosity of both individuals and organizations to fund its ongoing operations. It is essential we have the public&#x2019;s support because it is the creators and users of CC material who make our tools relevant in this digital age. They depend on the tools and services CC provides through their reuse and remix of the rich, open resources available on Wikipedia , Flickr , SoundCloud , Vimeo , Europeana , MIT OpenCourseWare , PLOS , Al Jazeera , and YouTube &#x2014;just to name a few. Many of these people donate $10, $25, or $50 to CC, to help keep it up and running so we can continue to provide our tools and services for free, as a nonprofit organization. The more people who donate to CC, the more independent it will remain. General License Information What are Creative Commons licenses? Creative Commons licenses provide an easy way to manage the copyright terms that attach automatically to all creative material under copyright . Our licenses allow that material to be shared and reused under terms that are flexible and legally sound. Creative Commons offers a core suite of six copyright licenses. Because there is no single &#x201C;Creative Commons license,&#x201D; it is important to identify which of the six licenses you are applying to your material, which of the six licenses has been applied to material that you intend to use, and in both cases the specific version. All of our licenses require that users provide attribution (BY) to the creator when the material is used and shared. Some licensors choose the BY license, which requires attribution to the creator as the only condition to reuse of the material. The other five licenses combine BY with one or more of three additional license elements: NonCommercial (NC), which prohibits commercial use of the material; NoDerivatives (ND), which prohibits the sharing of adaptations of the material; and ShareAlike (SA), which requires adaptations of the material be released under the same license. CC licenses may be applied to any type of work, including educational resources , music , photographs , databases , government and public sector information , and many other types of material . The only categories of works for which CC does not recommend its licenses are computer software and hardware. You should also not apply Creative Commons licenses to works that are no longer protected by copyright or are otherwise in the public domain . Instead, for those works in the worldwide public domain, we recommend that you mark them with the Public Domain Mark . How do CC licenses operate? CC licenses are operative only when applied to material in which a copyright exists, and even then only when a particular use would otherwise not be permitted by copyright. Note that the latest version of CC licenses also applies to rights similar to copyright, such as neighboring rights and sui generis database rights . Learn more about the scope of the licenses. This means that CC license terms and conditions are not triggered by uses permitted under any applicable exceptions and limitations to copyright , nor do license terms and conditions apply to elements of a licensed work that are in the public domain. This also means that CC licenses do not contractually impose restrictions on uses of a work where there is no underlying copyright. This feature (and others) distinguish CC licenses from some other open licenses like the ODbL and ODC-BY , both of which are intended to impose contractual conditions and restrictions on the reuse of databases in jurisdictions where there is no underlying copyright or sui generis database right. All CC licenses are non-exclusive: creators and owners can enter into additional, different licensing arrangements for the same material at any time (often referred to as &#x201C;dual-licensing&#x201D; or &#x201C;multi-licensing&#x201D;). However, CC licenses are not revocable once granted unless there has been a breach, and even then the license is terminated only for the breaching licensee. Please note that CC0 is not a license; it is a public domain dedication. When CC0 is applied to a work, copyright no longer applies to the work in most jurisdictions around the world. Therefore, references to dual licensing arrangements like the one above are inapplicable to CC0. There are also videos and comics that offer visual descriptions of how CC licenses work. Which is the latest version of the licenses offered by Creative Commons? In November 2013, Creative Commons published the version 4.0 license suite. These licenses are the most up-to-date licenses offered by CC, and are recommended over all prior versions. You can see how the licenses have been improved over time on the license versions page . 4.0 has been drafted to be internationally valid, and will have official translations becoming available after publication. Do Creative Commons licenses affect exceptions and limitations to copyright, such as fair dealing and fair use? No.&#xA0;By design, CC licenses do not reduce, limit, or restrict any rights under exceptions and limitations to copyright, such as fair use or fair dealing . If your use of CC-licensed material would otherwise be allowed because of an applicable exception or limitation, you do not need to rely on the CC license or comply with its terms and conditions. This is a fundamental principle of CC licensing. Who gives permission to use material offered under Creative Commons licenses? Our licenses and legal tools are intended for use by anyone who holds copyright in the material. This is often, but not always, the creator. Creative Commons offers licenses and tools to the public free of charge and does not require that creators or other rights holders register with CC in order to apply a CC license to a work. This means that CC does not have special knowledge of who uses the licenses and for what purposes, nor does CC have a way to contact creators beyond means generally available to the public. CC has no authority to grant permission on behalf of those persons, nor does CC manage those rights on behalf of others. If you would like to obtain additional permissions to use the work beyond those granted by the license that has been applied, or if you&#x2019;re not sure if your intended use is permitted by the license, you should contact the rights holder . Are Creative Commons licenses enforceable in a court of law? Creative Commons licenses are drafted to be enforceable around the world, and have been enforced in court in various jurisdictions. To CC&#x2019;s knowledge, the licenses have never been held unenforceable or invalid. CC licenses contain a &#x201C;severability&#x201D; clause. This allows a court to eliminate any provision determined to be unenforceable, and enforce the remaining provisions of the license. What happens if someone applies a Creative Commons license to my work without my knowledge or authorization? CC alerts prospective licensors they need to have all necessary rights before applying a CC license to a work. If that is not the case and someone has marked your work with a CC license without your authorization, you should contact that person and tell them to remove the license from your work. You may also wish to contact a lawyer. Creative Commons is not a law firm and cannot represent you or give you legal advice, but there are lawyers who have identified themselves as interested in representing people in CC-related matters . What are the international (&#x201C;unported&#x201D;) Creative Commons licenses, and why does CC offer &#x201C;ported&#x201D; licenses? One of CC&#x2019;s goals is ensuring that all of its legal tools work globally, so that anyone anywhere in the world can share their work on globally standard terms. To this end, CC offers a core suite of six international copyright licenses (formerly called the &#x201C;unported&#x201D;) that are drafted based largely on various international treaties governing copyright , taking into account as many jurisdiction-specific legal issues as possible. The latest version (4.0) has been drafted with particular attention to the needs of international enforceability. For version 3.0 and earlier, Creative Commons has also offered ported versions of its six core licenses for many jurisdictions (which usually correspond to countries, but not always). These ported licenses are based on the international license suite but have been modified to reflect local nuances in the expression of legal terms and conditions, drafting protocols, and language. The ported licenses and the international licenses are all intended to be legally effective everywhere. CC expects that few, if any, ports will be necessary for 4.0. CC recommends that you take advantage of the improvements in the 4.0 suite explained on the license versions page unless there are particular considerations you are aware of that would require a ported license. Can I include a work licensed with CC BY in a Wikipedia article even though they use a CC BY-SA license? Yes. Works licensed under CC BY may be incorporated into works that are licensed under CC BY-SA. For example, you may incorporate a CC BY photograph into a Wikipedia article so long as you keep all copyright notices intact, provide proper attribution, and otherwise comply with the terms of CC BY. Learn more about the licenses. Can governments and intergovernmental organizations (&#x201C;IGOs&#x201D;) use CC licenses? Yes, anyone may use CC licenses for material they own, including governments and IGOs, and these institutions frequently use CC licenses on their copyrightable material . The reasons for doing so vary, and often include a desire to maximize the impact and utility of works for educational and informational purposes, and to enhance transparency. Creative Commons licenses have desirable features that make them the preferred choice over custom licenses. CC licenses are standard and interoperable, which means material published by different creators using the same type of CC license can be translated, modified, compiled, and remixed without legal barriers depending on the particular license applied . Creative Commons licenses are also machine-readable, allowing CC-licensed works to be easily discovered via search engines such as Google. These features maximize distribution, reuse, and impact of works published by governments and IGOs. Though we encourage anyone to use version 4.0, which is internationally valid and may be used by individuals as well as organizations, there is an IGO ported version of 3.0 that IGOs may also use. Read more about how governments and IGOs use and leverage CC licenses and legal tools, considerations for using our licenses, and how they operate in the IGO context. Can children apply Creative Commons licenses to work they create? This issue depends largely on the laws in place where the child lives. In the United States, children can be copyright holders and are entitled to license their works in the same manner as adults. However, they may have the right to disaffirm certain types of legal agreements, including licenses. In many parts of the United States, for example, children have the ability to disaffirm some types of agreements under certain circumstances once they reach the age where they are considered adults within the relevant jurisdiction. We are unaware of any attempt by a licensor to exercise the disaffirmation right with respect to a CC license applied to a work. What are the official translations of the CC licenses and CC0? Official language translations will be available for the 4.0 licenses and CC0. When you license your own work, you may use or link to the text of any available official translation. When you reuse CC-licensed material, you may comply with the license conditions by referring to any available official translation of the license. These translations are linguistic translations of the English version which adhere as closely as possible to the original text. These translations have been done by our affiliates in accordance with the Legal Code Translation Policy and with the oversight and detailed review of the CC legal team. Note that these are equivalents of the original English; these translations are not jurisdiction ported versions . You may find a list of all available translations here . For versions 3.0 and earlier, official translations are not available. Some unofficial translations were made for informational purposes only. (Jurisdiction ported versions of version 3.0 and earlier were generally published in the official language(s) of the appropriate jurisdiction. However, the ported licenses are not equivalent to the international licenses, and do not serve as substitutable references for purposes of complying with the terms and conditions of the licenses.) What is a BY-SA Compatible License? A BY-SA Compatible License is a license officially designated by Creative Commons pursuant to the ShareAlike compatibility process . Once deemed a BY-SA Compatible License, you may use the license to publish your contributions to an adaptation of a BY-SA work. To see the list of BY-SA Compatible Licenses, click here . Learn more about ShareAlike compatibility here . For Licensors Choosing a license What things should I think about before I apply a Creative Commons license? Applying a Creative Commons license to your material is a serious decision. When you apply a CC license, you give permission to anyone to use your material for the full duration of applicable copyright and similar rights. CC has identified some things that you should consider before you apply a CC license, some of which relate to your ability to apply a CC license at all. Here are some highlights: Is the material copyrightable? If not, is it subject to neighboring rights or sui generis database rights ? CC licenses do not apply to material in the public domain . Different countries have different standards for what is in the public domain. Do you own the material you want to license? If not, are you otherwise authorized to license it under the specific CC license you are interested in using? You should not apply a license to material that you do not own or that you are not authorized to license. Are you aware that CC licenses are not revocable ? You are free to stop offering material under a CC license at any time, but this will not affect the rights associated with any copies of your work already in circulation. (Any particular licensee may lose his or her rights after violating the license, but this does not affect continual use of the work by other licensees.) Are you a member of a collecting society ? If you are, you should make sure that you are able to use CC licenses for your materials . Always read the terms and conditions of the specific license you plan to apply. Additionally, there are several terms that may differ in the earlier versions of the license , both unported and ported. If you choose to use a pre-4.0 version or any ported version , clauses such as choice of law may affect your desired choice of license. How should I decide which license to choose? If you are unsure which license best suits your needs, there are plenty of resources to help rights holders choose the right CC license. CC Australia has developed a flow chart that may be useful in helping you settle on the right license for your work. You can also read case studies of others who are using CC licenses. The CC community can also respond to questions, and may have already addressed issues you raise. The CC community email discussion lists and discussion archives may be useful resources. Finally, you may also want to consult with a lawyer to obtain advice on the best license for your needs. Why should I use the latest version of the Creative Commons licenses? The latest version of the Creative Commons licenses is version 4.0. You should always use the latest version of the Creative Commons licenses in order to take advantage of the many improvements described on the license versions page . In particular, 4.0 is meant to be better suited to international use, and use in many different contexts, including sharing data . What if CC licenses have not been ported to my jurisdiction? All CC licenses are intended to work worldwide. Unless you have a specific reason to use a ported license , we suggest you consider using one of the international licenses. 4.0 will support official translations of the international license for those who wish to use the licenses in another language. As of version 4.0, CC is discouraging ported versions, and has placed a hold on new porting projects following its publication until sometime in 2014. At that point, CC will reevaluate the necessity of porting in the future. Should I choose an international license or a ported license? We recommend that you use a version 4.0 international license. This is the most up-to-date version of our licenses, drafted after broad consultation with our global network of affiliates, and it has been written to be internationally valid. There are currently no ports of 4.0, and it is planned that few, if any, will be created. All of the ported licenses are at version 3.0 or earlier, which means licensors using those licenses do not have the benefit of the improvements made in the 4.0 license suite . But even before considering the improvements in 4.0, there are several reasons why the international licenses may be preferable for rights holders, even if the licenses have been ported to their jurisdiction. As an organization, CC itself licenses all of its own content under an international license because, among other reasons, the international licenses are essentially jurisdiction-neutral while remaining effective globally. The neutral nature of the international licenses appeals to many people and organizations, particularly for use in connection with global projects that transcend political borders. Finally, it is important to know that some of the ported licenses contain a choice of law provision, which may be undesirable for your needs. However, some rights holders still choose a license ported to their local jurisdiction because they believe their needs are not sufficiently met by the international licenses. If the licenses have been ported to your jurisdiction and you feel that the ported licenses better account for some aspect of local legislation, then you may wish to consider a ported license. You can use our jurisdiction database to compare international licenses and ports on these issues and others, such as whether a ported license contains a choice of law or forum selection clause. Why should I use the license chooser? What if I don&#x2019;t? Licensors are not required to use the CC license chooser or provide any information about themselves or their material when applying a CC license to their material. However, using the license chooser enables licensors to take advantage of the &#x201C;machine readable&#x201D; layer of CC licenses. Our machine-readable code enhances the discoverability of your work because that code allows software, search engines, and other tools to recognize when something is licensed under a CC license. The code also facilitates attribution: when users click on the CC button placed on your site, they will be linked directly to HTML code that they can cut and paste to provide attribution. How do I apply a Creative Commons license to my material? For online material : Select the license that is appropriate for your material from the CC license chooser and then follow the instructions to include the HTML code. The code will automatically generate a license button and a statement that your material is licensed under a CC license. If you are only licensing part of a work (for example, if you have created a video under a CC license but are using a song under a different license), be sure to clearly mark which parts are under the CC license and which parts are not. The HTML code will also include metadata, which allows the material to be discovered via Creative Commons-enabled search engines . For offline material : Identify which license you wish to apply to your work and either (a) mark your work with a statement such as, &#x201C;This work is licensed under the Creative Commons [insert description] License. To view a copy of the license, visit [insert url]&#x201D;; or (b) insert the applicable license buttons with the same statement and URL link. For third-party platforms : Many media platforms like Flickr , YouTube , and SoundCloud have built-in Creative Commons capabilities, letting users mark their material with a CC license through their account settings. The benefit of using this functionality is that it allows other people to find your content when searching on those platforms for CC-licensed material . If the platform where you&#x2019;re uploading your content does not support CC licensing, you can still identify your content as CC-licensed in the text description of your content. Legally, these three options are the same. The only difference between applying a CC license offline rather than online is that marking a work online with metadata will ensure that users will be able to find it through CC-enabled search engines. CC offers resources on the best practices for marking your material and on how to mark material in different media (.pdf) . Do I need to register with Creative Commons before I obtain a license? No.&#xA0;CC offers its licenses, code, and tools to the public free of charge, without obligation. You do not need to register with Creative Commons to apply a CC license to your material; it is legally valid as soon as you apply it to any material you have the legal right to license. CC does not require or provide any means for creators or other rights holders to register use of a CC license, nor does CC maintain a database of works distributed under Creative Commons licenses. CC also does not require registration of the work with a national copyright agency. What do the terms and conditions of a CC license apply to? Although CC licenses get attached to tangible works (such as photos and novels), the license terms and conditions apply to the licensor&#x2019;s copyright in the licensed material. The public is granted &#x201C;permission to exercise&#x201D; those rights in any medium or format . It is the expression that is protected by copyright and covered by the licenses, not any particular medium or format in which the expression is manifested. This means, for example, that a CC license applied to a digitized copy of a novel grants the public permission under copyright to use a print version of the same novel on the same terms and conditions (though you may have to purchase the print version from a bookstore). Can I apply a Creative Commons license to software? We recommend against using Creative Commons licenses for software. Instead, we strongly encourage you to use one of the very good software licenses which are already available. We recommend considering licenses listed as free by the Free Software Foundation and listed as &#x201C;open source&#x201D; by the Open Source Initiative . Unlike software-specific licenses, CC licenses do not contain specific terms about the distribution of source code, which is often important to ensuring the free reuse and modifiability of software. Many software licenses also address patent rights, which are important to software but may not be applicable to other copyrightable works. Additionally, our licenses are currently not compatible with the major software licenses, so it would be difficult to integrate CC-licensed work with other free software. Existing software licenses were designed specifically for use with software and offer a similar set of rights to the Creative Commons licenses. Version 4.0 of CC&#x2019;s Attribution-ShareAlike (BY-SA) license is one-way compatible with the GNU General Public License version 3.0 (GPLv3). This compatibility mechanism is designed for situations in which content is integrated into software code in a way that makes it difficult or impossible to distinguish the two. There are special considerations required before using this compatibility mechanism. Read more about it here . Also, the CC0 Public Domain Dedication is GPL-compatible and acceptable for software. For details, see the relevant CC0 FAQ entry . While we recommend against using a CC license on software itself, CC licenses may be used for software documentation, as well as for separate artistic elements such as game art or music. Can I apply a Creative Commons license to databases? Yes. CC licenses can be used on databases . In the 4.0 license suite, applicable sui generis database rights are licensed under the same license conditions as copyright. Many governments and others use CC licenses for data and databases. For more detailed information about how CC licenses apply to data and databases, visit our detailed Data FAQ . Could I use a CC license to share my logo or trademark? Creative Commons does not recommend using a CC license on a logo or trademark. While a logo or trademark can be covered by copyright laws in addition to trademark laws, the special purposes of trademarks make CC licenses an unsuitable mechanism for sharing them in most cases. Generally, logos and trademarks are used to identify the origin of a product or service, or to indicate that it meets a specific standard or quality. Allowing anyone to reuse or modify your logo or trademark as a matter of copyright could result in your inability to limit use of your logo or trademark selectively to accomplish those purposes. Applying a CC license to your trademarks and logos could even result in a loss of your trademark rights altogether. See below for more about how to license material that includes a trademark or logo. There are other ways to share your logos and trademarks widely while preserving your trademark rights. Establishing a trademark policy that grants permissions in advance for limited uses is one common alternative. Mozilla , Wikimedia , and Creative Commons have each published policies that accomplish the dual objectives of encouraging reuse and preserving trademark rights. May I apply a Creative Commons license to a work in the public domain? CC licenses should not be applied to works in the worldwide public domain . All CC licenses are clear that they do not have the effect of placing restrictions on material that would otherwise be unrestricted, and you cannot remove a work from the public domain by applying a CC license to it. If you want to dedicate your own work to the public domain before the expiration of applicable copyright or similar rights, use CC&#x2019;s legally robust public domain dedication . If a work is already in the worldwide public domain, you should mark it with CC&#x2019;s Public Domain Mark . Note that, in some cases, a work may be in the public domain under the copyright laws of some jurisdictions but not others. For example, U.S. government works are in the public domain under the copyright law of the United States, but may be protected by copyright laws in other jurisdictions. A CC license applied to such a work would be effective (and the license restrictions enforceable) in jurisdictions where copyright protection exists, but would not be operative if U.S. copyright law is determined to be the applicable law. Creators may also apply Creative Commons licenses to material they create that are adapted from public domain works, or to remixed material, databases, or collections that include work in the public domain. However, in each of these instances, the license does not affect parts of the work that are unrestricted by copyright or similar rights. We strongly encourage you to mark the public domain material , so that others know they are also free to use this material without legal restriction. If I take a photograph of another work that is in the public domain, can I apply a CC license to my photo? That depends. You can apply a CC license to your photograph if your photograph constitutes a work of original authorship, a question that varies by jurisdiction. As a general matter, your photograph must involve some creative choices, such as background setting, lighting, angle, or other mark of creativity. In the United States, an exact photographic copy of a public domain work is not subject to copyright because there is no originality (even if there is effort or &#x201C;sweat&#x201D; exerted in its creation). In practice, if your photograph is sufficiently creative to attract copyright protection, people will likely have to comply with the license conditions if they reproduce your entire photograph in verbatim form, absent some applicable exception or limitation such as fair use. However, they would not have to comply with the license conditions if they reproduce only those parts of the work in the public domain . This is because your copyright in the adaptation only extends to the material you contributed, not to the underlying work. May I apply a CC license to my work if it incorporates material used under fair use or another exception or limitation to copyright? Yes, but it is important to prominently mark any third party material you incorporate into your work so reusers do not think the CC license applies to that material. The CC license only applies to the rights you have in the work. For example, if your CC-licensed slide deck includes a Flickr image you are using pursuant to fair use, make sure to identify that image as not being subject to the CC license. For more information about incorporating work owned by others, see our page about marking third party content . Read more considerations for licensors here . Rights other than copyright Can I use CC licenses to license rights other than copyright? CC licenses are copyright licenses, but the latest version of CC licenses also cover certain other rights similar to cop
2026-01-13T09:29:56
https://www.cisco.com/site/us/en/about/purpose/fy24-report/index.html#svg-x
FY24 Purpose Report - Cisco Skip to main content Skip to search Skip to footer Cisco.com Worldwide Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Trials and demos How to buy Partners EN US Profile Log in Trials and demos MENU CLOSE How to buy Partners Profile Log in EN US Close Close Close Close Close Hello, how can I help? About Purpose Power an Inclusive Future for All FY24 Purpose Report Celebrating 40 Years of Impact Driven by our Purpose, we combine our technology, people, and broader networks to address society&#39;s greatest challenges. We share the progress we&#39;ve made in our annual report. FY24 Purpose Report (PDF) Overview Explore the Report Looking Ahead FY24 Purpose Report 40 Years of Impact We built the digital highways that have become the backbone for modern communication. Now, we’re harnessing the power of connection to build a better future for people, communities, and the planet. For 40 years, connection has been core to Cisco’s identity. At Cisco, we’re proud of how our products and services bridge gaps, enable collaboration, and drive sustainability in meaningful ways. We prove every day that running a successful business with a commitment to do good makes progress possible. Letter from the CEO Our Timeline of Impact 1984 Cisco Systems, Inc Developed by Sandy Lerner and Leonard Bosack with a team of colleagues at Stanford University, the multiprotocol router connected disparate computer networks, leading to Cisco’s founding. 1997 Cisco Networking Academy Launched to educate high school and college students on how to design, install, and maintain computer networks. 1997 Cisco Foundation Established to support programs that leverage the Internet to help people in need and drive positive change. 1998 Cisco Community Investment Report Published report detailing Cisco’s philanthropic and community investment efforts. 1999 NetAid Harnessed the Internet to raise US$830K to end global poverty. By live-streaming celebrated musicians across three locations, NetAid garnered 2.4M views across 80 countries and set a record for the largest Internet broadcast event for a single day. 2000 Habitat for Humanity Provided funding and volunteer support to build homes and wire houses for Internet access. 2005 Corporate Citizenship Report Made a formal commitment to transparency and accountability by publishing details on Cisco&#39;s Corporate Social Responsibility efforts. 2005 Crisis Response Deployed communications equipment to assist emergency personnel in the aftermath of Hurricane Katrina and formed a dedicated emergency response team. 2006 Goal to Reduce Emissions Set our first greenhouse gas emissions reduction goal. 2011 Veterans Program Established program to help transitioning U.S. military veterans and families find employment and educational opportunities. 2011 On-Campus Solar Energy Installed first solar energy project at Cisco&#39;s Research Triangle Park campus. 2012 Global Human Rights Policy Formalized our commitment to respect human rights for all people. 2014 Talos Formed to provide accurate, rapid, and actionable threat intelligence for Cisco customers, products, and services. 2015 Country Digital Acceleration Launched program to collaborate with government and private sector leaders in building sustainable, secure, and inclusive communities. 2016 White House Equal Pay Pledge Became a founding signer of the White House Equal Pay Pledge and committed to paying employees fairly and equitably. 2018 Homelessness Grant Announced a five-year, US$50M commitment to end homelessness in Santa Clara County. 2019 Global Citizen Announced a partnership with Global Citizen to power the movement to end extreme poverty. 2020 Community Enablement Commitment Transformed longstanding advocacy for community enablement into a global, company-wide commitment. 2020 COVID-19 Response Introduced $2.5B financing program to support customers and keep businesses running; donated US$50M in cash and personal protective equipment (PPE) to organizations supporting vulnerable citizens; and provided funding to deploy COVID-19-related technology solutions. 2021 Cisco Foundation Climate Commitment Committed US$100M over the next 10 years to address climate change. 2021 Net Zero Announced a goal to reach net-zero greenhouse gas emissions across our value chain by 2040. 2022 Responsible AI Launched our Responsible AI (RAI) Principles and RAI Framework to formalize our commitment to build safe and trustworthy AI. 2023 One Billion Lives Exceeded our goal—ahead of schedule—to positively impact one billion people globally from FY16-FY23 through Cisco Networking Academy and social innovation grants. 2024 40 Communities Announcing our next big ambition: over the next 10 years, we plan to engage, support, and invest in 40 communities around the globe. Previous Next Explore this year’s report View all Power Power We build and deliver technology that powers the world’s connectivity, whether that’s between computers, throughout communities, or across continents. And we do so with the highest standards of ethics and integrity in mind—for ourselves, for our customers and partners, and for their users. That’s the power, and importance, of connection. Explore the Power section  0 1600 Active, completed, or in-pipeline projects across 50 countries through Country Digital Acceleration 0 B 800 billion Security events observed each day by Cisco Talos, protecting the world against cyber threats 0 27 Languages available for stakeholders to use Cisco’s EthicsLine 0 % 99.9% Of employees completed our annual Code of Business Conduct certification Featured Stories Connectivity in the Amazon The first floating Networking Academy provides free WiFi within a 30-meter radius, offers IT training, and promotes digital inclusion for communities. Responsible Mineral Sourcing We joined the Initiative for Responsible Mining Assurance to support the visibility, accountability, and inclusion of rightsholders as decision-makers at all levels of the mineral supply chain. Show more Inclusive Inclusive We’re recognized as one of the world’s best workplaces, and we have an unrelenting focus on employee wellbeing, benefits, giving, and inclusion. We strive to create the best possible employee experience, because we know our greatest asset is our people. Explore the Inclusive section  0 % 86% Employees participated in community impact efforts through donations, volunteering, and more 0 720,000 Volunteer hours logged by employees Launched BridgeIT, a Cisco Enterprise Chat AI, to intelligently guide employees and help them work faster, safer, and smarter 0 31 Inclusive Communities with 335 chapters across 77 countries Featured Stories Native American Network Cisco’s Native American Network deployed 18 sovereign broadband access points on Zuni tribal lands in New Mexico to help close the digital divide. Wellbeing in Technology The &#34;WellNest&#34; on Webex pilot supports physical, mental, social, and financial wellbeing through an intuitive AI-powered platform. Show more Future Future Cisco has been committed to reducing its environmental impact for nearly two decades, but there’s more to be done as we work toward a regenerative future. Our sustainability strategy, the Plan for Possible, guides us as we build our products, accelerate clean energy access, support suppliers’ reduced environmental impacts, and foster climate resiliency in communities. Explore the Future section  0 % 96% Of electricity for Cisco facilities came from renewable sources 0 % 73% Reduction in Scope 1 and 2 emissions FY25 goal: 90% reduction 0 % 75% Of the waste generated at our facilities was diverted from landfill globally 0 % 96% Of new Cisco products and packaging incorporate Circular Design Principles FY25 goal: 100% meeting circular design criteria Featured Stories Connected Conservation Cisco donated Cisco Meraki routers to African Parks to help them harness reliable Internet technology. Cisco Refresh We provide a second life to our products and reduce waste through the Cisco Refresh program, and we provide discounts to businesses joining the circular economy. Show more For All For All Through our technology, our people, and our broader networks, we create solutions that help address the world’s most critical challenges—from the AI skills gap to social inequities to environmental crises. We continue to show up to create a better future for all, by all, with all stakeholders who share our vision. Explore the For All section 0 M 24 million Cisco Networking Academy students since 1997 0 &#43; 30 plus Natural disasters and humanitarian crises responded to by Cisco Crisis Response $ 0 M USD 35 million US dollars Approved to fund climate solutions through the Cisco Foundation since FY21 $ 0 B USD 1.5 billion US dollars In Title IV Federal Funding that we helped preserve for HBCUs since FY20 Featured Stories Women Rock-IT Women Rock-IT celebrated 10 years, and their annual International Girls in ICT day programming reached 1.2 million on social media. Impact in India Cisco partners with NGOs and government agencies in India to create technology-based solutions that support critical human needs. View all Looking Ahead To celebrate our 40th year, we’re looking ahead to our future with Splunk and how we can drive even greater success for our customers, partners, employees, and communities together. There’s no better way to celebrate our anniversary than setting our next big ambition to propel us into the future. Learn more from Chief People, Policy &amp; Purpose Officer Fran Katsoudas on what’s next for Cisco’s Purpose work. Explore “Looking Ahead” 40 Years of Impact Power an Inclusive Future for All Driven by our Purpose, we combine our technology, people, and broader networks to address society&#39;s greatest challenges. We share the progress we&#39;ve made in our annual report. FY24 Purpose Report (PDF) Purpose Reporting Hub Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Cookies / Do not sell or share my personal data Accessibility Trademarks Supply Chain Transparency Newsroom Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:56
https://snyk.io/es/glossaries/ai/
AI Cybersecurity Glossary | Machine Learning &amp; Security Key Terms | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API &amp; Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API &amp; Web - Todos los clientes Snyk API &amp; Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo AI Glossary Every AI security professional needs a trusted reference. Snyk’s AI glossary eliminates the uncertainty and equips you with the essential terms you need, from AI threats and defenses to operational frameworks.   AI security moves fast, our glossary keeps up—regularly updated to give you accurate, up-to-date definitions. Whether you’re assessing risks, evaluating safeguards, or designing secure AI systems, your definitional guide to AI security starts here. No results found A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Adversarial AI The use of malicious inputs or techniques to deceive, manipulate, or exploit AI models. In cybersecurity, adversarial AI can bypass defenses, cause misclassification, or degrade system performance. Adversarial AI Agentic AI An AI system capable of autonomous decision-making and taking actions to achieve defined goals without constant human intervention. In cybersecurity, agentic AI can automate complex defense or attack strategies. Agentic AI vs Generative AI AI agent A software entity powered by artificial intelligence that performs tasks on behalf of a user or system. AI agents in security contexts can monitor threats, respond to incidents, or execute automated workflows. AI Agents in Cybersecurity AI Attacks Cyberattacks enhanced or automated by AI to increase speed, scale, and sophistication, including adaptive phishing, automated exploitation, and evasion. AI attacks AI Bias In AI, bias refers to systemic errors that produce unfair outcomes. Fairness is the mitigation of these biases to ensure equitable and ethical AI performance. Bias in AI AI Bill of Rights A policy framework outlining principles to protect individuals from harmful AI use. It addresses privacy, discrimination, transparency, and accountability in AI systems. AI Bill of Rights AI Cloud Security The protection of AI workloads, models, and data hosted in cloud environments. It combines cloud security practices with AI-specific safeguards against data leakage, model theft, and adversarial attacks. AI Code Generation The automated creation of source code using AI models like LLMs. In cybersecurity, it speeds development but also requires security reviews to prevent vulnerabilities. AI Code Generations Benefits, Risks &amp; Tools AI Compliance The adherence of AI systems to relevant laws, regulations, and industry standards. In cybersecurity, this includes data protection, auditability, and governance frameworks for responsible AI use. AI Explainability The ability to interpret and understand how an AI model makes decisions. Essential for trust, compliance, and debugging in security systems. AI Fairness The principle of ensuring that AI systems produce unbiased and equitable outcomes across all user groups. In cybersecurity, AI fairness reduces the risk of discriminatory threat assessments or access controls, supporting compliance and ethical AI deployment. AI Inference The process of using a trained AI model to generate predictions, classifications, or responses based on new input data. In cybersecurity, inference powers real-time threat detection, anomaly identification, and automated decision-making without retraining the model. AI Inference AI Intrusion Unauthorized access, manipulation, or disruption of AI systems, models, or data pipelines. Can lead to compromised outputs, service outages, or exposure of sensitive information. AI Intrusion &amp; Anomaly Detection AI Jailbreaks A method to bypass an AI system’s safety constraints, enabling it to produce restricted or harmful outputs. A critical concern for AI security testing. AI Jailbreaking AI Model The algorithmic structure trained on data to perform tasks such as detection, classification, or generation. Security experts evaluate models for robustness and resistance to attacks. AI Red Teaming A proactive security exercise that simulates adversarial attacks against AI systems to identify vulnerabilities and improve resilience. AI Risk Assessment &amp; Management The process of identifying, evaluating, and mitigating risks related to AI systems. In cybersecurity, it covers model robustness, supply chain vulnerabilities, and compliance risks. AI Risk Assessment Strategies &amp; Tools AI Risk Management Best Practices AI SecOps The integration of AI into security operations to automate threat detection, incident response, and SOC workflows. Enhances speed and accuracy in cybersecurity defense. AI SecOps AI Security Guardrails Predefined safety and compliance boundaries that prevent AI from generating unsafe or unauthorized outputs. Essential in enterprise AI deployments. AI Security Guardrails with Snyk CLI MCP Server AI Threat Hunting The use of AI tools to proactively search for hidden cyber threats across networks and systems, often detecting patterns missed by human analysts.The use of AI tools to proactively search for hidden cyber threats across networks and systems, often detecting patterns missed by human analysts. AI Transparency The practice of making AI system operations, decision-making processes, and limitations understandable to stakeholders. In cybersecurity, transparency supports trust, auditing, and regulatory compliance. AI TRiSM Short for Trust, Risk, and Security Management in AI. A governance approach to ensure AI systems are safe, reliable, and compliant. AI TRiSM AI Trust The confidence stakeholders have in an AI system’s reliability, fairness, and security. Built through transparency, testing, and responsible use. AIBOMs (AI Bill of Materials) AI Bill of Materials. A detailed inventory of AI components, datasets, and dependencies. Helps track provenance and manage AI supply chain risks. AIBOMs AISPM (AI Security Posture Management) The continuous assessment and improvement of an organization’s AI-related security posture, including model governance and threat monitoring. AISPM AWS AI Security Amazon Web Services’ tools and frameworks for securing AI workloads, models, and data. Includes threat detection, compliance controls, and AI service protection. AI AWS Security Risks Chat Memory Manipulation A technique where an attacker or user alters an AI system’s stored conversation history to influence future responses or behaviors. It can be exploited to bypass safeguards, inject malicious instructions, or distort an AI agent’s decision-making Chat Memory Manipulation Chatbot An AI-powered conversational interface that interacts with users via text or voice. In cybersecurity, chatbots can automate support and incident triage. Compound AI Systems Integrated AI architectures combining multiple models or agents to perform complex tasks. In cybersecurity, they enable multi-layered defense strategies. Context Engineering The process of designing and structuring the context given to AI systems to optimize their outputs. Crucial for accurate cybersecurity automation. What is Context Engineering? Cryptojacking Unauthorized use of a system’s resources to mine cryptocurrency, often through malware or browser exploits. AI can both detect and be exploited for such attacks. How to Defend Against Cryptojacking Dark AI Malicious or unethical use of AI for cybercrime, espionage, or disinformation campaigns. Increasingly relevant in threat intelligence. Dark AI Data Exfiltration Unauthorized transfer of data from a system, often by malicious insiders or external attackers. AI can detect anomalies indicating exfiltration attempts. Data Exfiltration Strategies Data Mining The process of discovering patterns and insights from large datasets. In cybersecurity, data mining can reveal hidden threats or user behavior anomalies. Data Poisoning A cyberattack strategy that undermines AI model performance by deliberately corrupting datasets through injecting malicious data, mislabeling, or other means. Data Poisoning Attacks Data Security in AI The safeguarding of data used in AI systems across its lifecycle, including collection, storage, training, and inference. Protects against breaches, leaks, and data poisoning attacks. Data Quality in AI: Audits &amp; Best Practices AI Data Security Risks &amp; Best Practices Deep Learning A subset of machine learning using neural networks with many layers to model complex data patterns. Powers many AI-driven cybersecurity tools. Data Poisoning Attacks DSPM (Data Security Posture Management) The process of continuously monitoring and improving the security posture of sensitive data across systems and AI workloads. DSPM Explained Edge AI AI processing that is performed locally on devices rather than in the cloud, reducing latency and enhancing data privacy in cybersecurity applications. ETL (Extract, Transform, Load) A data integration process that collects, cleans, and moves data into storage or analytics systems. Vital for preparing AI security datasets. Evals Short for evaluations, these are systematic tests to measure AI system performance, safety, and reliability under varied scenarios. Explainability The ability to interpret and understand how an AI model makes decisions. Essential for trust, compliance, and debugging in security systems. Fine Tuning The process of adapting a pre-trained AI model to a specific task or domain. In security, fine-tuning improves detection accuracy for targeted threats. Generative AI AI models that create new content, such as text, code, or images. Cybersecurity uses include threat simulation and automated phishing generation. Generative AI vs Predictive AI Generative AI vs Agentic AI GRC (Governance, Risk &amp; Compliance) A framework for managing an organization’s governance, risk management, and regulatory compliance, now extended to AI systems. Hallucinations When an AI model generates false or misleading outputs that appear plausible. In security, hallucinations can lead to misinformation or faulty automation. AI Hallucinations Human-in-the-loop This term refers to human involvement in machine learning processes and AI workflows. Human experts provide insights, expertise, and judgment to Human in the Loop Hybrid AI Combines multiple AI approaches—such as symbolic reasoning and machine learning—for better accuracy and adaptability in cybersecurity. IDP (internal Developer Portal) A centralized hub for developers to access tools, documentation, and services. In security, it ensures controlled access to AI development resources. LangChain An AI framework for building applications powered by large language models with memory, chaining, and context control capabilities. LLM (Large Language Model) A machine learning model trained on massive datasets to understand and generate human-like text. Used in code generation, analysis, and chatbots. LLMJacking The unauthorized hijacking or exploitation of large language models, often to inject malicious prompts, steal intellectual property, or manipulate outputs for cyberattacks. What is LLMJacking LLMOps The operational discipline of deploying, monitoring, and maintaining large language models in production environments. LLMOps MCP (Model Context Protocol) The Model Context Protocol is an open standard that allows developers to create secure, bidirectional connections between AI-powered tools and their data sources. MCP in AI MITRE ATLAS The MITRE Adversarial Threat Landscape for Artificial-Intelligence Systems, a knowledge base of adversary tactics, techniques, and case studies for AI systems. Guides security teams in defending AI assets. ML (Machine Learning) A subset of AI that uses algorithms to learn from data and make predictions or decisions without explicit programming. MLOps Practices for managing the lifecycle of machine learning models, from training to deployment, ensuring reliability and scalability. MLSecOps The integration of machine learning, security, and operations practices to safeguard AI systems throughout their lifecycle. Model Theft The unauthorized extraction or replication of a proprietary AI model, often for competitive or malicious purposes. Model Theft in AI Neural Network A computational model inspired by the human brain, used in deep learning to process complex data relationships. NLP (Natural Language Processing) AI techniques that allow computers to understand, interpret, and generate human language. Used in chatbots, threat detection, and intelligence gathering. Non-Deterministic AI AI systems whose outputs can vary for the same input due to probabilistic processes, requiring special handling in security contexts. Securing Non-Deterministic Gen AI Package Hallucinations When an AI system fabricates the existence of software packages or components, leading to potential supply chain risks. Package Hallucinations Pervasive AI The integration of AI capabilities across all aspects of an organization’s operations, tools, and infrastructure. In cybersecurity, pervasive AI enables continuous, automated defense at scale. Predictive AI AI systems designed to forecast outcomes or behaviors based on historical data patterns. Used in threat prediction and risk assessment. Predictive AI vs Generative AI Prompt Engineering The practice of crafting effective prompts to guide AI model outputs, optimizing performance for security use cases. Prompt Engineering: A Practical Guide Promt Injection A malicious attempt to manipulate an AI system’s behavior by embedding harmful instructions into input prompts. Prompt injection Techniques, Challenges &amp; Risks RAG (Retrieval-Augmented Generation) An AI approach that combines language generation with external knowledge retrieval for more accurate and context-rich answers. What is RAG and how to Secure It RAG vs CAG: Key Differences Reinforcement Learning A machine learning approach where an agent learns through trial and error by receiving rewards or penalties, and its goal is to learn a strategy to maximize its cumulative reward over time without explicit instructions or labeled data Responsible AI The development and deployment of AI systems that are ethical, fair, transparent, and secure. In cybersecurity, responsible AI practices reduce bias, ensure compliance, and minimize misuse risks. Responsible AI Key Principles &amp; Best Practices Shadow AI The unapproved use of AI tools and models within an organization, creating compliance and security risks. Preventing Shadow AI Slopsquatting The malicious registration of packages with names similar to legitimate ones to trick developers into installing them. Tool Poisoning A type of data or model attack where malicious inputs are inserted into AI tools or datasets to manipulate behavior or outcomes. It compromises the reliability of AI systems over time. Training Data The dataset used to teach an AI model how to perform a task. In security, its quality directly impacts detection accuracy. Vibe coding A new approach to software development where developers create code through AI-powered platforms simply by describing desired outcomes in natural language, without requiring manual coding or prior programming knowledge. Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:56
https://ai.google.dev/api/models#body.ListModelsResponse.SCHEMA_REPRESENTATION
Models &nbsp;|&nbsp; Gemini API &nbsp;|&nbsp; Google AI for Developers Skip to main content / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 Get API key Cookbook Community Sign in Docs API reference Gemini API Docs API reference Get API key Cookbook Community Overview API versions Capabilities Models Generating content Live API Live Music API Interactions API Tokens Files Batch API Caching Embeddings File search File search stores Document All methods Deprecated PaLM (decomissioned) SDK references Python Go TypeScript Java C# Home Gemini API API reference Send feedback Models The models endpoint provides a way for you to programmatically list the available models, and retrieve extended metadata such as supported functionality and context window sizing. Read more in the Models guide . Method: models.get Endpoint Path parameters Request body Response body Authorization scopes Example request Get Gets information about a specific Model such as its version number, token limits, parameters and other metadata. Refer to the Gemini models guide for detailed model information. Endpoint get https: / /generativelanguage.googleapis.com /v1beta /{name=models /*} Path parameters name string Required. The resource name of the model. This name should match a model name returned by the models.list method. Format: models/{model} It takes the form models/{model} . Request body The request body must be empty. Example request Python from google import genai client = genai . Client () model_info = client . models . get ( model = "gemini-2.0-flash" ) print ( model_info ) models . py Go ctx := context . Background () client , err := genai . NewClient ( ctx , &amp; genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } modelInfo , err := client . Models . Get ( ctx , "gemini-2.0-flash" , nil ) if err != nil { log . Fatal ( err ) } fmt . Println ( modelInfo ) models . go Shell curl https://generativelanguage.googleapis.com/v1beta/models/gemini-2.0-flash?key = $GEMINI_API_KEY models .sh Response body If successful, the response body contains an instance of Model . Method: models.list Endpoint Query parameters Request body Response body JSON representation Authorization scopes Example request List Lists the Model s available through the Gemini API. Endpoint get https: / /generativelanguage.googleapis.com /v1beta /models Query parameters pageSize integer The maximum number of Models to return (per page). If unspecified, 50 models will be returned per page. This method returns at most 1000 models per page, even if you pass a larger pageSize. pageToken string A page token, received from a previous models.list call. Provide the pageToken returned by one request as an argument to the next request to retrieve the next page. When paginating, all other parameters provided to models.list must match the call that provided the page token. Request body The request body must be empty. Example request Python from google import genai client = genai . Client () print ( "List of models that support generateContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "generateContent" : print ( m . name ) print ( "List of models that support embedContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "embedContent" : print ( m . name ) models . py Go ctx := context . Background () client , err := genai . NewClient ( ctx , &amp; genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } // Retrieve the list of models. models , err := client . Models . List ( ctx , &amp; genai . ListModelsConfig {}) if err != nil { log . Fatal ( err ) } fmt . Println ( "List of models that support generateContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "generateContent" { fmt . Println ( m . Name ) break } } } fmt . Println ( "\nList of models that support embedContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "embedContent" { fmt . Println ( m . Name ) break } } } models . go Shell curl https://generativelanguage.googleapis.com/v1beta/models?key = $GEMINI_API_KEY models .sh Response body Response from ListModel containing a paginated list of Models. If successful, the response body contains data with the following structure: Fields models[] object ( Model ) The returned Models. nextPageToken string A token, which can be sent as pageToken to retrieve the next page. If this field is omitted, there are no more pages. JSON representation { "models" : [ { object ( Model ) } ] , "nextPageToken" : string } REST Resource: models Resource: Model JSON representation Methods Resource: Model Information about a Generative Language Model. Fields name string Required. The resource name of the Model . Refer to Model variants for all allowed values. Format: models/{model} with a {model} naming convention of: "{baseModelId}-{version}" Examples: models/gemini-1.5-flash-001 baseModelId string Required. The name of the base model, pass this to the generation request. Examples: gemini-1.5-flash version string Required. The version number of the model. This represents the major version ( 1.0 or 1.5 ) displayName string The human-readable name of the model. E.g. "Gemini 1.5 Flash". The name can be up to 128 characters long and can consist of any UTF-8 characters. description string A short description of the model. inputTokenLimit integer Maximum number of input tokens allowed for this model. outputTokenLimit integer Maximum number of output tokens available for this model. supportedGenerationMethods[] string The model's supported generation methods. The corresponding API method names are defined as Pascal case strings, such as generateMessage and generateContent . thinking boolean Whether the model supports thinking. temperature number Controls the randomness of the output. Values can range over [0.0,maxTemperature] , inclusive. A higher value will produce responses that are more varied, while a value closer to 0.0 will typically result in less surprising responses from the model. This value specifies default to be used by the backend while making the call to the model. maxTemperature number The maximum temperature this model can use. topP number For Nucleus sampling . Nucleus sampling considers the smallest set of tokens whose probability sum is at least topP . This value specifies default to be used by the backend while making the call to the model. topK integer For Top-k sampling. Top-k sampling considers the set of topK most probable tokens. This value specifies default to be used by the backend while making the call to the model. If empty, indicates the model doesn't use top-k sampling, and topK isn't allowed as a generation parameter. JSON representation { "name" : string , "baseModelId" : string , "version" : string , "displayName" : string , "description" : string , "inputTokenLimit" : integer , "outputTokenLimit" : integer , "supportedGenerationMethods" : [ string ] , "thinking" : boolean , "temperature" : number , "maxTemperature" : number , "topP" : number , "topK" : integer } Method: models.predict Endpoint Path parameters Request body JSON representation Response body JSON representation Authorization scopes Performs a prediction request. Endpoint post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predict Path parameters model string Required. The name of the model for prediction. Format: name=models/{model} . It takes the form models/{model} . Request body The request body contains data with the following structure: Fields instances[] value ( Value format) Required. The instances that are the input to the prediction call. parameters value ( Value format) Optional. The parameters that govern the prediction call. Response body Response message for [PredictionService.Predict]. If successful, the response body contains data with the following structure: Fields predictions[] value ( Value format) The outputs of the prediction call. JSON representation { "predictions" : [ value ] } Method: models.predictLongRunning Endpoint Path parameters Request body JSON representation Response body Authorization scopes Same as models.predict but returns an LRO. Endpoint post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predictLongRunning Path parameters model string Required. The name of the model for prediction. Format: name=models/{model} . Request body The request body contains data with the following structure: Fields instances[] value ( Value format) Required. The instances that are the input to the prediction call. parameters value ( Value format) Optional. The parameters that govern the prediction call. Response body If successful, the response body contains an instance of Operation . Send feedback Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License , and code samples are licensed under the Apache 2.0 License . For details, see the Google Developers Site Policies . Java is a registered trademark of Oracle and/or its affiliates. Last updated 2025-10-30 UTC. Need to tell us more? [[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-10-30 UTC."],[],[]] Terms Privacy Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:56
https://www.cisco.com/site/th/th/about/sitemap.html
แผนผังเว็บไซต์ - Cisco Skip to main content Skip to search Skip to footer Cisco.com ประเทศไทย ผลิตภัณฑ์และบริการ Close โซลูชัน Close การสนับสนุน Close เรียนรู้ Close เหตุผลที่เลือก CISCO Close บริษัทคู่ค้า Close สำรวจ Cisco วิธีซื้อ บริษัทคู่ค้า TH TH เข้าสู่ระบบ สำรวจ Cisco ค้นหา เมนู ปิด วิธีซื้อ บริษัทคู่ค้า เข้าสู่ระบบ TH TH Close Close Close Close Close สวัสดี มีอะไรให้ฉันช่วยไหม แผนผังเว็บไซต์ ลิงก์ยอดนิยม ใบรับรองวิชาชีพ โอกาสด้านอาชีพ กรณีศึกษาและเรื่องราวของลูกค้า Cisco Commerce ชุมชน ติดต่อเรา Networking Academy การเข้าสู่ระบบบริษัทคู่ค้า หน้าหลักของผลิตภัณฑ์ ศูนย์ความเชื่อมั่น แสดงเพิ่มเติม เกี่ยวกับ Cisco บริษัท ภาพรวม ห้องข่าว ความเป็นผู้นำ วัตถุประสงค์และความยั่งยืน โอกาสด้านอาชีพ ศูนย์ความเชื่อมั่น ติดต่อเรา นักลงทุนสัมพันธ์ หล้าหลักของนักลงทุนสัมพันธ์ รายงานประจำปี ผลประกอบการ ข้อมูลหุ้น นักวิเคราะห์สัมพันธ์ มีส่วนร่วมกับเรา ชุมชน Cisco Cisco Insider Cisco Research Cisco Store Cisco Talos แผนผังอินเทอร์เน็ตหลุด (ThousandEyes) Outshift by Cisco แสดงเพิ่มเติม ผลิตภัณฑ์ ผลิตภัณฑ์ที่แนะนำ Cisco AI Defense แพลตฟอร์ม Cisco Intersight Cisco Networking Cloud Cisco Secure Client (รวมถึง AnyConnect) Cisco Secure Firewall Cisco Webex Suite ศูนย์ข้อมูลและระบบเครือข่ายระบบคลาวด์ สวิตช์ เราเตอร์และอุปกรณ์ SD-WAN ระบบไร้สาย ผลิตภัณฑ์ทั้งหมด หน้าหลักของผลิตภัณฑ์ ผลิตภัณฑ์ A-Z การทำงานร่วมกัน การประมวลผล ระบบเครือข่าย การรักษาความปลอดภัย Splunk AppDynamics ซอฟต์แวร์ การดาวน์โหลดแอปมือถือ แหล่งข้อมูล กรณีศึกษาและเรื่องราวของลูกค้า Cisco Power Calculator Cisco Validated การปฏิบัติตาม การสาธิต dCloud, การฝึกอบรม และแซนด์บ็อกซ์ ผลิตภัณฑ์ที่สิ้นสุดการขายและสิ้นสุดอายุ ภาพรวม การสาธิต และการสอนใช้งาน การทดลองใช้และการสาธิต Visio Stencil การรับประกัน แสดงเพิ่มเติม โซลูชัน โซลูชันที่แนะนำ ปัญญาประดิษฐ์ Cisco on Cisco Secure Access Services Edge (SASE) ผู้ให้บริการ ธุรกิจขนาดเล็กและขนาดกลาง อาคารอัจฉริยะ Zero Trust Access จาก Cisco โซลูชันทั้งหมด หน้าแรกของโซลูชัน การทำงานร่วมกัน การประมวลผล ระบบเครือข่าย การรักษาความปลอดภัย โซลูชันสำหรับกลุ่มธุรกิจ ตัวสำรวจพอร์ตโฟลิโอกลุ่มธุรกิจ เมืองและชุมชน การศึกษา บริการทางการเงิน ภาครัฐ บริการดูแลสุขภาพ การผลิต การเก็บข้อมูล น้ำมันและก๊าซ การค้าปลีก กีฬา สื่อ และความบันเทิง การคมนาคม อรรถประโยชน์ แสดงเพิ่มเติม บริการ บริการที่แนะนำ บริการขั้นสูง Cisco Lifecycle Services Smart Net Total Care การสนับสนุนด้านซอฟต์แวร์ การสนับสนุนโซลูชัน เส้นทางความสำเร็จ บริการทั้งหมด หน้าหลักของบริการ การทำงานร่วมกัน การประมวลผล ระบบเครือข่าย ความสามารถในการสังเกต (Splunk) การรักษาความปลอดภัย กรณีการใช้งาน ศูนย์ข้อมูลสมัยใหม่ แสดงเพิ่มเติม การสนับสนุน สำหรับผลิตภัณฑ์ ผลิตภัณฑ์ทั้งหมด การดาวน์โหลดซอฟต์แวร์ทั้งหมด อุปกรณ์ปลายทางสำหรับการประสานการทำงานร่วมกันและโทรศัพท์ เราเตอร์ การรักษาความปลอดภัย สวิตช์ ระบบการสื่อสารแบบครบวงจร ระบบไร้สาย ติดต่อฝ่ายสนับสนุน ชุมชน ฝ่ายสนับสนุนเรื่องใบอนุญาต พอร์ทัลการส่งคืน (RMA) ผู้จัดการกรณีศึกษาด้านการสนับสนุน การสนับสนุนสำหรับการพัฒนาทักษะ หมายเลขโทรศัพท์สำหรับธุรกิจขนาดเล็ก หมายเลขโทรศัพท์อื่นๆ (ทั่วโลก) เครื่องมือและแหล่งข้อมูล การให้คำปรึกษาเกี่ยวกับการรักษาความปลอดภัย การแจ้งเตือนไปยังไซต์งาน อุปกรณ์ของฉัน การแจ้งเตือนของฉัน เครื่องมือค้นหาจุดบกพร่อง การหาข้อมูลซอฟต์แวร์ เครื่องมือตรวจสอบความคุ้มครองอุปกรณ์ เครื่องมือสนับสนุนทั้งหมด แสดงเพิ่มเติม เรียนรู้ การเรียนรู้ที่ Cisco ใบรับรองวิชาชีพ การสอบใบรับรอง Cisco Learning Network Cisco Networking Academy Cisco U. DevNet Packet Tracer (การจำลองเครือข่าย) การฝึกอบรมและใบรับรองทั้งหมด กิจกรรมและการสัมมนาออนไลน์ หน้าหลักของกิจกรรม ปฏิทินกิจกรรม Cisco Live การสัมมนาทางเว็บด้านโซลูชัน การสัมมนาทางเว็บด้านเทคโนโลยี หัวข้อด้านเทคโนโลยี การรักษาความปลอดภัยของแอปพลิเคชัน AI วิธีติดตั้งเราเตอร์ วิธีติดตั้งสวิตช์เครือข่าย การรักษาความปลอดภัยทางไซเบอร์คืออะไร ศูนย์ข้อมูลคืออะไร ไฟร์วอลล์คืออะไร LAN คืออะไร Wi-Fi 7 คืออะไร หัวข้อด้านเทคโนโลยีทั้งหมด แสดงเพิ่มเติม วิธีสั่งซื้อ การสั่งซื้อจาก Cisco ศูนย์รวมวิธีสั่งซื้อ การจัดหาเงินทุนของ Cisco Capital Cisco Refresh (อุปกรณ์เทียบเท่า) กำหนดเวลาการโทร เริ่มแชท การสั่งซื้อผ่านตัวแทนจำหน่ายหรือทางออนไลน์ พบปะกับบริษัทคู่ค้าของเรา รหัสที่ตั้งของตัวแทนจำหน่าย การสั่งซื้อบริการและการจัดการสัญญา ธุรกิจขนาดเล็กและขนาดกลาง การให้สิทธิ์การใช้งาน Enterprise Agreement Licensing Hub Software Central แสดงเพิ่มเติม บริษัทคู่ค้า Cisco Partner Program ร่วมเป็นบริษัทคู่ค้า รางวัลจูงใจสำหรับบริษัทคู่ค้า ความเชี่ยวชาญสำหรับบริษัทคู่ค้า เครื่องมือและแหล่งข้อมูลสำหรับบริษัทคู่ค้า Cisco Commerce Cisco Partner Summit โปรไฟล์ของฉัน ข้อคิดเห็นของบริษัทคู่ค้า การฝึกอบรมบริษัทคู่ค้า SalesConnect เครื่องมือและแหล่งข้อมูลเพิ่มเติมสำหรับบริษัทคู่ค้า การสนับสนุนคู่ค้า การสนับสนุนก่อนการขาย ผู้จัดการกรณีศึกษาด้านการสนับสนุน ช่องทางการสนับสนุนคู่ค้าทั้งหมด แสดงเพิ่มเติม ลิงก์ด่วน เกี่ยวกับ Cisco ติดต่อเรา อาชีพ เชื่อมต่อกับคู่ค้า แหล่งข้อมูลและฝ่ายกฎหมาย ความคิดเห็น วิธีใช้ ข้อกำหนดและเงื่อนไข คำชี้แจงสิทธิ์ส่วนบุคคล คุกกี้ เครื่องหมายการค้า ความโปร่งใสของห่วงโซ่อุปทาน แผนผังเว็บไซต์ &copy; Cisco Systems, Inc.
2026-01-13T09:29:56
https://akismet.com/developers/detailed-docs/errors/akismet-error-10003/
Akismet Error #10003 &#8211; Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Getting started Plugins and libraries Detailed docs Building your application Key verification Comment check Submit spam (missed&nbsp;spam) Submit ham (false&nbsp;positives) Key/sites activity Usage limit Response error codes Akismet Error #10001 Akismet Error #10003 Akismet Error #10402 Akismet Error #10011 Akismet Error #10010 Akismet Error #10009 Akismet Error #10006 Akismet Error #10005 Akismet Error #10404 Akismet Error #10403 Akismet Error #30001 Akismet Error #10003 Subscription Upgrade Required Akismet Error #10003 Why am I receiving this error? A Personal subscription is not appropriate for your current usage (multiple commercial sites). Which plan should I choose? If you need to use Akismet on 10 or more commercial sites, you can choose the Enterprise subscription ($50/month or $500/year), which will cover an unlimited number of sites. Otherwise,&nbsp; check out our plans page &nbsp;for the subscription that fits you best. What if an agency or studio set everything up? You can contact the folks who helped you get up and running, and let them know that their Akismet API key needs to be upgraded. Or &#8211; simply choose to&nbsp; register you own subscription &nbsp;and activate the Akismet plugin using your new API key. Can I just de-activate Akismet? Yes. If you are currently using our WordPress plugin, go to the Plugins menu in your dashboard and click on the “Deactivate” link found directly under “Akismet.” If you happen to be using a different client, please refer to its documentation regarding deactivation. Note that your site(s) will then be left unprotected from spam, which is not recommended. Can we help with anything else? I need to update my credit card. I forgot my API key. I need to reset my password. I need to cancel my subscription. Priority support Want to get help even faster? Don&#8217;t forget that our Pro subscription includes priority email support. Related Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:56