url
stringlengths
11
2.25k
text
stringlengths
88
50k
ts
timestamp[s]date
2026-01-13 08:47:33
2026-01-13 09:30:40
https://www.cisco.com/site/ph/en/about/sitemap.html
Sitemap - Cisco Skip to main content Skip to search Skip to footer Cisco.com Philippines Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Explore Cisco How to buy Partners EN PH Log in Explore Cisco Search MENU CLOSE How to buy Partners Log in EN PH Close Close Close Close Close Hello, how can I help? Sitemap Popular links Career certifications Career opportunities Case studies and customer stories Cisco Commerce Community Contact us Networking Academy Partner login Products home The Trust Center Show more About Cisco Company Overview Newsroom Leadership Purpose and sustainability Career opportunities The Trust Center Contact us Investor relations Investor relations home Annual reports Financial results Stock information Analyst relations Engage with us Cisco Community Cisco Insider Cisco Research Cisco Store Cisco Talos Internet outages map (ThousandEyes) Outshift by Cisco Show more Products Featured products Cisco AI Defense Cisco Intersight platform Cisco Networking Cloud Cisco Secure Client (including AnyConnect) Cisco Secure Firewall Cisco Webex Suite Data center and cloud networking Switches Routers and SD-WAN appliances Wireless All products Products home Products A-Z Collaboration Computing Networking Security Splunk AppDynamics Software Mobile app downloads Resources Case studies and customer stories Cisco Power Calculator Cisco Validated Compliance dCloud demos, training, and sandboxes End-of-sale and end-of-life products Overviews, demos, and tutorials Trials and demos Visio stencils Warranties Show more Solutions Featured solutions Artificial intelligence Cisco on Cisco Secure access service edge (SASE) Service providers Small and medium businesses Smart buildings Zero Trust Access from Cisco All solutions Solutions home Collaboration Computing Networking Security Industry solutions Industry Portfolio Explorer Cities and communities Education Financial services Government Healthcare Manufacturing Mining Oil and gas Retail Sports, media, and entertainment Transportation Utilities Show more Services Featured services Advanced services Cisco Lifecycle Services Smart Net Total Care Software Support Solution Support Success Tracks All services Services home Collaboration Computing Networking Observability (Splunk) Security Use cases Modern data center Show more Support For products All products All software downloads Collaboration endpoints and phones Routers Security Switches Unified Communications Wireless Contact Support Community Licensing support Returns portal (RMAs) Support Case Manager Support for acquisitions Small business phone numbers Other phone numbers (worldwide) Tools and resources Security advisories Field notices My Devices My Notifications Bug Search Tool Software research Device coverage checker All Support tools Show more Learn Learning at Cisco Career certifications Certification exams Cisco Learning Network Cisco Networking Academy Cisco U. DevNet Packet Tracer (network simulation) All training and certifications Events and webinars Events home Events calendar Cisco Live Solution webinars Technology webinars Technology topics AI application security How to set up a router How to set up a network switch What is cybersecurity? What is a data center? What is a firewall? What is a LAN? What is Wi-Fi 7? All technology topics Show more How to buy Buying from Cisco How-to-buy hub Cisco Capital financing Cisco Refresh (remanufactured equipment) Schedule a call Start a chat Buying through resellers or online Meet our partners Reseller locator Service ordering and contract management Small and medium business Licensing Enterprise Agreement Licensing Hub Software central Show more Partners Cisco Partner Program Becoming a partner Partner incentives Partner specializations Partner tools and resources Cisco Commerce Cisco Partner Summit My Profile Partner feedback Partner training SalesConnect More partner tools and resources Partner support Presales support Support Case Manager All partner support options Show more Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms & Conditions Privacy Statement Cookies Trademarks Supply Chain Transparency Sitemap © Cisco Systems, Inc.
2026-01-13T09:29:56
https://www.cisco.com/c/cs_cz/index.html
Infrastruktura, zabezpečené sítě a softwarová řešení využívající umělou inteligenci - Cisco Skip to main content Skip to search Skip to footer Cisco.com Česká republika Produkty a služby Close Řešení Close Podpora Close Vzdělávání Close Proč Cisco Close Partneři Close Objevte produkty Cisco Jak nakupovat Partneři CS CZ Přihlásit se Objevte produkty Cisco Vyhledat NABÍDKA ZAVŘÍT Jak nakupovat Partneři Přihlásit se CS CZ Close Close Close Close Close Amsterdam | 9.–13. února Podpořte svou kariéru Pět dní učení, objevování, navazování kontaktů a inspirace Zaregistrovat hned teď Stažení Certifikace Cisco Validated Školení Komunita Podpora Nejnovější produkty a inovace společnosti Cisco Získejte datové centrum s podporou umělé inteligence Rozdělte své pracovní zatížení, chraňte zranitelné body a řešte nejdůležitější výzvy týkající se kyberbezpečnosti – to vše s novou přelomovou architekturou s nativní umělou inteligencí Cisco Hypershield. Prozkoumat řešení Cisco Hypershield Představujeme řešení Cisco AI Defense Řešení Cisco AI Defense chrání vývoj a používání aplikací s umělou inteligencí, aby společnosti mohly s jistotou rozvíjet své iniciativy na tomto poli. Prozkoumat řešení AI Defense Řešení Cisco Nexus Hyperfabric Jednoduše navrhujte, sestavujte a spravujte síťové prvky kdekoliv. Prozkoumat řešení Cisco Nexus Hyperfabric Show more Procházet podle technologie Sítě Zabezpečení Přehlednost Spolupráce Výpočetní systémy Umělá inteligence Zobrazit všechny produkty Proč v éře AI zvolit Cisco? Jak to chodí ve společnosti Cisco Další novinky Další události Síla našeho poslání S cílem naplnit naše poslání kombinujeme naše technologie, pracovníky a širší sítě, abychom překonávali největší výzvy celé společnosti. Další informace Výroční zpráva Naše zcela první zpráva State of AI Security obsahuje klíčové milníky, trendy a predikce týkající se bezpečnosti umělé inteligence. Zobrazit zprávu Výzkumná studie Jak IT může zajistit průmyslové zabezpečení a lépe chránit kritickou infrastrukturu Získat informační dokument společnosti IDC Další novinky Další události Dobrý den, jak vám mohu pomoci? Rychlé odkazy O společnosti Cisco Kontaktujte nás Kariéra Spojení s partnerem Zdroje a právní informace Zpětná vazba Nápověda Smluvní podmínky Prohlášení o ochraně osobních údajů Soubory cookie Ochranné známky Transparentnost dodavatelského řetězce Mapa webu © Cisco Systems, Inc.
2026-01-13T09:29:56
https://snyk.io/es/product/infrastructure-as-code-security/
Seguridad de la infraestructura como código | Herramientas de seguridad de la IaC | Escaneo de la IaC | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API & Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API & Web - Todos los clientes Snyk API & Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo Snyk IaC Descripción general Gestión de desviaciones Documentos Select Descripción general Gestión de desviaciones Documentos Snyk Infrastructure as Code Herramientas de seguridad de IaC para equipos y operaciones de desarrollo Detecta y corrige errores de configuración en tu infraestructura como código antes de que lleguen a producción. Reserva una demostración en vivo Demostración de Snyk bajo demanda Descubre cómo la plataforma Snyk AI Trust puede ayudar a los equipos de AppSec a encontrar y corregir vulnerabilidades de seguridad de las aplicaciones para el código, las dependencias de código abierto, las imágenes de contenedores y la IaC. Ver ahora IaC segura desde los flujos de trabajo de los desarrolladores El escáner IaC de Snyk te ayuda a desplegar aplicaciones e infraestructuras seguras más rápido al integrar la seguridad IaC para Terraform, CloudFormation, Kubernetes, gráficos Helm y plantillas ARM en IDE, CLI, SCM y flujos de trabajo CI/CD. Seguridad desde el principio Reduce los retrasos de seguridad permitiendo a los desarrolladores identificar y solucionar de forma proactiva los problemas de seguridad en su IaC. Evitar errores de configuración Evita que las configuraciones erróneas lleguen a producción con pruebas automatizadas y bloqueo de los problemas de seguridad en el pipeline CI/CD. Remediaciones en el código Reduce el tiempo que se tarda en corregir el problema señalando el código vulnerable a los desarrolladores y proporcionando sugerencias de corrección en línea con el código. Seguridad de IaC en todo el SDLC Mantente seguro en Terraform, CloudFormation, ARM, Kubernetes, Docker, AWS, Azure, Google Cloud y más. Implementa automáticamente las prácticas recomendadas de seguridad de IaC Encuentra y corrige las configuraciones erróneas con la plataforma Snyk AI Trust , utilizando conjuntos de reglas integradas para los formatos Terraform, CloudFormation, ARM y Kubernetes, y AWS, Azure y GCP respaldados por las prácticas recomendadas de la industria, los puntos de referencia de CIS y la investigación de modelado de amenazas de los investigadores de seguridad de Snyk. Construye sobre las prácticas recomendadas con políticas personalizadas impulsadas por OPA (Open Policy Agent). Integraciones para desarrolladores Asegura la IaC en los flujos de trabajo de los desarrolladores a través de IDE, CLI, SCM, CI, Terraform Cloud e integraciones empresariales. Remediaciones procesables en el código Proporciona a los desarrolladores información de seguridad y sugerencias de corrección inmediatamente en línea con el código, evitando que las configuraciones erróneas lleguen a producción. Informes de nivel empresarial Comprende los problemas de configuración a lo largo del tiempo y exporta informes sobre problemas de seguridad y cumplimiento de IaC. Maximiza la adopción por parte de los desarrolladores Snyk está diseñado para desarrolladores, ya que ofrece integraciones perfectas en los flujos de trabajo de los desarrolladores y minimiza el tiempo de inactividad y la navegación a través de herramientas de seguridad. Integraciones Obtén visibilidad temprana integrando Snyk en IDE, CLI, repositorios Git y flujos de trabajo CI/CD. Seguridad del código Empodera a los desarrolladores para que aseguren su código a medida que lo escriben. Seguridad del contenedor Escanea tus imágenes base y los manifiestos de Kubernetes antes de implementarlos. Mantente seguro en  tiempo de ejecución con Sysdig . Formación en seguridad para desarrolladores Obtén formación en seguridad para desarrolladores con lecciones interactivas sobre cómo encontrar y corregir vulnerabilidades y utilizar Snyk para la seguridad. Empieza a utilizar las herramientas de escaneo de seguridad Snyk IaC Protege las configuraciones de la infraestructura como código con escaneo automático de vulnerabilidades, consejos de remediación y gestión de desvíos. Compara todos los planes Gratis Comienza gratis con GitHub Comienza gratis con Google Equipo Integración con Jira Adquiérelo ya Empresarial Integración con Jira Informes API Rich Roles de usuario personalizados Administración de políticas de seguridad Reglas personalizadas Reglas de cumplimiento e informes de incidencias de Snyk Solucionar problemas de nubes en IaC Reserva una demostración en vivo Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:56
https://github.com/aws-solutions-library-samples/guidance-for-multimodal-data-processing-using-amazon-bedrock-data-automation
GitHub - aws-solutions-library-samples/guidance-for-multimodal-data-processing-using-amazon-bedrock-data-automation: This Guidance shows how Amazon Bedrock Data Automation streamlines the generation of valuable insights from unstructured multimodal content such as documents, images, audio, and videos through a unified multi-modal inference API. Skip to content Navigation Menu Toggle navigation Sign in Appearance settings Platform AI CODE CREATION GitHub Copilot Write better code with AI GitHub Spark Build and deploy intelligent apps GitHub Models Manage and compare prompts MCP Registry New Integrate external tools DEVELOPER WORKFLOWS Actions Automate any workflow Codespaces Instant dev environments Issues Plan and track work Code Review Manage code changes APPLICATION SECURITY GitHub Advanced Security Find and fix vulnerabilities Code security Secure your code as you build Secret protection Stop leaks before they start EXPLORE Why GitHub Documentation Blog Changelog Marketplace View all features Solutions BY COMPANY SIZE Enterprises Small and medium teams Startups Nonprofits BY USE CASE App Modernization DevSecOps DevOps CI/CD View all use cases BY INDUSTRY Healthcare Financial services Manufacturing Government View all industries View all solutions Resources EXPLORE BY TOPIC AI Software Development DevOps Security View all topics EXPLORE BY TYPE Customer stories Events & webinars Ebooks & reports Business insights GitHub Skills SUPPORT & SERVICES Documentation Customer support Community forum Trust center Partners Open Source COMMUNITY GitHub Sponsors Fund open source developers PROGRAMS Security Lab Maintainer Community Accelerator Archive Program REPOSITORIES Topics Trending Collections Enterprise ENTERPRISE SOLUTIONS Enterprise platform AI-powered developer platform AVAILABLE ADD-ONS GitHub Advanced Security Enterprise-grade security features Copilot for Business Enterprise-grade AI features Premium Support Enterprise-grade 24/7 support Pricing Search or jump to... Search code, repositories, users, issues, pull requests... --> Search Clear Search syntax tips Provide feedback --> We read every piece of feedback, and take your input very seriously. Include my email address so I can be contacted Cancel Submit feedback Saved searches Use saved searches to filter your results more quickly --> Name Query To see all available qualifiers, see our documentation . Cancel Create saved search Sign in Sign up Appearance settings Resetting focus You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert {{ message }} aws-solutions-library-samples / guidance-for-multimodal-data-processing-using-amazon-bedrock-data-automation Public generated from amazon-archives/__template_MIT-0 Notifications You must be signed in to change notification settings Fork 18 Star 54 This Guidance shows how Amazon Bedrock Data Automation streamlines the generation of valuable insights from unstructured multimodal content such as documents, images, audio, and videos through a unified multi-modal inference API. aws.amazon.com/solutions/guidance/multimodal-data-processing-using-amazon-bedrock-data-automation/ License MIT-0 license 54 stars 18 forks Branches Tags Activity Star Notifications You must be signed in to change notification settings Code Issues 2 Pull requests 2 Actions Projects 0 Security Uh oh! There was an error while loading. Please reload this page . Insights Additional navigation options Code Issues Pull requests Actions Projects Security Insights aws-solutions-library-samples/guidance-for-multimodal-data-processing-using-amazon-bedrock-data-automation   main Branches Tags Go to file Code Open more actions menu Folders and files Name Name Last commit message Last commit date Latest commit   History 239 Commits assets assets     deployment deployment     source source     .gitignore .gitignore     CODE_OF_CONDUCT.md CODE_OF_CONDUCT.md     CONTRIBUTING.md CONTRIBUTING.md     LICENSE LICENSE     README.md README.md     claims-cli.bat claims-cli.bat     claims-cli.sh claims-cli.sh     source.bat source.bat     View all files Repository files navigation README Code of conduct Contributing MIT-0 license Security Guidance for Multimodal Data Processing Using Amazon Bedrock Data Automation Automate document processing using AWS AI/ML services to: Speed up business processes Improve decision quality Reduce operational costs Free up expert resources for high-value tasks cd This solution uses Amazon Bedrock's Generative AI capabilities to: Classify documents Extract content Process information using foundation models **Warning: This guidance was developed with the Public Preview of Bedrock Data Automation. With the expected GA launch of BDA, this codebase will need some minor changes to function correctly. The team behind this Solution Guidance is working on these code changes. This warning will be removed once the changes are tested and uploaded to this repo. ** Note on dataset and Acceptable End User Policy from the model provider The dataset utilized in this guidance consists entirely of synthetic data. This artificial data is designed to mimic real-world information but does not contain any actual personal or sensitive information. For use cases related to finance and medical insurance as used in this guidance: Users must adhere to the model provider's Acceptable Use Policy at all times. This policy governs the appropriate use of the synthetic data and associated models, and compliance is mandatory.This synthetic data is provided for testing, development, and demonstration purposes only. It should not be used as a substitute for real data in making financial or medical decisions affecting individuals or organizations. By using this dataset and guidance, you acknowledge that you have read, understood, and agree to comply with all applicable terms, conditions, and policies set forth by the model provider. Table of Contents Guidance for Multimodal Data Processing Using Amazon Bedrock Data Automation Table of Contents Architecture and Key Features Part A: Automated Lending Flow Part B: Intelligent Claims Review Getting Started Prerequisites Quick Start Guide Lending Flow Setup Claims Review Setup Cost Estimation Cost Breakdown Flow A: Lending Flow Flow B: Important Notes Data Usage Regional Availability Service Quotas Revisions Legal Notice Authors Architecture and Key Features Part A: Automated Lending Flow Uses Amazon Bedrock Data Automation (BDA) for document processing Creates reusable document blueprints Automatically detects document types Extracts relevant information Processes results downstream Part B: Intelligent Claims Review Processes insurance documents Stores extracted content in Bedrock Knowledge Base Uses RAG (Retrieval Augmented Generation) for accurate responses Employs Bedrock Agent to determine claim eligibility Updates claims database automatically Getting Started Prerequisites Active AWS Account ( Create one here ) AWS CLI ( Installation guide ) AWS CDK CLI ( Installation guide ) Quick Start Guide Lending Flow Setup Deploy lending flow stack Configure BDA project & blueprints Process lending documents Claims Review Setup Deploy claims review stack Process claims Cost Estimation Approximate cost: The Lending Flow will cost $42 month for 1,000 pages (US-West-2 Region, December 2024) Approximate cost: The Claims Review Flow will cost $579 month for 1,000 pages (US-West-2 Region, December 2024) Recommend setting up AWS Budget Cost Breakdown Below you can see the estimated costs of the guidance solution and the assumptions. Flow A: Lending Flow AWS service Dimensions Cost [USD] Amazon Bedrock Data Automation 1,000 documents (each 1 page) processed with Bedrock Data Automation $ 40 AWS Lambda 3,000 requests per month on x86 with 512 MB ephemeral storage, 30s execution time $ 0.19 Amazon EventBridge 1 million events $ 1.00 Amazon Simple Storage Service (S3) S3 Standard storage (10 GB per month) $ 0.24 Flow B: AWS service Dimensions Cost [USD] Amazon Bedrock Data Automation 1,000 documents (each 1 page) processed with Bedrock Data Automation $ 40 Amazon Bedrock Knowledgebase - Embeddings (Titan Text Embeddings v2) 100 documents, each 10MB of text, Total 1GB, ingested once $ 17 (one-time) Amazon Bedrock Knowledgebase - OpenSearch Serverless Minimum OCU: 1, Expected OCU hours per day: 24 $ 350 Amazon Bedrock Agent - Titan Text Premier 1,000 documents (each 2 pages), each flow requiring 5 agent steps with each 3.5K input tokens, 200 output tokens, total: input tokens 17.5K x 1000 documents (8.75 USD), output tokens: 1K x 1000 documents (1.50 USD), $0.0005 $0.0015 $ 10.25 AWS Lambda 3,000 requests per month on x86 with 512 MB ephemeral storage, 30s execution time $ 0.19 Amazon EventBridge 1 million events $ 1.00 Amazon Simple Storage Service (S3) S3 Standard storage (10 GB per month) $ 0.24 Amazon Aurora Minimum Aurora capacity units: 2 capacity units, Maximum Aurora capacity units: 8 capacity units $ 176.73 Important Notes Data Usage Solution uses synthetic data only No real personal/sensitive information included For testing/development purposes only Regional Availability This guidance can be deployed only to AWS regions which have these services available: Amazon Bedrock Bedrock Data Exchange Bedrock Agents Other services noted above Service Quotas Your AWS account has default quotas, also known as service limits, described here . This guidance can be installed and tested within the default quotas for each of the services used. You can request increases for some quotas. Note that not all quotas can be increased. To operate this guidance at scale, it is important to monitor your usage of AWS services and configure alarm settings to notify you when a quota is close to being exceeded. You can find details on visualizing your service quotas and setting alarms here . Revisions Document all notable changes to this project. Consider formatting this section based on Keep a Changelog, and adhering to Semantic Versioning. Legal Notice Customers are responsible for making their own independent assessment of the information in this Guidance. This Guidance: (a) is for informational purposes only, (b) represents AWS current product offerings and practices, which are subject to change without notice, and (c) does not create any commitments or assurances from AWS and its affiliates, suppliers or licensors. AWS products or services are provided “as is” without warranties, representations, or conditions of any kind, whether express or implied. AWS responsibilities and liabilities to its customers are controlled by AWS agreements, and this Guidance is not part of, nor does it modify, any agreement between AWS and its customers. Authors Judith Joseph, Principal Solution Architect Raja Vaidyanathan, Senior Solution Architect Conor Manton, Senior Technical Account Manager Vinay Maddi, Senior Solution Architect Arlind Nocaj, Senior Solution Architect Chan Zaw, Solution Architect About This Guidance shows how Amazon Bedrock Data Automation streamlines the generation of valuable insights from unstructured multimodal content such as documents, images, audio, and videos through a unified multi-modal inference API. aws.amazon.com/solutions/guidance/multimodal-data-processing-using-amazon-bedrock-data-automation/ Resources Readme License MIT-0 license Code of conduct Code of conduct Contributing Contributing Security policy Security policy Uh oh! There was an error while loading. Please reload this page . Activity Custom properties Stars 54 stars Watchers 19 watching Forks 18 forks Report repository Releases No releases published Packages 0 No packages published Uh oh! There was an error while loading. Please reload this page . Contributors 7 Uh oh! There was an error while loading. Please reload this page . Languages Python 99.7% Other 0.3% Footer © 2026 GitHub, Inc. Footer navigation Terms Privacy Security Status Community Docs Contact Manage cookies Do not share my personal information You can’t perform that action at this time.
2026-01-13T09:29:56
https://snyk.io/es/snyk-top-10/
Snyk Top 10 – Security Vulnerability Intelligence | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API & Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API & Web - Todos los clientes Snyk API & Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo Level up your security skills with our new Snyk Top 10 learning path Snyk Top 10: Vulnerabilities you should know Find out which types of vulnerabilities are most likely to appear in your projects based on Snyk scan results and security research. Stay safe, stay educated, stay out of the headlines! Get the code report Get the open source report 2022 results Top first-party code vulnerabilities Based on Snyk security intelligence research in 2022, our Snyk Top 10: Code Vulnerabilities report shows the risks teams frequently face when writing code. Here are the top three. Get the full report Directory traversal A directory traversal (a.k.a. path traversal) attack aims to access files and directories that are stored outside of the authorized folder. Cross-site scripting (XSS) Cross-site scripting (XSS) is a website attack method that utilizes an injection to implant malicious scripts into trusted websites. Hardcoded credentials Credentials are hardcoded when they are written directly in the code, allowing everyone with access to the source code to access those credentials PICK YOUR LANGUAGE First-party code vulnerabilities by language Only care about a language or two? Learn about the top code vulnerabilities our security researchers found in the ecosystem you use most. FIRST-PARTY CODE Top 10 Java vulnerabilities Learn about the most prevalent Java vulnerabilities found by Snyk Code researchers in 2022. Download FIRST-PARTY CODE Top 10 JavaScript vulnerabilities Learn about the most prevalent JavaScript vulnerabilities found by Snyk Code researchers in 2022. Download FIRST-PARTY CODE Top 10 C# vulnerabilities Learn about the most prevalent C# vulnerabilities found by Snyk Code researchers in 2022. Download FIRST-PARTY CODE Top 10 Go vulnerabilities Learn about the most prevalent Go vulnerabilities found by Snyk Code researchers in 2022. Download FIRST-PARTY CODE Top 10 PHP vulnerabilities Learn about the most prevalent PHP vulnerabilities found by Snyk Code researchers in 2022. Download FIRST-PARTY CODE Top 10 Python vulnerabilities Learn about the most prevalent Python vulnerabilities found by Snyk Code researchers in 2022. Download FIRST-PARTY CODE Top 10 Ruby vulnerabilities Learn about the most prevalent Ruby vulnerabilities found by Snyk Code researchers in 2022. Download Snyk Top 10 The top vulnerabilities of 2022 Read our Snyk Top 10 reports on the top open source and first-party code vulnerabilities of 2022. Get the open source report Get the code report 2022 results Top 3 critical and high OSS vulnerabilities Based on user scan results from 2022, our Snyk Top 10: Open Source Vulnerabilities report shows the OSS risks teams most frequently face. Here are the top three. Get the full report Denial of service (DoS) DoS attacks are used to shut down access to a network or server by bombarding the target with so many requests that it’s unable to process the load. Remote code execution (RCE) RCE attacks occur when a bad actor is able to run commands from a remote system that they shouldn’t have access to, leading to malware, exploits, and more. Deserializing untrusted data When an application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, an attacker can control the state or the flow of the execution. PICK YOUR LANGUAGE Open source vulnerabilities by language Only care about a language or two? Learn about the top high and critical open source vulnerabilities in the ecosystem you use most. OPEN SOURCE Top 10 Java vulnerabilities Learn about the top high and critical open source vulnerabilities in Java. Download OPEN SOURCE Top 10 JavaScript vulnerabilities Learn about the top high and critical open source vulnerabilities in JavaScript. Download OPEN SOURCE Top 10 Go vulnerabilities Learn about the top high and critical open source vulnerabilities in Go. Download OPEN SOURCE Top 10 .NET vulnerabilities Learn about the top high and critical open source vulnerabilities in .NET. Download OPEN SOURCE Top 10 PHP vulnerabilities Learn about the top high and critical open source vulnerabilities in PHP. Download OPEN SOURCE Top 10 Python vulnerabilities Learn about the top high and critical open source vulnerabilities in Python. Download OPEN SOURCE Top 10 Ruby vulnerabilities Learn about the top high and critical open source vulnerabilities in Ruby. Download Inteligencia en materia de seguridad desde el código a la nube La inteligencia en seguridad de Snyk comprende fuentes públicas, datos de la comunidad de desarrolladores, investigaciones expertas propias, motores de aprendizaje automático e IA con human-in-the-loop. Snyk Vulnerability Database The  Snyk Vulnerability Database  provides verified, detailed information and fixes for open source and container vulnerabilities. Snyk Code knowledgebase Snyk Code utilizes the most up-to-date  code security  information, reducing false positives and delivering actionable fixes. Unified policy engine Snyk’s  unified policy engine  extends the same security policies to infrastructure as code (IaC) files and runtime cloud resources. Get started with comprehensive security intelligence See how you can use Snyk (and the vulnerability database) to get updated on vulnerabilities and fix them faster. See Snyk in action Schedule a demo with a Snyk expert to learn about: OSS and container security Proprietary code scanning Cloud & IaC security Reserva una demostración en vivo O comienza sin pagar nada Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:56
https://www.cisco.com/site/us/en/solutions/small-business/index.html
Small and Medium Business Technology Solutions - Cisco Skip to main content Skip to search Skip to footer Cisco.com Worldwide Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Trials and demos How to buy Partners EN US Profile Log in Trials and demos MENU CLOSE How to buy Partners Profile Log in EN US Close Close Close Close Close Hello, how can I help? Solutions Cisco small and medium business solutions Unlock your potential with SMB solutions Small and medium businesses (SMBs) require products and solutions designed to scale, innovate, and succeed in a digital-first world. Transform your business today and prepare for tomorrow Fast, reliable solutions for SMB Evolve how you operate, collaborate, and secure your business using solutions that offer reliability, scalability, and security. Simplified IT management Control your entire network from an intuitive, cloud-based dashboard. Efficiency at scale Streamline operations to drive efficiency across your organization with technology that scales as your business grows. Dedicated support Cisco provides 24/7, award-winning technical support services, online and by phone to customers, partners, resellers, and distributors who hold valid Cisco service contracts. Cloud-driven flexibility Access your systems anytime, anywhere with a cloud-native infrastructure. SMB product categories Networking Build a secure network Keep your business running smoothly and help your customers do the same with cloud-managed, automated, secure, and scalable networking solutions. Explore networking Security Connect and protect your business Secure your network with solutions that protect your business from threats without compromising usability and performance. Explore security Collaboration Work with anyone, anywhere Keep your organization connected across distributed teams, wherever they are, using collaboration tools. Explore collaboration View all Access a limited-time offer on Cisco Meraki MX Power your future-proofed workplace with Cisco Meraki MX. This superior secure networking solution features cloud-managed SD-WAN and firewall security in a single appliance, and is now available for a limited-time discount. Get offer SMB offers and free trials Take advantage of our free trials and find limited-time offers on products and solutions that meet your needs.​ ​​See trials and offers​ How to buy Cisco SMB solutions Speak to an SMB sales specialist For guidance on our products and pricing, talk to a sales specialist, who will help you choose the solution that meets your needs. Contact Cisco Find a partner If you prefer to buy through a partner, connect with certified Cisco partners and resellers, who can generate quotes and place orders. Get help from a partner Shop SMB solutions When it's time to make a purchase, compare and then buy select products online directly from our licensed resellers. Buy now We're here to help Consult with an expert to understand financing, explore free trials and offers, and arrange product demos, all of which will be aligned to your business needs and goals. Contact us Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms & Conditions Privacy Cookies / Do not sell or share my personal data Accessibility Trademarks Supply Chain Transparency Newsroom Sitemap © Cisco Systems, Inc.
2026-01-13T09:29:56
https://www.notion.com/de/blog/topic/notion-hq
Notion HQ – Werkzeuge und Handwerk – Notion Notion Funktionen Notion-KI Erschaffen, schreiben, automatisieren Agenten Übernehmen manuelle Aufgaben Enterprise Suche Finde Antworten in Sekundenschnelle Smart Notes Perfekt geschrieben von der KI Dokumente Einfach und leistungsstark Wissensdatenbank Bündle dein Wissen Projekte Verwalte jede Art von Projekt Websites Veröffentliche alles Mögliche im Handumdrehen Loslegen KI-Anwendungsfälle entdecken Schau dir an, wozu die Notion-KI in der Lage ist Marktplatz durchstöbern Vorlagen für alles Mögliche Einbindungen anzeigen Verbinde deine Apps mit Notion Web Clipper herunterladen Speichere Inhalte aus dem Web in Notion Teste die Desktop-App von Notion für mehr Geschwindigkeit App herunterladen Mail Calendar KI Enterprise Tarife Erkunden Teams Entwicklung und Produkt Design Marketing IT Teamgröße Start-ups KMUs Konzerne Bildungswesen Lernen Hilfe-Center Notion Academy Erfahrungsberichte von Kund/-innen Blog Community Partnerprogramme Entwickeln API Vorlagen Sicherheit Beratung Fordere eine Demo an Anmelden Nutze Notion kostenlos Gedanken über die Zukunft der Arbeit, von den Menschen und Teams, die sie schaffen. Neueste Notion HQ Für Teams Technik Mail Inspiration Podcast First Block Notion HQ — Was für uns im Moment im Vordergrund steht. Entdecke Notion 3.0 Heute haben wir Notion 3.0 mit Agenten veröffentlicht. Alles, was du in Notion machen kannst, kann auch dein Agent. Lästige Routine kannst du jetzt in wenigen Minuten erledigen. Akshay Kothari COO, Notion Lerne Mick Hodgins kennen, Notions neuen EMEA-Geschäftsführer Lerne unseren neuen EMEA-Geschäftsführer kennen. Er bringt eine strategische Vision sowie internationale Erfahrung von Google und anderen Unternehmen mit, um unsere Teams in der gesamten Region zu leiten. Pravesh Mistry Head of Global Sales, Notion Notion ist jetzt im Microsoft Store verfügbar Wir haben einen spannenden Meilenstein auf unserer Reise zu mehr Zugriff für alle in unserer globalen Community erreicht: Notion ist jetzt im Microsoft Store verfügbar. David Rosenberg Leiter Business Development, Notion Notion-KI für die Arbeit: KI-gestützte Software-Entwicklung Erfahre, wie Notion das Versprechen künstlicher Intelligenz einlöst, die Entwicklung neuer Software-Produkte zu transformieren. Jannet Park Produktmarketing, Notion Neu: Notion-KI für die Arbeit Notion AI for Work ist da – dein All-in-One-KI-Toolkit, das direkt in deinen Notion-Workspace integriert ist. John Hurley Head of Product Marketing, Notion Willkommen Lena Waters, neue Chief Marketing Officer bei Notion Wie unsere neue CMO die Kunst der menschlichen Verbindung erlernte, indem sie Dinge vermarktete, von denen niemand dachte, dass sie sie brauchen würden. Erica Anderson Chief Revenue Officer, Notion Wir sind sowas von zurück an der Uni! Studierende sind die Notion-Community, die uns am meisten inspiriert. Dieses Semester verdoppeln wir eure Energie mit unserer bisher größten Kampagne zum Semesterstart. Maya Bakir EDU, Notion Der einfachste Weg, eine Website zu veröffentlichen Wir stellen vor: Notion Sites – jetzt mit individueller Domain, visuellen Anpassungen, Google Analytics und mehr. Matt Piccolella Produkt, Notion Vier Lehren aus dem KI-Launch: Was wir gelernt haben und wo wir uns geirrt haben Im Folgenden werfen wir einen Blick auf die Entwicklung unserer Go-to-Market-Strategien für die Notion-KI – was wir richtig gemacht haben, was wir falsch gemacht haben und die Erkenntnisse, die wir dabei gewonnen haben. Rachel Hepworth Chief Marketing Officer Neu: Notion Calendar – ein eingebundener Kalender fürs Berufs- und Privatleben Cron wird Notion Calendar – und besser als je zuvor. Nun kannst du deine Zeit besser planen und berufliche sowie private Termine leichter verwalten, organisieren und priorisieren. Raphael Schaad Head of Notion Calendar, Notion Welcome to Notion, Sequin team! I'm excited to welcome the Sequin team to Notion. They've built tools that helped companies bring data from across their software stack into one place, and their thinking on how to bring fragmented information together aligns perfectly with where we're headed. Fuzzy Khosrowshahi Chief Technology Officer, Notion Highlights and takeaways from Make with Notion Showcase Europe 2025 From the arrival of Notion 3.0 to uncovering the hidden costs of siloed knowledge, our second annual European conference series brought together over 1,300 attendees across four cities. Áine Dundas Head of EMEA Marketing Samsung × Notion: Building for the next billion users In partnership with Samsung, the global leader in mobile devices, we’re bringing the power of Notion AI to the owners of new Galaxy TabS11 and TabS11 Ultra devices. David Rosenberg Leiter Business Development, Notion How Notion helped a college “tools guy” build a business serving 150+ clients Builders Series: How a college “tool guy” turned his obsession with efficiency into a million-dollar Notion consultancy helping companies like Discord and CashApp scale their operations. Meet Katy Shields, Notion’s New Chief People Officer Meet our new Chief People Officer, who brings builder energy and heart from her time at Google X, VSCO, and DoorDash to help shape what’s next at Notion. Software should bend: Welcome Notion’s newest builder, Max Schoening From Cloud app to GitHub to the Tools for Thought community, we’ve long been admirers of how Max builds malleable software. Hear how he’s bringing that design-build sensibility to Notion. Akshay Kothari COO, Notion Before / After Notion Mail When your inbox is giving trauma-response vibes, Notion Mail has you covered. Elias Template creator Introducing Notion Mail, a new inbox that thinks like you Introducing Notion Mail, the inbox designed to think like you—a more personalized, powerful, modern way to communicate. Andrew Milich & Jason Ginsberg The Notion Mail Team How Notion helped a nonprofit streamline its operations and save lives Service Dogs Inc. uses Notion as an all-in-one workspace for dog-training management, pairing mutts with mammals, and donor relations—replacing multiple disconnected tools with one much-loved system. How to delete folders in Gmail: A practical inbox management guide How to delete folders in Gmail [+ Bonus inbox cleanup tips] 1 2 3 4 5 → Deutsch Cookie-Einstellungen © 2026 Notion Labs, Inc. Unternehmen Über uns Karriere Sicherheit Status Nutzungsbedingungen und Datenschutz Deine Datenschutzrechte Download iOS und Android Mac und Windows Calendar Web Clipper Ressourcen Hilfe-Center Preise Blog Community Einbindungen Vorlagen Partnerprogramme Notion für Unternehmen Kleine Unternehmen Persönlich Mehr entdecken →
2026-01-13T09:29:57
https://www.cisco.com/site/us/en/products/networking/cloud-networking-switches/index.html
Data Center Switches – Cisco Nexus - Cisco Skip to main content Skip to search Skip to footer Cisco.com Worldwide Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Trials and demos How to buy Partners EN US Profile Log in Trials and demos MENU CLOSE How to buy Partners Profile Log in EN US Close Close Close Close Close Products Networking Data center switches Anchor your data center networking strategy Ultra-reliable performance. Scalable infrastructure. Put a data center switching powerhouse at the heart of your network and be amazed at what's possible. Overview Resources Register for webinars Cutting-edge features that improve performance and sustainability 00:48 This is modular switching redefined. Unbox the Cisco Nexus 9800 Series. Expect more from your data center and storage network infrastructure with Cisco Nexus and Cisco MDS switches.   Industry-leading performance Get deep visibility, tighter security, and faster application performance with Cisco silicon. Scalable infrastructure Virtualization, high density, and performance—all supporting scalable and efficient growth. Easy programming Automate from day 0 to day N with APIs and programmable tools. Energy efficiency Efficient power and cooling with real-time energy insights drive sustainable data center operations, helping lower your total cost of ownership. Cisco named a Leader in Gartner® 2025 Magic Quadrant™ for Data Center Switching See why we believe our industry-leading performance, simplicity, and scalability helped us earn this recognition. Download Gartner report Data center switches designed for hybrid harmony Fixed switching Cisco Nexus 3000 Series switches Purpose-built low-latency switches to support business-critical applications and performance. Explore Nexus 3000 Series Cisco Nexus 9200 Series switches Compact 100M/1G Base-T switch running Cisco NX-OS Explore Nexus 9200 Series Cisco Nexus 9300 Series switches If spine and leaf or top of rack are your style, these fixed switches support ports from 1G to 400G to 800G. Enable AI-ready 800G infrastructure for data centers of any size. Explore Nexus 9300 Series Cisco 6000 Series switches Cloud-managed switches that are easy to deploy and manage for Cisco Nexus Hyperfabric. Explore 6000 Series Explore the Nexus 9000 Series family Explore Cisco Nexus Hyperfabric Modular switching Cisco Nexus 9400 Series switches These switches pack high performance and density plus better telemetry into a compact, modular design. Explore Nexus 9400 Series Nexus 9500 Series switches Enterprise or high growth? Modular configurations can support you with ports from 1G to 400G. Explore Nexus 9500 Series Nexus 9800 Series switches Get high-density 400G switching that's designed for 800G adoption and beyond. Explore Nexus 9800 Series Explore the Nexus 9000 Series family High density and transport Nexus 400G and 800G family Bandwidth like you’ve never known. Adopt 400G with scalability to 800G with confidence in a family of 1, 2, and 4 RU switches. Explore 400G and 800G Optics Fiber-optic transceiver modules to accelerate your network connections. Explore optics Ultra-low latency Cisco Nexus 3500 Series portfolio Design efficient, low-latency networks with programmable platforms, switches, and smart adapters. Explore Nexus 3550 Series Cisco Nexus 3550-T Series FPGA-based programmable network platform for critical, ultra-low latency network applications. Explore Nexus 3550-T Series Cisco Nexus SmartNICs FPGA-based network interface cards (NICs). Ideal for ultra-low latency, high-resolution timestamping. Explore Nexus SmartNICs Cisco Nexus 3500 Series switches Low-latency, 1 RU switches supporting 1G to 40G. Ideal for high-frequency trading (HFT) and big data environments. Explore Nexus 3500 Series Storage area networking Cisco MDS 9700 Series A SAN director with scale, performance, integrated analytics, and superior port density. Explore MDS 9700 Series MDS 9300 Series Next-generation high-density fabric switch with integrated analytics and telemetry. Explore MDS 9300 Series MDS 9200 Series High-performance SAN extension, disaster recovery, intelligent fabrics, and multiprotocol connectivity. Explore MDS 9200 Series MDS 9100 Series Flexible and agile, highly available and secure, and easy to use, with visibility to every flow. Explore MDS 9100 Series Cisco SAN Analytics Visibility and data-driven guidance, for faster troubleshooting and optimized infrastructure. Explore Cisco SAN Analytics See all SAN solutions Management platforms and controllers Cisco Application Centric Infrastructure (ACI) Simplifies data center network management, boosts security with centralized app-centric approach with automation and policy-based control driving agile IT. Explore ACI Cisco NX-OS Make your network agile, easily scalable, and secure with simplified network operations and integrated automation. Explore the platform Cisco Nexus Dashboard Configure, operate, and analyze, all from one place. Private cloud managed across your data center networks. Explore Cisco Nexus Dashboard Cisco Nexus Hyperfabric New plug-and-play, cloud-managed operations and validation of the full lifecycle of data center networks. Explore Cisco Nexus Hyperfabric Cisco smart switches Cisco N9300 Series Smart switches Cisco smart switch with Cisco Hypershield is our platform play that integrates networking with security services. Explore N9300 Series Smart switches Book an expert consultation to start your AI-ready infrastructure journey Receive expert guidance on modernizing your network and compute infrastructure with AI-ready infrastructure—combining technologies, products, and Cisco Validated Designs to support and scale AI workloads, all while advancing sustainability initiatives. Get Started Make it yours Discover add-ons to customize and enhance your data center and cloud networking environment. Explore our ecosystem Data center transformation starts here Simplify Operations Transform data center networks operations across LAN, SAN, IP Fabric for Media (IPFM) and AI/ML fabrics Cisco Nexus Dashboard Win in AI Unleash new use cases with AI-ready infrastructure and operations AI/ML overview 400G and 800G High-speed data center switching for your big data analytics, AI workloads, and HPC needs Explore 400G and 800G Previous Next Customer stories Gain agility with centralized device and technology management "Whether it's audio, visual, IPTV, ribbon boards, or jumbotron—the largest board in the United States right now—all of this is now controlled over one common network and secured through our platforms in a way that hadn't traditionally been done before." Michael Israel, Chief Information Officer The Kraft Group Read The Kraft Group's story Fuel growth with a new high-capacity data center network "We had a great experience with Cisco Nexus switches in our legacy data centers, and it became clear Cisco Nexus 9000 Series Switches were the best choice for our cloud fabric network. They give us exceptional density, capacity, and scalability as well as highly desirable line rate encryption capabilities." Ahsan Ghayas, Senior Principal Engineer Workday Read Workday's story Previous Next Services and support Portfolio buying guide Cisco Enterprise Agreement Bring the power and breadth of our entire technology portfolio under a single, simplified agreement. View guide Business-critical services Move your business forward Build modern, agile IT environments with advisory services designed to help you adapt and transform. Find services Read customer reviews Previous Next Kick-start your transformation Make sure your data center moves at the speed of business. Get expert guidance on emerging trends and new technology. Register for webinars Hello, how can I help? Trials and Demos --> Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms & Conditions Privacy Cookies / Do not sell or share my personal data Accessibility Trademarks Supply Chain Transparency Newsroom Sitemap © Cisco Systems, Inc.
2026-01-13T09:29:57
https://apps.apple.com/app/notion-calendar/id1607562761#information
‎Notion Calendar App - App Store for iPhone iPhone iPad Mac Vision Watch TV Today Games Apps Arcade Platform iPhone iPad Mac Vision Watch TV Notion Calendar For your work and life Only for iPhone Free Share 5.7K Ratings 4.7 Ages 4+ Years Category Productivity Developer Notion Labs, Incorporated Language EN + 16 More Size 40.4 MB iPhone Notion Calendar lets you schedule meetings and control your time like never before. It deeply integrates with Google Calendar accounts so that all your events are synced. Along with speed, beauty, and light/dark modes, Notion Calendar includes powerful features: - CONNECTED TO NOTION — add Notion docs, projects, and timelines. - MULTIPLE TIME ZONES — pull the time zone column to the right to “travel to any city” and add more time zones. - ALL IN ONE PLACE — see one unified view across multiple calendars and auto-sync events between them. - WIDGETS — select from 6 Home Screen Widgets featuring rich previews of upcoming events, month overviews, quick-add event buttons, and more! The Lock Screen Widget lets you see what’s coming at a glance when picking up your phone. - AVAILABLE IN 12 LANGUAGES — Japanese, Korean, French, German, Spanish, Portuguese, Danish, Dutch, Finnish, Norwegian, and Swedish. It’s time. more Ratings & Reviews 4.7 out of 5 5.7K Ratings Lot of potential - love the design! 09/03/2024 Hikari There’s a lot of reviews that talk about the pros and cons of the app but let me just say my favorite thing is I don’t immediately create a new event if I just fat finger my phone and hit a random spot on the calendar. So much time wasted on hitting a random spot on Google calendar and I’m like no I didn’t mean to please - no event oh god! Love the design and the way information is presented it makes it feel less overwhelming. I would love a 5 day view - 3 days is great because it’s intentional but getting the work week in one viewable window would be helpful. I know Google calendar forces the whole week on you though which I don’t totally love either. Either way I’m excited to see where the app goes from here! Lot of potential - love the design! 09/03/2024 Hikari There’s a lot of reviews that talk about the pros and cons of the app but let me just say my favorite thing is I don’t immediately create a new event if I just fat finger my phone and hit a random spot on the calendar. So much time wasted on hitting a random spot on Google calendar and I’m like no I didn’t mean to please - no event oh god! Love the design and the way information is presented it makes it feel less overwhelming. I would love a 5 day view - 3 days is great because it’s intentional but getting the work week in one viewable window would be helpful. I know Google calendar forces the whole week on you though which I don’t totally love either. Either way I’m excited to see where the app goes from here! Nightmare of a time 6d ago DayOldEggs I’ve had a nightmare of a time with this app. It does not scale on iPad as it should. You have a desktop app that works great, why can’t it work the same on iPad? Furthermore on my phone it is not showing any of my events. I’ve reinstalled the app twice now, checked all my settings, and even went through trying to fix it using notion AI. Nothing has worked.When adding events through notion AI you have to specify in your AI settings that you want to use your own timezone, not the default on Notion.The views that are available have been buggy for me for weeks. I cannot scroll down all the way to midnight. Every calendar app I’ve ever used has the ability to show a full week, but this app does not. Scrolling through months is not intuitive. I’ve essentially resorted to only using my calendar on my computer, which is not practical. I’ve also had major issues getting the app to send me notifications. I’ve double checked my settings on my phone, and they are correct. I’m not sure what to do anymore. I pay for notion to use as an assistant, and at this point it only works in that manner fluidly on my laptop. Nightmare of a time 6d ago DayOldEggs I’ve had a nightmare of a time with this app. It does not scale on iPad as it should. You have a desktop app that works great, why can’t it work the same on iPad? Furthermore on my phone it is not showing any of my events. I’ve reinstalled the app twice now, checked all my settings, and even went through trying to fix it using notion AI. Nothing has worked.When adding events through notion AI you have to specify in your AI settings that you want to use your own timezone, not the default on Notion.The views that are available have been buggy for me for weeks. I cannot scroll down all the way to midnight. Every calendar app I’ve ever used has the ability to show a full week, but this app does not. Scrolling through months is not intuitive. I’ve essentially resorted to only using my calendar on my computer, which is not practical. I’ve also had major issues getting the app to send me notifications. I’ve double checked my settings on my phone, and they are correct. I’m not sure what to do anymore. I pay for notion to use as an assistant, and at this point it only works in that manner fluidly on my laptop. Close to Perfect 12/20/2025 Borrmu421 Overall the app is very clean and modern, much like the Notion app. The one thing I don’t understand is why there isn’t an Agenda or Monthly view for the calendar. I use the agenda view all the time in other apps and it’s a standard view in any calendar app I’ve used, so I’m not sure why it doesn’t exist within Notion’s calendar app. I’m trying to get used to the 3-day view but I typically like to see more of a schedule forecast in the days to come without scrolling all the time. Outside of adding a couple more views to enhance the user experience and appeal to everyone’s preferences, the app is great. It does exactly what you want it to. Having the ability to natively sync with my notion databases is awesome and helps me stay on task. I would certainly recommend any/all Notion products! Close to Perfect 12/20/2025 Borrmu421 Overall the app is very clean and modern, much like the Notion app. The one thing I don’t understand is why there isn’t an Agenda or Monthly view for the calendar. I use the agenda view all the time in other apps and it’s a standard view in any calendar app I’ve used, so I’m not sure why it doesn’t exist within Notion’s calendar app. I’m trying to get used to the 3-day view but I typically like to see more of a schedule forecast in the days to come without scrolling all the time. Outside of adding a couple more views to enhance the user experience and appeal to everyone’s preferences, the app is great. It does exactly what you want it to. Having the ability to natively sync with my notion databases is awesome and helps me stay on task. I would certainly recommend any/all Notion products! Helpful Tech Support 04/17/2025 The Game's a Foot I’m just starting out with Notion and Notion Calendar (NC) on iPad and iPhone and so far I like the features and functionality of the apps. I’m mainly here to talk about their tech support.I had a difficult time getting NC to sync with my Apple Calendar. I tried multiple attempts to sync, regardless of device. I carefully wrote a detailed explanation of everything I tried and the tech support guys were kind and helpful with their response, once I got past the initial response from the AI. Now it’s working and I can’t wait to get more organized and learn all the features of the app.I’m giving the app 4.5 stars rather than 5 because there are some areas for improvement I’m seeing, so far.Would prefer the app to recognize when my device is in landscape mode and automatically switch, since I rarely use portrait mode on my iPad and the tiny narrow calendar view is annoying.I would also prefer to get a real human response from tech support the first time. The AI assumes you know nothing and didn’t read the instructions or documentation before requesting help. It was a bit off-putting for someone with decades of experience working with computers. Helpful Tech Support 04/17/2025 The Game's a Foot I’m just starting out with Notion and Notion Calendar (NC) on iPad and iPhone and so far I like the features and functionality of the apps. I’m mainly here to talk about their tech support.I had a difficult time getting NC to sync with my Apple Calendar. I tried multiple attempts to sync, regardless of device. I carefully wrote a detailed explanation of everything I tried and the tech support guys were kind and helpful with their response, once I got past the initial response from the AI. Now it’s working and I can’t wait to get more organized and learn all the features of the app.I’m giving the app 4.5 stars rather than 5 because there are some areas for improvement I’m seeing, so far.Would prefer the app to recognize when my device is in landscape mode and automatically switch, since I rarely use portrait mode on my iPad and the tiny narrow calendar view is annoying.I would also prefer to get a real human response from tech support the first time. The AI assumes you know nothing and didn’t read the instructions or documentation before requesting help. It was a bit off-putting for someone with decades of experience working with computers. What’s New Version History Bug fixes and performance improvements 1.86.0 11/22/2025 Bug fixes and performance improvements 1.85.0 11/13/2025 Bug fixes and performance improvements 1.83.0 07/13/2025 Bug fixes and performance improvements 1.82.0 07/08/2025 Bug fixes and performance improvements 1.81.0 06/23/2025 Bug fixes and performance improvements. 1.80.0 06/05/2025 Bug fixes and performance improvements. 1.79.0 06/03/2025 Bug fixes and performance improvements. 1.78.0 06/01/2025 Bug fixes and performance improvements. 1.77.0 05/21/2025 Bug fixes and performance improvements. 1.76.0 05/15/2025 Bug fixes and performance improvements. 1.75.0 05/09/2025 Bug fixes and performance improvements. 1.74.0 05/07/2025 Bug fixes and performance improvements. 1.73.0 04/02/2025 Bug fixes and performance improvements. 1.72.0 03/18/2025 Bug fixes and performance improvements. 1.71.0 03/13/2025 Bug fixes and performance improvements. 1.70.0 03/04/2025 Bug fixes and performance improvements. 1.69.0 02/07/2025 Bug fixes and performance improvements. 1.68.0 01/31/2025 Bug fixes and performance improvements. 1.67.0 01/09/2025 Bug fixes and performance improvements. 1.66.0 12/16/2024 Bug fixes and performance improvements. 1.65.0 12/12/2024 Bug fixes and performance improvements. 1.64.0 12/11/2024 Bug fixes and performance improvements. 1.63.0 12/02/2024 Bug fixes and performance improvements. 1.62 11/25/2024 Bug fixes and performance improvements. 1.61.0 11/18/2024 Bug fixes and performance improvements more Version 1.86.0 11/22/2025 App Privacy App Privacy The developer, Notion Labs, Incorporated , indicated that the app’s privacy practices may include handling of data as described below. This information has not been verified by Apple. For more information, see the developer’s privacy policy . To help you better understand the developer’s responses, see Privacy Definitions and Examples . Privacy practices may vary, for example, based on the features you use or your age. Learn More Data Linked to You The following data, which may be collected and linked to your identity, may be used for the following purposes: Analytics Contact Info Email Address Name Identifiers User ID Device ID Usage Data Product Interaction App Functionality Contact Info Email Address Name Identifiers User ID Device ID Data Not Linked to You The following data, which may be collected but is not linked to your identity, may be used for the following purposes: App Functionality Diagnostics Crash Data Performance Data The developer, Notion Labs, Incorporated , indicated that the app’s privacy practices may include handling of data as described below. For more information, see the developer’s privacy policy . Data Linked to You The following data may be collected and linked to your identity: Contact Info Identifiers Usage Data Data Not Linked to You The following data may be collected but it is not linked to your identity: Diagnostics Privacy practices may vary, for example, based on the features you use or your age. Learn More Accessibility The developer has not yet indicated which accessibility features this app supports. Learn More Information Seller Notion Labs, Incorporated Size 40.4 MB Category Productivity Compatibility Requires iOS 15.0 or later. iPhone Requires iOS 15.0 or later. iPod touch Requires iOS 15.0 or later. Apple Vision Requires visionOS 1.0 or later. Languages English and 16 more English, Danish, Dutch, Finnish, French, German, Indonesian, Japanese, Korean, Norwegian Bokmål, Portuguese, Simplified Chinese, Spanish, Swedish, Thai, Traditional Chinese, Vietnamese Age Rating 4+ 4+ Learn More Copyright ©2025 Notion Labs, Incorporated Developer Website Privacy Policy More by Notion Labs, Incorporated Notion: Notes, Tasks, AI Plan, organize, track projects View Notion Mail Productivity View You Might Also Like To-Do List & Tasks for Notion Calendar, Planner & Reminders View Notion Widget Quick access to Notion. View TickTick:To-Do List & Calendar Task remind, planner,countdown View Structured - Daily Planner Calendar, Reminder & To Do View Todoist: To Do List & Calendar Task manager & Reminders View Tasks for Notion - To-Do List Calendar Planner & Reminders View SyncTasks To-do list, syncs with Notion View Calendars: Schedule Planner 2026 Daily Organizer・Reminder View Fantastical Calendar Reminders & Todo List View Tiimo: AI Planner & To-do ADHD Task & Planning assistant View United States Español (México) العربية Русский 简体中文 Français (France) 한국어 Português (Brazil) Tiếng Việt 繁體中文 (台灣) Select a country or region Africa, Middle East, and India See All Algeria Angola Armenia Azerbaijan Bahrain Benin Botswana Brunei Darussalam Burkina Faso Cameroun Cape Verde Chad Côte d’Ivoire Congo, The Democratic Republic Of The Egypt Eswatini Gabon Gambia Ghana Guinea-Bissau India Iraq Israel Jordan Kenya Kuwait Lebanon Liberia Libya Madagascar Malawi Mali Mauritania Mauritius Morocco Mozambique Namibia Niger (English) Nigeria Oman Qatar Congo, Republic of Rwanda São Tomé and Príncipe Saudi Arabia Senegal Seychelles Sierra Leone South Africa Sri Lanka Tajikistan Tanzania, United Republic Of Tunisia Turkmenistan United Arab Emirates Uganda Yemen Zambia Zimbabwe Asia Pacific See All Afghanistan Australia Bhutan Cambodia 中国大陆 Fiji 香港 Indonesia (English) 日本 Kazakhstan 대한민국 Kyrgyzstan Lao People's Democratic Republic 澳門 Malaysia (English) Maldives Micronesia, Federated States of Mongolia Myanmar Nauru Nepal New Zealand Pakistan Palau Papua New Guinea Philippines Singapore Solomon Islands 台灣 Thailand Tonga Turkmenistan Uzbekistan Vanuatu Vietnam Europe See All Albania Armenia Österreich Belarus Belgium Bosnia and Herzegovina Bulgaria Croatia Cyprus Czechia Denmark Estonia Finland France (Français) Georgia Deutschland Greece Hungary Iceland Ireland Italia Kosovo Latvia Lithuania Luxembourg (English) Malta Moldova, Republic Of Montenegro Nederland North Macedonia Norway Poland Portugal (Português) Romania Россия Serbia Slovakia Slovenia España Sverige Schweiz Türkiye (English) Ukraine United Kingdom Latin America and the Caribbean See All Anguilla Antigua and Barbuda Argentina (Español) Bahamas Barbados Belize Bermuda Bolivia (Español) Brasil Virgin Islands, British Cayman Islands Chile (Español) Colombia (Español) Costa Rica (Español) Dominica República Dominicana Ecuador (Español) El Salvador (Español) Grenada Guatemala (Español) Guyana Honduras (Español) Jamaica México Montserrat Nicaragua (Español) Panamá Paraguay (Español) Perú St. Kitts and Nevis Saint Lucia St. Vincent and The Grenadines Suriname Trinidad and Tobago Turks and Caicos Uruguay (English) Venezuela (Español) The United States and Canada See All Canada (English) Canada (Français) United States Estados Unidos (Español México) الولايات المتحدة США 美国 (简体中文) États-Unis (Français France) 미국 Estados Unidos (Português Brasil) Hoa Kỳ 美國 (繁體中文台灣) Copyright © 2026 Apple Inc. All rights reserved. Internet Service Terms App Store & Privacy Cookie Warning Support
2026-01-13T09:29:57
https://infisical.com/docs/documentation/platform/identities/azure-auth
Azure Auth - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Machine Identities Azure Auth Platform Products CLI Reference API Reference SDKs Changelog Getting Started Overview What is Infisical? Concepts Guides Platform Reference Organizations Projects Identities Access Control Audit Logs App Connections Events Workflow Integrations External Migrations Server Admin Console Secret Sharing Connectivity Networking Gateway Authentication Methods User Authentication Machine Identities Explore Options Alibaba Cloud Auth AWS Auth Azure Auth GCP Auth JWT Auth Kubernetes Auth OCI Auth Token Auth TLS Certificate Auth Universal Auth OIDC Auth LDAP Auth Machine Identity Auth Templates Service Token MFA GitHub Team Sync Self-host Infisical Introduction Installation methods Linux Package Replication Upgrade Infisical Instance Environment Variables Release Channels Hardware requirements Guides Reference architectures Infisical Enterprise FAQ Internals Overview Permissions Architecture Security Service tokens Contributing Getting Started Contributing to platform On this page Diagram Concept Guide Machine Identities Azure Auth Learn how to authenticate with Infisical for services on Azure Azure Auth is an Azure-native authentication method for Azure resources like Azure VMs, Azure App Services, Azure Functions, Azure Kubernetes Service, etc. to access Infisical. ​ Diagram The following sequence diagram illustrates the Azure Auth workflow for authenticating Azure service principals with Infisical. ​ Concept At a high-level, Infisical authenticates an Azure service by verifying its identity and checking that it meets specific requirements (e.g. it is bound to an allowed service principal) at the /api/v1/auth/azure-auth/login endpoint. If successful, then Infisical returns a short-lived access token that can be used to make authenticated requests to the Infisical API. To be more specific: The client running on an Azure service obtains an access token that is a JWT token representing the managed identity for the Azure resource such as a Virtual Machine; the managed identity is associated with a service principal in Azure AD. The client sends the access token to Infisical. Infisical verifies the token against the corresponding public key at the public Azure AD OpenID configuration endpoint . Infisical checks if the entity behind the access token is allowed to authenticate with Infisical based on set criteria such as Allowed Service Principal IDs . If all is well, Infisical returns a short-lived access token that the client can use to make authenticated requests to the Infisical API. We recommend using one of Infisical’s clients like SDKs or the Infisical Agent to authenticate with Infisical using Azure Auth as they handle the authentication process including generating the client access token for you. Also, note that Infisical needs network-level access to send requests to the Google Cloud API as part of the Azure Auth workflow. ​ Guide In the following steps, we explore how to create and use identities for your applications in Azure to access the Infisical API using the Azure Auth authentication method. 1 Creating an identity To create an identity, head to your Organization Settings > Access Control > Identities and press Create identity . When creating an identity, you specify an organization level role for it to assume; you can configure roles in Organization Settings > Access Control > Organization Roles. Now input a few details for your new identity. Here’s some guidance for each field: Name (required): A friendly name for the identity. Role (required): A role from the Organization Roles tab for the identity to assume. The organization role assigned will determine what organization level resources this identity can have access to. Once you’ve created an identity, you’ll be redirected to a page where you can manage the identity. Since the identity has been configured with Universal Auth by default, you should re-configure it to use Azure Auth instead. To do this, press to edit the Authentication section, remove the existing Universal Auth configuration, and add a new Azure Auth configuration onto the identity. Here’s some more guidance on each field: Tenant ID: The tenant ID for the Azure AD organization. Resource / Audience: The resource URL for the application registered in Azure AD. The value is expected to match the aud claim of the access token JWT later used in the login operation against Infisical. See the resource parameter for how the audience is set when requesting a JWT access token from the Azure Instance Metadata Service (IMDS) endpoint. In most cases, this value should be https://management.azure.com/ which is the default. Allowed Service Principal IDs: A comma-separated list of Azure AD service principal IDs that are allowed to authenticate with Infisical. Access Token TTL (default is 2592000 equivalent to 30 days): The lifetime for an acccess token in seconds. This value will be referenced at renewal time. Access Token Max TTL (default is 2592000 equivalent to 30 days): The maximum lifetime for an acccess token in seconds. This value will be referenced at renewal time. Access Token Max Number of Uses (default is 0 ): The maximum number of times that an access token can be used; a value of 0 implies infinite number of uses. Access Token Trusted IPs: The IPs or CIDR ranges that access tokens can be used from. By default, each token is given the 0.0.0.0/0 , allowing usage from any network address. 2 Adding an identity to a project To enable the identity to access project-level resources such as secrets within a specific project, you should add it to that project. To do this, head over to the project you want to add the identity to and go to Project Settings > Access Control > Machine Identities and press Add identity . Next, select the identity you want to add to the project and the project level role you want to allow it to assume. The project role assigned will determine what project level resources this identity can have access to. 3 Accessing the Infisical API with the identity To access the Infisical API as the identity, you need to generate a managed identity access token that is a JWT token representing the managed identity for the Azure resource such as a Virtual Machine. The client token must be sent to the /api/v1/auth/azure-auth/login endpoint in exchange for a separate access token to access the Infisical API. We provide a few code examples below of how you can authenticate with Infisical to access the Infisical API . Sample code for generating the access token Start by making a request from your Azure client such as Virtual Machine to obtain a managed identity access token. For more examples of how to obtain the managed identity access token, refer to the official documentation . ​ Sample request curl Copy Ask AI curl 'http://169.254.169.254/metadata/identity/oauth2/token?api-version=2018-02-01&resource=https%3A%2F%2Fmanagement.azure.com%2F' -H Metadata: true -s ​ Sample response Copy Ask AI { "access_token" : "eyJ0eXAi...", "refresh_token" : "", "expires_in" : "3599", "expires_on" : "1506484173", "not_before" : "1506480273", "resource" : "https://management.azure.com/", "token_type" : "Bearer" } Next use send the obtained managed identity access token (i.e. the token from the access_token field above) to authenticate with Infisical and obtain a separate access token. ​ Sample request Request Copy Ask AI curl --location --request POST 'https://app.infisical.com/api/v1/auth/gcp-auth/login' \ --header 'Content-Type: application/x-www-form-urlencoded' \ --data-urlencode 'identityId=...' \ --data-urlencode 'jwt=...' Note that you should replace <identityId> with the ID of the identity you created in step 1. ​ Sample response Response Copy Ask AI { "accessToken" : "...", "expiresIn" : 7200, "accessTokenMaxTTL" : 43244 "tokenType" : "Bearer" } Next, you can use this access token to access the Infisical API We recommend using one of Infisical’s clients like SDKs or the Infisical Agent to authenticate with Infisical using Azure Auth as they handle the authentication process including retrieving the client access token. Each identity access token has a time-to-live (TTL) which you can infer from the response of the login operation; the default TTL is 7200 seconds which can be adjusted. If an identity access token expires, it can no longer authenticate with the Infisical API. In this case, a new access token should be obtained by performing another login operation. Was this page helpful? Yes No Suggest edits Raise issue AWS Auth GCP Auth ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback & Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"16:[\"$\",\"$L24\",null,{\"children\":[\"$\",\"$L5\",null,{\"appearance\":{\"default\":\"light\",\"strict\":true},\"codeblockTheme\":\"dark\",\"children\":[false,[\"$\",\"$L25\",null,{\"id\":\"_mintlify-banner-script\",\"strategy\":\"beforeInteractive\",\"dangerouslySetInnerHTML\":{\"__html\":\"(function j(a,b,c,d,e){try{let f,g,h=[];try{h=window.location.pathname.split(\\\"/\\\").filter(a=\u003e\\\"\\\"!==a\u0026\u0026\\\"global\\\"!==a).slice(0,2)}catch{h=[]}let i=h.find(a=\u003ec.includes(a)),j=[];for(let c of(i?j.push(i):j.push(b),j.push(\\\"global\\\"),j)){if(!c)continue;let b=a[c];if(b?.content){f=b.content,g=c;break}}if(!f)return void document.documentElement.setAttribute(d,\\\"hidden\\\");let k=!0,l=0;for(;l\u003clocalStorage.length;){let a=localStorage.key(l);if(l++,!a?.endsWith(e))continue;let b=localStorage.getItem(a);if(b\u0026\u0026b===f){k=!1;break}g\u0026\u0026(a.startsWith(`lang:${g}_`)||!a.startsWith(\\\"lang:\\\"))\u0026\u0026(localStorage.removeItem(a),l--)}document.documentElement.setAttribute(d,k?\\\"visible\\\":\\\"hidden\\\")}catch(a){console.error(a),document.documentElement.setAttribute(d,\\\"hidden\\\")}})(\\n {},\\n \\\"en\\\",\\n [],\\n \\\"data-banner-state\\\",\\n \\\"bannerDismissed\\\",\\n)\"}}],[\"$\",\"$L26\",null,{\"appId\":\"$undefined\",\"autoBoot\":true,\"children\":[\"$\",\"$L27\",null,{\"value\":{\"auth\":\"$undefined\",\"userAuth\":\"$undefined\"},\"children\":[\"$\",\"$L28\",null,{\"value\":{\"subdomain\":\"infisical\",\"actualSubdomain\":\"infisical\",\"gitSource\":{\"type\":\"github\",\"owner\":\"infisical\",\"repo\":\"infisical\",\"deployBranch\":\"main\",\"contentDirectory\":\"docs\"},\"inkeep\":{\"integrationApiKey\":\"a2e2846da1a227961e3519816ce2bfb868f7d86467d289de\"},\"trieve\":{\"chatEnabled\":true,\"datasetId\":\"cdc6f647-bdca-43d9-a3e5-f398c156d553\"},\"feedback\":{\"thumbs\":true,\"edits\":true,\"issues\":true},\"entitlements\":{\"AI_CHAT\":{\"status\":\"ENABLED\"}},\"buildId\":\"69659e6f05d1218cf2d5c729:success\",\"clientVersion\":\"0.0.2335\",\"preview\":\"$undefined\"},\"children\":[\"$\",\"$L29\",null,{\"value\":{\"docsConfig\":{\"theme\":\"mint\",\"$schema\":\"https://mintlify.com/docs.json\",\"name\":\"Infisical\",\"colors\":{\"primary\":\"#26272b\",\"light\":\"#97b31d\",\"dark\":\"#A1B659\"},\"logo\":{\"light\":\"https://mintlify.s3.us-west-1.amazonaws.com/infisical/logo/light.svg\",\"dark\":\"https://mintlify.s3.us-west-1.amazonaws.com/infisical/logo/dark.svg\",\"href\":\"https://infisical.com\"},\"favicon\":\"/favicon.ico\",\"api\":{\"openapi\":\"https://app.infisical.com/api/docs/json\",\"mdx\":{\"server\":[\"https://app.infisical.com\"]}},\"appearance\":\"$16:props:children:props:appearance\",\"background\":{\"color\":{\"light\":\"#ffffff\",\"dark\":\"#0D1117\"}},\"navbar\":{\"links\":[{\"label\":\"Log In\",\"href\":\"https://app.infisical.com/login\"}],\"primary\":{\"type\":\"button\",\"label\":\"Start for Free\",\"href\":\"https://app.infisical.com/signup\"}},\"navigation\":{\"tabs\":[{\"tab\":\"Platform\",\"groups\":[{\"group\":\"Getting Started\",\"pages\":[\"documentation/getting-started/overview\",\"documentation/getting-started/introduction\",{\"group\":\"Concepts\",\"pages\":[\"documentation/getting-started/concepts/deployment-models\",\"documentation/getting-started/concepts/platform-hierarchy\",\"documentation/getting-started/concepts/platform-iam\",\"documentation/getting-started/concepts/client-integrations\",\"documentation/getting-started/concepts/audit-logs\"]},{\"group\":\"Guides\",\"pages\":[\"documentation/guides/governance-models\",\"documentation/guides/organization-structure\"]}]},{\"group\":\"Platform Reference\",\"pages\":[\"documentation/platform/organization\",{\"group\":\"Projects\",\"pages\":[\"documentation/platform/project\",\"documentation/platform/project-templates\",{\"group\":\"KMS Configuration\",\"pages\":[\"documentation/platform/kms-configuration/overview\",\"documentation/platform/kms-configuration/aws-kms\",\"documentation/platform/kms-configuration/aws-hsm\",\"documentation/platform/kms-configuration/gcp-kms\"]}]},{\"group\":\"Identities\",\"pages\":[\"documentation/platform/identities/overview\",\"documentation/platform/identities/user-identities\",\"documentation/platform/identities/machine-identities\"]},{\"group\":\"Access Control\",\"pages\":[\"documentation/platform/access-controls/overview\",\"documentation/platform/access-controls/role-based-access-controls\",{\"group\":\"Attribute based access controls\",\"pages\":[\"documentation/platform/access-controls/abac/overview\",\"documentation/platform/access-controls/abac/managing-user-metadata\",\"documentation/platform/access-controls/abac/managing-machine-identity-attributes\"]},\"documentation/platform/access-controls/additional-privileges\",\"documentation/platform/access-controls/temporary-access\",\"documentation/platform/access-controls/assume-privilege\",\"documentation/platform/access-controls/access-requests\",\"documentation/platform/access-controls/project-access-requests\",\"documentation/platform/pr-workflows\",\"documentation/platform/groups\"]},{\"group\":\"Audit Logs\",\"pages\":[\"documentation/platform/audit-logs\",\"documentation/platform/audit-log-streams/audit-log-streams\",\"documentation/platform/audit-log-streams/audit-log-streams-with-fluentbit\"]},{\"group\":\"App Connections\",\"pages\":[\"integrations/app-connections\",\"integrations/app-connections/overview\",{\"group\":\"Connections\",\"pages\":[\"integrations/app-connections/1password\",\"integrations/app-connections/auth0\",\"integrations/app-connections/aws\",\"integrations/app-connections/azure-app-configuration\",\"integrations/app-connections/azure-adcs\",\"integrations/app-connections/azure-client-secrets\",\"integrations/app-connections/azure-devops\",\"integrations/app-connections/azure-key-vault\",\"integrations/app-connections/bitbucket\",\"integrations/app-connections/camunda\",\"integrations/app-connections/checkly\",\"integrations/app-connections/chef\",\"integrations/app-connections/cloudflare\",\"integrations/app-connections/databricks\",\"integrations/app-connections/digital-ocean\",\"integrations/app-connections/dns-made-easy\",\"integrations/app-connections/flyio\",\"integrations/app-connections/gcp\",\"integrations/app-connections/github\",\"integrations/app-connections/github-radar\",\"integrations/app-connections/gitlab\",\"integrations/app-connections/hashicorp-vault\",\"integrations/app-connections/heroku\",\"integrations/app-connections/humanitec\",\"integrations/app-connections/laravel-forge\",\"integrations/app-connections/ldap\",\"integrations/app-connections/mssql\",\"integrations/app-connections/mongodb\",\"integrations/app-connections/mysql\",\"integrations/app-connections/netlify\",\"integrations/app-connections/northflank\",\"integrations/app-connections/oci\",\"integrations/app-connections/octopus-deploy\",\"integrations/app-connections/okta\",\"integrations/app-connections/oracledb\",\"integrations/app-connections/postgres\",\"integrations/app-connections/railway\",\"integrations/app-connections/redis\",\"integrations/app-connections/render\",\"integrations/app-connections/supabase\",\"integrations/app-connections/teamcity\",\"integrations/app-connections/terraform-cloud\",\"integrations/app-connections/vercel\",\"integrations/app-connections/windmill\",\"integrations/app-connections/zabbix\"]}]},\"documentation/platform/event-subscriptions\",{\"group\":\"Workflow Integrations\",\"pages\":[\"documentation/platform/workflow-integrations/slack-integration\",\"documentation/platform/workflow-integrations/microsoft-teams-integration\"]},{\"group\":\"External Migrations\",\"pages\":[\"documentation/platform/external-migrations/overview\",\"documentation/platform/external-migrations/envkey\",\"documentation/platform/external-migrations/vault\"]},\"documentation/platform/admin-panel/server-admin\",\"documentation/platform/secret-sharing\"]},{\"group\":\"Connectivity\",\"pages\":[\"documentation/setup/networking\",{\"group\":\"Gateway\",\"pages\":[\"documentation/platform/gateways/overview\",\"documentation/platform/gateways/gateway-deployment\",{\"group\":\"Relay Deployment\",\"pages\":[\"documentation/platform/gateways/relay-deployment/overview\",\"documentation/platform/gateways/relay-deployment/terraform\"]},\"documentation/platform/gateways/security\"]}]},{\"group\":\"Authentication Methods\",\"pages\":[{\"group\":\"User Authentication\",\"pages\":[\"integrations/user-authentication\",\"documentation/platform/auth-methods/email-password\",{\"group\":\"SSO\",\"pages\":[\"documentation/platform/sso/overview\",\"documentation/platform/sso/google\",\"documentation/platform/sso/github\",\"documentation/platform/sso/gitlab\",\"documentation/platform/sso/okta\",\"documentation/platform/sso/azure\",\"documentation/platform/sso/jumpcloud\",\"documentation/platform/sso/keycloak-saml\",\"documentation/platform/sso/google-saml\",\"documentation/platform/sso/auth0-saml\",{\"group\":\"OIDC\",\"pages\":[{\"group\":\"Keycloak OIDC\",\"pages\":[\"documentation/platform/sso/keycloak-oidc/overview\",\"documentation/platform/sso/keycloak-oidc/group-membership-mapping\"]},\"documentation/platform/sso/auth0-oidc\",\"documentation/platform/sso/pingone-oidc\",{\"group\":\"General OIDC\",\"pages\":[\"documentation/platform/sso/general-oidc/overview\",\"documentation/platform/sso/general-oidc/group-membership-mapping\"]}]}]},{\"group\":\"LDAP\",\"pages\":[\"documentation/platform/ldap/overview\",\"documentation/platform/ldap/jumpcloud\",\"documentation/platform/ldap/general\"]},{\"group\":\"SCIM\",\"pages\":[\"documentation/platform/scim/overview\",\"documentation/platform/scim/okta\",\"documentation/platform/scim/azure\",\"documentation/platform/scim/jumpcloud\",\"documentation/platform/scim/pingone\",\"documentation/platform/scim/group-mappings\"]}]},{\"group\":\"Machine Identities\",\"pages\":[\"integrations/machine-authentication\",\"documentation/platform/identities/alicloud-auth\",\"documentation/platform/identities/aws-auth\",\"documentation/platform/identities/azure-auth\",\"documentation/platform/identities/gcp-auth\",\"documentation/platform/identities/jwt-auth\",\"documentation/platform/identities/kubernetes-auth\",\"documentation/platform/identities/oci-auth\",\"documentation/platform/identities/token-auth\",\"documentation/platform/identities/tls-cert-auth\",\"documentation/platform/identities/universal-auth\",{\"group\":\"OIDC Auth\",\"pages\":[\"documentation/platform/identities/oidc-auth/general\",\"documentation/platform/identities/oidc-auth/azure\",\"documentation/platform/identities/oidc-auth/github\",\"documentation/platform/identities/oidc-auth/circleci\",\"documentation/platform/identities/oidc-auth/gitlab\",\"documentation/platform/identities/oidc-auth/terraform-cloud\",\"documentation/platform/identities/oidc-auth/spire\"]},{\"group\":\"LDAP Auth\",\"pages\":[\"documentation/platform/identities/ldap-auth/general\",\"documentation/platform/identities/ldap-auth/jumpcloud\"]}]},\"documentation/platform/identities/auth-templates\",\"documentation/platform/token\",\"documentation/platform/mfa\",\"documentation/platform/github-org-sync\"]},{\"group\":\"Self-host Infisical\",\"pages\":[\"self-hosting/overview\",{\"group\":\"Installation methods\",\"pages\":[\"self-hosting/deployment-options/standalone-infisical\",\"self-hosting/deployment-options/docker-swarm\",\"self-hosting/deployment-options/docker-compose\",\"self-hosting/deployment-options/kubernetes-helm\"]},{\"group\":\"Linux Package\",\"pages\":[\"self-hosting/deployment-options/native/linux-package/installation\",\"self-hosting/deployment-options/native/linux-package/commands-configuration\",\"self-hosting/deployment-options/linux-upgrade\"]},\"self-hosting/guides/replication\",\"self-hosting/guides/upgrading-infisical\",\"self-hosting/configuration/envars\",\"self-hosting/guides/releases\",\"self-hosting/configuration/requirements\",{\"group\":\"Guides\",\"pages\":[\"self-hosting/guides/mongo-to-postgres\",\"self-hosting/guides/custom-certificates\",\"self-hosting/guides/automated-bootstrapping\",\"self-hosting/guides/production-hardening\",\"self-hosting/guides/monitoring-telemetry\"]},{\"group\":\"Reference architectures\",\"pages\":[\"self-hosting/reference-architectures/aws-ecs\",\"self-hosting/reference-architectures/linux-deployment-ha\",\"self-hosting/reference-architectures/on-prem-k8s-ha\",\"self-hosting/reference-architectures/google-cloud-run\"]},\"self-hosting/ee\",\"self-hosting/faq\"]},{\"group\":\"Internals\",\"pages\":[\"internals/overview\",{\"group\":\"Permissions\",\"pages\":[\"internals/permissions/overview\",\"internals/permissions/project-permissions\",\"internals/permissions/organization-permissions\",\"internals/permissions/migration\"]},{\"group\":\"Architecture\",\"pages\":[\"internals/architecture/components\",\"internals/architecture/cloud\"]},\"internals/security\",\"internals/service-tokens\"]},{\"group\":\"Contributing\",\"pages\":[{\"group\":\"Getting Started\",\"pages\":[\"contributing/getting-started/overview\",\"contributing/getting-started/code-of-conduct\",\"contributing/getting-started/pull-requests\"]},{\"group\":\"Contributing to platform\",\"pages\":[\"contributing/platform/developing\",\"contributing/platform/backend/how-to-create-a-feature\",\"contributing/platform/backend/folder-structure\"]}]}]},{\"tab\":\"Products\",\"menu\":[{\"item\":\"Secrets Management\",\"groups\":[{\"group\":\"Secrets Management\",\"pages\":[\"documentation/platform/secrets-mgmt/overview\",{\"group\":\"Concepts\",\"pages\":[\"documentation/platform/secrets-mgmt/concepts/secrets-mgmt\",\"documentation/platform/secrets-mgmt/concepts/access-control\",\"documentation/platform/secrets-mgmt/concepts/secrets-delivery\",\"documentation/platform/secrets-mgmt/concepts/secrets-rotation\",\"documentation/platform/secrets-mgmt/concepts/dynamic-secrets\"]},{\"group\":\"Guides\",\"pages\":[\"documentation/guides/introduction\",\"documentation/guides/local-development\",\"documentation/guides/node\",\"documentation/guides/python\",\"documentation/guides/nextjs-vercel\",\"documentation/guides/kubernetes-operator\",\"documentation/guides/microsoft-power-apps\"]}]},{\"group\":\"Product Reference\",\"pages\":[\"documentation/platform/secrets-mgmt/project\",\"documentation/platform/folder\",\"documentation/platform/secret-versioning\",\"documentation/platform/pit-recovery\",\"documentation/platform/secret-reference\",{\"group\":\"Secret Rotation\",\"pages\":[\"integrations/secret-rotations\",\"documentation/platform/secret-rotation/overview\",\"documentation/platform/secret-rotation/auth0-client-secret\",\"documentation/platform/secret-rotation/aws-iam-user-secret\",\"documentation/platform/secret-rotation/azure-client-secret\",\"documentation/platform/secret-rotation/databricks-service-principal-secret\",\"documentation/platform/secret-rotation/ldap-password\",\"documentation/platform/secret-rotation/mongodb-credentials\",\"documentation/platform/secret-rotation/mssql-credentials\",\"documentation/platform/secret-rotation/mysql-credentials\",\"documentation/platform/secret-rotation/okta-client-secret\",\"documentation/platform/secret-rotation/oracledb-credentials\",\"documentation/platform/secret-rotation/postgres-credentials\",\"documentation/platform/secret-rotation/redis-credentials\"]},{\"group\":\"Dynamic Secrets\",\"pages\":[\"integrations/dynamic-secrets\",\"documentation/platform/dynamic-secrets/overview\",\"documentation/platform/dynamic-secrets/aws-elasticache\",\"documentation/platform/dynamic-secrets/aws-iam\",\"documentation/platform/dynamic-secrets/azure-entra-id\",\"documentation/platform/dynamic-secrets/azure-sql-database\",\"documentation/platform/dynamic-secrets/cassandra\",\"documentation/platform/dynamic-secrets/couchbase\",\"documentation/platform/dynamic-secrets/elastic-search\",\"documentation/platform/dynamic-secrets/gcp-iam\",\"documentation/platform/dynamic-secrets/github\",\"documentation/platform/dynamic-secrets/ldap\",\"documentation/platform/dynamic-secrets/mongo-atlas\",\"documentation/platform/dynamic-secrets/mongo-db\",\"documentation/platform/dynamic-secrets/mssql\",\"documentation/platform/dynamic-secrets/mysql\",\"documentation/platform/dynamic-secrets/oracle\",\"documentation/platform/dynamic-secrets/postgresql\",\"documentation/platform/dynamic-secrets/rabbit-mq\",\"documentation/platform/dynamic-secrets/redis\",\"documentation/platform/dynamic-secrets/sap-ase\",\"documentation/platform/dynamic-secrets/sap-hana\",\"documentation/platform/dynamic-secrets/snowflake\",\"documentation/platform/dynamic-secrets/totp\",\"documentation/platform/dynamic-secrets/kubernetes\",\"documentation/platform/dynamic-secrets/vertica\"]},\"documentation/platform/webhooks\"]},{\"group\":\"Infrastructure Integrations\",\"pages\":[\"integrations/platforms/ansible\",\"integrations/platforms/apache-airflow\",{\"group\":\"AWS\",\"pages\":[\"integrations/platforms/aws/lambda\"]},{\"group\":\"Kubernetes Operator\",\"pages\":[\"integrations/platforms/kubernetes/overview\",\"integrations/platforms/kubernetes/infisical-secret-crd\",\"integrations/platforms/kubernetes/infisical-push-secret-crd\",\"integrations/platforms/kubernetes/infisical-dynamic-secret-crd\"]},\"integrations/platforms/kubernetes-injector\",\"integrations/platforms/kubernetes-csi\",{\"group\":\"Agent\",\"pages\":[\"integrations/platforms/infisical-agent\",\"integrations/platforms/docker-swarm-with-agent\",\"integrations/platforms/ecs-with-agent\"]},{\"group\":\"Docker\",\"pages\":[\"integrations/platforms/docker-intro\",\"integrations/platforms/docker\",\"integrations/platforms/docker-pass-envs\",\"integrations/platforms/docker-compose\"]},\"integrations/frameworks/packer\",\"integrations/frameworks/pulumi\",\"integrations/frameworks/terraform\"]},{\"group\":\"Secret Syncs\",\"pages\":[\"integrations/secret-syncs\",\"integrations/secret-syncs/overview\",{\"group\":\"Syncs\",\"pages\":[\"integrations/secret-syncs/1password\",\"integrations/secret-syncs/aws-parameter-store\",\"integrations/secret-syncs/aws-secrets-manager\",\"integrations/secret-syncs/azure-app-configuration\",\"integrations/secret-syncs/azure-devops\",\"integrations/secret-syncs/azure-key-vault\",\"integrations/secret-syncs/bitbucket\",\"integrations/secret-syncs/camunda\",\"integrations/secret-syncs/checkly\",\"integrations/secret-syncs/chef\",\"integrations/secret-syncs/cloudflare-pages\",\"integrations/secret-syncs/cloudflare-workers\",\"integrations/secret-syncs/databricks\",\"integrations/secret-syncs/digital-ocean-app-platform\",\"integrations/secret-syncs/flyio\",\"integrations/secret-syncs/gcp-secret-manager\",\"integrations/secret-syncs/github\",\"integrations/secret-syncs/gitlab\",\"integrations/secret-syncs/hashicorp-vault\",\"integrations/secret-syncs/heroku\",\"integrations/secret-syncs/humanitec\",\"integrations/secret-syncs/laravel-forge\",\"integrations/secret-syncs/netlify\",\"integrations/secret-syncs/northflank\",\"integrations/secret-syncs/oci-vault\",\"integrations/secret-syncs/octopus-deploy\",\"integrations/secret-syncs/railway\",\"integrations/secret-syncs/render\",\"integrations/secret-syncs/supabase\",\"integrations/secret-syncs/teamcity\",\"integrations/secret-syncs/terraform-cloud\",\"integrations/secret-syncs/vercel\",\"integrations/secret-syncs/windmill\",\"integrations/secret-syncs/zabbix\"]}]},{\"group\":\"CI/CD Integrations\",\"pages\":[\"integrations/cicd/aws-amplify\",\"integrations/cicd/bitbucket\",\"integrations/cicd/githubactions\",\"integrations/cicd/gitlab\",\"integrations/cicd/jenkins\"]},{\"group\":\"Framework Integrations\",\"pages\":[\"integrations/framework-integrations\",\"integrations/frameworks/spring-boot-maven\",\"integrations/frameworks/react\",\"integrations/frameworks/vue\",\"integrations/frameworks/express\",{\"group\":\"View more\",\"pages\":[\"integrations/frameworks/nextjs\",\"integrations/frameworks/nestjs\",\"integrations/frameworks/sveltekit\",\"integrations/frameworks/nuxt\",\"integrations/frameworks/gatsby\",\"integrations/frameworks/remix\",\"integrations/frameworks/vite\",\"integrations/frameworks/fiber\",\"integrations/frameworks/django\",\"integrations/frameworks/flask\",\"integrations/frameworks/laravel\",\"integrations/frameworks/rails\",\"integrations/frameworks/dotnet\",\"integrations/platforms/pm2\",\"integrations/frameworks/ab-initio\"]}]},{\"group\":\"Build Tool Integrations\",\"pages\":[\"integrations/build-tools/gradle\"]},{\"group\":\"Others\",\"pages\":[\"integrations/external/backstage\"]}]},{\"item\":\"Secrets Scanning\",\"groups\":[{\"group\":\"Secrets Scanning\",\"pages\":[\"documentation/platform/secret-scanning/overview\",{\"group\":\"Concepts\",\"pages\":[\"documentation/platform/secret-scanning/concepts/secret-scanning\"]}]},{\"group\":\"Product Reference\",\"pages\":[\"documentation/platform/secret-scanning/usage\",\"documentation/platform/secret-scanning/bitbucket\",\"documentation/platform/secret-scanning/github\",\"documentation/platform/secret-scanning/gitlab\"]}]},{\"item\":\"Certificate Management\",\"groups\":[{\"group\":\"Certificate Management\",\"pages\":[\"documentation/platform/pki/overview\",{\"group\":\"Concepts\",\"pages\":[\"documentation/platform/pki/concepts/certificate-mgmt\",\"documentation/platform/pki/concepts/certificate-lifecycle\",\"documentation/platform/pki/concepts/certificate-components\"]},{\"group\":\"Guides\",\"pages\":[\"documentation/platform/pki/guides/request-cert-agent\",\"documentation/platform/pki/guides/request-cert-api\",\"documentation/platform/pki/guides/request-cert-acme\"]}]},{\"group\":\"Product Reference\",\"pages\":[{\"group\":\"Certificate Authorities\",\"pages\":[\"documentation/platform/pki/ca/overview\",\"documentation/platform/pki/ca/private-ca\",\"documentation/platform/pki/ca/external-ca\"]},{\"group\":\"Certificates\",\"pages\":[\"documentation/platform/pki/certificates/overview\",\"documentation/platform/pki/certificates/profiles\",\"documentation/platform/pki/certificates/templates\",\"documentation/platform/pki/certificates/certificates\"]},{\"group\":\"Enrollment Methods\",\"pages\":[\"documentation/platform/pki/enrollment-methods/overview\",\"documentation/platform/pki/enrollment-methods/api\",\"documentation/platform/pki/enrollment-methods/acme\",\"documentation/platform/pki/enrollment-methods/est\"]},\"documentation/platform/pki/alerting\"]},{\"group\":\"Infrastructure Integrations\",\"pages\":[\"integrations/platforms/certificate-agent\",\"documentation/platform/pki/k8s-cert-manager\",\"documentation/platform/pki/integration-guides/gloo-mesh\",\"documentation/platform/pki/integration-guides/windows-server-acme\",\"documentation/platform/pki/integration-guides/nginx-certbot\",\"documentation/platform/pki/integration-guides/apache-certbot\",\"documentation/platform/pki/integration-guides/tomcat-certbot\",\"documentation/platform/pki/integration-guides/jboss-certbot\"]},{\"group\":\"Certificate Syncs\",\"pages\":[\"documentation/platform/pki/certificate-syncs/overview\",\"documentation/platform/pki/certificate-syncs/aws-certificate-manager\",\"documentation/platform/pki/certificate-syncs/aws-secrets-manager\",\"documentation/platform/pki/certificate-syncs/azure-key-vault\",\"documentation/platform/pki/certificate-syncs/chef\"]},{\"group\":\"External CA Integrations\",\"pages\":[\"documentation/platform/pki/ca/acme-ca\",\"documentation/platform/pki/ca/lets-encrypt\",\"documentation/platform/pki/ca/digicert\",\"documentation/platform/pki/ca/azure-adcs\"]}]},{\"item\":\"Infisical KMS\",\"groups\":[{\"group\":\"Infisical KMS\",\"pages\":[\"documentation/platform/kms/overview\",\"documentation/platform/kms/hsm-integration\",\"documentation/platform/kms/kubernetes-encryption\",\"documentation/platform/kms/kmip\"]}]},{\"item\":\"Infisical PAM\",\"groups\":[{\"group\":\"Infisical PAM\",\"pages\":[\"documentation/platform/pam/overview\",{\"group\":\"Getting Started\",\"pages\":[\"documentation/platform/pam/getting-started/setup\",{\"group\":\"Resources\",\"pages\":[\"documentation/platform/pam/getting-started/resources\",\"documentation/platform/pam/getting-started/resources/aws-iam\",\"documentation/platform/pam/getting-started/resources/kubernetes\",\"documentation/platform/pam/getting-started/resources/redis\",\"documentation/platform/pam/getting-started/resources/ssh\"]},\"documentation/platform/pam/getting-started/accounts\"]},\"documentation/platform/pam/architecture\"]},{\"group\":\"Product Reference\",\"pages\":[\"documentation/platform/pam/product-reference/auditing\",\"documentation/platform/pam/product-reference/session-recording\",\"documentation/platform/pam/product-reference/credential-rotation\"]}]},{\"item\":\"Agent Sentinel\",\"groups\":[{\"group\":\"Agent Sentinel\",\"pages\":[\"documentation/platform/agent-sentinel/overview\",{\"group\":\"Concepts\",\"pages\":[\"documentation/platform/agent-sentinel/concepts/mcp-overview\"]}]},{\"group\":\"Product Reference\",\"pages\":[\"documentation/platform/agent-sentinel/mcp-servers\",\"documentation/platform/agent-sentinel/mcp-endpoints\",\"documentation/platform/agent-sentinel/activity-logs\"]}]}]},{\"tab\":\"CLI Reference\",\"groups\":[{\"group\":\"Command line\",\"pages\":[\"cli/overview\",\"cli/usage\",{\"group\":\"Core commands\",\"pages\":[\"cli/commands/login\",\"cli/commands/init\",\"cli/commands/run\",\"cli/commands/secrets\",\"cli/commands/dynamic-secrets\",\"cli/commands/ssh\",\"cli/commands/gateway\",\"cli/commands/relay\",\"cli/commands/bootstrap\",\"cli/commands/export\",\"cli/commands/token\",\"cli/commands/service-token\",\"cli/commands/vault\",\"cli/commands/user\",\"cli/commands/reset\",{\"group\":\"infisical scan\",\"pages\":[\"cli/commands/scan\",\"cli/commands/scan-git-changes\",\"cli/commands/scan-install\"]}]},\"cli/scanning-overview\",\"cli/project-config\",\"cli/faq\"]}]},{\"tab\":\"API Reference\",\"groups\":[{\"group\":\"Overview\",\"pages\":[\"api-reference/overview/introduction\",\"api-reference/overview/authentication\"]},{\"group\":\"Organization\",\"pages\":[{\"group\":\"Organization Users\",\"pages\":[\"api-reference/endpoints/organizations/memberships\",\"api-reference/endpoints/organizations/update-membership\",\"api-reference/endpoints/organizations/delete-membership\",\"api-reference/endpoints/organizations/bulk-delete-memberships\",\"api-reference/endpoints/organizations/list-identity-memberships\"]},{\"group\":\"Organization Groups\",\"pages\":[\"api-reference/endpoints/groups/create\",\"api-reference/endpoints/groups/update\",\"api-reference/endpoints/groups/delete\",\"api-reference/endpoints/groups/get\",\"api-reference/endpoints/groups/get-by-id\",\"api-reference/endpoints/groups/add-group-user\",\"api-reference/endpoints/groups/remove-group-user\",\"api-reference/endpoints/groups/list-group-users\",\"api-reference/endpoints/groups/add-group-machine-identity\",\"api-reference/endpoints/groups/remove-group-machine-identity\",\"api-reference/endpoints/groups/list-group-machine-identities\",\"api-reference/endpoints/groups/list-group-projects\",\"api-reference/endpoints/groups/list-group-members\"]},{\"group\":\"Organization Identities\",\"pages\":[\"api-reference/endpoints/identities/create\",\"api-reference/endpoints/identities/update\",\"api-reference/endpoints/identities/delete\",\"api-reference/endpoints/identities/get-by-id\",\"api-reference/endpoints/identities/list\",\"api-reference/endpoints/identities/search\"]},{\"group\":\"OIDC SSO\",\"pages\":[\"api-reference/endpoints/organizations/oidc-sso/get-oidc-config\",\"api-reference/endpoints/organizations/oidc-sso/update-oidc-config\",\"api-reference/endpoints/organizations/oidc-sso/create-oidc-config\"]},{\"group\":\"LDAP SSO\",\"pages\":[\"api-reference/endpoints/organizations/ldap-sso/get-ldap-config\",\"api-reference/endpoints/organizations/ldap-sso/update-ldap-config\",\"api-reference/endpoints/organizations/ldap-sso/create-ldap-config\"]},{\"group\":\"SAML SSO\",\"pages\":[\"api-reference/endpoints/organizations/saml-sso/get-saml-config\",\"api-reference/endpoints/organizations/saml-sso/update-saml-config\",\"api-reference/endpoints/organizations/saml-sso/create-saml-config\"]},{\"group\":\"SCIM\",\"pages\":[{\"group\":\" Group to Org Role Mappings\",\"pages\":[\"api-reference/endpoints/organizations/scim/group-org-role-mappings/list\",\"api-reference/endpoints/organizations/scim/group-org-role-mappings/update\"]}]}]},{\"group\":\"Project\",\"pages\":[{\"group\":\"Projects\",\"pages\":[\"api-reference/endpoints/projects/get-project-by-slug\",\"api-reference/endpoints/projects/create-project\",\"api-reference/endpoints/projects/delete-project\",\"api-reference/endpoints/projects/get-project\",\"api-reference/endpoints/projects/list-projects\",\"api-reference/endpoints/projects/update-project\",\"api-reference/endpoints/projects/secret-snapshots\",{\"group\":\"Legacy\",\"pages\":[\"api-reference/endpoints/deprecated/projects/get-project-by-slug\",\"api-reference/endpoints/deprecated/projects/create-project\",\"api-reference/endpoints/deprecated/projects/delete-project\",\"api-reference/endpoints/deprecated/projects/get-project\",\"api-reference/endpoints/deprecated/organizations/projects\",\"api-reference/endpoints/deprecated/projects/update-project\",\"api-reference/endpoints/deprecated/projects/secret-snapshots\"]}]},{\"group\":\"Project Users\",\"pages\":[\"api-reference/endpoints/project-users/invite-member-to-project\",\"api-reference/endpoints/project-users/remove-member-from-project\",\"api-reference/endpoints/project-users/memberships\",\"api-reference/endpoints/project-users/get-by-username\",\"api-reference/endpoints/project-users/update-membership\",{\"group\":\"Legacy\",\"pages\":[\"api-reference/endpoints/deprecated/project-users/invite-member-to-project\",\"api-reference/endpoints/deprecated/project-users/remove-member-from-project\",\"api-reference/endpoints/deprecated/project-users/memberships\",\"api-reference/endpoints/deprecated/project-users/get-by-username\",\"api-reference/endpoints/deprecated/project-users/update-membership\"]}]},{\"group\":\"Project Groups\",\"pages\":[\"api-reference/endpoints/project-groups/create\",\"api-reference/endpoints/project-groups/delete\",\"api-reference/endpoints/project-groups/get-by-id\",\"api-reference/endpoints/project-groups/list\",\"api-reference/endpoints/project-groups/update\",{\"group\":\"Legacy\",\"pages\":[\"api-reference/endpoints/deprecated/project-groups/create\",\"api-reference/endpoints/deprecated/project-groups/delete\",\"api-reference/endpoints/deprecated/project-groups/get-by-id\",\"api-reference/endpoints/deprecated/project-groups/list\",\"api-reference/endpoints/deprecated/project-groups/update\"]}]},{\"group\":\"Project Managed Identities\",\"pages\":[\"api-reference/endpoints/project-identities/add-identity\",\"api-reference/endpoints/project-identities/list-identity\",\"api-reference/endpoints/project-identities/get-by-id\",\"api-reference/endpoints/project-identities/update-identity\",\"api-reference/endpoints/project-identities/delete-identity\"]},{\"group\":\"Project Identity Memberships\",\"pages\":[\"api-reference/endpoints/project-identities-membership/add-identity-membership\",\"api-reference/endpoints/project-identities-membership/list-identity-memberships\",\"api-reference/endpoints/project-identities-membership/get-by-id\",\"api-reference/endpoints/project-identities-membership/update-identity-membership\",\"api-reference/endpoints/project-identities-membership/delete-identity-membership\",{\"group\":\"Legacy\",\"pages\":[\"api-reference/endpoints/deprecated/project-identities-v2/add-identity-membership\",\"api-reference/endpoints/deprecated/project-identities-v2/list-identity-memberships\",\"api-reference/endpoints/deprecated/project-identities-v2/get-by-id\",\"api-reference/endpoints/deprecated/project-identities-v2/update-identity-membership\",\"api-reference/endpoints/deprecated/project-identities-v2/delete-identity-membership\"]}]},{\"group\":\"Project Templates\",\"pages\":[\"api-reference/endpoints/project-templates/create\",\"api-reference/endpoints/project-templates/update\",\"api-reference/endpoints/project-templates/delete\",\"api-reference/endpoints/project-templates/get-by-id\",\"api-reference/endpoints/project-templates/list\"]},{\"group\":\"Project Roles\",\"pages\":[\"api-reference/endpoints/project-roles/create\",\"api-reference/endpoints/project-roles/update\",\"api-reference/endpoints/project-roles/delete\",\"api-reference/endpoints/project-roles/get-by-slug\",\"api-reference/endpoints/project-roles/list\",{\"group\":\"Legacy\",\"pages\":[\"api-reference/endpoints/deprecated/project-roles/create\",\"api-reference/endpoints/deprecated/project-roles/update\",\"api-reference/endpoints/deprecated/project-roles/delete\",\"api-reference/endpoints/deprecated/project-roles/get-by-slug\",\"api-reference/endpoints/deprecated/project-roles/list\"]}]},{\"group\":\"Identity Specific Privilege\",\"pages\":[{\"group\":\"V1 (Legacy)\",\"pages\":[\"api-reference/endpoints/identity-specific-privilege/v1/create-permanent\",\"api-reference/endpoints/identity-specific-privilege/v1/create-temporary\",\"api-reference/endpoints/identity-specific-privilege/v1/update\",\"api-reference/endpoints/identity-specific-privilege/v1/delete\",\"api-reference/endpoints/identity-specific-privilege/v1/find-by-slug\",\"api-reference/endpoints/identity-specific-privilege/v1/list\"]},{\"group\":\"V2\",\"pages\":[\"api-reference/endpoints/identity-specific-privilege/v2/create\",\"api-reference/endpoints/identity-specific-privilege/v2/update\",\"api-reference/endpoints/identity-specific-privilege/v2/delete\",\"api-reference/endpoints/identity-specific-privilege/v2/list\",\"api-reference/endpoints/identity-specific-privilege/v2/find-by-id\",\"api-reference/endpoints/identity-specific-privilege/v2/find-by-slug\"]}]},{\"group\":\"Service Tokens\",\"pages\":[\"api-reference/endpoints/service-tokens/get\"]}]},{\"group\":\"Shared\",\"pages\":[{\"group\":\"App Connections\",\"pages\":[\"api-reference/endpoints/app-connections/list\",\"api-reference/endpoints/app-connections/options\",{\"group\":\"1Password\",\"pages\":[\"api-reference/endpoints/app-connections/1password/list\",\"api-reference/endpoints/app-connections/1password/available\",\"api-reference/endpoints/app-connections/1password/get-by-id\",\"api-reference/endpoints/app-connections/1password/get-by-name\",\"api-reference/endpoints/app-connections/1password/create\",\"api-reference/endpoints/app-connections/1password/update\",\"api-reference/endpoints/app-connections/1password/delete\"]},{\"group\":\"Auth0\",\"pages\":[\"api-reference/endpoints/app-connections/auth0/list\",\"api-reference/endpoints/app-connections/auth0/available\",\"api-reference/endpoints/app-connections/auth0/get-by-id\",\"api-reference/endpoints/app-connections/auth0/get-by-name\",\"api-reference/endpoints/app-connections/auth0/create\",\"api-reference/endpoints/app-connections/auth0/update\",\"api-reference/endpoints/app-connections/auth0/delete\"]},{\"group\":\"AWS\",\"pages\":[\"api-reference/endpoints/app-connections/aws/list\",\"api-reference/endpoints/app-connections/aws/available\",\"api-reference/endpoints/app-connections/aws/get-by-id\",\"api-reference/endpoints/app-connections/aws/get-by-name\",\"api-reference/endpoints/app-connections/aws/create\",\"api-reference/endpoints/app-connections/aws/update\",\"api-reference/endpoints/app-connections/aws/delete\"]},{\"group\":\"Azure ADCS\",\"pages\":[\"api-reference/endpoints/app-connections/azure-adcs/list\",\"api-reference/endpoints/app-connections/azure-adcs/available\",\"api-reference/endpoints/app-connections/azure-adcs/get-by-id\",\"api-reference/endpoints/app-connections/azure-adcs/get-by-name\",\"api-reference/endpoints/app-connections/azure-adcs/create\",\"api-reference/endpoints/app-connections/azure-adcs/update\",\"api-reference/endpoints/app-connections/azure-adcs/delete\"]},{\"group\":\"Azure App Configuration\",\"pages\":[\"api-reference/endpoints/app-connections/azure-app-configuration/list\",\"api-reference/endpoints/app-connections/azure-app-configuration/available\",\"api-reference/endpoints/app-connections/azure-app-configuration/get-by-id\",\"api-reference/endpoints/app-connections/azure-app-configuration/get-by-name\",\"api-reference/endpoints/app-connections/azure-app-configuration/create\",\"api-reference/endpoints/app-connections/azure-app-configuration/update\",\"api-reference/endpoints/app-connections/azure-app-configuration/delete\"]},{\"group\":\"Azure Client Secret\",\"pages\":[\"api-reference/endpoints/app-connections/azure-client-secret/list\",\"api-reference/endpoints/app-connections/azure-client-secret/available\",\"api-reference/endpoints/app-connections/azure-client-secret/get-by-id\",\"api-reference/endpoints/app-connections/azure-client-secret/get-by-name\",\"api-reference/endpoints/app-connections/azure-client-secret/create\",\"api-reference/endpoints/app-connections/azure-client-secret/update\",\"api-reference/endpoints/app-connections/azure-client-secret/delete\"]},{\"group\":\"Azure DevOps\",\"pages\":[\"api-reference/endpoints/app-connections/azure-devops/list\",\"api-reference/endpoints/app-connections/azure-devops/available\",\"api-reference/endpoints/app-connections/azure-devops/get-by-id\",\"api-reference/endpoints/app-connections/azure-devops/get-by-name\",\"api-reference/endpoints/app-connections/azure-devops/create\",\"api-reference/endpoints/app-connections/azure-devops/update\",\"api-reference/endpoints/app-connections/azure-devops/delete\"]},{\"group\":\"Azure Key Vault\",\"pages\":[\"api-reference/endpoints/app-connections/azure-key-vault/list\",\"api-reference/endpoints/app-connections/azure-key-vault/available\",\"api-reference/endpoints/app-connections/azure-key-vault/get-by-id\",\"api-reference/endpoints/app-connections/azure-key-vault/get-by-name\",\"api-reference/endpoints/app-connections/azure-key-vault/create\",\"api-reference/endpoints/app-connections/azure-key-vault/update\",\"api-reference/endpoints/app-connections/azure-key-vault/delete\"]},{\"group\":\"Bitbucket\",\"pages\":[\"api-reference/endpoints/app-connections/bitbucket/list\",\"api-reference/endpoints/app-connections/bitbucket/available\",\"api-reference/endpoints/app-connections/bitbucket/get-by-id\",\"api-reference/endpoints/app-connections/bitbucket/get-by-name\",\"api-reference/endpoints/app-connections/bitbucket/create\",\"api-reference/endpoints/app-connections/bitbucket/update\",\"api-reference/endpoints/app-connections/bitbucket/delete\"]},{\"group\":\"Camunda\",\"pages\":[\"api-reference/endpoints/app-connections/camunda/list\",\"api-reference/endpoints/app-connections/camunda/available\",\"api-reference/endpoints/app-connections/camunda/get-by-id\",\"api-reference/endpoints/app-connections/camunda/get-by-name\",\"api-reference/endpoints/app-connections/camunda/create\",\"api-reference/endpoints/app-connections/camunda/update\",\"api-reference/endpoints/app-connections/camunda/delete\"]},{\"group\":\"Checkly\",\"pages\":[\"api-reference/endpoints/app-connections/checkly/list\",\"api-reference/endpoints/app-connections/checkly/get-by-id\",\"api-reference/endpoints/app-connections/checkly/get-by-name\",\"api-reference/endpoints/app-connections/checkly/create\",\"api-reference/endpoints/app-connections/checkly/update\",\"api-reference/endpoints/app-connections/checkly/delete\"]},{\"group\":\"Chef\",\"pages\":[\"api-reference/endpoints/app-connections/chef/list\",\"api-reference/endpoints/app-connections/chef/available\",\"api-reference/endpoints/app-connections/chef/get-by-id\",\"api-reference/endpoints/app-connections/chef/get-by-name\",\"api-reference/endpoints/app-connections/chef/create\",\"api-reference/endpoints/app-connections/chef/update\",\"api-reference/endpoints/app-connections/chef/delete\"]},{\"group\":\"Cloudflare\",\"pages\":[\"api-reference/endpoints/app-connections/cloudflare/list\",\"api-reference/endpoints/app-connections/cloudflare/available\",\"api-reference/endpoints/app-connections/cloudflare/get-by-id\",\"api-reference/endpoints/app-connections/cloudflare/get-by-name\",\"api-reference/endpoints/app-connections/cloudflare/create\",\"api-reference/endpoints/app-connections/cloudflare/update\",\"api-reference/endpoints/app-connections/cloudflare/delete\"]},{\"gr
2026-01-13T09:29:57
https://www.cisco.com/c/pl_pl/buy.html
Jak kupić — produkty Cisco - Cisco Skip to Main content Przejdź do szukania Skip to footer Cisco.com Polska Produkty i usługi Rozwiązania Pomoc techniczna Kształć się Poznaj rozwiązania Cisco Jak kupić Strona główna Partnerów Nowa program dla Partnerów Pomoc techniczna Narzędzia Znajdź Partnera Cisco Poznaj naszych Partnerów Zostań Partnerem Cisco Jak kupić? Znajdź idealną ścieżkę zakupu z ekspertami Cisco ds. sprzedaży Skontaktuj się z naszym zespołem ds. sprzedaży za pośrednictwem czatu na żywo lub prosząc o kontakt. Jesteśmy tutaj, aby pomóc Ci zrozumieć nasze produkty i znaleźć najlepszą ścieżkę zakupu, która odpowiada Twoim potrzebom. Pomożemy Ci podjąć świadome decyzje zakupowe i zapewnimy bezproblemową obsługę. Zacznij już teraz. Czat z działem ds. sprzedaży Cisco Rozpocznij czat na żywo z naszym zespołem ds. sprzedaży, aby uzyskać pomoc w czasie rzeczywistym, lub po prostu skorzystaj z naszego wirtualnego konsjerża, działającego 24 godziny na dobę, 7 dni w tygodniu. Odpowie na najczęściej zadawane pytania i poprowadzi do przydatnych zasobów. Rozpocznij czat Poproś o kontakt Wypełnij nasz formularz, aby poprosić o kontakt w ciągu 15 minut. Zespół Cisco ds. sprzedaży jest tutaj, aby pomóc Ci w nadchodzących projektach lub decyzjach zakupowych. Podaj kluczowe informacje, które pomogą nam dostosować rozmowę do Twoich potrzeb. Poproś o kontakt Skontaktuj się z Cisco Wypełnij formularz, oddzwonimy Pomoc techniczna Skorzystaj z usług Partnerów Cisco Większość klientów nabywa produkty Cisco za pośrednictwem Partnerów Cisco. Są to intensywnie szkolone organizacje, które uzyskują nasze certyfikaty, aby sprzedawać oryginalne produkty Cisco. Partnerzy i niektórzy klienci, którzy nawiązali z nami bezpośrednie relacje handlowe, do uzyskiwania ofert handlowych, konfiguracji, wycen i zamówień używają systemu Cisco Commerce. Znajdź Partnera Miejsce zakupu ma znaczenie Sprzęt zakupiony przez partnerów Cisco – bez względu na to, czy jest nowy, czy to odzyskany sprzęt z certyfikatem Cisco – daje Ci prawo do uzyskania wsparcia, aktualizacji, gwarancji wymiany, ważnej licencji oprogramowania i pełnej rękojmi Cisco. Dlaczego to takie ważne? Zostań Partnerem Cisco Jesteś już Partnerem? Zaloguj się. Rozwiązanie Cisco Enterprise Agreement Nowe rozwiązanie Cisco Enterprise Agreement łączy moc naszego pakietu platform w ramach jednej umowy, która może być szybko skalowana, zapewniając najwyższej klasy doświadczenie zakupowe i oferując przy tym większą elastyczność i wartość.  Dowiedz się więcej Uzyskaj szacunkowe wyliczenia w systemie Cisco Commerce Zaloguj się, aby zobaczyć opcje zakupu. Przeglądaj zapisane wyliczenia (lub oferty i wyceny, jeśli jesteś Partnerem), używając Cisco Commerce. Przejdź do systemu Cisco Commerce Zasoby Produkty EOL/EOS Gwarancje na sprzęt i oprogramowanie Wsparcie licencjonowania Zarządzaj umowami o świadczenie usług (CCW-R) i je przedłużaj Zarządzaj uprawnieniami Zarządzaj licencjami Zwroty i wymiana produktów (RMA) Narzędzie do znajdowania usług Inteligentne licencje
2026-01-13T09:29:57
https://ai.google.dev/api/models#main-content
Models  |  Gemini API  |  Google AI for Developers Skip to main content / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 Get API key Cookbook Community Sign in Docs API reference Gemini API Docs API reference Get API key Cookbook Community Overview API versions Capabilities Models Generating content Live API Live Music API Interactions API Tokens Files Batch API Caching Embeddings File search File search stores Document All methods Deprecated PaLM (decomissioned) SDK references Python Go TypeScript Java C# Home Gemini API API reference Send feedback Models The models endpoint provides a way for you to programmatically list the available models, and retrieve extended metadata such as supported functionality and context window sizing. Read more in the Models guide . Method: models.get Endpoint Path parameters Request body Response body Authorization scopes Example request Get Gets information about a specific Model such as its version number, token limits, parameters and other metadata. Refer to the Gemini models guide for detailed model information. Endpoint get https: / /generativelanguage.googleapis.com /v1beta /{name=models /*} Path parameters name string Required. The resource name of the model. This name should match a model name returned by the models.list method. Format: models/{model} It takes the form models/{model} . Request body The request body must be empty. Example request Python from google import genai client = genai . Client () model_info = client . models . get ( model = "gemini-2.0-flash" ) print ( model_info ) models . py Go ctx := context . Background () client , err := genai . NewClient ( ctx , & genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } modelInfo , err := client . Models . Get ( ctx , "gemini-2.0-flash" , nil ) if err != nil { log . Fatal ( err ) } fmt . Println ( modelInfo ) models . go Shell curl https://generativelanguage.googleapis.com/v1beta/models/gemini-2.0-flash?key = $GEMINI_API_KEY models .sh Response body If successful, the response body contains an instance of Model . Method: models.list Endpoint Query parameters Request body Response body JSON representation Authorization scopes Example request List Lists the Model s available through the Gemini API. Endpoint get https: / /generativelanguage.googleapis.com /v1beta /models Query parameters pageSize integer The maximum number of Models to return (per page). If unspecified, 50 models will be returned per page. This method returns at most 1000 models per page, even if you pass a larger pageSize. pageToken string A page token, received from a previous models.list call. Provide the pageToken returned by one request as an argument to the next request to retrieve the next page. When paginating, all other parameters provided to models.list must match the call that provided the page token. Request body The request body must be empty. Example request Python from google import genai client = genai . Client () print ( "List of models that support generateContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "generateContent" : print ( m . name ) print ( "List of models that support embedContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "embedContent" : print ( m . name ) models . py Go ctx := context . Background () client , err := genai . NewClient ( ctx , & genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } // Retrieve the list of models. models , err := client . Models . List ( ctx , & genai . ListModelsConfig {}) if err != nil { log . Fatal ( err ) } fmt . Println ( "List of models that support generateContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "generateContent" { fmt . Println ( m . Name ) break } } } fmt . Println ( "\nList of models that support embedContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "embedContent" { fmt . Println ( m . Name ) break } } } models . go Shell curl https://generativelanguage.googleapis.com/v1beta/models?key = $GEMINI_API_KEY models .sh Response body Response from ListModel containing a paginated list of Models. If successful, the response body contains data with the following structure: Fields models[] object ( Model ) The returned Models. nextPageToken string A token, which can be sent as pageToken to retrieve the next page. If this field is omitted, there are no more pages. JSON representation { "models" : [ { object ( Model ) } ] , "nextPageToken" : string } REST Resource: models Resource: Model JSON representation Methods Resource: Model Information about a Generative Language Model. Fields name string Required. The resource name of the Model . Refer to Model variants for all allowed values. Format: models/{model} with a {model} naming convention of: "{baseModelId}-{version}" Examples: models/gemini-1.5-flash-001 baseModelId string Required. The name of the base model, pass this to the generation request. Examples: gemini-1.5-flash version string Required. The version number of the model. This represents the major version ( 1.0 or 1.5 ) displayName string The human-readable name of the model. E.g. "Gemini 1.5 Flash". The name can be up to 128 characters long and can consist of any UTF-8 characters. description string A short description of the model. inputTokenLimit integer Maximum number of input tokens allowed for this model. outputTokenLimit integer Maximum number of output tokens available for this model. supportedGenerationMethods[] string The model's supported generation methods. The corresponding API method names are defined as Pascal case strings, such as generateMessage and generateContent . thinking boolean Whether the model supports thinking. temperature number Controls the randomness of the output. Values can range over [0.0,maxTemperature] , inclusive. A higher value will produce responses that are more varied, while a value closer to 0.0 will typically result in less surprising responses from the model. This value specifies default to be used by the backend while making the call to the model. maxTemperature number The maximum temperature this model can use. topP number For Nucleus sampling . Nucleus sampling considers the smallest set of tokens whose probability sum is at least topP . This value specifies default to be used by the backend while making the call to the model. topK integer For Top-k sampling. Top-k sampling considers the set of topK most probable tokens. This value specifies default to be used by the backend while making the call to the model. If empty, indicates the model doesn't use top-k sampling, and topK isn't allowed as a generation parameter. JSON representation { "name" : string , "baseModelId" : string , "version" : string , "displayName" : string , "description" : string , "inputTokenLimit" : integer , "outputTokenLimit" : integer , "supportedGenerationMethods" : [ string ] , "thinking" : boolean , "temperature" : number , "maxTemperature" : number , "topP" : number , "topK" : integer } Method: models.predict Endpoint Path parameters Request body JSON representation Response body JSON representation Authorization scopes Performs a prediction request. Endpoint post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predict Path parameters model string Required. The name of the model for prediction. Format: name=models/{model} . It takes the form models/{model} . Request body The request body contains data with the following structure: Fields instances[] value ( Value format) Required. The instances that are the input to the prediction call. parameters value ( Value format) Optional. The parameters that govern the prediction call. Response body Response message for [PredictionService.Predict]. If successful, the response body contains data with the following structure: Fields predictions[] value ( Value format) The outputs of the prediction call. JSON representation { "predictions" : [ value ] } Method: models.predictLongRunning Endpoint Path parameters Request body JSON representation Response body Authorization scopes Same as models.predict but returns an LRO. Endpoint post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predictLongRunning Path parameters model string Required. The name of the model for prediction. Format: name=models/{model} . Request body The request body contains data with the following structure: Fields instances[] value ( Value format) Required. The instances that are the input to the prediction call. parameters value ( Value format) Optional. The parameters that govern the prediction call. Response body If successful, the response body contains an instance of Operation . Send feedback Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License , and code samples are licensed under the Apache 2.0 License . For details, see the Google Developers Site Policies . Java is a registered trademark of Oracle and/or its affiliates. Last updated 2025-10-30 UTC. Need to tell us more? [[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-10-30 UTC."],[],[]] Terms Privacy Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:57
https://akismet.com/developers/detailed-docs/submit-ham-false-positives/
Submit ham (false positives) – Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Getting started Plugins and libraries Detailed docs Building your application Key verification Comment check Submit spam (missed spam) Submit ham (false positives) Key/sites activity Usage limit Response error codes Akismet Error #10001 Akismet Error #10003 Akismet Error #10402 Akismet Error #10011 Akismet Error #10010 Akismet Error #10009 Akismet Error #10006 Akismet Error #10005 Akismet Error #10404 Akismet Error #10403 Akismet Error #30001 Submit ham (false positives) This call is intended for the submission of false positives – items that were incorrectly classified as spam by Akismet. It takes identical arguments as comment check and submit spam . Remember that, as explained in our submit-spam documentation, you should ensure that any values you’re passing here match up with the original and corresponding comment-check call. This method is called with the following URL: https://rest.akismet.com/1.1/submit-ham This call takes the same arguments as the comment check call. Important: All parameters should be sent via the POST method. Parameters api_key   (required) Your Akismet API key. You can find this on your account dashboard at  https://akismet.com/account/ blog   (required) The front page or home URL of the instance making the request. For a blog or wiki this would be the front page.  Note:  Must be a full URI, including http:// . user_ip  (required) IP address of the comment submitter. user_agent User agent string of the web browser submitting the comment – typically the HTTP_USER_AGENT cgi variable. Not to be confused with the user agent of your Akismet library. referrer  (note spelling) The content of the HTTP_REFERER header should be sent here. permalink The full permanent URL of the entry the comment was submitted to. comment_type A string that describes the type of content being sent. Examples: comment : A blog comment. forum-post : A top-level forum post. reply : A reply to a top-level forum post. blog-post : A blog post. contact-form : A contact form or feedback form submission. signup : A new user account. message : A message sent between just a few users. You may send a value not listed above if none of them accurately describe your content. This is further explained  here . comment_author Name submitted with the comment. comment_author_email Email address submitted with the comment. comment_author_url URL submitted with comment. Only send a URL that was manually entered by the user, not an automatically generated URL like the user’s profile URL on your site. comment_content The content that was submitted. comment_date_gmt The UTC timestamp of the creation of the comment, in ISO 8601 format. May be omitted for comment-check requests if the comment is sent to the API at the time it is created. comment_post_modified_gmt The UTC timestamp of the publication time for the post, page or thread on which the comment was posted. blog_lang Indicates the language(s) in use on the blog or site, in ISO 639-1 format, comma-separated. A site with articles in English and French might use “en, fr_ca”. blog_charset The character encoding for the form values included in  comment_*  parameters, such as “UTF-8” or “ISO-8859-1”. user_role The user role of the user who submitted the comment. This is an optional parameter. If you set it to “administrator”, Akismet will always return false. is_test This is an optional parameter. You can use it when submitting test queries to Akismet. recheck_reason If you are sending content to Akismet to be rechecked, such as a post that has been edited or old pending comments that you’d like to recheck, include the parameter  recheck_reason  with a string describing why the content is being rechecked. For example,  recheck_reason=edit . honeypot_field_name If you use a  honeypot field  in your implementation, include the name of the field in your request as well as the value of that field. For example, if you have a honeypot field that looks like  <input type=”text” name=”hidden_honeypot_field” style=”display: none;” /> , then you should include two extra parameters in your request:  honeypot_field_name=hidden_honeypot_field  and  hidden_honeypot_field=[the value of the input] . comment_context The  comment_context  parameter provides context for the environment in which the comment was posted: a list of tags or categories applied to the parent blog post or the site on which the comment was posted. Specify  comment_context  using PHP-style array parameter notation:  comment_context[]=cooking&comment_context[]=recipes&comment_context[]=bbq . Note that any tags or categories should be taken from the parent post or environment; they should not be supplied by the commenters themselves. Other server environmental variables In PHP, there is an array of environmental variables called  $_SERVER  that contains information about the Web server itself as well as a key/value for every HTTP header sent with the request. This data is highly useful to Akismet. How the submitted content interacts with the server can be very telling, so please include as much of it as possible. PHP example $data = array( 'blog' => 'http://yourgroovydomain.com', 'user_ip' => '127.0.0.1', 'user_agent' => 'Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6', 'referrer' => 'http://www.google.com', 'permalink' => 'http://yourgroovydomain.com/blog/post=1', 'comment_type' => 'comment', 'comment_author' => 'admin', 'comment_author_email' => 'test@example.com', 'comment_author_url' => 'http://spam.example.net', 'comment_content' => 'It means a lot that you would take the time to review our software.Thanks again.' ); akismet_submit_ham( '123YourAPIKey', $data ); function akismet_submit_ham( $api_key, $data ) { $request = 'api_key=' . urlencode( $api_key ) . '&blog=' . urlencode($data['blog']) . '&user_ip=' . urlencode($data['user_ip']) . '&user_agent=' . urlencode($data['user_agent']) . '&referrer=' . urlencode($data['referrer']) . '&permalink=' . urlencode($data['permalink']) . '&comment_type=' . urlencode($data['comment_type']) . '&comment_author=' . urlencode($data['comment_author']) . '&comment_author_email=' . urlencode($data['comment_author_email']) . '&comment_author_url=' . urlencode($data['comment_author_url']) . '&comment_content=' . urlencode($data['comment_content']); $host = $http_host = 'rest.akismet.com'; $path = '/1.1/submit-ham'; $port = 443; $akismet_ua = "WordPress/4.4.1 | Akismet/3.1.7"; $content_length = strlen( $request ); $http_request = "POST $path HTTP/1.0\r\n"; $http_request .= "Host: $host\r\n"; $http_request .= "Content-Type: application/x-www-form-urlencoded\r\n"; $http_request .= "Content-Length: {$content_length}\r\n"; $http_request .= "User-Agent: {$akismet_ua}\r\n"; $http_request .= "\r\n"; $http_request .= $request; $response = ''; if ( false != ( $fs = @fsockopen( 'ssl://' . $http_host, $port, $errno, $errstr, 10 ) ) ) { fwrite( $fs, $http_request ); while ( !feof( $fs ) ) { $response .= fgets( $fs, 1160 ); // One TCP-IP packet } fclose( $fs ); $response = explode( "\r\n\r\n", $response, 2 ); } if ( 'Thanks for making the web a better place.' == $response[1] ) { return true; } else { return false; } } This call returns a single response: Array ( [0] => HTTP/1.1 200 OK Server: nginx Date: Mon, 24 Feb 2014 20:41:15 GMT Content-Type: text/html; charset=utf-8 Connection: close Content-length: 41 [1] => Thanks for making the web a better place. ) We’re here to help If you ever get stuck or need help troubleshooting something, please don’t hesitate to contact us . Related Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:57
https://akismet.com/developers/detailed-docs/errors/akismet-error-10404/
Akismet Error #10404 – Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Getting started Plugins and libraries Detailed docs Building your application Key verification Comment check Submit spam (missed spam) Submit ham (false positives) Key/sites activity Usage limit Response error codes Akismet Error #10001 Akismet Error #10003 Akismet Error #10402 Akismet Error #10011 Akismet Error #10010 Akismet Error #10009 Akismet Error #10006 Akismet Error #10005 Akismet Error #10404 Akismet Error #10403 Akismet Error #30001 Akismet Error #10404 API Access Restricted Akismet Error #10404 Why am I receiving this error? We have detected that this API key has been used on multiple sites. Typically this is fine with us, however we would like to confirm that the person using the API key has access to the Akismet account the key belongs to. What should I do? Use an API key that you control or  add the new site  to an Akismet active subscription. Can we help with anything else? I need to update my credit card. I forgot my API key. I need to reset my password. I need to cancel my subscription. Priority support Want to get help even faster? Don’t forget that our Pro subscription includes priority email support. Related Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:57
https://ai.google.dev/api/models?hl=ja
Models  |  Gemini API  |  Google AI for Developers メイン コンテンツにスキップ / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 API キーを取得する クックブック Community ログイン ドキュメント API リファレンス Gemini API ドキュメント API リファレンス API キーを取得する クックブック Community 概要 API バージョン 機能 モデル コンテンツの生成 Live API Live Music API Interactions API トークン ファイル バッチ API キャッシュ エンベディング ファイル検索 ファイル検索ストア ドキュメント すべてのメソッド 非推奨 PaLM(廃止) SDK リファレンス Python Go TypeScript Java C# ホーム Gemini API API リファレンス フィードバックを送信 Models モデル エンドポイントを使用すると、使用可能なモデルをプログラムで一覧表示し、サポートされている機能やコンテキスト ウィンドウのサイズなどの拡張メタデータを取得できます。詳しくは、 モデルガイド をご覧ください。 メソッド: models.get エンドポイント パスパラメータ リクエストの本文 レスポンスの本文 認可スコープ リクエストの例 取得 バージョン番号、トークン上限、 パラメータ などの特定の Model に関する情報を取得します。モデルの詳細については、 Gemini モデルガイド をご覧ください。 エンドポイント get https: / /generativelanguage.googleapis.com /v1beta /{name=models /*} パスパラメータ name string 必須。モデルのリソース名。 この名前は、 models.list メソッドから返されるモデル名と一致する必要があります。 形式: models/{model} 形式は models/{model} です。 リクエストの本文 リクエストの本文は空にする必要があります。 リクエスト例 Python from google import genai client = genai . Client () model_info = client . models . get ( model = "gemini-2.0-flash" ) print ( model_info ) models . py Go ctx := context . Background () client , err := genai . NewClient ( ctx , & genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } modelInfo , err := client . Models . Get ( ctx , "gemini-2.0-flash" , nil ) if err != nil { log . Fatal ( err ) } fmt . Println ( modelInfo ) models . go Shell curl https://generativelanguage.googleapis.com/v1beta/models/gemini-2.0-flash?key = $GEMINI_API_KEY models .sh レスポンスの本文 成功した場合、レスポンスの本文には Model のインスタンスが含まれます。 メソッド: models.list エンドポイント クエリ パラメータ リクエストの本文 レスポンスの本文 JSON 表現 認可スコープ リクエストの例 リスト Gemini API で使用可能な Model を一覧表示します。 エンドポイント get https: / /generativelanguage.googleapis.com /v1beta /models クエリ パラメータ pageSize integer 返される Models の最大数(ページごと)。 指定しない場合、ページごとに 50 個のモデルが返されます。このメソッドは、pageSize に大きな値を渡しても、ページあたり最大 1, 000 個のモデルを返します。 pageToken string 前回の models.list 呼び出しから受け取ったページトークン。 次のページを取得するには、1 つのリクエストで返された pageToken を次のリクエストの引数として指定します。 ページ分割を行う場合、 models.list に指定する他のすべてのパラメータは、ページトークンを提供した呼び出しと一致する必要があります。 リクエストの本文 リクエストの本文は空にする必要があります。 リクエスト例 Python from google import genai client = genai . Client () print ( "List of models that support generateContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "generateContent" : print ( m . name ) print ( "List of models that support embedContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "embedContent" : print ( m . name ) models . py Go ctx := context . Background () client , err := genai . NewClient ( ctx , & genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } // Retrieve the list of models. models , err := client . Models . List ( ctx , & genai . ListModelsConfig {}) if err != nil { log . Fatal ( err ) } fmt . Println ( "List of models that support generateContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "generateContent" { fmt . Println ( m . Name ) break } } } fmt . Println ( "\nList of models that support embedContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "embedContent" { fmt . Println ( m . Name ) break } } } models . go Shell curl https://generativelanguage.googleapis.com/v1beta/models?key = $GEMINI_API_KEY models .sh レスポンスの本文 モデルのページ分割されたリストを含む ListModel からのレスポンス。 成功した場合、レスポンスの本文には次の構造のデータが含まれます。 フィールド models[] object ( Model ) 返されるモデル。 nextPageToken string 次のページを取得するために pageToken として送信できるトークン。 このフィールドを省略すると、それ以上ページは取得されません。 JSON 表現 { "models" : [ { object ( Model ) } ] , "nextPageToken" : string } REST リソース: モデル リソース: Model JSON 表現 メソッド リソース: Model 生成言語モデルに関する情報。 フィールド name string 必須。 Model のリソース名。使用できる値については、 モデル バリエーション をご覧ください。 形式: models/{model} 。 {model} の命名規則は次のとおりです。 "{baseModelId}-{version}" 例: models/gemini-1.5-flash-001 baseModelId string 必須。ベースモデルの名前。生成リクエストに渡します。 例: gemini-1.5-flash version string 必須。モデルのバージョン番号。 これはメジャー バージョン( 1.0 または 1.5 )を表します。 displayName string 人が読める形式のモデル名。例: 「Gemini 1.5 Flash」。 名前は最大 128 文字で、UTF-8 文字を含めることができます。 description string モデルの簡単な説明。 inputTokenLimit integer このモデルで許可される入力トークンの最大数。 outputTokenLimit integer このモデルで使用できる出力トークンの最大数。 supportedGenerationMethods[] string モデルでサポートされている生成メソッド。 対応する API メソッド名は、 generateMessage や generateContent などのパスカルケースの文字列として定義されます。 thinking boolean モデルが思考をサポートしているかどうか。 temperature number 出力のランダム性を制御します。 値の範囲は [0.0,maxTemperature] です(両端を含む)。値が大きいほど、より多様なレスポンスが生成されます。通常、値が 0.0 に近いほど、モデルから驚くようなレスポンスが返される可能性は低くなります。この値は、モデルを呼び出すときにバックエンドで使用されるデフォルトを指定します。 maxTemperature number このモデルで使用できる最大温度。 topP number Nucleus サンプリング の場合。 ニュークリアス サンプリングでは、確率の合計が topP 以上の最小のトークンセットが考慮されます。この値は、モデルを呼び出すときにバックエンドで使用されるデフォルトを指定します。 topK integer Top-k サンプリングの場合。 Top-k サンプリングでは、最も確率の高い topK 個のトークンのセットが考慮されます。この値は、モデルを呼び出すときにバックエンドで使用されるデフォルトを指定します。空の場合、モデルはトップ K サンプリングを使用せず、 topK は生成パラメータとして許可されません。 JSON 表現 { "name" : string , "baseModelId" : string , "version" : string , "displayName" : string , "description" : string , "inputTokenLimit" : integer , "outputTokenLimit" : integer , "supportedGenerationMethods" : [ string ] , "thinking" : boolean , "temperature" : number , "maxTemperature" : number , "topP" : number , "topK" : integer } メソッド: models.predict エンドポイント パスパラメータ リクエストの本文 JSON 表現 レスポンスの本文 JSON 表現 認可スコープ 予測リクエストを実行します。 エンドポイント post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predict パスパラメータ model string 必須。予測に使用するモデルの名前。形式: name=models/{model} 。形式は models/{model} です。 リクエストの本文 リクエストの本文には、次の構造のデータが含まれます。 フィールド instances[] value ( Value format) 必須。予測呼び出しの入力となるインスタンス。 parameters value ( Value format) 省略可。予測呼び出しを制御するパラメータ。 レスポンスの本文 [PredictionService.Predict] に対するレスポンス メッセージ。 成功した場合、レスポンスの本文には次の構造のデータが含まれます。 フィールド predictions[] value ( Value format) 予測呼び出しの出力。 JSON 表現 { "predictions" : [ value ] } メソッド: models.predictLongRunning エンドポイント パスパラメータ リクエストの本文 JSON 表現 レスポンスの本文 認可スコープ models.predict と同じですが、LRO を返します。 エンドポイント post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predictLongRunning パスパラメータ model string 必須。予測に使用するモデルの名前。形式: name=models/{model} 。 リクエストの本文 リクエストの本文には、次の構造のデータが含まれます。 フィールド instances[] value ( Value format) 必須。予測呼び出しの入力となるインスタンス。 parameters value ( Value format) 省略可。予測呼び出しを制御するパラメータ。 レスポンスの本文 成功した場合、レスポンスの本文には Operation のインスタンスが含まれます。 フィードバックを送信 特に記載のない限り、このページのコンテンツは クリエイティブ・コモンズの表示 4.0 ライセンス により使用許諾されます。コードサンプルは Apache 2.0 ライセンス により使用許諾されます。詳しくは、 Google Developers サイトのポリシー をご覧ください。Java は Oracle および関連会社の登録商標です。 最終更新日 2025-12-16 UTC。 ご意見をお聞かせください [[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["必要な情報がない","missingTheInformationINeed","thumb-down"],["複雑すぎる / 手順が多すぎる","tooComplicatedTooManySteps","thumb-down"],["最新ではない","outOfDate","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["サンプル / コードに問題がある","samplesCodeIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-12-16 UTC。"],[],[]] 利用規約 プライバシー Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:57
https://ai.google.dev/gemini-api/docs/api-versions?hl=id
Versi API dijelaskan  |  Gemini API  |  Google AI for Developers Langsung ke konten utama / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 Mendapatkan kunci API Cookbook Komunitas Masuk Dokumen Referensi API Gemini API Dokumen Referensi API Mendapatkan kunci API Cookbook Komunitas Ringkasan Versi API Kemampuan Model Menghasilkan konten API Live Live Music API Interactions API Token File Batch API Caching Embedding Penelusuran file Penyimpanan penelusuran file Dokumen Semua metode Tidak Digunakan Lagi PaLM (dinonaktifkan) Referensi SDK Python Go TypeScript Java C# Beranda Gemini API Referensi API Kirim masukan Versi API dijelaskan Kami telah memperbarui Persyaratan Layanan kami. Dokumen ini memberikan ringkasan umum tentang perbedaan antara versi v1 dan v1beta Gemini API. v1 : Versi API yang stabil. Fitur dalam versi stabil didukung sepenuhnya selama masa aktif versi utama. Jika ada perubahan yang merusak, maka versi utama API berikutnya akan dibuat dan versi yang ada akan dihentikan setelah jangka waktu yang wajar. Perubahan yang tidak merusak dapat diperkenalkan ke API tanpa mengubah versi utama. v1beta : Versi ini mencakup fitur awal yang mungkin masih dalam pengembangan dan dapat mengalami perubahan yang menyebabkan gangguan. Selain itu, tidak ada jaminan bahwa fitur dalam versi Beta akan dipindahkan ke versi stabil. Jika Anda memerlukan stabilitas di lingkungan produksi dan tidak dapat mengambil risiko perubahan yang merusak, Anda tidak boleh menggunakan versi ini dalam produksi. Fitur v1 v1beta Membuat Konten - Input khusus teks Membuat Konten - Input teks dan gambar Membuat Konten - Output teks Membuat Konten - Percakapan multi-giliran (chat) Membuat Konten - Panggilan fungsi Membuat Konten - Streaming Menyematkan Konten - Input khusus teks Buat Jawaban Pengambilan semantik Interactions API - Didukung - Tidak akan pernah didukung Mengonfigurasi versi API di SDK Gemini API SDK secara default menggunakan v1beta , tetapi Anda dapat memilih untuk menggunakan versi lain dengan menetapkan versi API seperti yang ditunjukkan dalam contoh kode berikut: Python from google import genai client = genai . Client ( http_options = { 'api_version' : 'v1alpha' }) response = client . models . generate_content ( model = 'gemini-2.0-flash' , contents = "Explain how AI works" , ) print ( response . text ) JavaScript import { GoogleGenAI } from "@google/genai" ; const ai = new GoogleGenAI ({ httpOptions : { apiVersion : "v1alpha" }, }); async function main () { const response = await ai . models . generateContent ({ model : "gemini-2.0-flash" , contents : "Explain how AI works" , }); console . log ( response . text ); } await main (); REST curl "https://generativelanguage.googleapis.com/v1/models/gemini-1.5-flash:generateContent" \ -H "x-goog-api-key: $GEMINI_API_KEY " \ -H 'Content-Type: application/json' \ -X POST \ -d '{ "contents": [{ "parts":[{"text": "Explain how AI works."}] }] }' Kirim masukan Kecuali dinyatakan lain, konten di halaman ini dilisensikan berdasarkan Lisensi Creative Commons Attribution 4.0 , sedangkan contoh kode dilisensikan berdasarkan Lisensi Apache 2.0 . Untuk mengetahui informasi selengkapnya, lihat Kebijakan Situs Google Developers . Java adalah merek dagang terdaftar dari Oracle dan/atau afiliasinya. Terakhir diperbarui pada 2025-12-18 UTC. Ada masukan untuk kami? [[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Informasi yang saya butuhkan tidak ada","missingTheInformationINeed","thumb-down"],["Terlalu rumit/langkahnya terlalu banyak","tooComplicatedTooManySteps","thumb-down"],["Sudah usang","outOfDate","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Masalah kode / contoh","samplesCodeIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-12-18 UTC."],[],[]] Persyaratan Privasi Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:57
https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.instagram.com%2F&h=AT0v77ABWXjhN6xQ5WgKltkRg7mDLjzjZh2Q-Ss2pSOqDue8OOd9W-_9qKP4dEhT9ieiHyO1IZoAjKu4iPGxFFAay91kziKADXHMvPzICgz2-qUvUtLrkG2m_nsxHK1vumhqTePegcW2YUrY
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:57
https://www.cisco.com/site/hk/en/products/networking/index.html
Cisco Networking Products and Solutions - Cisco Skip to main content Skip to search Skip to footer Cisco.com Hong Kong Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Explore Cisco How to buy Partners EN HK Log in Explore Cisco Search MENU CLOSE How to buy Partners Log in EN HK Close Close Close Close Close Products Cisco Networking Take your network as seriously as your business Whether you're with a Global 2000 or a local school district, build a future-ready network with the industry leader in networking.   Overview Build a network that gives you peace of mind 1:21 Blaze new paths to tomorrow. Your journey, your way. Keep users happy and business running smoothly with software and hardware that work best together. Automation, analytics, and security work hard for you, so you don't have to. Simplify onboarding and provisioning Use automated workflows to quickly configure and provision new devices on the network according to your network policies. Control access with ease Use artificial intelligence and machine learning (AI/ML) to identify and classify endpoints, implement security policies, and display the most critical alerts for action.  Maintain network health Use telemetry data and simple management tools to show client, network, and application health insights. Scale your network to match demand Simplify scalability with flexible router-port configuration to meet demand dynamically. And with Cisco Smart Licensing, it's easy to activate ports when and where you need them. Find what you're looking for Access networking Data center and cloud networking Industrial IoT networking Network security Network software Silicon and optics Visibility Wide-area networking (WAN) Access software for switching Benefit from the latest switching and management innovations as soon as they're released. Explore switching software Switches Build a network with multigigabit switches that constantly learn, adapt, and protect. Explore switching Access software for wireless Get continual feature innovations delivered by subscription.  Explore wireless software Wireless Provide an immersive Wi-Fi 6/6E experience with secure, fast, and reliable products. ​ Explore wireless WAN software Take advantage of the latest WAN innovations delivered continually by subscription.   Explore WAN software Routers Simplify your WAN architecture and make it easier to deploy, manage, and operate.  Explore routing Edge platforms Enhance multicloud application experiences across your cloud, data center, and WAN edge.  Explore edge platforms Data center and cloud software Expand your hybrid cloud operations without increasing your management complexity.  Explore data center switching software Data center switches and infrastructure Build for scale, industry-leading automation, programmability, and real-time visibility. Explore data center switches Service provider software Enable automation, subscriber management, and telco cloud solutions for the services edge. Explore service provider software Service provider routers, wireless, and infrastructure Break free from proprietary mobile technologies with infrastructure designed for open systems. Explore service provider infrastructure Industrial software Unlock the full value of your industrial infrastructure with Cisco DNA Software subscriptions. Explore IoT software Industrial switching Digitize your operations with ruggedized, purpose-built switches for your industrial network. Explore industrial switching Industrial wireless Enjoy reliable and secure connectivity for mission-critical, low-latency, and low-power IoT devices. Explore industrial wireless Industrial routers Connect your industrial edge securely and at scale to external users and applications. Explore industrial routers Industrial security Gain OT visibility, extend zero-trust security, and develop a converged IT/OT security strategy. Explore industrial security Silicon Deploy industry-leading silicon that unifies high-performance routing and switching networks.  Explore Cisco Silicon One technology Optics Increase capacity, reach, and speed with optical transceivers for your network connections.  Explore optics Show more Platforms to control your network Cisco Crosswork Network Automation Simplify services management and operations with advanced automation for service providers. Explore advanced automation Cisco Catalyst Center Automate, secure, and optimize your wireless and switching access networks. Explore platform Cisco Meraki platform Scale and secure your entire network with the Meraki cloud networking platform. Get started Cisco Catalyst SD-WAN Manager Centrally manage your SD-WAN for optimized security, application experience, and cloud connectivity. See dashboard Cisco Nexus Dashboard Configure, operate, and analyze—all from one place—across data center and public cloud. Explore dashboard IoT Control Center Deliver innovation at scale with our industry-leading IoT cellular connectivity platform. Take control Show more Find a solution, solve your challenge Easily find the right combination of software and hardware to meet specific business needs. See all networking solutions Network-enabled business outcomes Cisco Routed Optical Networking Converge IP and optical layers to streamline lifecycle operations. Explore details Hybrid work Help your users return to the workplace safely and work from home securely. Explore hybrid work solution Software-defined WAN Secure your users' access to any cloud from any location by getting on board with SASE. Explore SD-WAN and SASE Hybrid cloud Quickly connect to the clouds and services of your choice.  Explore hybrid cloud Sustainable workplaces Create intuitive, trusted facilities that help enhance health, safety, and energy efficiencies. Explore smart buildings Industry 4.0 Digitize manufacturing with easy-to-deploy validated network designs. Explore Cisco IoT Previous Next Services and support Business Critical Services Move your business forward Build modern IT environments and enhance agility with advisory services for resilient, adaptive, and transformative IT.   View Lifecycle Services Cisco Services Drive results with an optimized network Deploy faster, help enable NetOps excellence, and improve security and visibility. Explore all services Business works best in the cloud Join Cisco Catalyst and Meraki experts for a real-time demonstration of cloud monitoring with Cisco Catalyst switches and cloud management with Cisco Catalyst Wi-Fi 6E access points.  Watch now Hello, how can I help? Trials and Demos --> Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms & Conditions Privacy Statement Cookies Trademarks Supply Chain Transparency Sitemap © Cisco Systems, Inc.
2026-01-13T09:29:57
https://infisical.com/docs/integrations/platforms/certificate-agent#concept
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let's Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : "universal-auth" config : client-id : "./client-id" # Path to file containing client ID client-secret : "./client-secret" # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : "universal-auth" config : client-id : "your-client-id" client-secret : "your-client-secret" Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : "kubernetes-auth" config : identity-id : "your-kubernetes-identity-id" service-account-token-path : "/var/run/secrets/kubernetes.io/serviceaccount/token" Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : "azure-auth" config : identity-id : "your-azure-identity-id" Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : "gcp-id-token" config : identity-id : "your-gcp-identity-id" GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : "gcp-iam" config : identity-id : "your-gcp-identity-id" service-account-key : "/path/to/service-account-key.json" Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : "aws-iam" config : identity-id : "your-aws-identity-id" ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : "https://app.infisical.com" # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # Infisical authentication configuration auth : type : "universal-auth" # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : "your-client-id" client-secret : "your-client-secret" # Certificate configuration certificates : - profile-name : "prof-web-server-12345" project-slug : "my-project-slug" attributes : common-name : "api.example.com" alt-names : [ "api.example.com" , "api-v2.example.com" ] ttl : "90d" key-algorithm : "RSA_2048" signature-algorithm : "RSA-SHA256" key-usages : - "digital_signature" - "key_encipherment" extended-key-usages : - "server_auth" # Enable automatic certificate renewal lifecycle : renew-before-expiry : "30d" status-check-interval : "6h" # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : "/etc/ssl/private/web.key" permission : "0600" # Read/write for owner only certificate : path : "/etc/ssl/certs/web.crt" permission : "0644" # Read for all, write for owner chain : path : "/etc/ssl/certs/web-chain.crt" permission : "0644" # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo "Certificate issued for ${CERT_COMMON_NAME}" systemctl reload nginx timeout : 30 on-renewal : command : | echo "Certificate renewed for ${CERT_COMMON_NAME}" systemctl reload nginx timeout : 30 on-failure : command : | echo "Certificate operation failed: ${ERROR_MESSAGE}" mail -s "Certificate Alert" [email protected] < /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., ["www.example.com", "api.example.com"] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger 'Certificate renewal failed' , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo "New certificate issued for ${CERT_COMMON_NAME}" chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo "Certificate renewed for ${CERT_COMMON_NAME}" # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d "{'text': 'Certificate for ${CERT_COMMON_NAME} renewed successfully'}" timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo "Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}" # Send alert mail -s "Certificate Failure Alert" [email protected] < /dev/null # Log to syslog logger -p daemon.error "Certificate agent failure: ${ERROR_MESSAGE}" timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : "https://app.infisical.com" retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : "https://app.infisical.com" # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # Infisical authentication configuration auth : type : "universal-auth" # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : "your-client-id" client-secret : "your-client-secret" # Certificate configuration certificates : - profile-name : "prof-web-server-12345" project-slug : "my-project-slug" attributes : common-name : "api.example.com" alt-names : - "api.example.com" - "api-v2.example.com" key-algorithm : "RSA_2048" signature-algorithm : "RSA-SHA256" key-usages : - "digital_signature" - "key_encipherment" extended-key-usages : - "server_auth" ttl : "30d" file-output : private-key : path : "/etc/ssl/private/api.example.com.key" permission : "0600" certificate : path : "/etc/ssl/certs/api.example.com.crt" permission : "0644" chain : path : "/etc/ssl/certs/api.example.com.chain.crt" permission : "0644" omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : "https://app.infisical.com" # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # Infisical authentication configuration auth : type : "universal-auth" # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : "your-client-id" client-secret : "your-client-secret" # Certificate configuration certificates : - profile-name : "prof-web-server-12345" project-slug : "my-project-slug" csr-path : "/etc/ssl/requests/api.csr" file-output : certificate : path : "/etc/ssl/certs/api.example.com.crt" permission : "0644" chain : path : "/etc/ssl/certs/api.example.com.chain.crt" permission : "0644" omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : "https://app.infisical.com" # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : "5s" base-delay : "200ms" # Infisical authentication configuration auth : type : "universal-auth" # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : "your-client-id" client-secret : "your-client-secret" # Certificate configuration certificates : - profile-name : "prof-web-server-12345" project-slug : "my-project-slug" attributes : common-name : "api.example.com" alt-names : - "api.example.com" - "api-v2.example.com" key-algorithm : "RSA_2048" signature-algorithm : "RSA-SHA256" key-usages : - "digital_signature" - "key_encipherment" extended-key-usages : - "server_auth" ttl : "30d" lifecycle : renew-before-expiry : "14d" # Renew 14 days before expiration status-check-interval : "6h" # Check certificate status every 6 hours file-output : private-key : path : "/etc/ssl/private/api.example.com.key" permission : "0600" certificate : path : "/etc/ssl/certs/api.example.com.crt" permission : "0644" chain : path : "/etc/ssl/certs/api.example.com.chain.crt" permission : "0644" post-hooks : on-issuance : command : "systemctl reload nginx" timeout : 30 on-renewal : command : "systemctl reload nginx && logger 'Certificate renewed'" timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback & Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:57
https://akismet.com/it/contatto/
Contattaci – Akismet Vai al contenuto Funzionalità Enterprise Sviluppatori Prezzi Risorse Impara con Akismet Supporto Blog Accessibilità Accedi Comincia ora Funzionalità Enterprise Sviluppatori Prezzi Risorse Impara con Akismet Supporto Blog Accessibilità Accedi Comincia ora Contattaci Siamo qui per aiutarti. Dicci di più:  Ho una domanda sull'iscrizione o sull'abbonamento.  Ho una domanda sull'addebito.  Ho una domanda di carattere tecnico.  Akismet sta bloccando i miei commenti per errore.  Ho una domanda su piccole o grandi aziende.  Ho una domanda sugli account no profit.  Privacy: voglio che il mio indirizzo e-mail venga escluso dai tracciamenti a lungo termine.  Siete fantastici!  Ho una domanda su come sviluppare un'applicazione o una libreria con Akismet.  Voglio programmare un'intervista/ho una richiesta per la stampa.  Il mio sito è stato erroneamente classificato come commerciale. Il tuo nome La tua e-mail Società (facoltativo) URL del sito (facoltativo se inserisci la chiave API qui sotto) Chiave API (obbligatorio solo per il supporto prioritario a pagamento) Il tuo messaggio Quanto fa 14+7?* Invia * Magari ti starai chiedendo: se sono così bravi a bloccare lo spam, perché hanno inserito una domanda come questa nel loro modulo di contatto per tenere lontano lo spam? Akismet è bravissimo a proteggere i moduli di contatto: lo usiamo su tutti gli altri nostri siti. Ma su Akismet.com, a volte, le persone usano il modulo di contatto per dirci che sono state bloccate da Akismet. Se ci pensi, bloccare le persone che cercano di dirci che sono state bloccate per errore sarebbe frustrante. Da qui, la domanda di matematica. Risposte immediate Come aggiornare la tua carta di credito. Che fare se hai dimenticato la chiave API. Come reimpostare la password. Come annullare l’abbonamento. Supporto prioritario Vuoi un aiuto più immediato? Il nostro abbonamento Pro include il supporto prioritario via e-mail. Prodotto Funzionalità Enterprise Prezzi Risorse Supporto Sviluppatori Documentazione Stato API Legale Termini di servizio Informativa sulla privacy Non vendere o condividere le mie informazioni personali Nota sulla privacy per utenti in California it An medley Work With Us Abbonati Abbonato Akismet Registrami Hai già un account WordPress.com? Accedi ora. Akismet Abbonati Abbonato Registrati Accedi Copia shortlink Segnala questo contenuto Visualizza articolo nel Reader Gestisci gli abbonamenti Riduci la barra
2026-01-13T09:29:57
https://www.commondreams.org/
Raven.config('https://6b64f5cc8af542cbb920e0238864390a@sentry.io/147999').install(); Breaking News & Views for the Progressive Community | Common Dreams To donate by check, phone, or other method, see our More Ways to Give page. × Home Politics Climate Economy Rights & Justice War & Peace Breaking News Opinion News Newswire Further Planned Parenthood Action Fund Trade Justice Education Fund Profile Organization Test ProsperUS Repairers of the Breach Fix Our Senate ACLU Florida Alliance for Retired Americans Concerted Action Green New Deal Network Costs of War Fossil Free Media Center for Democratic and Environmental Rights Independent Jewish Voices Canada Cascadia Wildlands Congressman Jamaal Bowman Environmental Defense National Coalition for the Homeless Riverkeeper U.S. Campaign to Ban Landmines Free Gaza Movement Friends of the Earth Europe Bulletin of the Atomic Scientists Basel Action Network Healthy California Now Groundwork Collaborative One Fair Wage Progressive International Congressman Ro Khanna Data for Progress Fight Corporate Monopolies Mijente Congresswoman Pramila Jayapal Oxfam America Repair Our Democracy Farm Action Accountable.Senate The Sentencing Project Hunger Free America Fridays for Future Family Farm Action National Family Farm Coalition Protect the Results AFSCME Color Of Change PAC MPower Change Western Watersheds Project WildEarth Guardians The Elders Gwich'in Steering Committee Stop the Money Pipeline United Nations Human Rights - Special Procedures Quaker United Nations Office (QUNO) Communications Workers of America The Endangered Species Coalition Center for Climate Integrity Climate Power NORML Lower Drug Prices Now National Education Association (NEA) Democracy Initiative Small Business for Paid Leave Campaign Legal Center Muslim Advocates Congresswoman Ilhan Omar Accountable.US Climate Mobilization GLAD Out & Equal American Federation of State, County and Municipal Employees The Sunrise Project American Economic Liberties Project Bend the Arc Poor People's Campaign Jewish Voice for Peace Action The Revolving Door Project Congresswoman Alexandria Ocasio-Cortez TIME'S UP Now Oil Change U.S. Vote Climate U.S. PAC Community Change Action Democracy 21 Environmental Justice Foundation Center for Popular Democracy Action Climate Justice Alliance Free Press Action International Rivers JVP Action Open Markets Institute Center for Popular Democracy Stand Up America Demand Justice Stand.earth By the People The Sanders Institute Tax March Friends of the Earth Scotland Justice Democrats Sunrise Movement Western Values Project Good Jobs First Climate Works for All Democratic Socialists of America Freedom From Facebook & Google National Center for Transgender Equality As You Sow Rootstrikers Direct Action Everywhere Every Voice Earthworks Global Witness National Abortion Federation Representative Keith Ellison Transgender Law Center (TLC) Sea Shepherd American Promise Americans For Tax Fairness Action Fund Biofuelwatch Grassroots International Climate Justice Programme End Rape On Campus (EROC) Stop the Wall Organization for Competitive Markets Balestra Media Pacifica Foundation The LGBT Network Compassion in World Farming UNHCR Community Alliance for Global Justice Elders Rising Moms Demand Action For Gun Sense in America The Right Livelihood Award Women's Earth & Climate Action Network (WECAN) The International Rescue Committee Women Cross DMZ Acadia Center American Sustainable Business Council (ASBC) The New York Immigration Coalition GAIA The Culinary Union The American Immigration Council Citizens Against Monopoly Our Revolution United We Dream National Women's Law Center SumofUs Global Zero The Immigrant Legal Resource Center (ILRC) NAACP Legal Defense Fund Network Lobby NIAC Action Asian Americans Advancing Justice Freedom of the Press Foundation Progressive Congress Action Fund The Main Street Alliance Millions Marching For Medicare For All The World Health Organization Senator Elizabeth Warren Rep. Barbara Lee John Conyers, Jr., Congressman The Commonwealth Fund Social Security Works Mercy for Animals American Federation of Teachers Climate Disobedience Center Nuclear Age Peace Foundation Open Media Campaign for Nuclear Disarmament Community Environmental Legal Defense Fund Bold Alliance The Greenlining Institute Physicians for Reproductive Health Americans for Tax Fairness Climate Action Tracker American Federation of Government Employees Patriotic Millionaires Congresswoman Barbara Lee Progressive Change Campaign Committee Indivisible Friends of the Earth Action Stop the War Coalition Earthrights International Free Speech for People National Employment Law Project Navdanya International Open Debate Coalition Shut It Down - Climate Direct Action SOA Watch Grassroots Global Justice Alliance Green Party of the US Live Share Grow Advancement Project Chicago Teachers Union Indigenous Environmental Network Financial Accountability and Corporate Transparency (FACT) Coalition Coalition to Stop Gun Violence The Leadership Conference on Civil and Human Rights Stop Mass Incarceration Network - Chicago International Campaign to Abolish Nuclear Weapons (ICAN) Progress Michigan 350 Action Climate Action Network International Climate Tracker Regeneration International Ecojustice Together for Global Justice (CIDSE) Carbon Underground Fight for $15 sHELLNO Pembina Institute Global Justice Now Grassroots Leadership La Via Campesina New York Civil Liberties Union Privacy International National Iranian American Council (NIAC) Restaurant Opportunities Centers United U.S. Right to Know Share the World's Resources National Latina Institute for Reproductive Health Don't Shoot Coalition Environmental Action Fight for the Future Oceana UltraViolet Huu-ay-aht First Nations Latino Advocacy Western Environmental Law Center Rolling Jubilee Coalition for Peace Action Rodale Institute Food Research and Action Center Reject and Protect The Upstate Coalition to Ground the Drones and End the Wars Center for Reproductive Rights People's Action Iraq Veterans Against the War Jewish Voice for Peace US Robin Hood Tax Campaign Chesapeake Climate Action Network Council of Canadians Haiti: Make Births Safe Center for Corporate Policy Our Children's Trust The Partnership for Civil Justice Fund Friends of the Earth International + Common Dreams. To inform. To inspire. To ignite change for the common good. Common Dreams Globe LATEST NEWS OPINION CLIMATE ECONOMY POLITICS RIGHTS & JUSTICE WAR & PEACE LATEST NEWS OPINION Common Dreams To inform. To inspire. To ignite change for the common good. SUBSCRIBE TO OUR FREE NEWSLETTER Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox. * indicates required Email Address * Signup Form Location 5 #000000 #FFFFFF LIVE COVERAGE Trump Again Threatens to Bomb Iran as Protest Deaths Near 600 Brett Wilkins Jan 12, 2026 News Illinois, Minnesota Sue Over Trump Immigration Agents Who 'Have Acted as Occupiers' Jessica Corbett Jan 12, 2026 News 'Goebbels Could Not Have Improved On This': DHS Spreads 'Propaganda' on ICE Killing as Violence Mounts Julia Conley Jan 12, 2026 News Sanders Warns Powell Probe Part of Trump Plan to 'Intimidate and Destroy' All Critics Brad Reed Jan 12, 2026 News EPA to Stop Counting Public Health Benefits When Setting Air Pollution Standards Brett Wilkins Jan 12, 2026 News Warren Warns Democrats Against Letting Billionaires Dictate Their Economic Agenda Brad Reed Jan 12, 2026 SUBSCRIBE TO OUR FREE NEWSLETTER Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox. subscribe below * indicates required Email Address * True True Follow Us Opinion Climate Economy Politics Rights & Justice War & Peace Opinion Why February 6 Could Bring Us Closer to Nuclear Annihilation Michael T. Klare Jan 12, 2026 Opinion Trump, Vance, and Noem Launch a Preemptive Strike Against the Truth Steven Harper Jan 12, 2026 Opinion Big Data Is a Bad Idea: Why AI Factory Farms Will Not Save Rural America John Peck Jan 12, 2026 Opinion Renee Good's Murder: A Rorschach Test About Defiance, Vulnerability, and Community Jordan Liz Jan 12, 2026 Opinion As 2026 Begins, the Pendulum Is Swinging Toward War and Oppression Klaus Moegling Jan 12, 2026 Opinion Congress Spends Money to Kill and Maim Abroad, But Not to Heal at Home Seth Sandronsky Jan 12, 2026 Further ICE: "Fucking Bitch" It was shocking how quickly the psychopaths in power launched their vicious lies about Renée Good—"violent rioter," "domestic terrorist," "self-defense"—shot in the face for trying to drive away from ICE. It's all bullshit, proven by stunning new video from the killer's own phone. Bafflingly, JD Vance posted it, thinking it proved his smears. How sick is he? Good was "pure sunshine ...kindness radiated out of her," says her wife. "We stopped to support our neighbors. We had whistles. They had guns." Renée Nicole Macklin Good, a 37-year-old mother of three and widow of a veteran, was dropping off her youngest child, 6, at a Minneapolis school when she encountered an ICE raid at 34th Street and Portland Avenue; it was the second day of a 30-day "surge" of siccing America's Gestapo on the state's Somali-American population. On Instagram, Good described herself as "a poet and writer and wife and mom and shitty guitar strummer from Colorado"; she and her wife Becca had recently moved there, finding what Becca called "a vibrant and welcoming community" with a strong sense of people "looking out for each other." Horrific, widely viewed footage shows what happened next: The sirens and unmarked cars, masked thugs getting out, Good's car straddling the road, protesters shouting and then, suddenly, screaming as one goon approaches her window, yells "Get out of the fucking car," and fires off three shots through the windshield as Good's car careens wildly off and crashes. Multiple cellphone videos and eyewitness accounts concur: Good was trying to turn around, let one ICE car pass ahead, backed up slightly to turn to the right, pulled forward and around the agent - a few feet away - as he shot her three times in the face. The horror kept coming. Witnesses said Good slumped in her car onto a blood-soaked air bag for up to 15 minutes with no medical attention as protesters yelled and wept. One man asked agents if he could check her pulse. They said no. "I'm a physician," he pleaded. "I don't care," said the thug, claiming "we have our own medics." "Where the fuck are they?" shrieked a distraught woman. Emergency responders finally arrived without a stretcher; they carried Good away, said one woman, "like a sack of potatoes." Mayor Jacob Frey was livid: "To ICE, get the fuck out of Minneapolis. We do not want you here." Despite the clear, stark evidence, the fascist propaganda machine shot into high gear. In Texas , ICE Barbie, cosplaying in a ludicrous cowboy hat, proclaimed "an act of domestic terrorism...a woman attacked (ICE) and attempted to run them over." Dead-eyed DHS spokesbot Tricia McLaughlin raved about "a violent rioter” who "weaponized her vehicle, attempting to run over law enforcement officers." Vance called Good "a deranged leftist." In an incendiary post, Trump ripped a "disorderly" woman "obstructing and resisting" who "then violently, willfully, and viciously ran over the ICE officer...It is hard to believe he is alive." More to the point, it is hard to believe how brazenly, brutishly, remorselessly these motherfuckers can spew their fucking lies in the face of demonstrable, overwhelming reality , demanding we not see what we see or hear what we hear. Eventually, even Trump had to back down, slightly, after both the Washington Post and New York Times committed a rare act of journalism - the Times, to his face - and declared the video entirely contradicted his vile fantasy. Then, on Friday, the right-wing , Minnesota-based Alpha News released 47-second footage of the scene from the phone of ICE agent Jonathan Ross, Renée Good's murderer. An Iraq War veteran, Ross has worked for ICE since 2015 and is also a firearms instructor and SWAT team member; he was injured last summer when he was dragged by the vehicle of a fleeing suspect. The footage shows Ross arriving and walking around Renée Good's red Honda recording with his phone; he circles back to her window as another agent curses and tries to open her door. Sitting behind the wheel, her dog in the back, Good smilingly tells the agent, "It's fine, dude, I'm not mad at you." Seconds later, shots ring out. Ross stands safely away as her car veers off. Audio catches a man muttering, "Fucking bitch." Inexplicably, both Fox News and J.D. Vance posted the footage. "Watch this, as hard as it is," Vance wrote. "Many of you have been told (Ross) wasn’t hit by a car, wasn’t being harassed, and murdered an innocent woman." The footage, he said, proves Ross "fired in self-defense” when his "life was endangered” by Good. What the ever-loving fuck. Ross, he adds, "deserves a debt (sic) of gratitude. This is a guy who’s actually done a very important job for the United States of America." AOC speaks for us all: "I understand that Vance believes shooting a young mother of three in the face three times is an acceptable America that he wants to live in, and I do not... I do not believe the American people should be assassinated in the street." — (@) Good was ICE's ninth victim. Her murder - a white woman, not brown guy, it must be noted - has prompted nationwide outrage, and a GoFundMe that aimed to raise $50K is now at over a million. “This is an execution plain and simple,” said journalist Krystal Ball. "If your Trump love or immigrant hatred has you justifying murder, please seek help.” "We're a Third World country now," said Jesse Ventura, citing the history of 1930s Germany. "That's what happens in a dictatorship - in comes the military." And on the "giddy sadism" we see daily, "All of us, citizens and immigrants alike, are being ruled by people who think life is a privilege bestowed by authority, and death is a fair penalty for disobedience." Still, it goes on. They are still assaulting people, usually brown, sometimes citizens. In a clumsy, nasty encounter in North Carolina, they attacked two U.S. citizens in their car and only gave up when both guys kept filming the abuses. The lesson: "Film them. Always." In Minneapolis, they blithely moved on from murdering Renee Good to terrorize workers at a nearby childcare center and students at a high school, tackling people, handcuffing two staff members and firing teargas at bystanders until the schools were forced to shut down. "They're just animals," said one school official. "I've never seen people behave like this." Meanwhile, Renée Nicole Good is being mourned, in the words of her mother, as "an amazing human being" and "one of the kindest people I’ve ever known.." On Friday, Renée's wife Becca Good released a moving statement thanking all the people who have reached out to support their family: "This kindness of strangers is the most fitting tribute because if you ever encountered my wife, Renée Nicole Macklin Good, you know that above all else, she was kind. In fact, kindness radiated out of her...Renee lived by an overarching belief: there is kindness in the world and we need to do everything we can to find it where it resides and nurture it where it needs to grow." She described moving to Minnesota, "like people have done across place and time...to make a better life for ourselves. Here, I had finally found peace and safe harbor. That has been taken from me forever... We were raising our son to believe that no matter where you come from or what you look like, all of us deserve compassion and kindness. Renée lived this belief every day... We thank you for ensuring that Renee’s legacy is one of kindness and love. We honor her memory by living her values: rejecting hate and choosing compassion, turning away from fear and pursuing peace, refusing division and knowing we must come together to build a world where we all come home safe to the people we love." Abby Zimet Jan 10, 2026 Further SEE ALL News Trump Quits Key Treaties Amid 'Increasingly Deadly and Expensive' Weather Disasters Brett Wilkins Jan 08, 2026 News Trump Abandonment of Global Treaties 'Threatens All Life on Earth' Jake Johnson Jan 08, 2026 News Green Group Warns Trump's Offshore Drilling Plan Risks 4,000+ Additional Oil Spills Stephen Prager Jan 06, 2026 News Offshore Wind Developers Fight 'Unlawful' Trump Admin Attacks in Court Jessica Corbett Jan 02, 2026 News US Electric Grid Heading Toward 'Crisis' Thanks to AI Data Centers Brad Reed Jan 02, 2026 News 'New Year's Eve Massacre': Trump Administration Makes Deep Cuts at FEMA as Climate Crisis Accelerates Brad Reed Jan 02, 2026 News 'A Wake-Up Call': Scientists Find 2025 Among Hottest Years on Record Climate change driven by human burning of fossil fuels helped make 2025 one of the hottest years ever recorded, a scientific report published Monday affirmed, prompting renewed calls for urgent action to combat the worsening planetary emergency. Researchers at World Weather Attribution (WWA) found that "although 2025 was slightly cooler than 2024 globally, it was still far hotter than almost any other year on record," with only two other recent years recording a higher average worldwide temperature. For the first time, the three-year running average will end the year above the 1.5°C warming goal, relative to preindustrial levels, established a decade ago under the landmark Paris climate agreement. "Global temperatures remained very high and significant harm from human-induced climate change is very real," the report continues. "It is not a future threat, but a present-day reality." "Across the 22 extreme events we analyzed in depth, heatwaves , floods, storms, droughts, and wildfires claimed lives, destroyed communities, and wiped out crops," the researchers wrote. "Together, these events paint a stark picture of the escalating risks we face in a warming world." The WWA researchers' findings tracked with the findings of United Nations experts and others that 2025 would be the third-hottest year on record. — (@) According to the WWA study: This year highlighted again, in stark terms, how unfairly the consequences of human-induced climate change are distributed, consistently hitting those who are already marginalized within their societies the hardest. But the inequity goes deeper: The scientific evidence base itself is uneven. Many of our studies in 2025 focused on heavy rainfall events in the Global South , and time and again we found that gaps in observational data and the reliance on climate models developed primarily for the Global North prevented us from drawing confident conclusions. This unequal foundation in climate science mirrors the broader injustices of the climate crisis . The events of 2025 make it clear that while we urgently need to transition away from fossil fuels, we also must invest in adaptation measures. Many deaths and other impacts could be prevented with timely action. But events like Hurricane Melissa highlight the limits of preparedness and adaptation: When an intense storm strikes small islands such as Jamaica and other Caribbean nations, even relatively high levels of preparedness cannot prevent extreme losses and damage. This underscores that adaptation alone is not enough; rapid emission reductions remain essential to avoid the worst impacts of climate change. “If we don’t stop burning fossil fuels very, very, quickly, very soon, it will be very hard to keep that goal ” of 1.5°C, WWA co-founder Friederike Otto—who is also an Imperial College London climate scientist— told the Associated Press . “The science is increasingly clear.” The WWA study's publication comes a month after this year's United Nations Climate Change Conference—or COP30—ended in Brazil with little meaningful progress toward a transition from fossil fuels. Responding to the new study, Climate Action Campaign director Margie Alt said in a statement that "2025 was full of stark reminders of the urgent need to cut climate pollution , invest in clean energy, and tackle the climate crisis now." "Today’s report is a wake-up call," Alt continued. "Unfortunately, [US President Donald] Trump and Republicans controlling Congress spent the past year making climate denial official US policy and undermining progress to stave off the worst of the climate crisis. Their reckless polluters-first agenda rolled back critical climate protections and attacked and undermined the very agencies responsible for helping Americans prepare for and recover from increasingly dangerous disasters." "Across the country, people are standing up and demanding their leaders do better to protect our families from climate change and extreme weather ," Alt added. "It's time those in power started listening.” Brett Wilkins Dec 30, 2025 News Climate SEE ALL News Backlash Builds Against Trump DOJ's 'Unprecedented' Investigation of US Federal Reserve Chairman Brad Reed Jan 12, 2026 News Weak US Jobs Report Shows 'Bleak Economic Reality' for Workers Under Trump Brad Reed Jan 09, 2026 News Democrat-Led States Sue Trump Admin for 'Unlawful' Federal Childcare Funding Freeze Jessica Corbett Jan 09, 2026 News Hochul Backs Mamdani Childcare Expansion Plan With Two Years of State Funding Stephen Prager Jan 08, 2026 News Jensen Huang, World's 8th Richest Man, 'Perfectly Fine' With California Billionaire Tax Jake Johnson Jan 07, 2026 News Victory for Corporate Tax Dodgers as OECD Approves Watered-Down Global Minimum Tax Brad Reed Jan 05, 2026 News US Billionaire Wealth Surges to $8.1 Trillion as Affordability Crisis Hammers Working Class The collective wealth of US billionaires surged to $8.1 trillion in 2025 as working-class Americans faced a cost-of-living crisis made worse by President Donald Trump's tariff regime and unprecedented assault on the social safety net. An analysis released Friday by the Institute for Policy Studies (IPS) found that the top 15 US billionaires saw the largest wealth gains last year, with their collective fortune growing from $2.4 trillion to $3.2 trillion. That 33% gain was more than double the S&P 500's 16% increase in 2025. What IPS describes as the "elite group" of US billionaires includes Tesla CEO Elon Musk , the richest man in the world; Google co-founder Larry Page; Amazon founder Jeff Bezos ; and Oracle executive chairman Larry Ellison. IPS emphasized that "these staggering combined billionaire wealth totals come as the Trump-GOP budget bill passed in 2025 defunded health insurance, food stamps, and other vital anti-poverty safety net programs, in order to pay for tax cuts for the wealthy and budget increases for militarism and mass deportations ." "The affordability crisis is hitting ordinary Americans particularly hard as we head into the new year, but not everyone is feeling the pain: Billionaires are raking in staggering profits off the backs of ordinary workers,” Chuck Collins , director of the Program on Inequality and the Common Good at IPS, said in a statement . “These extreme concentrations of wealth and power," Collins added, "undermine our daily lives and further rig our economy in favor of the ultra-rich and corporations, while ordinary Americans get a raw deal once again.” IPS released its analysis days after Bloomberg reported, based on its Billionaires Index, that the world's 500 richest people gained a record $2.2 trillion in wealth last year. Omar Ocampo, an IPS researcher, said that in the US, billionaires are "paying far less in taxes compared to the huge amount of wealth they amass," allowing them to continue accumulating vast fortunes, supercharging inequality, and using their wealth and influence to subvert reform efforts . “Not only are a small number of Americans holding more wealth than the rest of America, but they’re also not paying their fair share in taxes," said Ocampo. The new report comes as families across the US struggle to make ends meet amid high and still-rising prices for groceries, housing, and other necessities. A Century Foundation survey released last month found that "roughly three in 10 voters delayed or skipped medical care in the past year due to cost, while nearly two-thirds switched to cheaper groceries or bought less food altogether." Jake Johnson Jan 02, 2026 News Economy SEE ALL News EPA to Stop Counting Public Health Benefits When Setting Air Pollution Standards Brett Wilkins Jan 12, 2026 News Warren Warns Democrats Against Letting Billionaires Dictate Their Economic Agenda Brad Reed Jan 12, 2026 News House Democrats Who Want Stock Trading Ban 'Disappointed' by GOP Proposal Jessica Corbett Jan 12, 2026 News Fed Chair Powell Says He Won't Bow to Trump 'Intimidation' as DOJ Launches Criminal Probe Jake Johnson Jan 12, 2026 News Citing 'Astronomical' Cost in US, Graham Platner and Wife Head to Norway for Affordable IVF Treatment Jon Queally Jan 10, 2026 News Progressives Say 'No Taxpayer Subsidies' as Big Oil Balks at Trump's Call to Invest in Venezuela Brett Wilkins Jan 09, 2026 News Schumer, Jeffries Refuse to Join Democrats' Growing Calls to Slash ICE Spending The killing of Renee Good by a federal immigration officer in Minneapolis this week came as Republicans in Congress were planning to bring a homeland security spending bill to the House floor, deciding on whether the agency that's surged thousands of armed agents into communities across the country should have increased funding—and progressive lawmakers are demanding that the Democrats use the upcoming government funding deadline to hopefully reduce the department's ability to wreak further havoc. "I just don’t understand how we provide votes for a bill that funds the extent of the depravity," Sen. Chris Murphy (D-Conn.) told CNN Thursday. "I know we can’t fix everything in the appropriations bill but we should be looking at ways we can put some commonsense limitations on their ability to bring violence to our cities." But the top Democratic leaders, Senate Minority Leader Chuck Schumer (NY) and House Minority Leader Hakeem Jeffries (NY) both appeared to have little interest in discussing how their party can use the appropriations process as leverage to rein in US Immigration and Customs Enforcement (ICE) and other Department of Homeland Security (DHS) agencies that have taken part in President Donald Trump's mass deportation operation. Both Schumer and Jeffries sharply criticized Wednesday's shooting and the Trump administration's insistence that, contrary to mounting video evidence, the ICE agent who shot Good was acting in self-defense. But Jeffries said Thursday that he was focused on passing other appropriations bills that were ultimately approved by the House. “We’ll figure out the accountability mechanisms at the appropriate time," Jeffries told reporters. — (@) With Congress facing a January 30 deadline for approving government spending packages—and with public disapproval of ICE at an all-time high—several lawmakers have said this week that right now is the "appropriate time" to rein in the agency in any way the Democrats can. "Statements and letters are not enough, and the appropriations process and the [continuing resolution] expiring January 31 is our opportunity," Rep. Delia Ramirez (D-Ill.) told Axios . Schumer also refused to say whether the Democrats would use the appropriations process as leverage to cut funding to ICE, whose budget is set to balloon to $170 billion following the passage of the One Big Beautiful Bill Act last year. Republicans will need Democratic support to pass a spending bill in the Senate, where 60 votes are required. — (@) The Senate leader said only that he has "lots of problems with ICE" when asked whether he would support abolishing the agency—a proposal whose support has gone by 20 percentage points among voters in just one year, according to a recent survey. Both leaders also would not commit to slashing the homeland security budget should the Democrats win back majorities in Congress this year. "It’s hard to be an opposition party when you refuse to oppose the blatantly illegal and immoral things being done by the opposition," said Melanie D'Arrigo, executive director of the Campaign for New York Health. Sharing a clip of Jeffries' remarks to reporters about the agency's funding, historian Moshik Temkin said that "people need to understand that at its core ICE is a bipartisan project, increasingly funded and normalized over multiple Democratic administrations and congressional majorities, and a few of them (not this guy) are starting to realize how foolish, weak, and misguided they were." Reps. Pramila Jayapal (D-Wash.) and Alexandria Ocasio-Cortez (D-NY) are among the progressive lawmakers calling on the Democrats to demand reduced funding for ICE—even if it means another government shutdown months after the longest one in US history late last year, which began when the Democrats refused to join the GOP in passing a spending bill that would have allowed Affordable Care Act tax credits to expire. Ultimately, some Senate Democrats caved, and the subsidies lapsed. "We can't just keep authorizing money for these illegal killers," Jayapal told Axios . "That's what they are, this rogue force." Ocasio-Cortez told the Independent that Democrats should "absolutely" push to cut funding. “This Congress, this Republican Congress, while they cut a trillion dollars to Americans’ healthcare , and they exploded the ICE budget to $170 billion making it one of the largest paramilitary forces in the United States with zero accountability as they shoot US citizens in the head—absolutely,” she said. On the podcast The Majority Report , Emma Vigeland and Sam Seder called on progressive Democrats to demand Schumer's ouster in light of his refusal to take action to rein in ICE as its violence in American communities escalates. It's time for Democrats to oust Chuck Schumer from leadership pic.twitter.com/ByWMJ495zb — Majority Report (@majorityfm) January 9, 2026 "Change the news cycle and show that you'll be an opposition party," said Vigeland. "Call for his ouster." Seder added that Schumer "has the ability to wage a fight to prevent the funding of DHS. He has the ability to do that and he doesn't want it. He's running away from any leverage he has, deliberately." Julia Conley Jan 09, 2026 News Politics SEE ALL News Illinois, Minnesota Sue Over Trump Immigration Agents Who 'Have Acted as Occupiers' Jessica Corbett Jan 12, 2026 News 'Goebbels Could Not Have Improved On This': DHS Spreads 'Propaganda' on ICE Killing as Violence Mounts Julia Conley Jan 12, 2026 News Sanders Warns Powell Probe Part of Trump Plan to 'Intimidate and Destroy' All Critics Brad Reed Jan 12, 2026 News Sen. Kelly Sues Pentagon, Hegseth Over Retaliation for Illegal Orders Video Jessica Corbett Jan 12, 2026 News Global Intellectuals Voice Solidarity With Palestine Action Hunger Strikers 'At Death's Door' Brett Wilkins Jan 12, 2026 News Largest Nurses Strike in NYC History as Nearly 15,000 Healthcare Workers Hit the Picket Line Brad Reed Jan 12, 2026 News 'You Are Murderers!' 'Get the F*ck Out!': Fury at ICE Agents Boils in Minneapolis Amidst peaceful demonstrations and shows of empathy and solidarity in Minneapolis and other US cities following the killing of Renee Nicole Good by a federal agent last week, videos appearing online over the weekend also show increasing levels of outrage directed at immigration officers who community members say they no longer want to see terrorizing their streets. While Trump has reportedly ordered more officers to Minneapolis in the wake of Good's killing—even as local and state officials have called for the end of operations in order to tamp down tensions in the city—the clips circulating online reveal mounting frustration by neighbors no longer willing to tolerate the situation. On Sunday, journalist and documentarian Ford Fischer posted video from Minneapolis he described as ICE agents being "followed by dozens of activists on foot and in vehicles" in the city. While agents are seen holding bear spray and warning people to stay back, the procession of civilians following them heckled the officers and made it clear they are not wanted in the city. "You are murderers!" yells one man at the officers. Several others can be heard screaming, "Go home!" and "Fuck you!" Just now: ICE followed by dozens of activists on foot and in vehicles in Minneapolis. pic.twitter.com/vFXmZIr0TA — Ford Fischer (@FordFischer) January 11, 2026 In another video, posted by FreedomNews.TV, federal agents are seen pulling two people from a vehicle on a residential street and placing them under arrest before being confronted by neighbors and onlookers telling them to "Get out of our fucking state!"; "Get the fuck out!"; and "Get a real job!" 🚨 HOLY SMOKES: New video shows ICE agents smashing the window of a protester’s vehicle and forcibly pulling him out in Minneapolis and he was immediately detained. Protesters in the area are furious, and tensions are exploding. This is escalation, not policing. pic.twitter.com/CfHMQyPOOg — Brian Allen (@allenanalysis) January 11, 2026 "Protesters in the area are furious, and tensions are exploding," said independent journalist Brian Allen in response to the video. "This is escalation, not policing." The latest scenes appear to indicate growing anger by the public towards President Donald Trump's authoritarian deployment of federal agents to cities nationwide over the last year. With Good's killing, the growing tensions are palpable. NOW: Border Patrol Commander Greg Bovino hounded by activists and shoppers protesting his presence as he and a federal agent caravan leave a Target in St Paul, Minnesota for a restroom break. pic.twitter.com/Ti21rQbuyd — Ford Fischer (@FordFischer) January 11, 2026 While many state and local lawmakers and other officials calling for calm and peaceful protest in response, many—including Rep. Ilhan Omar (D-Minn.) also believe that Trump and members of his administration are intentionally trying to provoke the civilian population in order to justify an ever harsher repressive response. In comments on Saturday, as Common Dreams reported , Omar warned that the ultimate goal is "to agitate people enough where they are able to invoke the Insurrection Act to declare martial law." While the individual episodes documented above reveal the very real anger that many are feeling as masked federal agents target people in their communities, the overall protests against the policies that led to Good's killing—which took place in hundreds of cities over the weekend—have been resoundingly peaceful. 🚨 JUST IN: Families, including parents with children , are present at PEACEFUL protests in Minneapolis, underscoring that these are community demonstrations, NOT riots. If federal agents escalate force against crowds that include families, that will be a choice by the state, not… pic.twitter.com/SKoHKleGFb — Brian Allen (@allenanalysis) January 11, 2026 "A peaceful night in Minneapolis," the city posted to its social media accounts following Saturday night's demonstrations. "As more demonstrations are planned today, we appreciate and thank the community for using its collective voice in harmony and love." Jon Queally Jan 11, 2026 News Rights & Justice SEE ALL News Trump Again Threatens to Bomb Iran as Protest Deaths Near 600 Brett Wilkins Jan 12, 2026 News EU Leader Warns of 'End of NATO' as Trump Ramps Up Threats to Take Over Greenland Julia Conley Jan 12, 2026 News Son of Last Iranian Shah Asks Trump to Back Military Coup as Protests Rage Jake Johnson Jan 12, 2026 News US Oil Piracy Continues as Fifth Tanker Tied to Venezuela Seized Stephen Prager Jan 09, 2026 News Trump Vows to 'Do Something' With Greenland 'Whether They Like It or Not' Brad Reed Jan 09, 2026 News 'I Don't Need International Law,' Trump Says, Adding That His 'Power' Is Limited Only By His 'Morality' Stephen Prager Jan 09, 2026 News Trump Meeting With Big Oil Underscores Venezuela Agenda: Enriching ‘Himself and His Fossil Fuel Donors’ US President Donald Trump is set to meet at the White House on Friday afternoon with executives from some of the world's largest fossil fuel companies to discuss the future of Venezuela's oil infrastructure , a gathering that critics said throws into stark relief the true aims of the administration's military assault on a sovereign nation and abduction of its president. The meeting, scheduled for 2 pm ET, will come after Trump declared on social media early Friday that "at least 100 Billion Dollars will be invested by BIG OIL ," an industry that donated heavily to the president's 2024 campaign and inaugural fund . Attendees of Friday's White House meeting will reportedly include the CEOs of Chevron , ExxonMobil , ConocoPhillips, Halliburton, and Shell . Harold Hamm, the founder of Continental Resources and major Trump donor, is also expected to attend. Hamm organized the now-infamous 2024 event where Trump asked oil executives for $1 billion in campaign donations in exchange for industry-friendly policies. “American fossil fuel companies who’ve bought access to the Trump administration stand to benefit most from Trump’s illegal acts of aggression in Venezuela ," Allie Rosenbluth, US program manager at Oil Change International , said in a statement ahead of Friday's gathering. "Today’s meeting is meant to ensure the future of Venezuela is being shaped in a way that maximizes Big Oil profits and Trump’s power," said Rosenbluth. "Trump’s aggression in Venezuela is leading us to a hotter, more polluted, and more dangerous world—all to enrich himself and his fossil fuel donors. Today’s meeting is proof of that. To protect our communities from climate disasters and more wars for oil, we need to reject extractive energy models and build democratic systems that prioritize community health and safety." Despite Trump's lofty promises and suggestion of taxpayer reimbursement , major US oil companies have yet to make any concrete investment pledges related to Venezuela's oil infrastructure. Earlier this week, US Energy Secretary Chris Wright said the Trump administration intends to manage Venezuela oil sales and revenue indefinitely. On Tuesday, Trump proclaimed that he himself would control the proceeds from the sale of Venezuelan oil. While Venezuela's known oil reserves are the largest in the world, some leading oil executives have "privately expressed reservations about committing the kind of money it would take to meaningfully boost Venezuelan oil production," the New York Times reported Friday. "Some oil companies have discussed the possibility of seeking some form of financial guarantee from the federal government before agreeing to establish or expand production in Venezuela," the Times added. "Along with blocking further military action against Venezuela, Congress must act to ensure US taxpayers don’t subsidize Big Oil’s exploitation of Venezuela’s oil resources.” The watchdog group Public Citizen noted in a report released Thursday that "Big Oil companies have a long history of demanding that taxpayers shoulder their risks, even when they choose to operate in politically volatile jurisdictions." "They rake in billions in profit exploiting the natural resources from impoverished nations, then demand taxpayer compensation if those nations require them to clean up their pollution or if affected communities convince their governments to halt harmful projects," the group observed. "And so it seems likely that these companies are going to require their investments in Venezuela to have some sort of 'guarantees and conditions'—that’s the exact phrase [US Secretary of State] Marco Rubio used on 'Face the Nation ' on Monday." Robert Weissman, Public Citizen's co-president, said in a statement that "the Trump administration’s shocking actions to use force to exploit Venezuela’s oil resources echo the imperial arrogance of the United States after the invasion of Iraq and a century of military intervention in Central and South America." "Along with blocking further military action against Venezuela," said Weissman, "Congress must act to ensure US taxpayers don’t subsidize Big Oil’s exploitation of Venezuela’s oil resources.” Jake Johnson Jan 09, 2026 News War & Peace SEE ALL LATEST NEWS Sen. Kelly Sues Pentagon, Hegseth Over Retaliation for Illegal Orders Video The Pentagon chief's "unconstitutional crusade against me sends a chilling message to every retired member of the military," said the former Navy captain. Jessica Corbett Jan 12, 2026 US Sen. Mark Kelly , a retired Navy captain, announced Monday that he "filed a lawsuit against the secretary of defense because there are few things as important as standing up for the rights of the very Americans who fought to defend our freedoms." The Arizona Democrat is suing not only Pentagon chief Pete Hegseth but also the US Department of Defense, the Department of the Navy, and Navy Secretary John Phelan over the DOD leader's effort to cut Kelly's retirement pay over a November video in which he and other veterans of the military and intelligence community reminded troops that they "must refuse illegal orders." Kelly, Sen. Elissa Slotkin (D-Mich.), and Reps. Jason Crow (D-Colo.), Chris Deluzio (D-Pa.), Maggie Goodlander (D-NH), and Chrissy Houlahan (D-Pa.) released the short video as Hegseth and President Donald Trump were in the midst of their deadly boat-bombing spree and ramping up threats against Venezuela , whose leader they have since abducted to put him on trial in the United States . Of the six Democrats in the video, Kelly is the only one still subject to the Uniform Code of Military Justice. Given that, Hegseth initially launched a probe into the senator and threatened to call him back to active duty to face a court-martial, but ultimately revealed last week that the DOD was working to reduce his retirement pay and had issued a formal letter of censure. — (@) "Pete Hegseth is coming after what I earned through my 25 years of military service, in violation of my rights as an American, as a retired veteran, and as a United States senator whose job is to hold him—and this or any administration—accountable," Kelly said Monday. "His unconstitutional crusade against me sends a chilling message to every retired member of the military: If you speak out and say something that the president or secretary of defense doesn't like, you will be censured, threatened with demotion, or even prosecuted." "In 1986, at just 22 years old, I took an oath to protect and defend the Constitution. I have fulfilled that oath every day since, but I never expected that I would have to defend it against a secretary of defense or president," said Kelly, also a former US astronaut. "But I've never shied away from a fight for our country, and I won't shy away from this one. Because our freedom of speech, the separation of powers, and due process are not just words on a page, they are bedrock principles of our democracy that has lasted 250 years and will last 250 more as long as patriotic Americans are willing to stand up for our rights." — (@) Kelly's 46-page complaint , filed in federal court in Washington , DC, states that "defendants' actions violate numerous constitutional guarantees and have no basis in statute," citing "the First Amendment , the speech or debate clause, the separation of powers, due process, 10 USC § 1370, and the Administrative Procedure Act." The senator is asking the court "to declare the censure letter, reopening determination, retirement grade determination proceedings, and related actions unlawful and unconstitutional; to vacate those actions; to enjoin their enforcement; and to preserve the status of a coequal Congress and an apolitical military." Keep Reading Show Less News News Rights & Justice mark kelly Global Intellectuals Voice Solidarity With Palestine Action Hunger Strikers 'At Death's Door' Angela Davis, Naomi Klein, Sally Rooney, Tariq Ali, and George Monbiot are among the signers of a statement of support for the proscribed anti-genocide protesters, who have refused food for over two months. Brett Wilkins Jan 12, 2026 More than 50 international authors and academics signed a declaration published Monday in support of hunger-striking activists allegedly linked to the banned Palestine Action movement, who are at imminent risk of death after refusing to eat for more than two months. The brief statement —“We oppose genocide , we support the Palestine Action prisoners”—was signed by prominent figures including historian Tariq Ali; novelist Sally Rooney; former Guantánamo Bay prisoner Moazzam Begg; journalists Owen Jones and George Monbiot; and professors Angela Davis, Judith Butler, Naomi Klein , and Ilan Pappé. The declaration echoes the message on a placard held by Swedish climate campaigner Greta Thunberg when she was arrested last month in London protesting the imprisonment of people accused of being part of Palestine Action after the nonviolent direct action group was officially declared a terrorist organization in July by the UK government. Since then, more than 2,000 people have been arrested for supporting Palestine Action, often while simply holding signs. Eight accused Palestine Action activists are awaiting trial for allegedly breaking into and damaging a British military base and a facility run by Israeli arms maker Elbit Systems. The defendants are facing at least 18 months behind bars before trial. On November 2, a small group of imprisoned activists launched a hunger strike. Three people—Heba Muraisi, Kamran Ahmed, and Lewie Chiaramello—are still striking, despite imminent danger of death. "She’s dying. She said it: ‘I’m dying,'" Francesca Nadin said of her friend Muraisi—who is on the 71st day of her strike—during a Monday interview with the Guardian . Nadin said that the 31-year-old's body is "shutting down." "I know mentally she’ll remain strong right to the last moment but she is dying," she added. "The government, by putting her in prison and denying her all her rights, they’re not just letting her die, they’re actively killing her.” Ahmed, 28, has been refusing food for 64 days. Doctors have informed him that his heart muscles are shrinking and he is at risk of sudden cardiac arrest. "He’s skinny. I describe him a bit like a piece of paper,” Shahmina Alam, Ahmed's sister, told Al Jazeera last week. "It feels like now every time you see him, it could be the last.” Chiaramello, 22, has Type 1 diabetes and has been fasting every other day for 44 days. A fourth person, Umar Khalid, has reportedly resumed his strike following a 13-day pause. Despite her dire condition, Muraisi is “intent on carrying on until the demands are met," according to friend Amareen Afzal. The strikers are demanding immediate bail, an end to censorship of their communications, a fair trial, lifting of the ban on Palestine Action, and closure of Elbit Systems' UK facilities. "The hunger strikers’ demands seem reasonable to me," Monbiot wrote last week. "All these things, I believe, should be happening anyway. And they are of course negotiating positions. Whether all would need to be met for the strike to end cannot be known until the government engages. Its refusal to talk could condemn the strikers to death." Standing in stark contrast with the US military's torturous force-feeding of hunger striking Guantánamo Bay prisoners during the Obama administration , the UK follows recommendations in the World Medical Association’s Declaration of Malta , which advises doctors not to force-feed prisoners who choose to hunger strike and understand the consequences of their actions. "Forcible feeding is never ethically acceptable," the declaration states. In 1981, UK authoritie
2026-01-13T09:29:57
https://akismet.com/developers/detailed-docs/usage-limit/
Usage limit – Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Getting started Plugins and libraries Detailed docs Building your application Key verification Comment check Submit spam (missed spam) Submit ham (false positives) Key/sites activity Usage limit Response error codes Akismet Error #10001 Akismet Error #10003 Akismet Error #10402 Akismet Error #10011 Akismet Error #10010 Akismet Error #10009 Akismet Error #10006 Akismet Error #10005 Akismet Error #10404 Akismet Error #10403 Akismet Error #30001 Usage limit An endpoint to keep track of your Akismet API usage for the current month. https://rest.akismet.com/1.2/usage-limit All parameters can be passed via the GET or POST methods. Required parameters api_key Your Akismet API key. You can find this on your account dashboard at  https://akismet.com/account/ PHP example $data = file_get_contents( 'https://rest.akismet.com/1.2/usage-limit?api_key=123YourAPIKey' ); var_dump( $data ); Sample results { "limit":350000, "usage":7463, "percentage":"2.13", "throttled":false } Results keys limit The number of monthly API calls your plan entitles you to. 350000 : The limit, when applicable. none : If your plan is unlimited. usage Number of calls (spam + ham) since the beginning of the current month, to date. percentage The percentage of your limit used since the beginning of the current month, to date. throttled Indicates if your requests are currently being throttled for having consistently gone over your plan’s limit, or not. We’re here to help If you ever get stuck or need help troubleshooting something, please don’t hesitate to  contact us . Related Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:57
https://wiki.creativecommons.org/wiki/Frequently_Asked_Questions#how-do-i-properly-attribute-material-offered-under-a-creative-commons-license
Frequently Asked Questions - Creative Commons Skip to content Creative Commons Menu Who We Are What We Do Licenses and Tools Blog Support Us Search Donate Explore CC Global Network Join a global community working to strengthen the Commons Certificate Become an expert in creating and engaging with openly licensed materials Global Summit Attend our annual event, promoting the power of open licensing Chooser Get help choosing the appropriate license for your work Search Portal Find engines to search openly licensed material for creative and educational reuse Open Source Help us build products that maximize creativity and innovation Frequently Asked Questions English | Français 2025-05-12 19:36:36 UTC About CC What is Creative Commons and what do you do? Is Creative Commons against copyright? What does “Some Rights Reserved” mean? Can Creative Commons give legal advice about its licenses or other tools, or help with CC license enforcement? Does Creative Commons collect or track material licensed under a CC license? What do the Creative Commons buttons do? May I use the Creative Commons logo and buttons? I love Creative Commons. How can I help? Why does Creative Commons run an annual fundraising campaign? What is the money used for and where does it go? General License Information What are Creative Commons licenses? How do CC licenses operate? Which is the latest version of the licenses offered by Creative Commons? Do Creative Commons licenses affect exceptions and limitations to copyright, such as fair dealing and fair use? Who gives permission to use material offered under Creative Commons licenses? Are Creative Commons licenses enforceable in a court of law? What happens if someone applies a Creative Commons license to my work without my knowledge or authorization? What are the international (“unported”) Creative Commons licenses, and why does CC offer “ported” licenses? Can I include a work licensed with CC BY in a Wikipedia article even though they use a CC BY-SA license? Can governments and intergovernmental organizations (“IGOs”) use CC licenses? Can children apply Creative Commons licenses to work they create? What are the official translations of the CC licenses and CC0? What is a BY-SA Compatible License? For Licensors Choosing a license What things should I think about before I apply a Creative Commons license? How should I decide which license to choose? Why should I use the latest version of the Creative Commons licenses? What if CC licenses have not been ported to my jurisdiction? Should I choose an international license or a ported license? Why should I use the license chooser? What if I don’t? How do I apply a Creative Commons license to my material? Do I need to register with Creative Commons before I obtain a license? What do the terms and conditions of a CC license apply to? Can I apply a Creative Commons license to software? Can I apply a Creative Commons license to databases? Could I use a CC license to share my logo or trademark? May I apply a Creative Commons license to a work in the public domain? If I take a photograph of another work that is in the public domain, can I apply a CC license to my photo? May I apply a CC license to my work if it incorporates material used under fair use or another exception or limitation to copyright? Rights other than copyright Can I use CC licenses to license rights other than copyright? How do Creative Commons licenses affect my moral rights, if at all? Can I offer material under a CC license that has my trademark on it without also licensing or affecting rights in the trademark? How are publicity, privacy, and personality rights affected when I apply a CC license? What is the difference between plagiarism and copyright infringement? And what role do CC licenses play to address plagiarism? Business models Can I apply a CC license to low-resolution copies of a licensed work and reserve more rights in high-resolution copies? Can I use a Creative Commons license if I am a member of a collecting society? Can I still make money from a work I make available under a Creative Commons license? Alterations and additions to the license Can I insist on the exact placement of the attribution credit? Can I change the license terms or conditions? Can I waive license terms or conditions? Can I enter into separate or supplemental agreements with users of my work? After licensing What happens if I offer my material under a Creative Commons license and someone misuses them? What can I do if I offer my material under a Creative Commons license and I do not like the way someone uses it? Do I have to provide my name? Can I ask that my name be removed? What do I do if someone tries to place effective technological measures (such as DRM) on my CC-licensed material? When I release my work under a CC license in one format (e.g., .pdf), can I restrict licensees from changing it to or using it in other formats? What if I change my mind about using a CC license? For Licensees Before using CC-licensed material What should I think about before using material offered under a Creative Commons license? Does a Creative Commons license give me all the rights I need to use the work? What if there are sui generis database rights that apply to my use of a CC-licensed database? Where can I find material offered under a CC license? Are Creative Commons works really free to use? What should I know about differences between the international licenses and the ported licenses? General license compliance What happens if I want to use the material in a way that is not permitted by the license? Do I always have to comply with the license terms? If not, what are the exceptions? Attribution How do I properly attribute material offered under a Creative Commons license? Do I need to be aware of anything else when providing attribution? Do I always have to attribute the creator of the licensed material? Using licensed material Does my use violate the NonCommercial clause of the licenses? Can I take a CC-licensed work and use it in a different format? How do I know if a low-resolution photo and a high-resolution photo are the same work? Can I reuse an excerpt of a larger work that is licensed with the NoDerivs restriction? Can I use effective technological measures (such as DRM) when I share CC-licensed material? Can I share CC-licensed material on password-protected sites? Can I share CC-licensed material on file-sharing networks? Do I need to worry about website terms of service when I share CC-licensed content on social media platforms? Additional restrictions on licensed material What if I received CC-licensed material encumbered with effective technological measures (such as DRM)? What if I have received CC-licensed material with additional restrictions? Combining and adapting CC material When is my use considered an adaptation? Can I combine material under different Creative Commons licenses in my work? If I derive or adapt material offered under a Creative Commons license, which CC license(s) can I use? If I create a collection that includes a work offered under a CC license, which license(s) may I choose for the collection? License termination When do Creative Commons licenses expire? What happens if the author decides to revoke the CC license to material I am using? How can I lose my rights under a Creative Commons license? If that happens, how do I get them back? Technical Questions How do Creative Commons licenses and public domain tools work technically? What does it mean that Creative Commons licenses are “machine-readable”? What is RDFa? What is CC REL and why does Creative Commons recommend it? What does it mean for a search engine to be CC-enabled? How do I give users of my site the option to use CC licensing like Flickr does? How can I change or remove the Creative Commons search option built into the Firefox browser? Is Creative Commons involved in digital rights management (DRM)? Legal Background What is copyright and why does it matter? What is the public domain? What do I need to do to get a copyright? What is an adaptation? What are moral rights? What are neighboring rights? What are sui generis database rights? What are collecting societies? What are publicity, personality, and privacy rights? Data Frequently asked questions about data and CC licenses Can databases be released under CC licenses? When a CC license is applied to a database, what is being licensed? How do I apply a CC legal tool to a database? How do the different CC license elements operate for a CC-licensed database? Can I conduct text/data mining on a CC-licensed database? How does the treatment of sui generis database rights vary in prior versions of CC licenses? What is the difference between the Open Data Commons licenses and the CC 4.0 licenses? Frequently asked questions about data, generally Which components of databases are protected by copyright? How do I know whether a particular use of a database is restricted by copyright? If my use of a database is restricted by copyright, how do I comply with the license? Which components of a database are protected by sui generis database rights? How do I know whether a particular use of a database is restricted by sui generis database rights? What constitutes a “substantial portion” of a database? If my use of a database is restricted by sui generis database rights, how do I comply with the license? Artificial intelligence and CC licenses What are the limits on how CC-licensed works can be used in the development of new technologies, such as training of artificial intelligence software? But what about privacy laws, rules governing ethical research, and data protection laws? What attribution obligations exist when CC-licensed images are included in a published dataset? Is linking to the original image or URI required, and if so, is it adequate? If a for-profit company uses CC-licensed content under a Non Commercial license and releases the work under terms that allow only research purposes, is the NC restriction violated? If CC SA-licensed content is included in a database, does the entire database have to be licensed under an SA license? What, if any, remedies, do users have if they dislike how their photos or images have been reused? Notes These FAQs are designed to provide a better understanding of Creative Commons, our licenses, and our other legal and technical tools. They provide basic information, sometimes about fairly complex topics, and will often link to more detailed information. Other CC FAQs: CC0 Public Domain Dedication and Public Domain Mark . “Licensor”, “rights holder”, “owner”, and “creator” may be used interchangeably to refer to the person or entity applying a CC license. Information about the licenses is primarily made with reference to the 4.0 suite, but earlier license versions are mentioned where they differ. Have a question that isn’t answered here? Contact info@creativecommons.org. Creative Commons does not provide legal advice. This FAQ is for informational purposes and is not a substitute for legal advice. It may not cover important issues that affect you. You should consult with your own lawyer if you have questions. About CC What is Creative Commons and what do you do? Creative Commons is a global nonprofit organization that enables sharing and reuse of creativity and knowledge through the provision of free legal tools. Our legal tools help those who want to encourage reuse of their works by offering them for use under generous, standardized terms; those who want to make creative uses of works; and those who want to benefit from this symbiosis. Our vision is to help others realize the full potential of the internet. CC has affiliates all over the world who help ensure our licenses work internationally and who raise awareness of our work. Although Creative Commons is best known for its licenses, our work extends beyond just providing copyright licenses. CC offers other legal and technical tools that also facilitate sharing and discovery of creative works, such as CC0 , a public domain dedication for rights holders who wish to put their work into the public domain before the expiration of copyright, and the Public Domain Mark , a tool for marking a work that is in the worldwide public domain. Creative Commons licenses and tools were designed specifically to work with the web, which makes content that is offered under their terms easy to search for, discover, and use. For more information about CC, our main website contains in-depth information about the organization , its staff and board of directors , its history , and its supporters . You can also read CC case studies to learn about some of the inspiring ways CC licenses and tools have been used to share works and support innovative business models. You can find regularly updated information about CC by visiting the blog . Is Creative Commons against copyright? Absolutely not. CC has responded to claims to the contrary . CC licenses are copyright licenses, and depend on the existence of copyright to work. CC licenses are legal tools that creators and other rights holders can use to offer certain usage rights to the public, while reserving other rights. Those who want to make their work available to the public for limited kinds of uses while preserving their copyright may want to consider using CC licenses. Others who want to reserve all of their rights under copyright law should not use CC licenses. That said, Creative Commons recognizes the need for change in copyright law, and many members of the Creative Commons community are active participants in the copyright reform movement. For more information, see our statement in support of copyright reform . What does “Some Rights Reserved” mean? Copyright grants to creators a bundle of exclusive rights over their creative works, which generally include, at a minimum, the right to reproduce, distribute, display, and make adaptations. The phrase “All Rights Reserved” is often used by owners to indicate that they reserve all of the rights granted to them under the law. When copyright expires, the work enters the public domain , and the rights holder can no longer stop others from engaging in those activities under copyright, with the exception of moral rights reserved to creators in some jurisdictions. Creative Commons licenses offer creators a spectrum of choices between retaining all rights and relinquishing all rights (public domain), an approach we call “Some Rights Reserved.” Can Creative Commons give legal advice about its licenses or other tools, or help with CC license enforcement? No. Creative Commons is not a law firm and does not provide legal advice or legal services. CC is similar to a self-help service that offers free, form-based legal documents for others to use. These FAQ answers many of the most common questions. There is also specialized information available on the following pages: Marking practices for creators Marking practices for reusers Data FAQ Differences between CC license versions Differences between jurisdiction ports of earlier license versions Public domain mark FAQ CC0 FAQ While CC does provide this informational guidance about its licenses and other tools, this information may not apply to your particular situation, and should never be taken as legal advice. If you’re looking for legal advice about using CC licenses and other tools, we recommend contacting the Creative Commons affiliate in your jurisdiction . CC affiliates are highly connected to the communities of copyright lawyers in their countries. We also offer a list of lawyers and organizations who have identified themselves as willing to provide information to others about CC licensing issues. However, please note that CC does not provide referral services, and does not endorse or recommend any person on that list. Does Creative Commons collect or track material licensed under a CC license? No, CC does not collect content or track licensed material. However, CC builds technical tools that help the public search for and use works licensed under our licenses and other legal tools, and many others have built such tools as well. CC Search is one tool developed by CC to help the public discover works offered under Creative Commons licenses on the internet via CC-aware search engines and repositories. What do the Creative Commons buttons do? The CC buttons are a shorthand way to convey the basic permissions associated with material offered under CC licenses. Creators and owners who apply CC licenses to their material can download and apply those buttons to communicate to users the permissions granted in advance. When the material is offered online, the buttons should usually link out to the human-readable license deeds (which, in turn, link to the license itself). May I use the Creative Commons logo and buttons? You may download high resolution versions of the Creative Commons logos and use them in connection with your work or your website, provided you comply with our policies . Among other things, if you use the logos on a website or on your work, you may not alter the logos in any respect—such as by changing the font, the proportions, or the colors. CC’s buttons, name, and corporate logo (the “CC” in a circle) are trademarks of Creative Commons. You cannot use them in ways not permitted by our policies unless you first receive express, written permission. This means, for example, that you cannot (without our permission) print your own buttons and t-shirts using CC logos, although you can purchase them in CC’s store . I love Creative Commons. How can I help? Please support CC by making a donation through our support page . Donations can be handled through PayPal or by credit card. You can also support CC by visiting our store . CC always welcomes your feedback, which you can provide by emailing info at creativecommons dot org . You can also participate in CC’s email discussion lists and share feedback and ideas in one of those forums. If you are a software developer, sysadmin, or have other technical expertise, please join our developer community and help build the tools that build the commons. Finally, one of the best ways to support CC is by supporting our causes yourself. Follow our blog to find out about current issues where you can help get involved and spread the word, and advocate for free and open licensing in your own communities. Why does Creative Commons run an annual fundraising campaign? What is the money used for and where does it go? Creative Commons is a global nonprofit organization that enables sharing and reuse of creativity and knowledge through free legal tools, with affiliates all over the world who help ensure our licenses work internationally and raise awareness about our work. Our tools are free, and our reach is wide. In order to… continue developing our licenses and public domain tools to make sure they are legally and technically up-to-date around the world, help creators implement these tools on websites through best practices and individual assistance, enable CC licensing on major content-sharing platforms, enhance CC-licensed resource search and discovery, advocate for CC licensing and open policies in education , science , and culture , and myriad other activities we’re forgetting to mention, such as all the everyday boring but essential operations that go into running an organization …we need $ to make it all happen! For more information, please take a look at our Annual Report . Creative Commons has always relied on the generosity of both individuals and organizations to fund its ongoing operations. It is essential we have the public’s support because it is the creators and users of CC material who make our tools relevant in this digital age. They depend on the tools and services CC provides through their reuse and remix of the rich, open resources available on Wikipedia , Flickr , SoundCloud , Vimeo , Europeana , MIT OpenCourseWare , PLOS , Al Jazeera , and YouTube —just to name a few. Many of these people donate $10, $25, or $50 to CC, to help keep it up and running so we can continue to provide our tools and services for free, as a nonprofit organization. The more people who donate to CC, the more independent it will remain. General License Information What are Creative Commons licenses? Creative Commons licenses provide an easy way to manage the copyright terms that attach automatically to all creative material under copyright . Our licenses allow that material to be shared and reused under terms that are flexible and legally sound. Creative Commons offers a core suite of six copyright licenses. Because there is no single “Creative Commons license,” it is important to identify which of the six licenses you are applying to your material, which of the six licenses has been applied to material that you intend to use, and in both cases the specific version. All of our licenses require that users provide attribution (BY) to the creator when the material is used and shared. Some licensors choose the BY license, which requires attribution to the creator as the only condition to reuse of the material. The other five licenses combine BY with one or more of three additional license elements: NonCommercial (NC), which prohibits commercial use of the material; NoDerivatives (ND), which prohibits the sharing of adaptations of the material; and ShareAlike (SA), which requires adaptations of the material be released under the same license. CC licenses may be applied to any type of work, including educational resources , music , photographs , databases , government and public sector information , and many other types of material . The only categories of works for which CC does not recommend its licenses are computer software and hardware. You should also not apply Creative Commons licenses to works that are no longer protected by copyright or are otherwise in the public domain . Instead, for those works in the worldwide public domain, we recommend that you mark them with the Public Domain Mark . How do CC licenses operate? CC licenses are operative only when applied to material in which a copyright exists, and even then only when a particular use would otherwise not be permitted by copyright. Note that the latest version of CC licenses also applies to rights similar to copyright, such as neighboring rights and sui generis database rights . Learn more about the scope of the licenses. This means that CC license terms and conditions are not triggered by uses permitted under any applicable exceptions and limitations to copyright , nor do license terms and conditions apply to elements of a licensed work that are in the public domain. This also means that CC licenses do not contractually impose restrictions on uses of a work where there is no underlying copyright. This feature (and others) distinguish CC licenses from some other open licenses like the ODbL and ODC-BY , both of which are intended to impose contractual conditions and restrictions on the reuse of databases in jurisdictions where there is no underlying copyright or sui generis database right. All CC licenses are non-exclusive: creators and owners can enter into additional, different licensing arrangements for the same material at any time (often referred to as “dual-licensing” or “multi-licensing”). However, CC licenses are not revocable once granted unless there has been a breach, and even then the license is terminated only for the breaching licensee. Please note that CC0 is not a license; it is a public domain dedication. When CC0 is applied to a work, copyright no longer applies to the work in most jurisdictions around the world. Therefore, references to dual licensing arrangements like the one above are inapplicable to CC0. There are also videos and comics that offer visual descriptions of how CC licenses work. Which is the latest version of the licenses offered by Creative Commons? In November 2013, Creative Commons published the version 4.0 license suite. These licenses are the most up-to-date licenses offered by CC, and are recommended over all prior versions. You can see how the licenses have been improved over time on the license versions page . 4.0 has been drafted to be internationally valid, and will have official translations becoming available after publication. Do Creative Commons licenses affect exceptions and limitations to copyright, such as fair dealing and fair use? No. By design, CC licenses do not reduce, limit, or restrict any rights under exceptions and limitations to copyright, such as fair use or fair dealing . If your use of CC-licensed material would otherwise be allowed because of an applicable exception or limitation, you do not need to rely on the CC license or comply with its terms and conditions. This is a fundamental principle of CC licensing. Who gives permission to use material offered under Creative Commons licenses? Our licenses and legal tools are intended for use by anyone who holds copyright in the material. This is often, but not always, the creator. Creative Commons offers licenses and tools to the public free of charge and does not require that creators or other rights holders register with CC in order to apply a CC license to a work. This means that CC does not have special knowledge of who uses the licenses and for what purposes, nor does CC have a way to contact creators beyond means generally available to the public. CC has no authority to grant permission on behalf of those persons, nor does CC manage those rights on behalf of others. If you would like to obtain additional permissions to use the work beyond those granted by the license that has been applied, or if you’re not sure if your intended use is permitted by the license, you should contact the rights holder . Are Creative Commons licenses enforceable in a court of law? Creative Commons licenses are drafted to be enforceable around the world, and have been enforced in court in various jurisdictions. To CC’s knowledge, the licenses have never been held unenforceable or invalid. CC licenses contain a “severability” clause. This allows a court to eliminate any provision determined to be unenforceable, and enforce the remaining provisions of the license. What happens if someone applies a Creative Commons license to my work without my knowledge or authorization? CC alerts prospective licensors they need to have all necessary rights before applying a CC license to a work. If that is not the case and someone has marked your work with a CC license without your authorization, you should contact that person and tell them to remove the license from your work. You may also wish to contact a lawyer. Creative Commons is not a law firm and cannot represent you or give you legal advice, but there are lawyers who have identified themselves as interested in representing people in CC-related matters . What are the international (“unported”) Creative Commons licenses, and why does CC offer “ported” licenses? One of CC’s goals is ensuring that all of its legal tools work globally, so that anyone anywhere in the world can share their work on globally standard terms. To this end, CC offers a core suite of six international copyright licenses (formerly called the “unported”) that are drafted based largely on various international treaties governing copyright , taking into account as many jurisdiction-specific legal issues as possible. The latest version (4.0) has been drafted with particular attention to the needs of international enforceability. For version 3.0 and earlier, Creative Commons has also offered ported versions of its six core licenses for many jurisdictions (which usually correspond to countries, but not always). These ported licenses are based on the international license suite but have been modified to reflect local nuances in the expression of legal terms and conditions, drafting protocols, and language. The ported licenses and the international licenses are all intended to be legally effective everywhere. CC expects that few, if any, ports will be necessary for 4.0. CC recommends that you take advantage of the improvements in the 4.0 suite explained on the license versions page unless there are particular considerations you are aware of that would require a ported license. Can I include a work licensed with CC BY in a Wikipedia article even though they use a CC BY-SA license? Yes. Works licensed under CC BY may be incorporated into works that are licensed under CC BY-SA. For example, you may incorporate a CC BY photograph into a Wikipedia article so long as you keep all copyright notices intact, provide proper attribution, and otherwise comply with the terms of CC BY. Learn more about the licenses. Can governments and intergovernmental organizations (“IGOs”) use CC licenses? Yes, anyone may use CC licenses for material they own, including governments and IGOs, and these institutions frequently use CC licenses on their copyrightable material . The reasons for doing so vary, and often include a desire to maximize the impact and utility of works for educational and informational purposes, and to enhance transparency. Creative Commons licenses have desirable features that make them the preferred choice over custom licenses. CC licenses are standard and interoperable, which means material published by different creators using the same type of CC license can be translated, modified, compiled, and remixed without legal barriers depending on the particular license applied . Creative Commons licenses are also machine-readable, allowing CC-licensed works to be easily discovered via search engines such as Google. These features maximize distribution, reuse, and impact of works published by governments and IGOs. Though we encourage anyone to use version 4.0, which is internationally valid and may be used by individuals as well as organizations, there is an IGO ported version of 3.0 that IGOs may also use. Read more about how governments and IGOs use and leverage CC licenses and legal tools, considerations for using our licenses, and how they operate in the IGO context. Can children apply Creative Commons licenses to work they create? This issue depends largely on the laws in place where the child lives. In the United States, children can be copyright holders and are entitled to license their works in the same manner as adults. However, they may have the right to disaffirm certain types of legal agreements, including licenses. In many parts of the United States, for example, children have the ability to disaffirm some types of agreements under certain circumstances once they reach the age where they are considered adults within the relevant jurisdiction. We are unaware of any attempt by a licensor to exercise the disaffirmation right with respect to a CC license applied to a work. What are the official translations of the CC licenses and CC0? Official language translations will be available for the 4.0 licenses and CC0. When you license your own work, you may use or link to the text of any available official translation. When you reuse CC-licensed material, you may comply with the license conditions by referring to any available official translation of the license. These translations are linguistic translations of the English version which adhere as closely as possible to the original text. These translations have been done by our affiliates in accordance with the Legal Code Translation Policy and with the oversight and detailed review of the CC legal team. Note that these are equivalents of the original English; these translations are not jurisdiction ported versions . You may find a list of all available translations here . For versions 3.0 and earlier, official translations are not available. Some unofficial translations were made for informational purposes only. (Jurisdiction ported versions of version 3.0 and earlier were generally published in the official language(s) of the appropriate jurisdiction. However, the ported licenses are not equivalent to the international licenses, and do not serve as substitutable references for purposes of complying with the terms and conditions of the licenses.) What is a BY-SA Compatible License? A BY-SA Compatible License is a license officially designated by Creative Commons pursuant to the ShareAlike compatibility process . Once deemed a BY-SA Compatible License, you may use the license to publish your contributions to an adaptation of a BY-SA work. To see the list of BY-SA Compatible Licenses, click here . Learn more about ShareAlike compatibility here . For Licensors Choosing a license What things should I think about before I apply a Creative Commons license? Applying a Creative Commons license to your material is a serious decision. When you apply a CC license, you give permission to anyone to use your material for the full duration of applicable copyright and similar rights. CC has identified some things that you should consider before you apply a CC license, some of which relate to your ability to apply a CC license at all. Here are some highlights: Is the material copyrightable? If not, is it subject to neighboring rights or sui generis database rights ? CC licenses do not apply to material in the public domain . Different countries have different standards for what is in the public domain. Do you own the material you want to license? If not, are you otherwise authorized to license it under the specific CC license you are interested in using? You should not apply a license to material that you do not own or that you are not authorized to license. Are you aware that CC licenses are not revocable ? You are free to stop offering material under a CC license at any time, but this will not affect the rights associated with any copies of your work already in circulation. (Any particular licensee may lose his or her rights after violating the license, but this does not affect continual use of the work by other licensees.) Are you a member of a collecting society ? If you are, you should make sure that you are able to use CC licenses for your materials . Always read the terms and conditions of the specific license you plan to apply. Additionally, there are several terms that may differ in the earlier versions of the license , both unported and ported. If you choose to use a pre-4.0 version or any ported version , clauses such as choice of law may affect your desired choice of license. How should I decide which license to choose? If you are unsure which license best suits your needs, there are plenty of resources to help rights holders choose the right CC license. CC Australia has developed a flow chart that may be useful in helping you settle on the right license for your work. You can also read case studies of others who are using CC licenses. The CC community can also respond to questions, and may have already addressed issues you raise. The CC community email discussion lists and discussion archives may be useful resources. Finally, you may also want to consult with a lawyer to obtain advice on the best license for your needs. Why should I use the latest version of the Creative Commons licenses? The latest version of the Creative Commons licenses is version 4.0. You should always use the latest version of the Creative Commons licenses in order to take advantage of the many improvements described on the license versions page . In particular, 4.0 is meant to be better suited to international use, and use in many different contexts, including sharing data . What if CC licenses have not been ported to my jurisdiction? All CC licenses are intended to work worldwide. Unless you have a specific reason to use a ported license , we suggest you consider using one of the international licenses. 4.0 will support official translations of the international license for those who wish to use the licenses in another language. As of version 4.0, CC is discouraging ported versions, and has placed a hold on new porting projects following its publication until sometime in 2014. At that point, CC will reevaluate the necessity of porting in the future. Should I choose an international license or a ported license? We recommend that you use a version 4.0 international license. This is the most up-to-date version of our licenses, drafted after broad consultation with our global network of affiliates, and it has been written to be internationally valid. There are currently no ports of 4.0, and it is planned that few, if any, will be created. All of the ported licenses are at version 3.0 or earlier, which means licensors using those licenses do not have the benefit of the improvements made in the 4.0 license suite . But even before considering the improvements in 4.0, there are several reasons why the international licenses may be preferable for rights holders, even if the licenses have been ported to their jurisdiction. As an organization, CC itself licenses all of its own content under an international license because, among other reasons, the international licenses are essentially jurisdiction-neutral while remaining effective globally. The neutral nature of the international licenses appeals to many people and organizations, particularly for use in connection with global projects that transcend political borders. Finally, it is important to know that some of the ported licenses contain a choice of law provision, which may be undesirable for your needs. However, some rights holders still choose a license ported to their local jurisdiction because they believe their needs are not sufficiently met by the international licenses. If the licenses have been ported to your jurisdiction and you feel that the ported licenses better account for some aspect of local legislation, then you may wish to consider a ported license. You can use our jurisdiction database to compare international licenses and ports on these issues and others, such as whether a ported license contains a choice of law or forum selection clause. Why should I use the license chooser? What if I don’t? Licensors are not required to use the CC license chooser or provide any information about themselves or their material when applying a CC license to their material. However, using the license chooser enables licensors to take advantage of the “machine readable” layer of CC licenses. Our machine-readable code enhances the discoverability of your work because that code allows software, search engines, and other tools to recognize when something is licensed under a CC license. The code also facilitates attribution: when users click on the CC button placed on your site, they will be linked directly to HTML code that they can cut and paste to provide attribution. How do I apply a Creative Commons license to my material? For online material : Select the license that is appropriate for your material from the CC license chooser and then follow the instructions to include the HTML code. The code will automatically generate a license button and a statement that your material is licensed under a CC license. If you are only licensing part of a work (for example, if you have created a video under a CC license but are using a song under a different license), be sure to clearly mark which parts are under the CC license and which parts are not. The HTML code will also include metadata, which allows the material to be discovered via Creative Commons-enabled search engines . For offline material : Identify which license you wish to apply to your work and either (a) mark your work with a statement such as, “This work is licensed under the Creative Commons [insert description] License. To view a copy of the license, visit [insert url]”; or (b) insert the applicable license buttons with the same statement and URL link. For third-party platforms : Many media platforms like Flickr , YouTube , and SoundCloud have built-in Creative Commons capabilities, letting users mark their material with a CC license through their account settings. The benefit of using this functionality is that it allows other people to find your content when searching on those platforms for CC-licensed material . If the platform where you’re uploading your content does not support CC licensing, you can still identify your content as CC-licensed in the text description of your content. Legally, these three options are the same. The only difference between applying a CC license offline rather than online is that marking a work online with metadata will ensure that users will be able to find it through CC-enabled search engines. CC offers resources on the best practices for marking your material and on how to mark material in different media (.pdf) . Do I need to register with Creative Commons before I obtain a license? No. CC offers its licenses, code, and tools to the public free of charge, without obligation. You do not need to register with Creative Commons to apply a CC license to your material; it is legally valid as soon as you apply it to any material you have the legal right to license. CC does not require or provide any means for creators or other rights holders to register use of a CC license, nor does CC maintain a database of works distributed under Creative Commons licenses. CC also does not require registration of the work with a national copyright agency. What do the terms and conditions of a CC license apply to? Although CC licenses get attached to tangible works (such as photos and novels), the license terms and conditions apply to the licensor’s copyright in the licensed material. The public is granted “permission to exercise” those rights in any medium or format . It is the expression that is protected by copyright and covered by the licenses, not any particular medium or format in which the expression is manifested. This means, for example, that a CC license applied to a digitized copy of a novel grants the public permission under copyright to use a print version of the same novel on the same terms and conditions (though you may have to purchase the print version from a bookstore). Can I apply a Creative Commons license to software? We recommend against using Creative Commons licenses for software. Instead, we strongly encourage you to use one of the very good software licenses which are already available. We recommend considering licenses listed as free by the Free Software Foundation and listed as “open source” by the Open Source Initiative . Unlike software-specific licenses, CC licenses do not contain specific terms about the distribution of source code, which is often important to ensuring the free reuse and modifiability of software. Many software licenses also address patent rights, which are important to software but may not be applicable to other copyrightable works. Additionally, our licenses are currently not compatible with the major software licenses, so it would be difficult to integrate CC-licensed work with other free software. Existing software licenses were designed specifically for use with software and offer a similar set of rights to the Creative Commons licenses. Version 4.0 of CC’s Attribution-ShareAlike (BY-SA) license is one-way compatible with the GNU General Public License version 3.0 (GPLv3). This compatibility mechanism is designed for situations in which content is integrated into software code in a way that makes it difficult or impossible to distinguish the two. There are special considerations required before using this compatibility mechanism. Read more about it here . Also, the CC0 Public Domain Dedication is GPL-compatible and acceptable for software. For details, see the relevant CC0 FAQ entry . While we recommend against using a CC license on software itself, CC licenses may be used for software documentation, as well as for separate artistic elements such as game art or music. Can I apply a Creative Commons license to databases? Yes. CC licenses can be used on databases . In the 4.0 license suite, applicable sui generis database rights are licensed under the same license conditions as copyright. Many governments and others use CC licenses for data and databases. For more detailed information about how CC licenses apply to data and databases, visit our detailed Data FAQ . Could I use a CC license to share my logo or trademark? Creative Commons does not recommend using a CC license on a logo or trademark. While a logo or trademark can be covered by copyright laws in addition to trademark laws, the special purposes of trademarks make CC licenses an unsuitable mechanism for sharing them in most cases. Generally, logos and trademarks are used to identify the origin of a product or service, or to indicate that it meets a specific standard or quality. Allowing anyone to reuse or modify your logo or trademark as a matter of copyright could result in your inability to limit use of your logo or trademark selectively to accomplish those purposes. Applying a CC license to your trademarks and logos could even result in a loss of your trademark rights altogether. See below for more about how to license material that includes a trademark or logo. There are other ways to share your logos and trademarks widely while preserving your trademark rights. Establishing a trademark policy that grants permissions in advance for limited uses is one common alternative. Mozilla , Wikimedia , and Creative Commons have each published policies that accomplish the dual objectives of encouraging reuse and preserving trademark rights. May I apply a Creative Commons license to a work in the public domain? CC licenses should not be applied to works in the worldwide public domain . All CC licenses are clear that they do not have the effect of placing restrictions on material that would otherwise be unrestricted, and you cannot remove a work from the public domain by applying a CC license to it. If you want to dedicate your own work to the public domain before the expiration of applicable copyright or similar rights, use CC’s legally robust public domain dedication . If a work is already in the worldwide public domain, you should mark it with CC’s Public Domain Mark . Note that, in some cases, a work may be in the public domain under the copyright laws of some jurisdictions but not others. For example, U.S. government works are in the public domain under the copyright law of the United States, but may be protected by copyright laws in other jurisdictions. A CC license applied to such a work would be effective (and the license restrictions enforceable) in jurisdictions where copyright protection exists, but would not be operative if U.S. copyright law is determined to be the applicable law. Creators may also apply Creative Commons licenses to material they create that are adapted from public domain works, or to remixed material, databases, or collections that include work in the public domain. However, in each of these instances, the license does not affect parts of the work that are unrestricted by copyright or similar rights. We strongly encourage you to mark the public domain material , so that others know they are also free to use this material without legal restriction. If I take a photograph of another work that is in the public domain, can I apply a CC license to my photo? That depends. You can apply a CC license to your photograph if your photograph constitutes a work of original authorship, a question that varies by jurisdiction. As a general matter, your photograph must involve some creative choices, such as background setting, lighting, angle, or other mark of creativity. In the United States, an exact photographic copy of a public domain work is not subject to copyright because there is no originality (even if there is effort or “sweat” exerted in its creation). In practice, if your photograph is sufficiently creative to attract copyright protection, people will likely have to comply with the license conditions if they reproduce your entire photograph in verbatim form, absent some applicable exception or limitation such as fair use. However, they would not have to comply with the license conditions if they reproduce only those parts of the work in the public domain . This is because your copyright in the adaptation only extends to the material you contributed, not to the underlying work. May I apply a CC license to my work if it incorporates material used under fair use or another exception or limitation to copyright? Yes, but it is important to prominently mark any third party material you incorporate into your work so reusers do not think the CC license applies to that material. The CC license only applies to the rights you have in the work. For example, if your CC-licensed slide deck includes a Flickr image you are using pursuant to fair use, make sure to identify that image as not being subject to the CC license. For more information about incorporating work owned by others, see our page about marking third party content . Read more considerations for licensors here . Rights other than copyright Can I use CC licenses to license rights other than copyright? CC licenses are copyright licenses, but the latest version of CC licenses also cover certain other rights similar to cop
2026-01-13T09:29:57
https://ai.google.dev/api/interactions-api?hl=de
Gemini API  |  Google AI for Developers Zum Hauptinhalt springen / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 API-Schlüssel abrufen Kochbuch Community Anmelden Dokumentation API-Referenz Gemini API Dokumentation API-Referenz API-Schlüssel abrufen Kochbuch Community Übersicht API-Versionen Leistungsspektrum Modelle Inhalte werden generiert Live-API Live Music API Interactions API Tokens Dateien Batch API Caching Einbettungen Dateisuche Dateisuchspeicher Dokument Alle Methoden Eingestellt PaLM (außer Betrieb genommen) SDK-Referenzen Python Go TypeScript Java C# Startseite Gemini API API-Referenz Feedback geben Gemini API Die Gemini Interactions API ist eine experimentelle API, mit der Entwickler generative KI-Anwendungen mit Gemini-Modellen erstellen können. Gemini ist unser leistungsstärkstes Modell, das von Grund auf multimodal konzipiert wurde. Es kann generalisieren und problemlos verschiedene Arten von Informationen wie Sprache, Bilder, Audio, Video und Code verstehen, verarbeiten und kombinieren. Sie können die Gemini API für Anwendungsfälle wie das Ableiten von Text und Bildern, die Generierung von Inhalten, Dialog-Agents, Zusammenfassungs- und Klassifizierungssysteme und vieles mehr verwenden. Als Markdown ansehen OpenAPI-Spezifikation ansehen Interaktion erstellen post https://generativelanguage.googleapis.com/v1beta/interactions Erstellt eine neue Interaktion. Anfragetext Antwort Anfragetext Der Anfragetext enthält Daten mit folgender Struktur: model ModelOption  (optional) Der Name des `Model`, das zum Generieren der Interaktion verwendet wurde. Erforderlich, wenn „agent“ nicht angegeben ist. Mögliche Werte: gemini-2.5-pro Unser hochmodernes Mehrzweckmodell, das sich durch seine Fähigkeiten beim Programmieren und bei komplexen Aufgaben zum logischen Denken auszeichnet. gemini-2.5-flash Unser erstes Hybrid-Reasoning-Modell, das ein Kontextfenster mit 1 Million Tokens unterstützt und über Denkbudgets verfügt. gemini-2.5-flash-preview-09-2025 Das neueste Modell, das auf dem Modell 2.5 Flash basiert. 2.5 Flash Preview eignet sich am besten für die Verarbeitung großer Mengen, Aufgaben mit niedriger Latenz und hohem Volumen, die Denkprozesse erfordern, sowie für Agent-Anwendungsfälle. gemini-2.5-flash-lite Unser kleinstes und kostengünstigstes Modell, das für die Nutzung im großen Maßstab entwickelt wurde. gemini-2.5-flash-lite-preview-09-2025 Das neueste Modell basiert auf Gemini 2.5 Flash Lite und ist für Kosteneffizienz, hohen Durchsatz und hohe Qualität optimiert. gemini-2.5-flash-preview-native-audio-dialog Unsere nativen Audiomodelle sind für Audioausgaben mit höherer Qualität optimiert und bieten ein besseres Tempo, natürlichere Stimmen, mehr Ausführlichkeit und eine passendere Stimmungslage. gemini-2.5-flash-image-preview Unser natives Modell für die Bildgenerierung, das für Geschwindigkeit, Flexibilität und Kontextverständnis optimiert ist. Die Preise für Texteingabe und -ausgabe sind dieselben wie für 2.5 Flash. gemini-2.5-pro-preview-tts Unser 2.5 Pro-Modell für die Sprachsynthese ist für die leistungsstarke, latenzarme Sprachgenerierung optimiert und bietet natürlichere Ausgaben und einfacher zu steuernde Prompts. gemini-3-pro-preview Unser bisher intelligentestes Modell mit modernsten Funktionen für logische Schlussfolgerungen und multimodales Verstehen sowie leistungsstarken Funktionen für agentisches Programmieren und Vibe Coding. Das Modell, das Ihren Prompt vervollständigt.\n\nWeitere Informationen finden Sie unter [Modelle](https://ai.google.dev/gemini-api/docs/models). agent AgentOption  (optional) Der Name des `Agent`, der zum Generieren der Interaktion verwendet wurde. Erforderlich, wenn „model“ nicht angegeben ist. Mögliche Werte: deep-research-pro-preview-12-2025 Gemini Deep Research Agent Der Agent, mit dem interagiert werden soll. input Content oder Array ( Content ) oder Array ( Turn ) oder String  (erforderlich) Die Eingaben für die Interaktion (sowohl für das Modell als auch für den Agent). system_instruction String  (optional) Systemanweisung für die Interaktion. tools array ( Tool )  (optional) Eine Liste der Tool-Deklarationen, die das Modell während der Interaktion aufrufen kann. response_format object  (optional) Erzwingt, dass die generierte Antwort ein JSON-Objekt ist, das dem in diesem Feld angegebenen JSON-Schema entspricht. response_mime_type string  (optional) Der MIME-Typ der Antwort. Erforderlich, wenn „response_format“ festgelegt ist. stream boolean  (optional) Nur Eingabe. Ob die Interaktion gestreamt wird. store boolean  (optional) Nur Eingabe. Gibt an, ob die Antwort und die Anfrage für den späteren Abruf gespeichert werden sollen. background boolean  (optional) Gibt an, ob die Modellinteraktion im Hintergrund ausgeführt werden soll. generation_config GenerationConfig  (optional) Modellkonfiguration Konfigurationsparameter für die Modellinteraktion. Alternative zu „agent_config“. Gilt nur, wenn „model“ festgelegt ist. Konfigurationsparameter für Modellinteraktionen. Felder temperature number  (optional) Steuert die Zufälligkeit der Ausgabe. top_p number  (optional) Die maximale kumulative Wahrscheinlichkeit der Tokens, die beim Sampling berücksichtigt werden sollen. seed integer  (optional) Seed, der beim Decodieren für die Reproduzierbarkeit verwendet wird. stop_sequences array (string)  (optional) Eine Liste von Zeichenfolgen, die die Ausgabeinteraktion beenden. tool_choice ToolChoice  (optional) Die Tool-Auswahl für die Interaktion. Die Konfiguration für die Auswahl des Tools. Mögliche Typen ToolChoiceType Dieser Typ hat keine spezifischen Felder. ToolChoiceConfig allowed_tools AllowedTools  (optional) Keine Beschreibung vorhanden. Die Konfiguration für zulässige Tools. Felder mode ToolChoiceType  (optional) Der Modus der Tool-Auswahl. Mögliche Werte: auto any none validated tools array (string)  (optional) Die Namen der zulässigen Tools. thinking_level ThinkingLevel  (optional) Die Anzahl der Denk-Tokens, die das Modell generieren soll. Mögliche Werte: low high thinking_summaries ThinkingSummaries  (optional) Gibt an, ob Zusammenfassungen der Überlegungen in die Antwort aufgenommen werden sollen. Mögliche Werte: auto none max_output_tokens integer  (optional) Die maximale Anzahl von Tokens, die in der Antwort enthalten sein sollen. speech_config SpeechConfig  (optional) Konfiguration für die Sprachinteraktion. Die Konfiguration für die Sprachinteraktion. Felder voice string  (optional) Die Stimme des Sprechers. language String  (optional) Die Sprache der Rede. speaker string  (optional) Der Name des Sprechers muss mit dem Namen des Sprechers im Prompt übereinstimmen. agent_config object  (optional) Agent Configuration (Agent-Konfiguration) Konfiguration für den Agent. Alternative zu `generation_config`. Gilt nur, wenn `agent` festgelegt ist. Mögliche Typen Polymorpher Diskriminator: type DynamicAgentConfig Konfiguration für dynamische Agenten. type string  (optional) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "dynamic" gesetzt. DeepResearchAgentConfig Konfiguration für den Deep Research-Agenten. type string  (optional) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "deep-research" gesetzt. thinking_summaries ThinkingSummaries  (optional) Gibt an, ob Zusammenfassungen der Überlegungen in die Antwort aufgenommen werden sollen. Mögliche Werte: auto none previous_interaction_id String  (optional) Die ID der vorherigen Interaktion, falls vorhanden. response_modalities ResponseModality  (optional) Die angeforderten Modalitäten der Antwort (TEXT, IMAGE, AUDIO). Mögliche Werte: text image audio Antwort Gibt eine Interaction -Ressource zurück. Einfache Anfrage Beispielantwort { "created" : "2025-11-26T12:25:15Z" , "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "object" : "interaction" , "outputs" : [ { "text" : "Hello! I'm functioning perfectly and ready to assist you.\n\nHow are you doing today?" , "type" : "text" } ], "role" : "model" , "status" : "completed" , "updated" : "2025-11-26T12:25:15Z" , "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 7 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 7 , "total_output_tokens" : 20 , "total_reasoning_tokens" : 22 , "total_tokens" : 49 , "total_tool_use_tokens" : 0 } } In mehreren Schritten Beispielantwort { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "status" : "completed" , "object" : "interaction" , "created" : "2025-11-26T12:22:47Z" , "updated" : "2025-11-26T12:22:47Z" , "role" : "model" , "outputs" : [ { "type" : "text" , "text" : "The capital of France is Paris." } ], "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 50 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 50 , "total_output_tokens" : 10 , "total_reasoning_tokens" : 0 , "total_tokens" : 60 , "total_tool_use_tokens" : 0 } } Bildeingabe Beispielantwort { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "status" : "completed" , "object" : "interaction" , "created" : "2025-11-26T12:22:47Z" , "updated" : "2025-11-26T12:22:47Z" , "role" : "model" , "outputs" : [ { "type" : "text" , "text" : "A white humanoid robot with glowing blue eyes stands holding a red skateboard." } ], "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 10 }, { "modality" : "image" , "tokens" : 258 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 268 , "total_output_tokens" : 20 , "total_reasoning_tokens" : 0 , "total_tokens" : 288 , "total_tool_use_tokens" : 0 } } Funktionsaufrufe Beispielantwort { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "status" : "requires_action" , "object" : "interaction" , "created" : "2025-11-26T12:22:47Z" , "updated" : "2025-11-26T12:22:47Z" , "role" : "model" , "outputs" : [ { "type" : "function_call" , "function_call" : { "name" : "get_weather" , "arguments" : { "location" : "Boston, MA" } } } ], "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 100 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 100 , "total_output_tokens" : 25 , "total_reasoning_tokens" : 0 , "total_tokens" : 125 , "total_tool_use_tokens" : 50 } } Deep Research Beispielantwort { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "agent" : "deep-research-pro-preview-12-2025" , "status" : "completed" , "object" : "interaction" , "created" : "2025-11-26T12:22:47Z" , "updated" : "2025-11-26T12:22:47Z" , "role" : "model" , "outputs" : [ { "type" : "text" , "text" : "Here is a comprehensive research report on the current state of cancer research..." } ], "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 20 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 20 , "total_output_tokens" : 1000 , "total_reasoning_tokens" : 500 , "total_tokens" : 1520 , "total_tool_use_tokens" : 0 } } Interaktion abrufen get https://generativelanguage.googleapis.com/v1beta/interactions/{id} Ruft die vollständigen Details einer einzelnen Interaktion anhand ihrer `Interaction.id` ab. Pfad-/Suchparameter Antwort Pfad-/Suchparameter id String  (erforderlich) Die eindeutige ID der abzurufenden Interaktion. stream boolean  (optional) Bei „true“ werden die generierten Inhalte inkrementell gestreamt. Standardeinstellung: False last_event_id string  (optional) Optional. Wenn festgelegt, wird der Interaktionsstream ab dem nächsten Chunk nach dem Ereignis fortgesetzt, das durch die Ereignis-ID markiert ist. Kann nur verwendet werden, wenn „stream“ auf „true“ gesetzt ist. api_version string  (optional) Zu verwendende API-Version. Antwort Gibt eine Interaction -Ressource zurück. Interaktion abrufen Beispielantwort { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "status" : "completed" , "object" : "interaction" , "created" : "2025-11-26T12:25:15Z" , "updated" : "2025-11-26T12:25:15Z" , "role" : "model" , "outputs" : [ { "type" : "text" , "text" : "I'm doing great, thank you for asking! How can I help you today?" } ] } Interaktion löschen delete https://generativelanguage.googleapis.com/v1beta/interactions/{id} Löscht die Interaktion anhand der ID. Pfad-/Suchparameter Antwort Pfad-/Suchparameter id String  (erforderlich) Die eindeutige Kennung der zu löschenden Interaktion. api_version string  (optional) Zu verwendende API-Version. Antwort Bei Erfolg ist die Antwort leer. Interaktion löschen Interaktion abbrechen post https://generativelanguage.googleapis.com/v1beta/interactions/{id}/cancel Bricht eine Interaktion anhand der ID ab. Dies gilt nur für Hintergrundinteraktionen, die noch laufen. Pfad-/Suchparameter Antwort Pfad-/Suchparameter id String  (erforderlich) Die eindeutige ID der abzurufenden Interaktion. api_version string  (optional) Zu verwendende API-Version. Antwort Gibt eine Interaction -Ressource zurück. Interaktion abbrechen Beispielantwort { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "agent" : "deep-research-pro-preview-12-2025" , "status" : "cancelled" , "object" : "interaction" , "created" : "2025-11-26T12:25:15Z" , "updated" : "2025-11-26T12:25:15Z" , "role" : "model" } Ressourcen Interaktion Die Interaction-Ressource. Felder model ModelOption  (optional) Der Name des `Model`, das zum Generieren der Interaktion verwendet wurde. Mögliche Werte: gemini-2.5-pro Unser hochmodernes Mehrzweckmodell, das sich durch seine Fähigkeiten beim Programmieren und bei komplexen Aufgaben zum logischen Denken auszeichnet. gemini-2.5-flash Unser erstes Hybrid-Reasoning-Modell, das ein Kontextfenster mit 1 Million Tokens unterstützt und über Denkbudgets verfügt. gemini-2.5-flash-preview-09-2025 Das neueste Modell, das auf dem Modell 2.5 Flash basiert. 2.5 Flash Preview eignet sich am besten für die Verarbeitung großer Mengen, Aufgaben mit niedriger Latenz und hohem Volumen, die Denkprozesse erfordern, sowie für Agent-Anwendungsfälle. gemini-2.5-flash-lite Unser kleinstes und kostengünstigstes Modell, das für die Nutzung im großen Maßstab entwickelt wurde. gemini-2.5-flash-lite-preview-09-2025 Das neueste Modell basiert auf Gemini 2.5 Flash Lite und ist für Kosteneffizienz, hohen Durchsatz und hohe Qualität optimiert. gemini-2.5-flash-preview-native-audio-dialog Unsere nativen Audiomodelle sind für Audioausgaben mit höherer Qualität optimiert und bieten ein besseres Tempo, natürlichere Stimmen, mehr Ausführlichkeit und eine passendere Stimmungslage. gemini-2.5-flash-image-preview Unser natives Modell für die Bildgenerierung, das für Geschwindigkeit, Flexibilität und Kontextverständnis optimiert ist. Die Preise für Texteingabe und -ausgabe sind dieselben wie für 2.5 Flash. gemini-2.5-pro-preview-tts Unser 2.5 Pro-Modell für die Sprachsynthese ist für die leistungsstarke, latenzarme Sprachgenerierung optimiert und bietet natürlichere Ausgaben und einfacher zu steuernde Prompts. gemini-3-pro-preview Unser bisher intelligentestes Modell mit modernsten Funktionen für logische Schlussfolgerungen und multimodales Verstehen sowie leistungsstarken Funktionen für agentisches Programmieren und Vibe Coding. Das Modell, das Ihren Prompt vervollständigt.\n\nWeitere Informationen finden Sie unter [Modelle](https://ai.google.dev/gemini-api/docs/models). agent AgentOption  (optional) Der Name des `Agent`, der zum Generieren der Interaktion verwendet wurde. Mögliche Werte: deep-research-pro-preview-12-2025 Gemini Deep Research Agent Der Agent, mit dem interagiert werden soll. id String  (optional) Nur Ausgabe. Eine eindeutige Kennung für den Abschluss der Interaktion. status enum (string)  (optional) Nur Ausgabe. Der Status der Interaktion. Mögliche Werte: in_progress requires_action completed failed cancelled created string  (optional) Nur Ausgabe. Die Uhrzeit, zu der die Antwort erstellt wurde, im ISO 8601-Format (JJJJ-MM-TTThh:mm:ssZ). updated string  (optional) Nur Ausgabe. Die Uhrzeit, zu der die Antwort zuletzt aktualisiert wurde, im ISO 8601-Format (JJJJ-MM-TTThh:mm:ssZ). role string  (optional) Nur Ausgabe. Die Rolle der Interaktion. outputs array ( Content )  (optional) Nur Ausgabe. Antworten des Modells. object string  (optional) Nur Ausgabe. Der Objekttyp der Interaktion. Immer auf „interaction“ festgelegt. Immer auf "interaction" gesetzt. usage Usage  (optional) Nur Ausgabe. Statistiken zur Tokennutzung der Interaktionsanfrage. Statistiken zur Tokennutzung der Interaktionsanfrage. Felder total_input_tokens integer  (optional) Anzahl der Tokens im Prompt (Kontext). input_tokens_by_modality ModalityTokens  (optional) Eine Aufschlüsselung der Nutzung von Eingabetokens nach Modalität. Die Anzahl der Tokens für eine einzelne Antwortmodalität. Felder modality ResponseModality  (optional) Die Modalität, die der Anzahl der Tokens zugeordnet ist. Mögliche Werte: text image audio Tokens Ganzzahl  (optional) Anzahl der Tokens für die Modalität. total_cached_tokens integer  (optional) Anzahl der Tokens im im Cache gespeicherten Teil des Prompts (im Cache gespeicherter Inhalt). cached_tokens_by_modality ModalityTokens  (optional) Eine Aufschlüsselung der Nutzung von zwischengespeicherten Tokens nach Modalität. Die Anzahl der Tokens für eine einzelne Antwortmodalität. Felder modality ResponseModality  (optional) Die Modalität, die der Anzahl der Tokens zugeordnet ist. Mögliche Werte: text image audio Tokens Ganzzahl  (optional) Anzahl der Tokens für die Modalität. total_output_tokens integer  (optional) Die Gesamtzahl der Tokens in allen generierten Antworten. output_tokens_by_modality ModalityTokens  (optional) Eine Aufschlüsselung der Nutzung von Ausgabetokens nach Modalität. Die Anzahl der Tokens für eine einzelne Antwortmodalität. Felder modality ResponseModality  (optional) Die Modalität, die der Anzahl der Tokens zugeordnet ist. Mögliche Werte: text image audio Tokens Ganzzahl  (optional) Anzahl der Tokens für die Modalität. total_tool_use_tokens integer  (optional) Anzahl der Tokens in den Tool-Nutzungs-Prompts. tool_use_tokens_by_modality ModalityTokens  (optional) Eine Aufschlüsselung der Tokennutzung für die Tool-Verwendung nach Modalität. Die Anzahl der Tokens für eine einzelne Antwortmodalität. Felder modality ResponseModality  (optional) Die Modalität, die der Anzahl der Tokens zugeordnet ist. Mögliche Werte: text image audio Tokens Ganzzahl  (optional) Anzahl der Tokens für die Modalität. total_reasoning_tokens integer  (optional) Anzahl der Tokens für Überlegungen für Denkmodelle. total_tokens integer  (optional) Gesamtzahl der Tokens für die Interaktionsanfrage (Prompt + Antworten + andere interne Tokens). previous_interaction_id String  (optional) Die ID der vorherigen Interaktion, falls vorhanden. Beispiele Beispiel { "created" : "2025-12-04T15:01:45Z" , "id" : "v1_ChdXS0l4YWZXTk9xbk0xZThQczhEcmlROBIXV0tJeGFmV05PcW5NMWU4UHM4RHJpUTg" , "model" : "gemini-2.5-flash" , "object" : "interaction" , "outputs" : [ { "text" : "Hello! I'm doing well, functioning as expected. Thank you for asking! How are you doing today?" , "type" : "text" } ] , "role" : "model" , "status" : "completed" , "updated" : "2025-12-04T15:01:45Z" , "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 7 } ] , "total_cached_tokens" : 0 , "total_input_tokens" : 7 , "total_output_tokens" : 23 , "total_reasoning_tokens" : 49 , "total_tokens" : 79 , "total_tool_use_tokens" : 0 } } Datenmodelle Inhalt Der Inhalt der Antwort. Mögliche Typen Polymorpher Diskriminator: type TextContent Ein Textinhaltsblock. text string  (optional) Der Textinhalt. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "text" gesetzt. annotations Annotation  (optional) Quellenangaben für von Modellen generierte Inhalte. Quellenangaben für von Modellen generierte Inhalte. Felder start_index Ganzzahl  (optional) Beginn des Antwortsegments, das dieser Quelle zugeordnet wird. Der Index gibt den Beginn des Segments an, gemessen in Byte. end_index integer  (optional) Ende des zugeordneten Segments (ausschließlich). source string  (optional) Die Quelle, die einem Teil des Texts zugeordnet ist. Das kann eine URL, ein Titel oder eine andere Kennung sein. ImageContent Ein Inhaltsblock mit einem Bild. data string  (optional) Keine Beschreibung vorhanden. uri string  (optional) Keine Beschreibung vorhanden. mime_type ImageMimeTypeOption  (optional) Keine Beschreibung vorhanden. Mögliche Werte: image/png image/jpeg image/webp image/heic image/heif Der MIME-Typ des Bildes. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "image" gesetzt. resolution MediaResolution  (optional) Die Auflösung der Media. Mögliche Werte: low medium high AudioContent Ein Audioinhaltsblock. data string  (optional) Keine Beschreibung vorhanden. uri string  (optional) Keine Beschreibung vorhanden. mime_type AudioMimeTypeOption  (optional) Keine Beschreibung vorhanden. Mögliche Werte: audio/wav audio/mp3 audio/aiff audio/aac audio/ogg audio/flac Der MIME-Typ des Audios. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "audio" gesetzt. DocumentContent Ein Inhaltsblock für Dokumente. data string  (optional) Keine Beschreibung vorhanden. uri string  (optional) Keine Beschreibung vorhanden. mime_type string  (optional) Keine Beschreibung vorhanden. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "document" gesetzt. VideoContent Ein Videocontent-Block. data string  (optional) Keine Beschreibung vorhanden. uri string  (optional) Keine Beschreibung vorhanden. mime_type VideoMimeTypeOption  (optional) Keine Beschreibung vorhanden. Mögliche Werte: video/mp4 video/mpeg video/mov video/avi video/x-flv video/mpg video/webm video/wmv video/3gpp Der MIME-Typ des Videos. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "video" gesetzt. resolution MediaResolution  (optional) Die Auflösung der Media. Mögliche Werte: low medium high ThoughtContent Ein Inhaltsblock mit Gedanken. signature string  (optional) Signatur, die mit der Backend-Quelle übereinstimmen muss, damit sie Teil der Generierung ist. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "thought" gesetzt. Zusammenfassung ThoughtSummary  (optional) Eine Zusammenfassung des Gedankens. Eine Zusammenfassung des Gedankens. FunctionCallContent Ein Inhaltsblock für einen Funktionsaufruf. name string  (erforderlich) Der Name des aufzurufenden Tools. arguments object  (erforderlich) Die Argumente, die an die Funktion übergeben werden sollen. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "function_call" gesetzt. id String  (erforderlich) Eine eindeutige ID für diesen bestimmten Tool-Aufruf. FunctionResultContent Ein Inhaltsblock mit dem Ergebnis eines Funktionstools. name string  (optional) Der Name des aufgerufenen Tools. is_error boolean  (optional) Gibt an, ob beim Toolaufruf ein Fehler aufgetreten ist. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "function_result" gesetzt. result object oder string  (erforderlich) Das Ergebnis des Tool-Aufrufs. call_id string  (erforderlich) ID, die mit der ID aus dem Funktionsaufrufblock übereinstimmen muss. CodeExecutionCallContent Inhalte zur Codeausführung. arguments CodeExecutionCallArguments  (optional) Die Argumente, die an die Codeausführung übergeben werden sollen. Die Argumente, die an die Codeausführung übergeben werden sollen. Felder language enum (string)  (optional) Programmiersprache des „code“. Mögliche Werte: python code string  (optional) Der auszuführende Code. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "code_execution_call" gesetzt. id String  (optional) Eine eindeutige ID für diesen bestimmten Tool-Aufruf. CodeExecutionResultContent Inhalte des Ergebnisses der Codeausführung. result String  (optional) Die Ausgabe der Codeausführung. is_error boolean  (optional) Gibt an, ob bei der Codeausführung ein Fehler aufgetreten ist. signature string  (optional) Ein Signatur-Hash für die Backend-Validierung. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "code_execution_result" gesetzt. call_id string  (optional) ID, die der ID aus dem Block für den Aufruf der Codeausführung entspricht. UrlContextCallContent Inhalte des URL-Kontexts. arguments UrlContextCallArguments  (optional) Die Argumente, die an den URL-Kontext übergeben werden sollen. Die Argumente, die an den URL-Kontext übergeben werden sollen. Felder urls array (string)  (optional) Die abzurufenden URLs. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "url_context_call" gesetzt. id String  (optional) Eine eindeutige ID für diesen bestimmten Tool-Aufruf. UrlContextResultContent Inhalte des URL-Kontext-Ergebnisses. signature string  (optional) Die Signatur des URL-Kontextergebnisses. result UrlContextResult  (optional) Die Ergebnisse des URL-Kontexts. Das Ergebnis des URL-Kontexts. Felder url string  (optional) Die abgerufene URL. status enum (string)  (optional) Der Status des URL-Abrufs. Mögliche Werte: success error paywall unsafe is_error boolean  (optional) Gibt an, ob beim URL-Kontext ein Fehler aufgetreten ist. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "url_context_result" gesetzt. call_id string  (optional) ID, die mit der ID aus dem URL-Kontextaufrufblock übereinstimmen muss. GoogleSearchCallContent Inhalte der Google Suche. arguments GoogleSearchCallArguments  (optional) Die Argumente, die an die Google Suche übergeben werden sollen. Die Argumente, die an die Google Suche übergeben werden sollen. Felder queries array (string)  (optional) Websuchanfragen für die anschließende Websuche. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "google_search_call" gesetzt. id String  (optional) Eine eindeutige ID für diesen bestimmten Tool-Aufruf. GoogleSearchResultContent Inhalte von Google-Suchergebnissen. signature string  (optional) Die Signatur des Google-Suchergebnisses. result GoogleSearchResult  (optional) Die Ergebnisse der Google Suche. Das Ergebnis der Google-Suche. Felder url string  (optional) URI-Referenz des Suchergebnisses. title string  (optional) Titel des Suchergebnisses. rendered_content String  (optional) Webinhalts-Snippet, das in eine Webseite oder eine App-Webview eingebettet werden kann. is_error boolean  (optional) Gibt an, ob bei der Google-Suche ein Fehler aufgetreten ist. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "google_search_result" gesetzt. call_id string  (optional) ID, die mit der ID aus dem Google Search-Aufrufblock übereinstimmen muss. McpServerToolCallContent Inhalt des MCPServer-Toolaufrufs. name string  (erforderlich) Der Name des aufgerufenen Tools. server_name string  (erforderlich) Der Name des verwendeten MCP-Servers. arguments object  (erforderlich) Das JSON-Objekt der Argumente für die Funktion. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "mcp_server_tool_call" gesetzt. id String  (erforderlich) Eine eindeutige ID für diesen bestimmten Tool-Aufruf. McpServerToolResultContent Inhalte der MCPServer-Tool-Ergebnisse. name string  (optional) Name des Tools, das für diesen bestimmten Tool-Aufruf aufgerufen wird. server_name string  (optional) Der Name des verwendeten MCP-Servers. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "mcp_server_tool_result" gesetzt. result object oder string  (erforderlich) Das Ergebnis des Tool-Aufrufs. call_id string  (erforderlich) ID, die der ID aus dem MCP-Server-Toolaufrufblock entspricht. FileSearchResultContent Inhalt des Suchergebnisses für die Dateisuche. result FileSearchResult  (optional) Die Ergebnisse der Dateisuche. Das Ergebnis der Dateisuche. Felder title string  (optional) Der Titel des Suchergebnisses. text string  (optional) Der Text des Suchergebnisses. file_search_store String  (optional) Der Name des Dateisuchspeichers. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "file_search_result" gesetzt. Beispiele Text { "type" : "text" , "text" : "Hello, how are you?" } Bild { "type" : "image" , "data" : "BASE64_ENCODED_IMAGE" , "mime_type" : "image/png" } Audio { "type" : "audio" , "data" : "BASE64_ENCODED_AUDIO" , "mime_type" : "audio/wav" } Dokument { "type" : "document" , "data" : "BASE64_ENCODED_DOCUMENT" , "mime_type" : "application/pdf" } Video { "type" : "video" , "uri" : "https://www.youtube.com/watch?v=9hE5-98ZeCg" } Gedanke { "type" : "thought" , "summary" : [ { "type" : "text" , "text" : "The user is asking about the weather. I should use the get_weather tool." } ], "signature" : "CoMDAXLI2nynRYojJIy6B1Jh9os2crpWLfB0+19xcLsGG46bd8wjkF/6RNlRUdvHrXyjsHkG0BZFcuO/bPOyA6Xh5jANNgx82wPHjGExN8A4ZQn56FlMwyZoqFVQz0QyY1lfibFJ2zU3J87uw26OewzcuVX0KEcs+GIsZa3EA6WwqhbsOd3wtZB3Ua2Qf98VAWZTS5y/tWpql7jnU3/CU7pouxQr/Bwft3hwnJNesQ9/dDJTuaQ8Zprh9VRWf1aFFjpIueOjBRrlT3oW6/y/eRl/Gt9BQXCYTqg/38vHFUU4Wo/d9dUpvfCe/a3o97t2Jgxp34oFKcsVb4S5WJrykIkw+14DzVnTpCpbQNFckqvFLuqnJCkL0EQFtunBXI03FJpPu3T1XU6id8S7ojoJQZSauGUCgmaLqUGdMrd08oo81ecoJSLs51Re9N/lISGmjWFPGpqJLoGq6uo4FHz58hmeyXCgHG742BHz2P3MiH1CXHUT2J8mF6zLhf3SR9Qb3lkrobAh" } Funktionsaufruf { "type" : "function_call" , "name" : "get_weather" , "id" : "gth23981" , "arguments" : { "location" : "Boston, MA" } } Funktionsergebnis { "type" : "function_result" , "name" : "get_weather" , "call_id" : "gth23981" , "result" : { "weather" : "sunny" } } Codeausführungsaufruf { "type" : "code_execution_call" , "id" : "call_123456" , "arguments" : { "language" : "python" , "code" : "print('hello world')" } } Ergebnis der Codeausführung { "type" : "code_execution_result" , "call_id" : "call_123456" , "result" : "hello world\n" } UrlContext-Aufruf { "type" : "url_context_call" , "id" : "call_123456" , "arguments" : { "urls" : [ "https://www.example.com" ] } } Ergebnis des URL-Kontexts { "type" : "url_context_result" , "call_id" : "call_123456" , "result" : [ { "url" : "https://www.example.com" , "status" : "SUCCESS" } ] } Google Search Call { "type" : "google_search_call" , "id" : "call_123456" , "arguments" : { "queries" : [ "weather in Boston" ] } } Google-Suchergebnis { "type" : "google_search_result" , "call_id" : "call_123456" , "result" : [ { "url" : "https://www.google.com/search?q=weather+in+Boston" , "title" : "Weather in Boston" } ] } McpServer-Toolaufruf { "type" : "mcp_server_tool_call" , "id" : "call_123456" , "name" : "get_forecast" , "server_name" : "weather_server" , "arguments" : { "city" : "London" } } Ergebnis des MCP-Servertools { "type" : "mcp_server_tool_result" , "name" : "get_forecast" , "server_name" : "weather_server" , "call_id" : "call_123456" , "result" : "sunny" } Dateisuchergebnis { "type" : "file_search_result" , "result" : [ { "text" : "search result chunk" , "file_search_store" : "file_search_store" } ] } Tool Mögliche Typen Polymorpher Diskriminator: type Funktion Ein Tool, das vom Modell verwendet werden kann. name string  (optional) Der Name der Funktion. description string  (optional) Eine Beschreibung der Funktion. Parameter object  (optional) Das JSON-Schema für die Parameter der Funktion. type string  (erforderlich) Keine Beschreibung vorhanden. Immer auf "function" gesetzt. GoogleSearch Ein Tool, das vom Modell verwendet werden kann, um in Google zu suchen. type string  (erforderlich) Keine Beschreibung vorhanden. Immer auf "google_search" gesetzt. CodeExecution Ein Tool, das vom Modell zum Ausführen von Code verwendet werden kann. type string  (erforderlich) Keine Beschreibung vorhanden. Immer auf "code_execution" gesetzt. UrlContext Ein Tool, mit dem das Modell URL-Kontext abrufen kann. type string  (erforderlich) Keine Beschreibung vorhanden. Immer auf "url_context" gesetzt. ComputerUse Ein Tool, das vom Modell verwendet werden kann, um mit dem Computer zu interagieren. type string  (erforderlich) Keine Beschreibung vorhanden. Immer auf "computer_use" gesetzt. environment enum (string)  (optional) Die Umgebung, in der der Vorgang ausgeführt wird. Mögliche Werte: browser excludedPredefinedFunctions Array (String)  (optional) Die Liste der vordefinierten Funktionen, die vom Modellaufruf ausgeschlossen sind. McpServer Ein MCPServer ist ein Server, der vom Modell aufgerufen werden kann, um Aktionen auszuführen. type string  (erforderlich) Keine Beschreibung vorhanden. Immer auf "mcp_server" gesetzt. name string  (optional) Der Name des MCPServers. url string  (optional) Die vollständige URL für den MCPServer-Endpunkt. Beispiel: „https://api.beispiel.de/mcp“ headers object  (optional) Optional: Felder für Authentifizierungsheader, Zeitüberschreitungen usw., falls erforderlich. allowed_tools AllowedTools  (optional) Die zulässigen Tools. Die Konfiguration für zulässige Tools. Felder mode ToolChoiceType  (optional) Der Modus der Tool-Auswahl. Mögliche Werte: auto any none validated tools array (string)  (optional) Die Namen der zulässigen Tools. FileSearch Ein Tool, das vom Modell zum Suchen von Dateien verwendet werden kann. file_search_store_names Array (String)  (optional) Die Namen der Dateisuchspeicher, die durchsucht werden sollen. top_k integer  (optional) Die Anzahl der semantischen Abruf-Chunks, die abgerufen werden sollen. metadata_filter String  (optional) Metadatenfilter, der auf die semantischen Abrufdokumente und ‑chunks angewendet werden soll. type string  (erforderlich) Keine Beschreibung vorhanden. Immer auf "file_search" gesetzt. Beispiele Funktion GoogleSearch CodeExecution UrlContext ComputerUse McpServer FileSearch Turn Felder role string  (optional) Der Initiator dieses Zuges. Muss „user“ für die Eingabe oder „model“ für die Modellausgabe sein. content Array ( Content ) oder String  (optional) Der Inhalt des Turns. Beispiele Nutzerzugriff { "role" : "user" , "content" : [ { "type" : "text" , "text" : "user turn" } ] } Modell drehen { "role" : "model" , "content" : [ { "type" : "text" , "text" : "model turn" } ] } InteractionSseEvent Mögliche Typen Polymorpher Diskriminator: event_type InteractionEvent event_type enum (string)  (optional) Keine Beschreibung vorhanden. Mögliche Werte: interaction.start interaction.complete interaction Interaction  (optional) Keine Beschreibung vorhanden. event_id string  (optional) Das event_id-Token, das verwendet werden soll, um den Interaktionsstream ab diesem Ereignis fortzusetzen. InteractionStatusUpdate interaction_id string  (optional) Keine Beschreibung vorhanden. status enum (string)  (optional) Keine Beschreibung vorhanden. Mögliche Werte: in_progress requires_action completed failed cancelled event_type string  (optional) Keine Beschreibung vorhanden. Immer auf "interaction.status_update" gesetzt. event_id string  (optional) Das event_id-Token, das verwendet werden soll, um den Interaktionsstream ab diesem Ereignis fortzusetzen. ContentStart index integer  (optional) Keine Beschreibung vorhanden. content Content  (optional) Keine Beschreibung vorhanden. event_type string  (optional) Keine Beschreibung vorhanden. Immer auf "content.start" gesetzt. event_id string  (optional) Das event_id-Token, das verwendet werden soll, um den Interaktionsstream ab diesem Ereignis fortzusetzen. ContentDelta index integer  (optional) Keine Beschreibung vorhanden. event_type string  (optional) Keine Beschreibung vorhanden. Immer auf "content.delta" gesetzt. event_id string  (optional) Das event_id-Token, das verwendet werden soll, um den Interaktionsstream ab diesem Ereignis fortzusetzen. delta object  (optional) Keine Beschreibung vorhanden. Mögliche Typen Polymorpher Diskriminator: type TextDelta text string  (optional) Keine Beschreibung vorhanden. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "text" gesetzt. annotations Annotation  (optional) Quellenangaben für von Modellen generierte Inhalte. Quellenangaben für von Modellen generierte Inhalte. Felder start_index Ganzzahl  (optional) Beginn des Antwortsegments, das dieser Quelle zugeordnet wird. Der Index gibt den Beginn des Segments an, gemessen in Byte. end_index integer  (optional) Ende des zugeordneten Segments (ausschließlich). source string  (optional) Die Quelle, die einem Teil des Texts zugeordnet ist. Das kann eine URL, ein Titel oder eine andere Kennung sein. ImageDelta data string  (optional) Keine Beschreibung vorhanden. uri string  (optional) Keine Beschreibung vorhanden. mime_type ImageMimeTypeOption  (optional) Keine Beschreibung vorhanden. Mögliche Werte: image/png image/jpeg image/webp image/heic image/heif Der MIME-Typ des Bildes. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "image" gesetzt. resolution MediaResolution  (optional) Die Auflösung der Media. Mögliche Werte: low medium high AudioDelta data string  (optional) Keine Beschreibung vorhanden. uri string  (optional) Keine Beschreibung vorhanden. mime_type AudioMimeTypeOption  (optional) Keine Beschreibung vorhanden. Mögliche Werte: audio/wav audio/mp3 audio/aiff audio/aac audio/ogg audio/flac Der MIME-Typ des Audios. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "audio" gesetzt. DocumentDelta data string  (optional) Keine Beschreibung vorhanden. uri string  (optional) Keine Beschreibung vorhanden. mime_type string  (optional) Keine Beschreibung vorhanden. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "document" gesetzt. VideoDelta data string  (optional) Keine Beschreibung vorhanden. uri string  (optional) Keine Beschreibung vorhanden. mime_type VideoMimeTypeOption  (optional) Keine Beschreibung vorhanden. Mögliche Werte: video/mp4 video/mpeg video/mov video/avi video/x-flv video/mpg video/webm video/wmv video/3gpp Der MIME-Typ des Videos. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "video" gesetzt. resolution MediaResolution  (optional) Die Auflösung der Media. Mögliche Werte: low medium high ThoughtSummaryDelta type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "thought_summary" gesetzt. content ImageContent oder TextContent  (optional) Keine Beschreibung vorhanden. ThoughtSignatureDelta signature string  (optional) Signatur, die mit der Backend-Quelle übereinstimmen muss, damit sie Teil der Generierung ist. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "thought_signature" gesetzt. FunctionCallDelta name string  (optional) Keine Beschreibung vorhanden. arguments object  (optional) Keine Beschreibung vorhanden. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "function_call" gesetzt. id String  (optional) Eine eindeutige ID für diesen bestimmten Tool-Aufruf. FunctionResultDelta name string  (optional) Keine Beschreibung vorhanden. is_error boolean  (optional) Keine Beschreibung vorhanden. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "function_result" gesetzt. result object oder string  (optional) Delta des Tool-Aufrufergebnisses. call_id string  (optional) ID, die mit der ID aus dem Funktionsaufrufblock übereinstimmen muss. CodeExecutionCallDelta arguments CodeExecutionCallArguments  (optional) Keine Beschreibung vorhanden. Die Argumente, die an die Codeausführung übergeben werden sollen. Felder language enum (string)  (optional) Programmiersprache des „code“. Mögliche Werte: python code string  (optional) Der auszuführende Code. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "code_execution_call" gesetzt. id String  (optional) Eine eindeutige ID für diesen bestimmten Tool-Aufruf. CodeExecutionResultDelta result String  (optional) Keine Beschreibung vorhanden. is_error boolean  (optional) Keine Beschreibung vorhanden. signature string  (optional) Keine Beschreibung vorhanden. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "code_execution_result" gesetzt. call_id string  (optional) ID, die mit der ID aus dem Funktionsaufrufblock übereinstimmen muss. UrlContextCallDelta arguments UrlContextCallArguments  (optional) Keine Beschreibung vorhanden. Die Argumente, die an den URL-Kontext übergeben werden sollen. Felder urls array (string)  (optional) Die abzurufenden URLs. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "url_context_call" gesetzt. id String  (optional) Eine eindeutige ID für diesen bestimmten Tool-Aufruf. UrlContextResultDelta signature string  (optional) Keine Beschreibung vorhanden. result UrlContextResult  (optional) Keine Beschreibung vorhanden. Das Ergebnis des URL-Kontexts. Felder url string  (optional) Die abgerufene URL. status enum (string)  (optional) Der Status des URL-Abrufs. Mögliche Werte: success error paywall unsafe is_error boolean  (optional) Keine Beschreibung vorhanden. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "url_context_result" gesetzt. call_id string  (optional) ID, die mit der ID aus dem Funktionsaufrufblock übereinstimmen muss. GoogleSearchCallDelta arguments GoogleSearchCallArguments  (optional) Keine Beschreibung vorhanden. Die Argumente, die an die Google Suche übergeben werden sollen. Felder queries array (string)  (optional) Websuchanfragen für die anschließende Websuche. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "google_search_call" gesetzt. id String  (optional) Eine eindeutige ID für diesen bestimmten Tool-Aufruf. GoogleSearchResultDelta signature string  (optional) Keine Beschreibung vorhanden. result GoogleSearchResult  (optional) Keine Beschreibung vorhanden. Das Ergebnis der Google-Suche. Felder url string  (optional) URI-Referenz des Suchergebnisses. title string  (optional) Titel des Suchergebnisses. rendered_content String  (optional) Webinhalts-Snippet, das in eine Webseite oder eine App-Webview eingebettet werden kann. is_error boolean  (optional) Keine Beschreibung vorhanden. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "google_search_result" gesetzt. call_id string  (optional) ID, die mit der ID aus dem Funktionsaufrufblock übereinstimmen muss. McpServerToolCallDelta name string  (optional) Keine Beschreibung vorhanden. server_name string  (optional) Keine Beschreibung vorhanden. arguments object  (optional) Keine Beschreibung vorhanden. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "mcp_server_tool_call" gesetzt. id String  (optional) Eine eindeutige ID für diesen bestimmten Tool-Aufruf. McpServerToolResultDelta name string  (optional) Keine Beschreibung vorhanden. server_name string  (optional) Keine Beschreibung vorhanden. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "mcp_server_tool_result" gesetzt. result object oder string  (optional) Delta des Tool-Aufrufergebnisses. call_id string  (optional) ID, die mit der ID aus dem Funktionsaufrufblock übereinstimmen muss. FileSearchResultDelta result FileSearchResult  (optional) Keine Beschreibung vorhanden. Das Ergebnis der Dateisuche. Felder title string  (optional) Der Titel des Suchergebnisses. text string  (optional) Der Text des Suchergebnisses. file_search_store String  (optional) Der Name des Dateisuchspeichers. type string  (erforderlich) Wird als OpenAPI-Typ-Diskriminator für die „content“-OneOf-Option verwendet. Immer auf "file_search_result" gesetzt. ContentStop index integer  (optional) Keine Beschreibung vorhanden. event_type string  (optional) Keine Beschreibung vorhanden. Immer auf "content.stop" gesetzt. event_id string  (optional) Das event_id-Token, das verwendet werden soll, um den Interaktionsstream ab diesem Ereignis fortzusetzen. ErrorEvent event_type string  (optional) Keine Beschreibung vorhanden. Immer auf "error" gesetzt. Fehler Fehler  (optional) Keine Beschreibung vorhanden. Fehlermeldung aus einer Interaktion. Felder code string  (optional) Ein URI, der den Fehlertyp identifiziert. message string  (optional) Eine für Menschen lesbare Fehlermeldung. event_id string  (optional) Das event_id-Token, das verwendet werden soll, um den Interaktionsstream ab diesem Ereignis fortzusetzen. Beispiele Interaktionsbeginn { "event_type" : "interaction.start" , "interaction" : { "id" : "v1_ChdTMjQ0YWJ5TUF1TzcxZThQdjRpcnFRcxIXUzI0NGFieU1BdU83MWU4UHY0aXJxUXM" , "model" : "gemini-2.5-flash" , "object" : "interaction" , "status" : "in_progress" } } Interaktion abgeschlossen { "event_type" : "interaction.complete" , "interaction" : { "created" : "2025-12-09T18:45:40Z" , "id" : "v1_ChdTMjQ0YWJ5TUF1TzcxZThQdjRpcnFRcxIXUzI0NGFieU1BdU83MWU4UHY0aXJxUXM" , "model" : "gemini-2.5-flash" , "object" : "interaction" , "outputs" : [ { "signature" : "CoMDAXLI2nynRYojJIy6B1Jh9os2crpWLfB0+19xcLsGG46bd8wjkF/6RNlRUdvHrXyjsHkG0BZFcuO/bPOyA6Xh5jANNgx82wPHjGExN8A4ZQn56FlMwyZoqFVQz0QyY1lfibFJ2zU3J87uw26OewzcuVX0KEcs+GIsZa3EA6WwqhbsOd3wtZB3Ua2Qf98VAWZTS5y/tWpql7jnU3/CU7pouxQr/Bwft3hwnJNesQ9/dDJTuaQ8Zprh9VRWf1aFFjpIueOjBRrlT3oW6/y/eRl/Gt9BQXCYTqg/38vHFUU4Wo/d9dUpvfCe/a3o97t2Jgxp34oFKcsVb4S5WJrykIkw+14DzVnTpCpbQNFckqvFLuqnJCkL0EQFtunBXI03FJpPu3T1XU6id8S7ojoJQZSauGUCgmaLqUGdMrd08oo81ecoJSLs51Re9N/lISGmjWFPGpqJLoGq6uo4FHz58hmeyXCgHG742BHz2P3MiH1CXHUT2J8mF6zLhf3SR9Qb3lkrobAh" , "type" : "thought" }, { "text" : "Elara\u2019s life was a symphony of quiet moments. A librarian, she found solace in the hushed aisles, the scent of aged paper, and the predictable rhythm of her days. Her small apartment, meticulously ordered, reflected this internal calm, save" , "type" : "text" }, { "text" : " for one beloved anomaly: a chipped porcelain teacup, inherited from her grandmother, which held her morning Earl Grey.\n\nOne Tuesday, stirring her tea, Elara paused. At the bottom, nestled against the porcelain, was a star." , "type" : "text" }, { "text" : " Not a star-shaped tea leaf, but a miniature, perfectly formed celestial body, radiating a faint, cool luminescence. Before she could gasp, it dissolved, leaving only the amber swirl of her brew. She dismissed it as a trick of" , "type" : "text" }, { "text" : " tired eyes.\n\nBut the next morning, a gossamer-thin feather, smaller than an eyelash and shimmering with iridescent hues, floated on the surface. It vanished the moment she tried to touch it. A week later, a single," , "type" : "text" }, { "text" : " impossibly delicate bloom, like spun moonbeam, unfolded in her cup before fading into nothingness.\n\nThese weren't illusions. Each day, Elara\u2019s chipped teacup offered a fleeting, exquisite secret. A tiny, perfect" , "type" : "text" }, { "text" : " crystal, a miniature spiral nebula, a fragment of rainbow caught in liquid form. They never lingered, never accumulated, simply *were* and then *weren't*, leaving behind a residue of quiet wonder.\n\nElara never spoke" , "type" : "text" }, { "text" : " of it. It was her private wellspring, a daily reminder that magic could exist in the smallest, most overlooked corners of the world. Her routine remained unchanged, her external life a picture of calm, but inside, a secret garden blo" , "type" : "text" }, { "text" : "omed. Each dawn brought not just tea, but the silent promise of extraordinary beauty, waiting patiently in a chipped teacup." , "type" : "text" } ], "role" : "model" , "status" : "completed" , "updated" : "2025-12-09T18:45
2026-01-13T09:29:57
https://akismet.com/es/ponte-en-contacto-con/
Contacta con nosotros – Akismet Ir directamente al contenido Funcionalidades Enterprise Desarrolladores Precios Recursos Aprende con Akismet Atención al cliente Blog Accesibilidad Iniciar sesión Comenzar Funcionalidades Enterprise Desarrolladores Precios Recursos Aprende con Akismet Atención al cliente Blog Accesibilidad Iniciar sesión Comenzar Contacta con nosotros Estamos aquí para ayudarte. Cuéntanos más:  Tengo una pregunta sobre el registro o la suscripción.  Tengo una pregunta sobre la facturación.  Tengo una pregunta de servicio técnico.  Creo que Akismet está bloqueando mis comentarios por error.  Tengo una pregunta sobre pequeñas o grandes empresas.  Tengo una pregunta sobre las cuentas sin ánimo de lucro.  Privacidad: quiero excluir mi dirección de correo electrónico de cualquier seguimiento a largo plazo.  ¡Todo va bien!  Tengo una pregunta sobre el desarrollo de una aplicación o biblioteca con Akismet.  Quiero solicitar una entrevista o una nota de prensa.  Mi sitio se ha clasificado incorrectamente como comercial. Tu nombre Tu correo electrónico Empresa (opcional) URL de tu sitio (opcional si introduces tu clave de API) Clave API (obligatorio solo para el soporte prioritario de pago) Tu mensaje ¿Cuánto es 14+7? * Enviar * A lo mejor te estás preguntando: si tan buenos son bloqueando el spam, ¿por qué ponen una pregunta para evitar el spam en su formulario de contacto? Bueno, Akismet protege muy bien los formularios de contacto; lo utilizamos en todos nuestros otros sitios. Pero a veces la gente utiliza el formulario de contacto de Akismet.com para decirnos que Akismet les está bloqueando. No nos parece una buena idea bloquear a la gente cuando está intentando decirnos que se les ha bloqueado por error; de ahí la pregunta matemática. Respuestas rápidas Necesito actualizar mi tarjeta de crédito. He olvidado mi clave API. Necesito restablecer mi contraseña. Necesito cancelar mi suscripción. Soporte prioritario ¿Quieres conseguir ayuda aún más rápido? No olvides que nuestra suscripción Pro incluye soporte prioritario por correo electrónico. Producto Funcionalidades Enterprise Precios Recursos Atención al cliente Desarrolladores Documentación Estado de la API Legal Condiciones de servicio Política de privacidad No vendas ni compartas mi información personal Aviso de privacidad para usuarios de California es Un popurrí Work With Us Suscribirse Suscrito Akismet Suscríbeme ¿Ya tienes una cuenta de WordPress.com? Inicia sesión . Akismet Suscribirse Suscrito Regístrate Iniciar sesión Copiar enlace corto Denunciar este contenido Ver la entrada en el Lector Gestionar las suscripciones Contraer esta barra
2026-01-13T09:29:57
https://ai.google.dev/api/models?hl=zh-cn
Models  |  Gemini API  |  Google AI for Developers 跳至主要内容 / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 获取 API 密钥 实战宝典 社区 登录 文档 API 参考 Gemini API 文档 API 参考 获取 API 密钥 实战宝典 社区 概览 API 版本 功能 模型 生成内容 Live API Live Music API Interactions API 令牌 文件 Batch API 缓存 Embeddings 文件搜索 文件搜索存储区 文档 所有方法 已弃用 PaLM(已停用) SDK 参考文档 Python Go TypeScript Java C# 首页 Gemini API API 参考 发送反馈 Models 通过 models 端点,您可以以编程方式列出可用的模型,并检索扩展元数据,例如支持的功能和上下文窗口大小。如需了解详情,请参阅 模型指南 。 方法:models.get 端点 路径参数 请求正文 响应正文 授权范围 示例请求 获取 获取有关特定 Model 的信息,例如其版本号、令牌限制、 参数 和其他元数据。如需详细了解模型,请参阅 Gemini 模型指南 。 端点 get https: / /generativelanguage.googleapis.com /v1beta /{name=models /*} 路径参数 name string 必需。模型的资源名称。 此名称应与 models.list 方法返回的某个模型名称相匹配。 格式: models/{model} 格式为 models/{model} 。 请求正文 请求正文必须为空。 示例请求 Python from google import genai client = genai . Client () model_info = client . models . get ( model = "gemini-2.0-flash" ) print ( model_info ) models . py Go ctx := context . Background () client , err := genai . NewClient ( ctx , & genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } modelInfo , err := client . Models . Get ( ctx , "gemini-2.0-flash" , nil ) if err != nil { log . Fatal ( err ) } fmt . Println ( modelInfo ) models . go Shell curl https://generativelanguage.googleapis.com/v1beta/models/gemini-2.0-flash?key = $GEMINI_API_KEY models .sh 响应正文 如果成功,则响应正文包含一个 Model 实例。 方法:models.list 端点 查询参数 请求正文 响应正文 JSON 表示法 授权范围 示例请求 列表 列出可通过 Gemini API 获取的 Model 。 端点 get https: / /generativelanguage.googleapis.com /v1beta /models 查询参数 pageSize integer 要返回的 Models 的最大数量(每页)。 如果未指定,则每页返回 50 个模型。即使您传递的 pageSize 值较大,此方法每页最多也只会返回 1000 个模型。 pageToken string 从之前的 models.list 调用接收的页面令牌。 将一个请求返回的 pageToken 作为实参提供给下一个请求,以检索下一页。 进行分页时,提供给 models.list 的所有其他参数必须与提供页面令牌的调用匹配。 请求正文 请求正文必须为空。 示例请求 Python from google import genai client = genai . Client () print ( "List of models that support generateContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "generateContent" : print ( m . name ) print ( "List of models that support embedContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "embedContent" : print ( m . name ) models . py Go ctx := context . Background () client , err := genai . NewClient ( ctx , & genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } // Retrieve the list of models. models , err := client . Models . List ( ctx , & genai . ListModelsConfig {}) if err != nil { log . Fatal ( err ) } fmt . Println ( "List of models that support generateContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "generateContent" { fmt . Println ( m . Name ) break } } } fmt . Println ( "\nList of models that support embedContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "embedContent" { fmt . Println ( m . Name ) break } } } models . go Shell curl https://generativelanguage.googleapis.com/v1beta/models?key = $GEMINI_API_KEY models .sh 响应正文 来自 ListModel 的响应,包含分页的 Model 列表。 如果成功,响应正文将包含结构如下的数据: 字段 models[] object ( Model ) 返回的模型。 nextPageToken string 可作为 pageToken 发送并用于检索下一页的令牌。 如果省略此字段,则没有更多页面。 JSON 表示法 { "models" : [ { object ( Model ) } ] , "nextPageToken" : string } REST 资源:models 资源:Model JSON 表示法 方法 资源:Model 有关生成式语言模型的信息。 字段 name string 必需。 Model 的资源名称。如需了解所有允许的值,请参阅 模型变体 。 格式: models/{model} ,采用 {model} 命名规范: "{baseModelId}-{version}" 示例: models/gemini-1.5-flash-001 baseModelId string 必需。基础模型的名称,将其传递给生成请求。 示例: gemini-1.5-flash version string 必需。模型的版本号。 表示主要版本( 1.0 或 1.5 ) displayName string 模型的直观易懂的名称。例如“Gemini 1.5 Flash”。 名称不得超过 128 个字符,可以包含任何 UTF-8 字符。 description string 模型的简短说明。 inputTokenLimit integer 相应模型允许的输入令牌数量上限。 outputTokenLimit integer 相应模型可输出的词元数量上限。 supportedGenerationMethods[] string 模型支持的生成方法。 相应的 API 方法名称定义为 Pascal 大小写字符串,例如 generateMessage 和 generateContent 。 thinking boolean 模型是否支持思考。 temperature number 控制输出的随机性。 值可介于 [0.0,maxTemperature] 之间(含边界值)。值越高,生成的回答就越多样化;而值越接近 0.0 ,模型生成的回答通常就越不令人意外。此值用于指定后端在调用模型时使用的默认值。 maxTemperature number 此模型可使用的最高温度。 topP number 对于 核采样 。 核采样会考虑概率总和至少为 topP 的最小 token 集。此值用于指定后端在调用模型时使用的默认值。 topK integer 适用于 Top-k 采样。 Top-k 抽样会考虑 topK 个最有可能的 token。此值用于指定后端在调用模型时使用的默认值。如果为空,则表示模型不使用 Top-K 抽样,并且不允许将 topK 用作生成参数。 JSON 表示法 { "name" : string , "baseModelId" : string , "version" : string , "displayName" : string , "description" : string , "inputTokenLimit" : integer , "outputTokenLimit" : integer , "supportedGenerationMethods" : [ string ] , "thinking" : boolean , "temperature" : number , "maxTemperature" : number , "topP" : number , "topK" : integer } 方法:models.predict 端点 路径参数 请求正文 JSON 表示法 响应正文 JSON 表示法 授权范围 执行预测请求。 端点 帖子 https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predict 路径参数 model string 必需。用于预测的模型的名称。格式: name=models/{model} 。格式为 models/{model} 。 请求正文 请求正文中包含结构如下的数据: 字段 instances[] value ( Value format) 必需。作为预测调用的输入的实例。 parameters value ( Value format) 可选。用于控制预测调用的参数。 响应正文 [PredictionService.Predict] 的响应消息。 如果成功,响应正文将包含结构如下的数据: 字段 predictions[] value ( Value format) 预测调用的输出。 JSON 表示法 { "predictions" : [ value ] } 方法:models.predictLongRunning 端点 路径参数 请求正文 JSON 表示法 响应正文 授权范围 与 models.predict 相同,但返回的是 LRO。 端点 帖子 https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predictLongRunning 路径参数 model string 必需。用于预测的模型的名称。格式: name=models/{model} 。 请求正文 请求正文中包含结构如下的数据: 字段 instances[] value ( Value format) 必需。作为预测调用的输入的实例。 parameters value ( Value format) 可选。用于控制预测调用的参数。 响应正文 如果成功,则响应正文包含一个 Operation 实例。 发送反馈 如未另行说明,那么本页面中的内容已根据 知识共享署名 4.0 许可 获得了许可,并且代码示例已根据 Apache 2.0 许可 获得了许可。有关详情,请参阅 Google 开发者网站政策 。Java 是 Oracle 和/或其关联公司的注册商标。 最后更新时间 (UTC):2025-12-16。 需要向我们提供更多信息? [[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["没有我需要的信息","missingTheInformationINeed","thumb-down"],["太复杂/步骤太多","tooComplicatedTooManySteps","thumb-down"],["内容需要更新","outOfDate","thumb-down"],["翻译问题","translationIssue","thumb-down"],["示例/代码问题","samplesCodeIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-12-16。"],[],[]] 条款 隐私权政策 Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:57
https://ai.google.dev/gemini-api/docs/api-versions?hl=ru
Объяснение версий API  |  Gemini API  |  Google AI for Developers Перейти к основному контенту / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 Как получить ключ API Кулинарная книга Сообщество Войти Документация Справочник по API Gemini API Документация Справочник по API Как получить ключ API Кулинарная книга Сообщество Обзор Версии API Возможности Модели Создание контента Живой API API живой музыки API взаимодействия Токены Файлы Пакетный API Кеширование Встраивания Поиск файлов Магазины поиска файлов Документ Все методы Поддержка прекращена ПалМ (выведен из эксплуатации) Ссылки на SDK Python Go TypeScript Java C# Эта страница переведена с помощью Cloud Translation API . Главная Gemini API Справочник по API Отправить отзыв Объяснение версий API Мы обновили наши Условия предоставления услуг . В этом документе представлен общий обзор различий между версиями v1 и v1beta API Gemini. v1 : Стабильная версия API. Функции стабильной версии полностью поддерживаются на протяжении всего срока службы основной версии. В случае внесения каких-либо критических изменений будет создана следующая основная версия API, а существующая версия будет объявлена ​​устаревшей по истечении разумного периода времени. В API могут быть внесены изменения, не нарушающие обратную совместимость, без изменения основной версии. v1beta : Эта версия включает в себя ранние функции, которые могут находиться в разработке и могут претерпеть существенные изменения. Также нет гарантии, что функции бета-версии будут перенесены в стабильную версию. Если вам необходима стабильность в производственной среде и вы не можете рисковать внесением существенных изменений, вам не следует использовать эту версию в производственной среде. Особенность v1 v1beta Создание контента — ввод только текста Создание контента — ввод текста и изображений. Создание контента - текстовый вывод Создание контента — многоэтапные диалоги (чат) Генерация контента - вызовы функций Создание контента — потоковая передача Встраивание контента — ввод только текста Сгенерировать ответ Семантический поиск API взаимодействий - Поддерживается - Никогда не будет поддержано Настройка версии API в SDK В стандартной версии SDK API Gemini используется v1beta , но вы можете выбрать другие версии, указав версию API, как показано в следующем примере кода: Python from google import genai client = genai . Client ( http_options = { 'api_version' : 'v1alpha' }) response = client . models . generate_content ( model = 'gemini-2.0-flash' , contents = "Explain how AI works" , ) print ( response . text ) JavaScript import { GoogleGenAI } from "@google/genai" ; const ai = new GoogleGenAI ({ httpOptions : { apiVersion : "v1alpha" }, }); async function main () { const response = await ai . models . generateContent ({ model : "gemini-2.0-flash" , contents : "Explain how AI works" , }); console . log ( response . text ); } await main (); ОТДЫХ curl "https://generativelanguage.googleapis.com/v1/models/gemini-1.5-flash:generateContent" \ -H "x-goog-api-key: $GEMINI_API_KEY " \ -H 'Content-Type: application/json' \ -X POST \ -d '{ "contents": [{ "parts":[{"text": "Explain how AI works."}] }] }' Отправить отзыв Если не указано иное, контент на этой странице предоставляется по лицензии Creative Commons "С указанием авторства 4.0" , а примеры кода – по лицензии Apache 2.0 . Подробнее об этом написано в правилах сайта . Java – это зарегистрированный товарный знак корпорации Oracle и ее аффилированных лиц. Последнее обновление: 2025-12-18 UTC. Хотите рассказать подробнее? [[["Прост для понимания","easyToUnderstand","thumb-up"],["Помог мне решить мою проблему","solvedMyProblem","thumb-up"],["Другое","otherUp","thumb-up"]],[["Отсутствует нужная мне информация","missingTheInformationINeed","thumb-down"],["Слишком сложен/слишком много шагов","tooComplicatedTooManySteps","thumb-down"],["Устарел","outOfDate","thumb-down"],["Проблема с переводом текста","translationIssue","thumb-down"],["Проблемы образцов/кода","samplesCodeIssue","thumb-down"],["Другое","otherDown","thumb-down"]],["Последнее обновление: 2025-12-18 UTC."],[],[]] Условия использования Конфиденциальность Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:57
https://snyk.io/es/ethical-hacking-resources/
Ethical Hacking Resources | Learn Ethical Hacking | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API & Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API & Web - Todos los clientes Snyk API & Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo Resource Center Ethical hacking resources Welcome to your one-stop shop for ethical hacking, with introductory blogs, lessons, and workshops.  What is ethical hacking? Ethical hacking is a legal and ethical approach to improving security posture by identifying and exploiting vulnerabilities. Ethical hackers simulate real-world attacks in a controlled environment to find and fix vulnerabilities before they can be exploited by malicious actors. Webinar Ethical hacking 101 workshop Watch this workshop for an intro to ethical hacking. Watch now Article What is ethical hacking? Learn more about the foundations of ethical hacking. Read now Blog Ethical hacking techniques Review the techniques and procedures ethical hackers use. Read now Blog A day in the life of an ethical hacker Get an in-depth look at an ethical hacker’s day-to-day. Read now Article VDP vs. Bug Bounty? Discover the differences between a Vulnerability Disclosure Program and Bug Bounty. Read now Article Ethical hacking reporting Dive into the critical role of reporting in ethical hacking. Read now Video SQL Injection for beginners In this video, Tech Raj demonstrates error-based SQL injection. Watch now Lesson Cross-site scripting tutorial Learn about cross-site scripting and how it can play out in the real world. Read now Article Ethical hacking certifications Learn about key certifications and how to prepare for exams. Read now Blog Top 10 ethical hacking tools Review the most popular and effective tools used by ethical hackers. Read now Article Ethical hacking skills Learn about the technical and non-technical skills ethical hackers need. Read now Preguntas más frecuentes Is ethical hacking risky? Ethical hacking involves gaining access to closed applications or systems with permission from the system owner to report on potential vulnerabilities within an application . It is less risky than traditional hacking, as with permission, there is no illegal activity or risk of prosecution. How do you get certified as an ethical hacker? There are several certifications available for ethical hackers, including Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), Offensive Security Certified Professional (OSCP), and CompTIA Security+. These certifications demonstrate the necessary skills and knowledge to perform ethical hacking professionally. Read our detailed guide to ethical hacking certifications for more information. Is ethical hacking legal? Ethical hacking is only legal when performed with the system owner’s permission. Hacking any system without permission is legally and ethically risky, so it’s vital for ethical hackers to get explicit permission or work within existing frameworks such as vulnerability disclosure programs and bug bounties . How do you learn ethical hacking? There are a variety of free online platforms to learn ethical hacking , including Snyk Learn , Cybrary, and more. Are ethical hackers in high demand? The need for ethical hackers and their skills is also growing rapidly. According to a report by Cybersecurity Ventures, the cybersecurity industry will have 3.5 million unfilled jobs globally by 2023 . Ethical hackers are in high demand, with many organizations looking to hire professionals to help them identify and mitigate cybersecurity risks. Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:57
https://ai.google.dev/api/file-search/file-search-stores?hl=zh-cn
File Search Stores  |  Gemini API  |  Google AI for Developers 跳至主要内容 / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 获取 API 密钥 实战宝典 社区 登录 文档 API 参考 Gemini API 文档 API 参考 获取 API 密钥 实战宝典 社区 概览 API 版本 功能 模型 生成内容 Live API Live Music API Interactions API 令牌 文件 Batch API 缓存 Embeddings 文件搜索 文件搜索存储区 文档 所有方法 已弃用 PaLM(已停用) SDK 参考文档 Python Go TypeScript Java C# 首页 Gemini API API 参考 发送反馈 File Search Stores File Search API 提供托管的问答服务,用于使用 Google 的基础架构构建检索增强生成 (RAG) 系统。 方法:media.uploadToFileSearchStore 端点 路径参数 请求正文 JSON 表示法 响应正文 JSON 表示法 将数据上传到 FileSearchStore,在存储到 FileSearchStore 文档之前进行预处理和分块。 端点 上传 URI,用于媒体上传请求: post https: / /generativelanguage.googleapis.com /upload /v1beta /{fileSearchStoreName=fileSearchStores /*}:uploadToFileSearchStore 元数据 URI,用于仅涉及元数据的请求: post https: / /generativelanguage.googleapis.com /v1beta /{fileSearchStoreName=fileSearchStores /*}:uploadToFileSearchStore 路径参数 fileSearchStoreName string 必需。不可变。要将文件上传到的 FileSearchStore 的名称。示例: fileSearchStores/my-file-search-store-123 格式为 fileSearchStores/{filesearchstore} 。 请求正文 请求正文中包含结构如下的数据: 字段 displayName string 可选。所创建文档的显示名称。 customMetadata[] object ( CustomMetadata ) 要与数据相关联的自定义元数据。 chunkingConfig object ( ChunkingConfig ) 可选。用于告知服务如何对数据进行分块的配置。如果未提供,服务将使用默认参数。 mimeType string 可选。数据的 MIME 类型。如果未提供,系统将根据上传的内容进行推断。 响应正文 如果成功,响应正文将包含结构如下的数据: 字段 name string 由服务器分配的名称,该名称仅在最初返回它的那项服务中是唯一的。如果您使用默认 HTTP 映射,则 name 应是以 operations/{unique_id} 结尾的资源名称。 metadata object 与操作关联的服务专属元数据。它通常包含进度信息和常见元数据(如创建时间)。一些服务可能不会提供此类元数据。任何返回长时间运行操作的方法都应记录元数据类型(如果有的话)。 此对象可以包含任意类型的字段。附加字段 "@type" 包含用于标示相应类型的 URI。示例: { "id": 1234, "@type": "types.example.com/standard/id" } 。 done boolean 如果值为 false ,则表示操作仍在进行中。如果为 true ,则表示操作已完成,其结果不是 error 就是 response 。 result Union type 操作结果,可以是 error ,也可以是有效的 response 。如果 done == false ,则既不会设置 error ,也不会设置 response 。如果 done == true ,则只能设置 error 或 response 中的一项。部分服务可能不会提供结果。 result 只能是下列其中一项: error object ( Status ) 操作失败或被取消时表示有错误发生的结果。 response object 操作的常规成功响应。如果原始方法在成功时不返回任何数据(如 Delete ),则响应为 google.protobuf.Empty 。如果原始方法为标准 Get / Create / Update 方法,则响应应该为资源。对于其他方法,响应类型应为 XxxResponse ,其中 Xxx 是原始方法的名称。例如,如果原始方法名称为 TakeSnapshot() ,则推断的响应类型为 TakeSnapshotResponse 。 此对象可以包含任意类型的字段。附加字段 "@type" 包含用于标示相应类型的 URI。示例: { "id": 1234, "@type": "types.example.com/standard/id" } 。 JSON 表示法 { "name" : string , "metadata" : { "@type" : string , field1 : ... , ... } , "done" : boolean , // result "error" : { object ( Status ) } , "response" : { "@type" : string , field1 : ... , ... } // Union type } 方法:fileSearchStores.create 端点 请求正文 响应正文 授权范围 创建空的 FileSearchStore 。 端点 post https: / /generativelanguage.googleapis.com /v1beta /fileSearchStores 请求正文 请求正文包含一个 FileSearchStore 实例。 字段 displayName string 可选。 FileSearchStore 的人类可读显示名称。显示名称的长度不得超过 512 个字符(包括空格)。示例:“语义检索器上的文档” 响应正文 如果成功,响应正文将包含一个新创建的 FileSearchStore 实例。 方法:fileSearchStores.delete 端点 路径参数 查询参数 请求正文 响应正文 授权范围 删除 FileSearchStore 。 端点 delete https: / /generativelanguage.googleapis.com /v1beta /{name=fileSearchStores /*} 路径参数 name string 必需。 FileSearchStore 的资源名称。示例: fileSearchStores/my-file-search-store-123 格式为 fileSearchStores/{filesearchstore} 。 查询参数 force boolean 可选。如果设置为 true,则与此 FileSearchStore 相关的所有 Document 和对象也会被删除。 如果为 false(默认值),则当 FileSearchStore 包含任何 Document 时,系统会返回 FAILED_PRECONDITION 错误。 请求正文 请求正文必须为空。 响应正文 如果成功,则响应正文为空的 JSON 对象。 方法:fileSearchStores.get 端点 路径参数 请求正文 响应正文 授权范围 获取有关特定 FileSearchStore 的信息。 端点 get https: / /generativelanguage.googleapis.com /v1beta /{name=fileSearchStores /*} 路径参数 name string 必需。 FileSearchStore 的名称。示例: fileSearchStores/my-file-search-store-123 格式为 fileSearchStores/{filesearchstore} 。 请求正文 请求正文必须为空。 响应正文 如果成功,则响应正文包含一个 FileSearchStore 实例。 方法:fileSearchStores.list 端点 查询参数 请求正文 响应正文 JSON 表示法 授权范围 列出用户拥有的所有 FileSearchStores 。 端点 get https: / /generativelanguage.googleapis.com /v1beta /fileSearchStores 查询参数 pageSize integer 可选。要返回的 FileSearchStores 的数量上限(每页)。服务返回的数量可能少于 FileSearchStores 。 如果未指定,则最多返回 10 个 FileSearchStores 。每页的上限为 20 FileSearchStores 。 pageToken string 可选。从之前的 fileSearchStores.list 调用接收的页面令牌。 在下一个请求中提供响应中返回的 nextPageToken 作为实参,以检索下一页。 进行分页时,提供给 fileSearchStores.list 的所有其他参数必须与提供页面令牌的调用匹配。 请求正文 请求正文必须为空。 响应正文 来自 fileSearchStores.list 的响应,包含分页的 FileSearchStores 列表。结果按 fileSearchStore.create_time 升序排序。 如果成功,响应正文将包含结构如下的数据: 字段 fileSearchStores[] object ( FileSearchStore ) 返回的 rag_stores。 nextPageToken string 可作为 pageToken 发送并用于检索下一页的令牌。如果省略此字段,则没有更多页面。 JSON 表示法 { "fileSearchStores" : [ { object ( FileSearchStore ) } ] , "nextPageToken" : string } 方法:fileSearchStores.importFile 端点 路径参数 请求正文 JSON 表示法 响应正文 将 File 从文件服务导入到 FileSearchStore 。 端点 post https: / /generativelanguage.googleapis.com /v1beta /{fileSearchStoreName=fileSearchStores /*}:importFile 路径参数 fileSearchStoreName string 必需。不可变。要将文件导入到的 FileSearchStore 的名称。示例: fileSearchStores/my-file-search-store-123 格式为 fileSearchStores/{filesearchstore} 。 请求正文 请求正文中包含结构如下的数据: 字段 fileName string 必需。要导入的 File 的名称。示例: files/abc-123 customMetadata[] object ( CustomMetadata ) 要与文件关联的自定义元数据。 chunkingConfig object ( ChunkingConfig ) 可选。用于告知服务如何将文件分块的配置。如果未提供,服务将使用默认参数。 响应正文 如果成功,则响应正文包含一个 Operation 实例。 REST 资源:fileSearchStores.operations 资源:Operation JSON 表示法 方法 资源:Operation 此资源表示由网络 API 调用引发的长时间运行的操作。 字段 name string 由服务器分配的名称,该名称仅在最初返回它的那项服务中是唯一的。如果您使用默认 HTTP 映射,则 name 应是以 operations/{unique_id} 结尾的资源名称。 metadata object 与操作关联的服务专属元数据。它通常包含进度信息和常见元数据(如创建时间)。一些服务可能不会提供此类元数据。任何返回长时间运行操作的方法都应记录元数据类型(如果有的话)。 此对象可以包含任意类型的字段。附加字段 "@type" 包含用于标示相应类型的 URI。示例: { "id": 1234, "@type": "types.example.com/standard/id" } 。 done boolean 如果值为 false ,则表示操作仍在进行中。如果为 true ,则表示操作已完成,其结果不是 error 就是 response 。 result Union type 操作结果,可以是 error ,也可以是有效的 response 。如果 done == false ,则既不会设置 error ,也不会设置 response 。如果 done == true ,则只能设置 error 或 response 中的一项。部分服务可能不会提供结果。 result 只能是下列其中一项: error object ( Status ) 操作失败或被取消时表示有错误发生的结果。 response object 操作的常规成功响应。如果原始方法在成功时不返回任何数据(如 Delete ),则响应为 google.protobuf.Empty 。如果原始方法为标准 Get / Create / Update 方法,则响应应该为资源。对于其他方法,响应类型应为 XxxResponse ,其中 Xxx 是原始方法的名称。例如,如果原始方法名称为 TakeSnapshot() ,则推断的响应类型为 TakeSnapshotResponse 。 此对象可以包含任意类型的字段。附加字段 "@type" 包含用于标示相应类型的 URI。示例: { "id": 1234, "@type": "types.example.com/standard/id" } 。 JSON 表示法 { "name" : string , "metadata" : { "@type" : string , field1 : ... , ... } , "done" : boolean , // result "error" : { object ( Status ) } , "response" : { "@type" : string , field1 : ... , ... } // Union type } 方法:fileSearchStores.operations.get 端点 路径参数 请求正文 响应正文 授权范围 获取长时间运行的操作的最新状态。客户端可以使用此方法,按 API 服务建议的时间间隔来轮询操作结果。 端点 get https: / /generativelanguage.googleapis.com /v1beta /{name=fileSearchStores /* /operations /*} 路径参数 name string 操作资源的名称。 格式为 fileSearchStores/{filesearchstore}/operations/{operation} 。 请求正文 请求正文必须为空。 响应正文 如果成功,则响应正文包含一个 Operation 实例。 REST 资源:fileSearchStores.upload.operations 资源:Operation JSON 表示法 方法 资源:Operation 此资源表示由网络 API 调用引发的长时间运行的操作。 字段 name string 由服务器分配的名称,该名称仅在最初返回它的那项服务中是唯一的。如果您使用默认 HTTP 映射,则 name 应是以 operations/{unique_id} 结尾的资源名称。 metadata object 与操作关联的服务专属元数据。它通常包含进度信息和常见元数据(如创建时间)。一些服务可能不会提供此类元数据。任何返回长时间运行操作的方法都应记录元数据类型(如果有的话)。 此对象可以包含任意类型的字段。附加字段 "@type" 包含用于标示相应类型的 URI。示例: { "id": 1234, "@type": "types.example.com/standard/id" } 。 done boolean 如果值为 false ,则表示操作仍在进行中。如果为 true ,则表示操作已完成,其结果不是 error 就是 response 。 result Union type 操作结果,可以是 error ,也可以是有效的 response 。如果 done == false ,则既不会设置 error ,也不会设置 response 。如果 done == true ,则只能设置 error 或 response 中的一项。部分服务可能不会提供结果。 result 只能是下列其中一项: error object ( Status ) 操作失败或被取消时表示有错误发生的结果。 response object 操作的常规成功响应。如果原始方法在成功时不返回任何数据(如 Delete ),则响应为 google.protobuf.Empty 。如果原始方法为标准 Get / Create / Update 方法,则响应应该为资源。对于其他方法,响应类型应为 XxxResponse ,其中 Xxx 是原始方法的名称。例如,如果原始方法名称为 TakeSnapshot() ,则推断的响应类型为 TakeSnapshotResponse 。 此对象可以包含任意类型的字段。附加字段 "@type" 包含用于标示相应类型的 URI。示例: { "id": 1234, "@type": "types.example.com/standard/id" } 。 JSON 表示法 { "name" : string , "metadata" : { "@type" : string , field1 : ... , ... } , "done" : boolean , // result "error" : { object ( Status ) } , "response" : { "@type" : string , field1 : ... , ... } // Union type } 方法:fileSearchStores.upload.operations.get 端点 路径参数 请求正文 响应正文 授权范围 获取长时间运行的操作的最新状态。客户端可以使用此方法,按 API 服务建议的时间间隔来轮询操作结果。 端点 get https: / /generativelanguage.googleapis.com /v1beta /{name=fileSearchStores /* /upload /operations /*} 路径参数 name string 操作资源的名称。 格式为 fileSearchStores/{filesearchstore}/upload/operations/{operation} 。 请求正文 请求正文必须为空。 响应正文 如果成功,则响应正文包含一个 Operation 实例。 REST 资源:fileSearchStores 资源:FileSearchStore JSON 表示法 方法 资源:FileSearchStore FileSearchStore 是 Document 的集合。 字段 name string 仅限输出。不可变。标识符。 FileSearchStore 资源名称。这是一个 ID(不含“fileSearchStores/”前缀的名称),最多可包含 40 个字符,这些字符可以是小写字母数字字符或短划线 (-)。此属性仅供输出。唯一名称将从 displayName 派生,并附带一个 12 字符的随机后缀。示例: fileSearchStores/my-awesome-file-search-store-123a456b789c 如果未提供 displayName ,系统会随机生成名称。 displayName string 可选。 FileSearchStore 的人类可读显示名称。显示名称的长度不得超过 512 个字符(包括空格)。示例:“语义检索器上的文档” createTime string ( Timestamp format) 仅限输出。创建 FileSearchStore 时的时间戳。 采用 RFC 3339 标准,生成的输出将始终进行 Z 规范化(即转换为 UTC 零时区格式并在末尾附加 Z),并使用 0、3、6 或 9 个小数位。不带“Z”的偏差时间也是可以接受的。示例: "2014-10-02T15:01:23Z" 、 "2014-10-02T15:01:23.045123456Z" 或 "2014-10-02T15:01:23+05:30" 。 updateTime string ( Timestamp format) 仅限输出。上次更新 FileSearchStore 时的时间戳。 采用 RFC 3339 标准,生成的输出将始终进行 Z 规范化(即转换为 UTC 零时区格式并在末尾附加 Z),并使用 0、3、6 或 9 个小数位。不带“Z”的偏差时间也是可以接受的。示例: "2014-10-02T15:01:23Z" 、 "2014-10-02T15:01:23.045123456Z" 或 "2014-10-02T15:01:23+05:30" 。 activeDocumentsCount string ( int64 format) 仅限输出。 FileSearchStore 中处于有效状态且可供检索的文档数量。 pendingDocumentsCount string ( int64 format) 仅限输出。正在处理的 FileSearchStore 中的文档数量。 failedDocumentsCount string ( int64 format) 仅限输出。 FileSearchStore 中处理失败的文档数量。 sizeBytes string ( int64 format) 仅限输出。提取到 FileSearchStore 中的原始字节的大小。这是 FileSearchStore 中所有文档的总大小。 JSON 表示法 { "name" : string , "displayName" : string , "createTime" : string , "updateTime" : string , "activeDocumentsCount" : string , "pendingDocumentsCount" : string , "failedDocumentsCount" : string , "sizeBytes" : string } 发送反馈 如未另行说明,那么本页面中的内容已根据 知识共享署名 4.0 许可 获得了许可,并且代码示例已根据 Apache 2.0 许可 获得了许可。有关详情,请参阅 Google 开发者网站政策 。Java 是 Oracle 和/或其关联公司的注册商标。 最后更新时间 (UTC):2026-01-12。 需要向我们提供更多信息? [[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["没有我需要的信息","missingTheInformationINeed","thumb-down"],["太复杂/步骤太多","tooComplicatedTooManySteps","thumb-down"],["内容需要更新","outOfDate","thumb-down"],["翻译问题","translationIssue","thumb-down"],["示例/代码问题","samplesCodeIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2026-01-12。"],[],[]] 条款 隐私权政策 Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:57
https://ai.google.dev/api/file-search/file-search-stores?hl=ar
File Search Stores  |  Gemini API  |  Google AI for Developers التخطّي إلى المحتوى الرئيسي / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 الحصول على مفتاح واجهة برمجة التطبيقات كتاب الطبخ منتدى تسجيل الدخول المستندات مرجع واجهة برمجة التطبيقات Gemini API المستندات مرجع واجهة برمجة التطبيقات الحصول على مفتاح واجهة برمجة التطبيقات كتاب الطبخ منتدى نظرة عامة إصدارات واجهة برمجة التطبيقات الإمكانات الطرُز جارٍ إنشاء المحتوى واجهة برمجة التطبيقات للبث المباشر Live Music API واجهة برمجة التطبيقات Interactions API الرموز المميزة الملفات Batch API تخزين مؤقت التضمينات البحث عن ملف متاجر البحث عن الملفات مستند جميع الطرق منهي العمل به PaLM (تم إيقافه) مراجع حِزم تطوير البرامج (SDK) Python Go TypeScript Java C# الصفحة الرئيسية Gemini API مرجع واجهة برمجة التطبيقات إرسال ملاحظات File Search Stores توفّر واجهة برمجة التطبيقات File Search API خدمة مستضافة للإجابة عن الأسئلة من أجل إنشاء أنظمة التوليد المعزّز بالاسترجاع باستخدام البنية الأساسية من Google. الطريقة: media.uploadToFileSearchStore نقطة النهاية مَعلمات المسار نص الطلب تمثيل JSON نص الاستجابة تمثيل JSON تحميل البيانات إلى FileSearchStore، ومعالجتها مسبقًا وتقسيمها إلى أجزاء قبل تخزينها في مستند FileSearchStore نقطة نهاية معرّف الموارد المنتظم (URI) للتحميل، لطلبات تحميل الوسائط: post https: / /generativelanguage.googleapis.com /upload /v1beta /{fileSearchStoreName=fileSearchStores /*}:uploadToFileSearchStore معرّف الموارد المنتظم للبيانات الوصفية، للطلبات التي تتضمّن البيانات الوصفية فقط: post https: / /generativelanguage.googleapis.com /v1beta /{fileSearchStoreName=fileSearchStores /*}:uploadToFileSearchStore مَعلمات المسار fileSearchStoreName string الحقل مطلوب. غير قابل للتغيير اسم FileSearchStore الذي سيتم تحميل الملف إليه. مثال: fileSearchStores/my-file-search-store-123 ويكون بالتنسيق التالي: fileSearchStores/{filesearchstore} . نص الطلب يتضمن نص الطلب بيانات بالبنية التالية: الحقول displayName string اختياريّ. الاسم المعروض للمستند الذي تم إنشاؤه customMetadata[] object ( CustomMetadata ) بيانات التعريف المخصّصة التي سيتم ربطها بالبيانات chunkingConfig object ( ChunkingConfig ) اختياريّ. إعدادات لتحديد كيفية تقسيم البيانات إلى أجزاء. في حال عدم توفيرها، ستستخدم الخدمة المَعلمات التلقائية. mimeType string اختياريّ. نوع MIME للبيانات في حال عدم توفيرها، سيتم استنتاجها من المحتوى الذي تم تحميله. نص الاستجابة إذا كانت الاستجابة ناجحة، سيحتوي نص الاستجابة على بيانات بالبنية التالية: الحقول name string هو الاسم الذي يُعيّنه الخادم، ويكون فريدًا فقط ضمن الخدمة نفسها التي أرسلت الاسم في الاستجابة. إذا كنت تستخدم أسلوب ربط HTTP التلقائي، يجب أن يكون حقل name اسم مورد ينتهي بالشكل التالي: operations/{unique_id} . metadata object يشير الحقل إلى بيانات وصفية خاصة بالخدمة ومرتبطة بالعملية. يتضمّن عادةً معلومات حول مستوى تقدّم العملية وبيانات وصفية شائعة مثل وقت الإنشاء. يُرجى الِعلم أنّ بعض الخدمات قد لا توفّر هذه البيانات. إذا أدّى إجراء ما إلى بدء عملية طويلة، يجب أن يوثّق نوع البيانات الوصفية، إن وُجدِت. هو كائن يحتوي على حقول من أي نوع، بالإضافة إلى حقل "@type" الذي يتضمّن معرف موارد منتظم (URI) يحدّد نوع الكائن، مثل { "id": 1234, "@type": "types.example.com/standard/id" } . done boolean إذا كانت القيمة false ، هذا يعني أنّ العملية ما زالت قيد التنفيذ. أما إذا كانت true ، فهذا يعني أنّ العملية اكتملت، ويمكن عندها الوصول إلى error أو response . result Union type تمثّل نتيجة العملية، والتي يمكن أن تكون إما error أو response صالحة. إذا كان false ‏ == done ، هذا يعني أنّه لم يتم ضبط أي من error أو response . إذا كان true ‏ == done ، هذا يعني أنّه يمكن ضبط إما error أو response فقط. بعض الخدمات قد لا توفّر النتيجة. يمكن أن تكون result إحدى القيم التالية فقط: error object ( Status ) يمثّل نتيجة الخطأ للعملية في حال فشلها أو إلغائها. response object يشير هذا الحقل إلى الاستجابة المعتادة إذا كانت العملية ناجحة. إذا كان الإجراء الأصلي لا يعرض أي بيانات عند نجاحه، مثل Delete ، تكون الاستجابة google.protobuf.Empty . وإذا كان الإجراء الأصلي أحد العمليات الشائعة مثل Get أو Create أو Update ، يجب أن تكون الاستجابة هي المورد نفسه. أما بالنسبة إلى الإجراءات الأخرى، فيجب أن يكون نوع الاستجابة بصيغة XxxResponse ، حيث يمثّل Xxx اسم الإجراء الأصلي. على سبيل المثال، إذا كان اسم الإجراء الأصلي TakeSnapshot() ، سيكون نوع الاستجابة المستنتَج TakeSnapshotResponse . هو كائن يحتوي على حقول من أي نوع، بالإضافة إلى حقل "@type" الذي يتضمّن معرف موارد منتظم (URI) يحدّد نوع الكائن، مثل { "id": 1234, "@type": "types.example.com/standard/id" } . تمثيل JSON { "name" : string , "metadata" : { "@type" : string , field1 : ... , ... } , "done" : boolean , // result "error" : { object ( Status ) } , "response" : { "@type" : string , field1 : ... , ... } // Union type } الطريقة: fileSearchStores.create نقطة النهاية نص الطلب نص الاستجابة نطاقات الأذونات تنشئ هذه الطريقة FileSearchStore فارغًا. نقطة نهاية post https: / /generativelanguage.googleapis.com /v1beta /fileSearchStores نص الطلب يحتوي نص الطلب على مثال FileSearchStore . الحقول displayName string اختياريّ. تمثّل هذه السمة الاسم المعروض FileSearchStore الذي يمكن للمستخدم قراءته. يجب ألا يزيد طول الاسم المعروض عن 512 حرفًا، بما في ذلك المسافات. مثال: "مستندات حول Semantic Retriever" نص الاستجابة إذا كانت الاستجابة ناجحة، سيحتوي نصها على مثال تم إنشاؤه حديثًا FileSearchStore . الطريقة: fileSearchStores.delete نقطة النهاية مَعلمات المسار معامِلات طلب البحث نص الطلب نص الاستجابة نطاقات الأذونات يحذف FileSearchStore . نقطة نهاية delete https: / /generativelanguage.googleapis.com /v1beta /{name=fileSearchStores /*} مَعلمات المسار name string الحقل مطلوب. تمثّل هذه السمة اسم المورد الخاص بـ FileSearchStore . مثال: fileSearchStores/my-file-search-store-123 ويكون بالتنسيق التالي: fileSearchStores/{filesearchstore} . مَعلمات طلب البحث force boolean اختياريّ. في حال ضبطها على "صحيح"، سيتم أيضًا حذف أي Document وعناصر مرتبطة بهذا FileSearchStore . إذا كانت القيمة خطأ (القيمة التلقائية)، سيتم عرض الخطأ FAILED_PRECONDITION إذا كان FileSearchStore يحتوي على أي Document . نص الطلب يجب أن يكون نص الطلب فارغًا. نص الاستجابة إذا كانت الاستجابة ناجحة، سيكون نص الاستجابة عبارة عن كائن JSON فارغ. الطريقة: fileSearchStores.get نقطة النهاية مَعلمات المسار نص الطلب نص الاستجابة نطاقات الأذونات تعرض هذه السمة معلومات حول FileSearchStore معيّن. نقطة نهاية get https: / /generativelanguage.googleapis.com /v1beta /{name=fileSearchStores /*} مَعلمات المسار name string الحقل مطلوب. تمثّل هذه السمة اسم FileSearchStore . مثال: fileSearchStores/my-file-search-store-123 ويكون بالتنسيق التالي: fileSearchStores/{filesearchstore} . نص الطلب يجب أن يكون نص الطلب فارغًا. نص الاستجابة إذا كانت الاستجابة ناجحة، يحتوي نص الاستجابة على مثال FileSearchStore . الطريقة: fileSearchStores.list نقطة النهاية معامِلات طلب البحث نص الطلب نص الاستجابة تمثيل JSON نطاقات الأذونات تعرض هذه السمة جميع FileSearchStores التي يملكها المستخدم. نقطة نهاية get https: / /generativelanguage.googleapis.com /v1beta /fileSearchStores مَعلمات طلب البحث pageSize integer اختياريّ. الحد الأقصى لعدد FileSearchStores المطلوب عرضه (لكل صفحة) قد تعرض الخدمة عددًا أقل من FileSearchStores . إذا لم يتم تحديد عدد، سيتم عرض 10 FileSearchStores على الأكثر. الحدّ الأقصى للحجم هو 20 FileSearchStores لكل صفحة. pageToken string اختياريّ. رمز مميز للصفحة تم تلقّيه من طلب fileSearchStores.list سابق. قدِّم nextPageToken الذي تم عرضه في الرد كمعلَمة للطلب التالي لاسترداد الصفحة التالية. عند تقسيم النتائج إلى صفحات، يجب أن تتطابق جميع المَعلمات الأخرى المقدَّمة إلى fileSearchStores.list مع الطلب الذي قدّم رمز الصفحة المميز. نص الطلب يجب أن يكون نص الطلب فارغًا. نص الاستجابة استجابة من fileSearchStores.list تحتوي على قائمة مقسّمة إلى صفحات من FileSearchStores يتم ترتيب النتائج حسب fileSearchStore.create_time تصاعديًا. إذا كانت الاستجابة ناجحة، سيحتوي نص الاستجابة على بيانات بالبنية التالية: الحقول fileSearchStores[] object ( FileSearchStore ) ‫rag_stores التي تم إرجاعها nextPageToken string رمز مميز يمكن إرساله كـ pageToken لاسترداد الصفحة التالية. إذا تم حذف هذا الحقل، لن يكون هناك المزيد من الصفحات. تمثيل JSON { "fileSearchStores" : [ { object ( FileSearchStore ) } ] , "nextPageToken" : string } الطريقة: fileSearchStores.importFile نقطة النهاية مَعلمات المسار نص الطلب تمثيل JSON نص الاستجابة يستورد هذا الإجراء ملف File من "خدمة الملفات" إلى FileSearchStore . نقطة نهاية post https: / /generativelanguage.googleapis.com /v1beta /{fileSearchStoreName=fileSearchStores /*}:importFile مَعلمات المسار fileSearchStoreName string الحقل مطلوب. غير قابل للتغيير اسم FileSearchStore الذي سيتم استيراد الملف إليه. مثال: fileSearchStores/my-file-search-store-123 ويكون بالتنسيق التالي: fileSearchStores/{filesearchstore} . نص الطلب يتضمن نص الطلب بيانات بالبنية التالية: الحقول fileName string الحقل مطلوب. اسم File المطلوب استيراده مثال: files/abc-123 customMetadata[] object ( CustomMetadata ) البيانات الوصفية المخصّصة التي سيتم ربطها بالملف chunkingConfig object ( ChunkingConfig ) اختياريّ. إعدادات لتحديد كيفية تقسيم الملف إلى أجزاء. في حال عدم توفيرها، ستستخدم الخدمة المَعلمات التلقائية. نص الاستجابة إذا كانت الاستجابة ناجحة، يحتوي نص الاستجابة على مثال Operation . مورد REST: ‏ fileSearchStores.operations المورد: العملية تمثيل JSON الطُرق المورد: العملية يمثّل هذا المورد عملية طويلة ناتجة عن طلب بيانات من واجهة برمجة التطبيقات من الشبكة. الحقول name string هو الاسم الذي يُعيّنه الخادم، ويكون فريدًا فقط ضمن الخدمة نفسها التي أرسلت الاسم في الاستجابة. إذا كنت تستخدم أسلوب ربط HTTP التلقائي، يجب أن يكون حقل name اسم مورد ينتهي بالشكل التالي: operations/{unique_id} . metadata object يشير الحقل إلى بيانات وصفية خاصة بالخدمة ومرتبطة بالعملية. يتضمّن عادةً معلومات حول مستوى تقدّم العملية وبيانات وصفية شائعة مثل وقت الإنشاء. يُرجى الِعلم أنّ بعض الخدمات قد لا توفّر هذه البيانات. إذا أدّى إجراء ما إلى بدء عملية طويلة، يجب أن يوثّق نوع البيانات الوصفية، إن وُجدِت. هو كائن يحتوي على حقول من أي نوع، بالإضافة إلى حقل "@type" الذي يتضمّن معرف موارد منتظم (URI) يحدّد نوع الكائن، مثل { "id": 1234, "@type": "types.example.com/standard/id" } . done boolean إذا كانت القيمة false ، هذا يعني أنّ العملية ما زالت قيد التنفيذ. أما إذا كانت true ، فهذا يعني أنّ العملية اكتملت، ويمكن عندها الوصول إلى error أو response . result Union type تمثّل نتيجة العملية، والتي يمكن أن تكون إما error أو response صالحة. إذا كان false ‏ == done ، هذا يعني أنّه لم يتم ضبط أي من error أو response . إذا كان true ‏ == done ، هذا يعني أنّه يمكن ضبط إما error أو response فقط. بعض الخدمات قد لا توفّر النتيجة. يمكن أن تكون result إحدى القيم التالية فقط: error object ( Status ) يمثّل نتيجة الخطأ للعملية في حال فشلها أو إلغائها. response object يشير هذا الحقل إلى الاستجابة المعتادة إذا كانت العملية ناجحة. إذا كان الإجراء الأصلي لا يعرض أي بيانات عند نجاحه، مثل Delete ، تكون الاستجابة google.protobuf.Empty . وإذا كان الإجراء الأصلي أحد العمليات الشائعة مثل Get أو Create أو Update ، يجب أن تكون الاستجابة هي المورد نفسه. أما بالنسبة إلى الإجراءات الأخرى، فيجب أن يكون نوع الاستجابة بصيغة XxxResponse ، حيث يمثّل Xxx اسم الإجراء الأصلي. على سبيل المثال، إذا كان اسم الإجراء الأصلي TakeSnapshot() ، سيكون نوع الاستجابة المستنتَج TakeSnapshotResponse . هو كائن يحتوي على حقول من أي نوع، بالإضافة إلى حقل "@type" الذي يتضمّن معرف موارد منتظم (URI) يحدّد نوع الكائن، مثل { "id": 1234, "@type": "types.example.com/standard/id" } . تمثيل JSON { "name" : string , "metadata" : { "@type" : string , field1 : ... , ... } , "done" : boolean , // result "error" : { object ( Status ) } , "response" : { "@type" : string , field1 : ... , ... } // Union type } الطريقة: fileSearchStores.operations.get نقطة النهاية مَعلمات المسار نص الطلب نص الاستجابة نطاقات الأذونات تتيح هذه الطريقة الاطّلاع على أحدث حالة لعملية طويلة، ويمكن للعملاء استخدامها للتحقّق من نتيجة العملية على فترات زمنية منتظمة تنصح بها خدمة واجهة برمجة التطبيقات. نقطة نهاية get https: / /generativelanguage.googleapis.com /v1beta /{name=fileSearchStores /* /operations /*} مَعلمات المسار name string يمثّل اسم مورد العملية. ويكون بالتنسيق التالي: fileSearchStores/{filesearchstore}/operations/{operation} . نص الطلب يجب أن يكون نص الطلب فارغًا. نص الاستجابة إذا كانت الاستجابة ناجحة، يحتوي نص الاستجابة على مثال Operation . مورد REST: ‏ fileSearchStores.upload.operations المورد: العملية تمثيل JSON الطُرق المورد: العملية يمثّل هذا المورد عملية طويلة ناتجة عن طلب بيانات من واجهة برمجة التطبيقات من الشبكة. الحقول name string هو الاسم الذي يُعيّنه الخادم، ويكون فريدًا فقط ضمن الخدمة نفسها التي أرسلت الاسم في الاستجابة. إذا كنت تستخدم أسلوب ربط HTTP التلقائي، يجب أن يكون حقل name اسم مورد ينتهي بالشكل التالي: operations/{unique_id} . metadata object يشير الحقل إلى بيانات وصفية خاصة بالخدمة ومرتبطة بالعملية. يتضمّن عادةً معلومات حول مستوى تقدّم العملية وبيانات وصفية شائعة مثل وقت الإنشاء. يُرجى الِعلم أنّ بعض الخدمات قد لا توفّر هذه البيانات. إذا أدّى إجراء ما إلى بدء عملية طويلة، يجب أن يوثّق نوع البيانات الوصفية، إن وُجدِت. هو كائن يحتوي على حقول من أي نوع، بالإضافة إلى حقل "@type" الذي يتضمّن معرف موارد منتظم (URI) يحدّد نوع الكائن، مثل { "id": 1234, "@type": "types.example.com/standard/id" } . done boolean إذا كانت القيمة false ، هذا يعني أنّ العملية ما زالت قيد التنفيذ. أما إذا كانت true ، فهذا يعني أنّ العملية اكتملت، ويمكن عندها الوصول إلى error أو response . result Union type تمثّل نتيجة العملية، والتي يمكن أن تكون إما error أو response صالحة. إذا كان false ‏ == done ، هذا يعني أنّه لم يتم ضبط أي من error أو response . إذا كان true ‏ == done ، هذا يعني أنّه يمكن ضبط إما error أو response فقط. بعض الخدمات قد لا توفّر النتيجة. يمكن أن تكون result إحدى القيم التالية فقط: error object ( Status ) يمثّل نتيجة الخطأ للعملية في حال فشلها أو إلغائها. response object يشير هذا الحقل إلى الاستجابة المعتادة إذا كانت العملية ناجحة. إذا كان الإجراء الأصلي لا يعرض أي بيانات عند نجاحه، مثل Delete ، تكون الاستجابة google.protobuf.Empty . وإذا كان الإجراء الأصلي أحد العمليات الشائعة مثل Get أو Create أو Update ، يجب أن تكون الاستجابة هي المورد نفسه. أما بالنسبة إلى الإجراءات الأخرى، فيجب أن يكون نوع الاستجابة بصيغة XxxResponse ، حيث يمثّل Xxx اسم الإجراء الأصلي. على سبيل المثال، إذا كان اسم الإجراء الأصلي TakeSnapshot() ، سيكون نوع الاستجابة المستنتَج TakeSnapshotResponse . هو كائن يحتوي على حقول من أي نوع، بالإضافة إلى حقل "@type" الذي يتضمّن معرف موارد منتظم (URI) يحدّد نوع الكائن، مثل { "id": 1234, "@type": "types.example.com/standard/id" } . تمثيل JSON { "name" : string , "metadata" : { "@type" : string , field1 : ... , ... } , "done" : boolean , // result "error" : { object ( Status ) } , "response" : { "@type" : string , field1 : ... , ... } // Union type } الطريقة: fileSearchStores.upload.operations.get نقطة النهاية مَعلمات المسار نص الطلب نص الاستجابة نطاقات الأذونات تتيح هذه الطريقة الاطّلاع على أحدث حالة لعملية طويلة، ويمكن للعملاء استخدامها للتحقّق من نتيجة العملية على فترات زمنية منتظمة تنصح بها خدمة واجهة برمجة التطبيقات. نقطة نهاية get https: / /generativelanguage.googleapis.com /v1beta /{name=fileSearchStores /* /upload /operations /*} مَعلمات المسار name string يمثّل اسم مورد العملية. ويكون بالتنسيق التالي: fileSearchStores/{filesearchstore}/upload/operations/{operation} . نص الطلب يجب أن يكون نص الطلب فارغًا. نص الاستجابة إذا كانت الاستجابة ناجحة، يحتوي نص الاستجابة على مثال Operation . مورد REST: ‏ fileSearchStores المورد: FileSearchStore تمثيل JSON الطُرق المورد: FileSearchStore FileSearchStore هي مجموعة من Document . الحقول name string النتائج فقط. غير قابل للتغيير المعرّف تمثّل هذه السمة FileSearchStore اسم المورد. وهو معرّف (اسم باستثناء البادئة "fileSearchStores/") يمكن أن يحتوي على ما يصل إلى 40 حرفًا أبجديًا رقميًا صغيرًا أو شُرطًا (-). وهو قيمة للناتج فقط. سيتم اشتقاق الاسم الفريد من displayName بالإضافة إلى لاحقة عشوائية مكوّنة من 12 حرفًا. مثال: fileSearchStores/my-awesome-file-search-store-123a456b789c في حال عدم توفير displayName ، سيتم إنشاء الاسم بشكل عشوائي. displayName string اختياريّ. تمثّل هذه السمة الاسم المعروض FileSearchStore الذي يمكن للمستخدم قراءته. يجب ألا يزيد طول الاسم المعروض عن 512 حرفًا، بما في ذلك المسافات. مثال: "مستندات حول Semantic Retriever" createTime string ( Timestamp format) النتائج فقط. الطابع الزمني لوقت إنشاء FileSearchStore يستخدم المعيار RFC 3339، حيث يكون الناتج الذي يتم إنشاؤه مُمثلاً بالتوقيت العالمي المنسَّق مع حرف Z في النهاية ويستخدم الأرقام الجزئية 0 أو 3 أو 6 أو 9. تُقبل أيضًا المعادلات الأخرى التي لا تستخدم حرف Z. أمثلة: "2014-10-02T15:01:23Z" أو "2014-10-02T15:01:23.045123456Z" أو "2014-10-02T15:01:23+05:30" . updateTime string ( Timestamp format) النتائج فقط. الطابع الزمني لآخر مرة تم فيها تعديل FileSearchStore يستخدم المعيار RFC 3339، حيث يكون الناتج الذي يتم إنشاؤه مُمثلاً بالتوقيت العالمي المنسَّق مع حرف Z في النهاية ويستخدم الأرقام الجزئية 0 أو 3 أو 6 أو 9. تُقبل أيضًا المعادلات الأخرى التي لا تستخدم حرف Z. أمثلة: "2014-10-02T15:01:23Z" أو "2014-10-02T15:01:23.045123456Z" أو "2014-10-02T15:01:23+05:30" . activeDocumentsCount string ( int64 format) النتائج فقط. عدد المستندات في FileSearchStore النشطة والجاهزة للاسترداد pendingDocumentsCount string ( int64 format) النتائج فقط. عدد المستندات في FileSearchStore التي تتم معالجتها failedDocumentsCount string ( int64 format) النتائج فقط. عدد المستندات في FileSearchStore التي تعذّر معالجتها sizeBytes string ( int64 format) النتائج فقط. حجم البايتات الأولية التي تمّ استيعابها في FileSearchStore هذا هو الحجم الإجمالي لجميع المستندات في FileSearchStore . تمثيل JSON { "name" : string , "displayName" : string , "createTime" : string , "updateTime" : string , "activeDocumentsCount" : string , "pendingDocumentsCount" : string , "failedDocumentsCount" : string , "sizeBytes" : string } إرسال ملاحظات إنّ محتوى هذه الصفحة مرخّص بموجب ترخيص Creative Commons Attribution 4.0‏ ما لم يُنصّ على خلاف ذلك، ونماذج الرموز مرخّصة بموجب ترخيص Apache 2.0‏ . للاطّلاع على التفاصيل، يُرجى مراجعة سياسات موقع Google Developers‏ . إنّ Java هي علامة تجارية مسجَّلة لشركة Oracle و/أو شركائها التابعين. تاريخ التعديل الأخير: 2026-01-12 (حسب التوقيت العالمي المتفَّق عليه) هل تريد مشاركة ملاحظاتك معنا؟ [[["يسهُل فهم المحتوى.","easyToUnderstand","thumb-up"],["ساعَدني المحتوى في حلّ مشكلتي.","solvedMyProblem","thumb-up"],["غير ذلك","otherUp","thumb-up"]],[["لا يحتوي على المعلومات التي أحتاج إليها.","missingTheInformationINeed","thumb-down"],["الخطوات معقدة للغاية / كثيرة جدًا.","tooComplicatedTooManySteps","thumb-down"],["المحتوى قديم.","outOfDate","thumb-down"],["ثمة مشكلة في الترجمة.","translationIssue","thumb-down"],["مشكلة في العيّنات / التعليمات البرمجية","samplesCodeIssue","thumb-down"],["غير ذلك","otherDown","thumb-down"]],["تاريخ التعديل الأخير: 2026-01-12 (حسب التوقيت العالمي المتفَّق عليه)"],[],[]] البنود الخصوصية Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:57
https://ai.google.dev/api/models#body.response_body
Models  |  Gemini API  |  Google AI for Developers Skip to main content / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 Get API key Cookbook Community Sign in Docs API reference Gemini API Docs API reference Get API key Cookbook Community Overview API versions Capabilities Models Generating content Live API Live Music API Interactions API Tokens Files Batch API Caching Embeddings File search File search stores Document All methods Deprecated PaLM (decomissioned) SDK references Python Go TypeScript Java C# Home Gemini API API reference Send feedback Models The models endpoint provides a way for you to programmatically list the available models, and retrieve extended metadata such as supported functionality and context window sizing. Read more in the Models guide . Method: models.get Endpoint Path parameters Request body Response body Authorization scopes Example request Get Gets information about a specific Model such as its version number, token limits, parameters and other metadata. Refer to the Gemini models guide for detailed model information. Endpoint get https: / /generativelanguage.googleapis.com /v1beta /{name=models /*} Path parameters name string Required. The resource name of the model. This name should match a model name returned by the models.list method. Format: models/{model} It takes the form models/{model} . Request body The request body must be empty. Example request Python from google import genai client = genai . Client () model_info = client . models . get ( model = "gemini-2.0-flash" ) print ( model_info ) models . py Go ctx := context . Background () client , err := genai . NewClient ( ctx , & genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } modelInfo , err := client . Models . Get ( ctx , "gemini-2.0-flash" , nil ) if err != nil { log . Fatal ( err ) } fmt . Println ( modelInfo ) models . go Shell curl https://generativelanguage.googleapis.com/v1beta/models/gemini-2.0-flash?key = $GEMINI_API_KEY models .sh Response body If successful, the response body contains an instance of Model . Method: models.list Endpoint Query parameters Request body Response body JSON representation Authorization scopes Example request List Lists the Model s available through the Gemini API. Endpoint get https: / /generativelanguage.googleapis.com /v1beta /models Query parameters pageSize integer The maximum number of Models to return (per page). If unspecified, 50 models will be returned per page. This method returns at most 1000 models per page, even if you pass a larger pageSize. pageToken string A page token, received from a previous models.list call. Provide the pageToken returned by one request as an argument to the next request to retrieve the next page. When paginating, all other parameters provided to models.list must match the call that provided the page token. Request body The request body must be empty. Example request Python from google import genai client = genai . Client () print ( "List of models that support generateContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "generateContent" : print ( m . name ) print ( "List of models that support embedContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "embedContent" : print ( m . name ) models . py Go ctx := context . Background () client , err := genai . NewClient ( ctx , & genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } // Retrieve the list of models. models , err := client . Models . List ( ctx , & genai . ListModelsConfig {}) if err != nil { log . Fatal ( err ) } fmt . Println ( "List of models that support generateContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "generateContent" { fmt . Println ( m . Name ) break } } } fmt . Println ( "\nList of models that support embedContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "embedContent" { fmt . Println ( m . Name ) break } } } models . go Shell curl https://generativelanguage.googleapis.com/v1beta/models?key = $GEMINI_API_KEY models .sh Response body Response from ListModel containing a paginated list of Models. If successful, the response body contains data with the following structure: Fields models[] object ( Model ) The returned Models. nextPageToken string A token, which can be sent as pageToken to retrieve the next page. If this field is omitted, there are no more pages. JSON representation { "models" : [ { object ( Model ) } ] , "nextPageToken" : string } REST Resource: models Resource: Model JSON representation Methods Resource: Model Information about a Generative Language Model. Fields name string Required. The resource name of the Model . Refer to Model variants for all allowed values. Format: models/{model} with a {model} naming convention of: "{baseModelId}-{version}" Examples: models/gemini-1.5-flash-001 baseModelId string Required. The name of the base model, pass this to the generation request. Examples: gemini-1.5-flash version string Required. The version number of the model. This represents the major version ( 1.0 or 1.5 ) displayName string The human-readable name of the model. E.g. "Gemini 1.5 Flash". The name can be up to 128 characters long and can consist of any UTF-8 characters. description string A short description of the model. inputTokenLimit integer Maximum number of input tokens allowed for this model. outputTokenLimit integer Maximum number of output tokens available for this model. supportedGenerationMethods[] string The model's supported generation methods. The corresponding API method names are defined as Pascal case strings, such as generateMessage and generateContent . thinking boolean Whether the model supports thinking. temperature number Controls the randomness of the output. Values can range over [0.0,maxTemperature] , inclusive. A higher value will produce responses that are more varied, while a value closer to 0.0 will typically result in less surprising responses from the model. This value specifies default to be used by the backend while making the call to the model. maxTemperature number The maximum temperature this model can use. topP number For Nucleus sampling . Nucleus sampling considers the smallest set of tokens whose probability sum is at least topP . This value specifies default to be used by the backend while making the call to the model. topK integer For Top-k sampling. Top-k sampling considers the set of topK most probable tokens. This value specifies default to be used by the backend while making the call to the model. If empty, indicates the model doesn't use top-k sampling, and topK isn't allowed as a generation parameter. JSON representation { "name" : string , "baseModelId" : string , "version" : string , "displayName" : string , "description" : string , "inputTokenLimit" : integer , "outputTokenLimit" : integer , "supportedGenerationMethods" : [ string ] , "thinking" : boolean , "temperature" : number , "maxTemperature" : number , "topP" : number , "topK" : integer } Method: models.predict Endpoint Path parameters Request body JSON representation Response body JSON representation Authorization scopes Performs a prediction request. Endpoint post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predict Path parameters model string Required. The name of the model for prediction. Format: name=models/{model} . It takes the form models/{model} . Request body The request body contains data with the following structure: Fields instances[] value ( Value format) Required. The instances that are the input to the prediction call. parameters value ( Value format) Optional. The parameters that govern the prediction call. Response body Response message for [PredictionService.Predict]. If successful, the response body contains data with the following structure: Fields predictions[] value ( Value format) The outputs of the prediction call. JSON representation { "predictions" : [ value ] } Method: models.predictLongRunning Endpoint Path parameters Request body JSON representation Response body Authorization scopes Same as models.predict but returns an LRO. Endpoint post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predictLongRunning Path parameters model string Required. The name of the model for prediction. Format: name=models/{model} . Request body The request body contains data with the following structure: Fields instances[] value ( Value format) Required. The instances that are the input to the prediction call. parameters value ( Value format) Optional. The parameters that govern the prediction call. Response body If successful, the response body contains an instance of Operation . Send feedback Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License , and code samples are licensed under the Apache 2.0 License . For details, see the Google Developers Site Policies . Java is a registered trademark of Oracle and/or its affiliates. Last updated 2025-10-30 UTC. Need to tell us more? [[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-10-30 UTC."],[],[]] Terms Privacy Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:57
https://play.google.com/store/apps/details?id=notion.id&hl=eu
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M12 17.27L18.
2026-01-13T09:29:57
https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.meta.com%2Fquest%2F&amp;h=AT3MRIqS8mu0fb6wZ6Wn5k84ViLP9OPpG2Xg1U7bz-C0RKcjrfRNu5y4l9mXi03uELTtRZkyI-ZJemhl8vMDlRBuoKWOB0NuMKjErluS7a9JPwveMhKYbpWbJxZtQIkMrBwvphwswNuClxBn
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:57
https://ai.google.dev/api/file-search/file-search-stores?hl=fa
File Search Stores &nbsp;|&nbsp; Gemini API &nbsp;|&nbsp; Google AI for Developers رد شدن و رفتن به محتوای اصلی / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 کلید API را دریافت کنید کتاب آشپزی انجمن ورود به برنامه اسناد مرجع API Gemini API اسناد مرجع API کلید API را دریافت کنید کتاب آشپزی انجمن نمای کلی نسخه های API قابلیت ها مدل ها تولید محتوا Live API Live Music API API تعاملات توکن ها فایل ها Batch API ذخیره سازی جاسازی‌ها جستجوی فایل فروشگاه‌های جستجوی فایل سند همه روش ها منسوخ پالم (از بین رفته) مراجع SDK Python Go TypeScript Java C# این صفحه به‌وسیله ‏Cloud Translation API‏ ترجمه شده است. صفحه اصلی Gemini API مرجع API ارسال بازخورد File Search Stores رابط برنامه‌نویسی کاربردی جستجوی فایل (File Search API) یک سرویس پاسخگویی به پرسش و پاسخ میزبانی‌شده برای ساخت سیستم‌های بازیابی افزوده نسل (RAG) با استفاده از زیرساخت گوگل ارائه می‌دهد. روش: media.uploadToFileSearchStore نقطه پایانی پارامترهای مسیر درخواست بدنه نمایش JSON بدنه پاسخ نمایش JSON داده‌ها را در FileSearchStore آپلود می‌کند، قبل از ذخیره آنها در یک سند FileSearchStore، پیش‌پردازش‌ها و تکه‌ها را انجام می‌دهد. نقطه پایانی آپلود URI، برای درخواست‌های آپلود رسانه: پست https: / /generativelanguage.googleapis.com /upload /v1beta /{fileSearchStoreName=fileSearchStores /*}:uploadToFileSearchStore آدرس URL فراداده، برای درخواست‌های فقط فراداده: پست https: / /generativelanguage.googleapis.com /v1beta /{fileSearchStoreName=fileSearchStores /*}:uploadToFileSearchStore پارامترهای مسیر string fileSearchStoreName اجباری. تغییرناپذیر. نام FileSearchStore که قرار است فایل در آن آپلود شود. مثال: fileSearchStores/my-file-search-store-123 این مقدار به شکل fileSearchStores/{filesearchstore} است. درخواست بدنه بدنه درخواست شامل داده‌هایی با ساختار زیر است: فیلدها string displayName اختیاری. نام سند ایجاد شده را نمایش می‌دهد. شیء customMetadata[] object ( CustomMetadata ) فراداده‌های سفارشی که باید با داده‌ها مرتبط شوند. شیء chunkingConfig object ( ChunkingConfig ) اختیاری. پیکربندی برای اطلاع‌رسانی به سرویس در مورد نحوه‌ی قطعه‌بندی داده‌ها. در صورت عدم ارائه، سرویس از پارامترهای پیش‌فرض استفاده خواهد کرد. string mimeType اختیاری. نوع MIME داده‌ها. در صورت عدم ارائه، از محتوای آپلود شده استنباط خواهد شد. بدنه پاسخ در صورت موفقیت، بدنه پاسخ شامل داده‌هایی با ساختار زیر است: فیلدها string name نام اختصاص داده شده توسط سرور، که فقط در همان سرویسی که در ابتدا آن را برمی‌گرداند، منحصر به فرد است. اگر از نگاشت پیش‌فرض HTTP استفاده می‌کنید، name باید نام منبعی باشد که به operations/{unique_id} ختم می‌شود. object metadata فراداده‌های مختص سرویس مرتبط با عملیات. معمولاً شامل اطلاعات پیشرفت و فراداده‌های رایج مانند زمان ایجاد است. برخی از سرویس‌ها ممکن است چنین فراداده‌ای را ارائه ندهند. هر متدی که یک عملیات طولانی مدت را برمی‌گرداند، باید نوع فراداده را، در صورت وجود، مستند کند. یک شیء حاوی فیلدهایی از نوع دلخواه. یک فیلد اضافی &quot;@type&quot; حاوی یک URI است که نوع را مشخص می‌کند. مثال: { &quot;id&quot;: 1234, &quot;@type&quot;: &quot;types.example.com/standard/id&quot; } . boolean done اگر مقدار آن false باشد، به این معنی است که عملیات هنوز در حال انجام است. اگر true ، عملیات تکمیل شده و error یا response در دسترس است. result Union type نتیجه عملیات، که می‌تواند یک error یا یک response معتبر باشد. اگر done == false باشد، نه error و نه response تنظیم نمی‌شوند. اگر done == true ، دقیقاً یکی از error یا response می‌تواند تنظیم شود. برخی از سرویس‌ها ممکن است نتیجه را ارائه ندهند. result فقط می‌تواند یکی از موارد زیر باشد: شیء error object ( Status ) نتیجه خطای عملیات در صورت عدم موفقیت یا لغو. object response پاسخ عادی و موفقیت‌آمیز عملیات. اگر متد اصلی هیچ داده‌ای مانند Delete در صورت موفقیت برنگرداند، پاسخ google.protobuf.Empty خواهد بود. اگر متد اصلی Get / Create / Update استاندارد باشد، پاسخ باید resource باشد. برای متدهای دیگر، پاسخ باید از نوع XxxResponse باشد، که در آن Xxx نام متد اصلی است. به عنوان مثال، اگر نام متد اصلی TakeSnapshot() باشد، نوع پاسخ استنباط شده TakeSnapshotResponse خواهد بود. یک شیء حاوی فیلدهایی از نوع دلخواه. یک فیلد اضافی &quot;@type&quot; حاوی یک URI است که نوع را مشخص می‌کند. مثال: { &quot;id&quot;: 1234, &quot;@type&quot;: &quot;types.example.com/standard/id&quot; } . نمایش JSON { "name" : string , "metadata" : { "@type" : string , field1 : ... , ... } , "done" : boolean , // result "error" : { object ( Status ) } , "response" : { "@type" : string , field1 : ... , ... } // Union type } روش: fileSearchStores.create نقطه پایانی درخواست بدنه بدنه پاسخ دامنه‌های مجوز یک FileSearchStore خالی ایجاد می‌کند. نقطه پایانی پست https: / /generativelanguage.googleapis.com /v1beta /fileSearchStores درخواست بدنه بدنه درخواست شامل نمونه‌ای از FileSearchStore است. فیلدها string displayName اختیاری. نام نمایشی قابل خواندن توسط انسان برای FileSearchStore . نام نمایشی نباید بیش از ۵۱۲ کاراکتر، شامل فاصله‌ها، باشد. مثال: &quot;Docs on Semantic Retriever&quot; بدنه پاسخ در صورت موفقیت، بدنه پاسخ شامل یک نمونه تازه ایجاد شده از FileSearchStore است. روش: fileSearchStores.delete نقطه پایانی پارامترهای مسیر پارامترهای پرس و جو درخواست بدنه بدنه پاسخ دامنه‌های مجوز یک FileSearchStore حذف می‌کند. نقطه پایانی حذف https: / /generativelanguage.googleapis.com /v1beta /{name=fileSearchStores /*} پارامترهای مسیر string name الزامی. نام منبع FileSearchStore . مثال: fileSearchStores/my-file-search-store-123 این مقدار به شکل fileSearchStores/{filesearchstore} است. پارامترهای پرس و جو force boolean اختیاری. اگر روی true تنظیم شود، هر Document و شیء مرتبط با این FileSearchStore نیز حذف خواهد شد. اگر مقدار آن false باشد (پیش‌فرض)، در صورتی که FileSearchStore حاوی هر نوع Document باشد، خطای FAILED_PRECONDITION برگردانده می‌شود. درخواست بدنه بدنه درخواست باید خالی باشد. بدنه پاسخ در صورت موفقیت، بدنه پاسخ یک شیء JSON خالی خواهد بود. روش: fileSearchStores.get نقطه پایانی پارامترهای مسیر درخواست بدنه بدنه پاسخ دامنه‌های مجوز اطلاعات مربوط به یک FileSearchStore خاص را دریافت می‌کند. نقطه پایانی دریافت https: / /generativelanguage.googleapis.com /v1beta /{name=fileSearchStores /*} پارامترهای مسیر string name الزامی. نام FileSearchStore . مثال: fileSearchStores/my-file-search-store-123 این تابع فرم fileSearchStores/{filesearchstore} را می‌گیرد. درخواست بدنه بدنه درخواست باید خالی باشد. بدنه پاسخ در صورت موفقیت، بدنه پاسخ شامل نمونه‌ای از FileSearchStore خواهد بود. روش: fileSearchStores.list نقطه پایانی پارامترهای پرس و جو درخواست بدنه بدنه پاسخ نمایش JSON دامنه‌های مجوز تمام FileSearchStores متعلق به کاربر را لیست می‌کند. نقطه پایانی دریافت https: / /generativelanguage.googleapis.com /v1beta /fileSearchStores پارامترهای پرس و جو integer pageSize اختیاری. حداکثر تعداد FileSearchStores برای برگرداندن (در هر صفحه). این سرویس ممکن است FileSearchStores کمتری برگرداند. اگر مشخص نشود، حداکثر ۱۰ FileSearchStores برگردانده خواهد شد. حداکثر اندازه مجاز ۲۰ FileSearchStores در هر صفحه است. string pageToken اختیاری. یک توکن صفحه، که از فراخوانی قبلی fileSearchStores.list دریافت شده است. nextPageToken برگردانده شده در پاسخ را به عنوان آرگومان برای درخواست بعدی جهت بازیابی صفحه بعدی ارائه دهید. هنگام صفحه‌بندی، تمام پارامترهای دیگر ارائه شده به fileSearchStores.list باید با فراخوانی که توکن صفحه را ارائه داده است، مطابقت داشته باشند. درخواست بدنه بدنه درخواست باید خالی باشد. بدنه پاسخ پاسخ از fileSearchStores.list حاوی لیست صفحه‌بندی‌شده‌ای از FileSearchStores . نتایج بر اساس fileSearchStore.create_time صعودی مرتب شده‌اند. در صورت موفقیت، بدنه پاسخ شامل داده‌هایی با ساختار زیر است: فیلدها شیء fileSearchStores[] object ( FileSearchStore ) پارچه‌های برگشتی. string nextPageToken یک توکن، که می‌تواند به عنوان pageToken برای بازیابی صفحه بعدی ارسال شود. اگر این فیلد حذف شود، صفحات بیشتری وجود نخواهد داشت. نمایش JSON { "fileSearchStores" : [ { object ( FileSearchStore ) } ] , "nextPageToken" : string } روش: fileSearchStores.importFile نقطه پایانی پارامترهای مسیر درخواست بدنه نمایش JSON بدنه پاسخ یک File از File Service به FileSearchStore وارد می‌کند. نقطه پایانی پست https: / /generativelanguage.googleapis.com /v1beta /{fileSearchStoreName=fileSearchStores /*}:importFile پارامترهای مسیر string fileSearchStoreName الزامی. تغییرناپذیر. نام FileSearchStore که قرار است فایل به آن وارد شود. مثال: fileSearchStores/my-file-search-store-123 این مقدار به شکل fileSearchStores/{filesearchstore} است. درخواست بدنه بدنه درخواست شامل داده‌هایی با ساختار زیر است: فیلدها string fileName الزامی. نام File که قرار است وارد شود. مثال: files/abc-123 شیء customMetadata[] object ( CustomMetadata ) فراداده‌های سفارشی که باید با فایل مرتبط شوند. شیء chunkingConfig object ( ChunkingConfig ) اختیاری. پیکربندی برای اینکه به سرویس بگویید چگونه فایل را تکه‌تکه کند. اگر ارائه نشود، سرویس از پارامترهای پیش‌فرض استفاده خواهد کرد. بدنه پاسخ در صورت موفقیت، بدنه پاسخ شامل نمونه‌ای از Operation است. منبع REST: fileSearchStores.operations منبع: عملیات نمایش JSON روش‌ها منبع: عملیات این منبع نشان دهنده یک عملیات طولانی مدت است که نتیجه یک فراخوانی API شبکه است. فیلدها string name نام اختصاص داده شده توسط سرور، که فقط در همان سرویسی که در ابتدا آن را برمی‌گرداند، منحصر به فرد است. اگر از نگاشت پیش‌فرض HTTP استفاده می‌کنید، name باید نام منبعی باشد که به operations/{unique_id} ختم می‌شود. object metadata فراداده‌های مختص سرویس مرتبط با عملیات. معمولاً شامل اطلاعات پیشرفت و فراداده‌های رایج مانند زمان ایجاد است. برخی از سرویس‌ها ممکن است چنین فراداده‌ای را ارائه ندهند. هر متدی که یک عملیات طولانی مدت را برمی‌گرداند، باید نوع فراداده را، در صورت وجود، مستند کند. یک شیء حاوی فیلدهایی از نوع دلخواه. یک فیلد اضافی &quot;@type&quot; حاوی یک URI است که نوع را مشخص می‌کند. مثال: { &quot;id&quot;: 1234, &quot;@type&quot;: &quot;types.example.com/standard/id&quot; } . boolean done اگر مقدار آن false باشد، به این معنی است که عملیات هنوز در حال انجام است. اگر true ، عملیات تکمیل شده و error یا response در دسترس است. result Union type نتیجه عملیات، که می‌تواند یک error یا یک response معتبر باشد. اگر done == false باشد، نه error و نه response تنظیم نمی‌شوند. اگر done == true ، دقیقاً یکی از error یا response می‌تواند تنظیم شود. برخی از سرویس‌ها ممکن است نتیجه را ارائه ندهند. result فقط می‌تواند یکی از موارد زیر باشد: شیء error object ( Status ) نتیجه خطای عملیات در صورت عدم موفقیت یا لغو. object response پاسخ عادی و موفقیت‌آمیز عملیات. اگر متد اصلی هیچ داده‌ای مانند Delete در صورت موفقیت برنگرداند، پاسخ google.protobuf.Empty خواهد بود. اگر متد اصلی Get / Create / Update استاندارد باشد، پاسخ باید resource باشد. برای متدهای دیگر، پاسخ باید از نوع XxxResponse باشد، که در آن Xxx نام متد اصلی است. به عنوان مثال، اگر نام متد اصلی TakeSnapshot() باشد، نوع پاسخ استنباط شده TakeSnapshotResponse خواهد بود. یک شیء حاوی فیلدهایی از نوع دلخواه. یک فیلد اضافی &quot;@type&quot; حاوی یک URI است که نوع را مشخص می‌کند. مثال: { &quot;id&quot;: 1234, &quot;@type&quot;: &quot;types.example.com/standard/id&quot; } . نمایش JSON { "name" : string , "metadata" : { "@type" : string , field1 : ... , ... } , "done" : boolean , // result "error" : { object ( Status ) } , "response" : { "@type" : string , field1 : ... , ... } // Union type } روش: fileSearchStores.operations.get نقطه پایانی پارامترهای مسیر درخواست بدنه بدنه پاسخ دامنه‌های مجوز آخرین وضعیت یک عملیات طولانی مدت را دریافت می‌کند. کلاینت‌ها می‌توانند از این متد برای نظرسنجی از نتیجه عملیات در فواصل زمانی توصیه شده توسط سرویس API استفاده کنند. نقطه پایانی دریافت https: / /generativelanguage.googleapis.com /v1beta /{name=fileSearchStores /* /operations /*} پارامترهای مسیر string name نام منبع عملیات. این منبع شکلی به صورت fileSearchStores/{filesearchstore}/operations/{operation} ‎ دارد. درخواست بدنه بدنه درخواست باید خالی باشد. بدنه پاسخ در صورت موفقیت، بدنه پاسخ شامل نمونه‌ای از Operation است. منبع REST: fileSearchStores.upload.operations منبع: عملیات نمایش JSON روش‌ها منبع: عملیات این منبع نشان دهنده یک عملیات طولانی مدت است که نتیجه یک فراخوانی API شبکه است. فیلدها string name نام اختصاص داده شده توسط سرور، که فقط در همان سرویسی که در ابتدا آن را برمی‌گرداند، منحصر به فرد است. اگر از نگاشت پیش‌فرض HTTP استفاده می‌کنید، name باید نام منبعی باشد که به operations/{unique_id} ختم می‌شود. object metadata فراداده‌های مختص سرویس مرتبط با عملیات. معمولاً شامل اطلاعات پیشرفت و فراداده‌های رایج مانند زمان ایجاد است. برخی از سرویس‌ها ممکن است چنین فراداده‌ای را ارائه ندهند. هر متدی که یک عملیات طولانی مدت را برمی‌گرداند، باید نوع فراداده را، در صورت وجود، مستند کند. یک شیء حاوی فیلدهایی از نوع دلخواه. یک فیلد اضافی &quot;@type&quot; حاوی یک URI است که نوع را مشخص می‌کند. مثال: { &quot;id&quot;: 1234, &quot;@type&quot;: &quot;types.example.com/standard/id&quot; } . boolean done اگر مقدار آن false باشد، به این معنی است که عملیات هنوز در حال انجام است. اگر true ، عملیات تکمیل شده و error یا response در دسترس است. result Union type نتیجه عملیات، که می‌تواند یک error یا یک response معتبر باشد. اگر done == false باشد، نه error و نه response تنظیم نمی‌شوند. اگر done == true ، دقیقاً یکی از error یا response می‌تواند تنظیم شود. برخی از سرویس‌ها ممکن است نتیجه را ارائه ندهند. result فقط می‌تواند یکی از موارد زیر باشد: شیء error object ( Status ) نتیجه خطای عملیات در صورت عدم موفقیت یا لغو. object response پاسخ عادی و موفقیت‌آمیز عملیات. اگر متد اصلی هیچ داده‌ای مانند Delete در صورت موفقیت برنگرداند، پاسخ google.protobuf.Empty خواهد بود. اگر متد اصلی Get / Create / Update استاندارد باشد، پاسخ باید resource باشد. برای متدهای دیگر، پاسخ باید از نوع XxxResponse باشد، که در آن Xxx نام متد اصلی است. به عنوان مثال، اگر نام متد اصلی TakeSnapshot() باشد، نوع پاسخ استنباط شده TakeSnapshotResponse خواهد بود. یک شیء حاوی فیلدهایی از نوع دلخواه. یک فیلد اضافی &quot;@type&quot; حاوی یک URI است که نوع را مشخص می‌کند. مثال: { &quot;id&quot;: 1234, &quot;@type&quot;: &quot;types.example.com/standard/id&quot; } . نمایش JSON { "name" : string , "metadata" : { "@type" : string , field1 : ... , ... } , "done" : boolean , // result "error" : { object ( Status ) } , "response" : { "@type" : string , field1 : ... , ... } // Union type } روش: fileSearchStores.upload.operations.get نقطه پایانی پارامترهای مسیر درخواست بدنه بدنه پاسخ دامنه‌های مجوز آخرین وضعیت یک عملیات طولانی مدت را دریافت می‌کند. کلاینت‌ها می‌توانند از این متد برای نظرسنجی از نتیجه عملیات در فواصل زمانی توصیه شده توسط سرویس API استفاده کنند. نقطه پایانی دریافت https: / /generativelanguage.googleapis.com /v1beta /{name=fileSearchStores /* /upload /operations /*} پارامترهای مسیر string name نام منبع عملیات. این منبع فرم fileSearchStores/{filesearchstore}/upload/operations/{operation} را می‌گیرد. درخواست بدنه بدنه درخواست باید خالی باشد. بدنه پاسخ در صورت موفقیت، بدنه پاسخ شامل نمونه‌ای از Operation است. منبع REST: fileSearchStores منبع: FileSearchStore نمایش JSON روش‌ها منبع: FileSearchStore یک FileSearchStore مجموعه‌ای از Document است. فیلدها string name فقط خروجی. تغییرناپذیر. شناسه. نام منبع FileSearchStore . این یک شناسه است (نامی به جز پیشوند &quot;fileSearchStores/&quot;) که می‌تواند تا ۴۰ کاراکتر حروف کوچک و عددی یا خط تیره (-) داشته باشد. این فقط خروجی است. نام منحصر به فرد از displayName به همراه یک پسوند تصادفی ۱۲ کاراکتری گرفته می‌شود. مثال: fileSearchStores/my-awesome-file-search-store-123a456b789c اگر displayName ارائه نشود، نام به طور تصادفی تولید می‌شود. string displayName اختیاری. نام نمایشی قابل خواندن توسط انسان برای FileSearchStore . نام نمایشی نباید بیش از ۵۱۲ کاراکتر، شامل فاصله‌ها، باشد. مثال: &quot;Docs on Semantic Retriever&quot; رشته‌ی createTime string ( Timestamp format) فقط خروجی. مهر زمانیِ ایجاد FileSearchStore . از RFC 3339 استفاده می‌کند، که در آن خروجی تولید شده همیشه به صورت Z-normalized خواهد بود و از ارقام کسری ۰، ۳، ۶ یا ۹ استفاده می‌کند. آفست‌های غیر از &quot;Z&quot; نیز پذیرفته می‌شوند. مثال‌ها: &quot;2014-10-02T15:01:23Z&quot; ، &quot;2014-10-02T15:01:23.045123456Z&quot; یا &quot;2014-10-02T15:01:23+05:30&quot; . رشته updateTime string ( Timestamp format) فقط خروجی. مهر زمانی آخرین به‌روزرسانی FileSearchStore . از RFC 3339 استفاده می‌کند، که در آن خروجی تولید شده همیشه به صورت Z-normalized خواهد بود و از ارقام کسری ۰، ۳، ۶ یا ۹ استفاده می‌کند. آفست‌های غیر از &quot;Z&quot; نیز پذیرفته می‌شوند. مثال‌ها: &quot;2014-10-02T15:01:23Z&quot; ، &quot;2014-10-02T15:01:23.045123456Z&quot; یا &quot;2014-10-02T15:01:23+05:30&quot; . رشته‌ی activeDocumentsCount string ( int64 format) فقط خروجی. تعداد اسناد موجود در FileSearchStore که فعال و آماده بازیابی هستند. string ( int64 format) pendingDocumentsCount (با فرمت int64) فقط خروجی. تعداد اسناد موجود در FileSearchStore که در حال پردازش هستند. رشته failedDocumentsCount string ( int64 format) فقط خروجی. تعداد اسناد موجود در FileSearchStore که پردازش آنها با شکست مواجه شده است. رشته sizeBytes string ( int64 format) فقط خروجی. اندازه بایت‌های خام وارد شده به FileSearchStore . این اندازه کل تمام اسناد موجود در FileSearchStore است. نمایش JSON { "name" : string , "displayName" : string , "createTime" : string , "updateTime" : string , "activeDocumentsCount" : string , "pendingDocumentsCount" : string , "failedDocumentsCount" : string , "sizeBytes" : string } ارسال بازخورد جز در مواردی که غیر از این ذکر شده باشد،‌محتوای این صفحه تحت مجوز Creative Commons Attribution 4.0 License است. نمونه کدها نیز دارای مجوز Apache 2.0 License است. برای اطلاع از جزئیات، به خطمشی‌های سایت Google Developers‏ مراجعه کنید. جاوا علامت تجاری ثبت‌شده Oracle و/یا شرکت‌های وابسته به آن است. تاریخ آخرین به‌روزرسانی 2026-01-12 به‌وقت ساعت هماهنگ جهانی. می‌خواهید موارد بیشتری را با ما درمیان بگذارید؟ [[["درک آسان","easyToUnderstand","thumb-up"],["مشکلم را برطرف کرد","solvedMyProblem","thumb-up"],["غیره","otherUp","thumb-up"]],[["اطلاعاتی که نیاز دارم وجود ندارد","missingTheInformationINeed","thumb-down"],["بیش‌ازحد پیچیده/ مراحل بسیار زیاد","tooComplicatedTooManySteps","thumb-down"],["قدیمی","outOfDate","thumb-down"],["مشکل ترجمه","translationIssue","thumb-down"],["مشکل کد / نمونه‌ها","samplesCodeIssue","thumb-down"],["غیره","otherDown","thumb-down"]],["تاریخ آخرین به‌روزرسانی 2026-01-12 به‌وقت ساعت هماهنگ جهانی."],[],[]] شرایط حریم خصوصی Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:57
https://ko-kr.facebook.com/login/?next=https%3A%2F%2Fl.facebook.com%2Fl.php%3Fu%3Dhttps%253A%252F%252Fwww.threads.com%252F%26amp%253Bh%3DAT3GHcxzy3_hwgabrQGILAdFg5-sY2UF3NnqPPcszvftFRFkOTEfGUk-rwMDXeNUDholnd7i3yKnlJRQZJRlzh6bTHGOy_AwXAON6FXI3F9Ps5p79OpOuIqxrhg60Qd00lf219tJ000sSHdA
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:57
https://th-th.facebook.com/login/?next=https%3A%2F%2Fwww.facebook.com%2Fshare_channel%2F%3Ftype%3Dreshare%26link%3Dhttps%253A%252F%252Faws.amazon.com%252Fblogs%252Fmachine-learning%252Fbuild-an-ai-powered-website-assistant-with-amazon-bedrock%252F%26app_id%3D966242223397117%26source_surface%3Dexternal_reshare%26display%26hashtag
Facebook Facebook อีเมลหรือโทรศัพท์ รหัสผ่าน ลืมบัญชีใช่หรือไม่ สร้างบัญชีใหม่ คุณถูกบล็อกชั่วคราว คุณถูกบล็อกชั่วคราว ดูเหมือนว่าคุณจะใช้คุณสมบัตินี้ในทางที่ผิดโดยการใช้เร็วเกินไป คุณถูกบล็อกจากการใช้โดยชั่วคราว Back ภาษาไทย 한국어 English (US) Tiếng Việt Bahasa Indonesia Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch สมัคร เข้าสู่ระบบ Messenger Facebook Lite วิดีโอ Meta Pay Meta Store Meta Quest Ray-Ban Meta Meta AI เนื้อหาเพิ่มเติมจาก Meta AI Instagram Threads ศูนย์ข้อมูลการลงคะแนนเสียง นโยบายความเป็นส่วนตัว ศูนย์ความเป็นส่วนตัว เกี่ยวกับ สร้างโฆษณา สร้างเพจ ผู้พัฒนา ร่วมงานกับ Facebook คุกกี้ ตัวเลือกโฆษณา เงื่อนไข ความช่วยเหลือ การอัพโหลดผู้ติดต่อและผู้ที่ไม่ได้ใช้บริการ การตั้งค่า บันทึกกิจกรรม Meta © 2026
2026-01-13T09:29:57
https://akismet.com/developers/detailed-docs/errors/
Response error codes &#8211; Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Getting started Plugins and libraries Detailed docs Building your application Key verification Comment check Submit spam (missed&nbsp;spam) Submit ham (false&nbsp;positives) Key/sites activity Usage limit Response error codes Akismet Error #10001 Akismet Error #10003 Akismet Error #10402 Akismet Error #10011 Akismet Error #10010 Akismet Error #10009 Akismet Error #10006 Akismet Error #10005 Akismet Error #10404 Akismet Error #10403 Akismet Error #30001 Response error codes Akismet API response errors Learn about the different statuses and error messages An API response may include an error code in the X-akismet-alert-code header. It is always accompanied by a X-akismet-alert-msg header containing a message describing the error that can be shown to the end user, but the list below includes all of the currently active error codes for reference. 10001 Your site is using an expired Yahoo! Small Business API key. 10003 You must upgrade your Personal subscription to continue using Akismet. 10005 Your Akismet API key may be in use by someone else. 10006 Your subscription has been suspended due to improper use. 10009 Your subscription has been suspended due to overuse. 10010 Your subscription has been suspended due to inappropriate use. 10011 Your subscription needs to be upgraded due to high usage. 10402 Your API key was suspended for non-payment. 10403 The owner of your API key has revoked your site&#8217;s access to the key. 10404 Your site was not found in the list of sites allowed to use the API key you used. 30001 Your Personal subscription needs to be upgraded based on your usage. Can we help with anything else? I need to update my credit card. I forgot my API key. I need to reset my password. I need to cancel my subscription. Priority support Want to get help even faster? Don&#8217;t forget that our Pro subscription includes priority email support. Related Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:57
https://addons.mozilla.org/de/firefox/user/18674047/
Benutzerprofil von Hugvan – Add-ons für Firefox (de) Um diese Add-ons zu verwenden, müssen Sie Firefox herunterladen. Diesen Hinweis verwerfen Add-ons für den Firefox-Browser Erweiterungen Themes Mehr… für Firefox Wörterbücher &amp; Sprachpakete Andere Browser-Seiten Add-ons für Android Anmelden Suchen Suchen Hugvan Diesen Benutzer melden Erweiterungen von Hugvan Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Themes von Hugvan Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Es liegen noch keine Bewertungen vor Zur Mozilla-Startseite gehen Add-ons Über Firefox-Add-ons-Blog Erweiterungs-Workshop Entwickler-Zentrum Regeln für Entwickler Blog der Gemeinschaft Forum Einen Fehler melden Bewertungsleitfaden Browser Desktop Mobile Enterprise Produkte Browsers VPN Relay Monitor Pocket Bluesky (@firefox.com) Instagram (Firefox) YouTube (firefoxchannel) Datenschutz Cookies Rechtliches Sofern nicht anders vermerkt , steht der Inhalt dieser Seite unter der Creative Commons Attribution Share-Alike License v3.0 oder einer späteren Version. Sprache ändern Čeština Deutsch Dolnoserbšćina Ελληνικά English (Canadian) English (British) English (US) Español (de Argentina) Español (de Chile) Español (de España) Español (de México) suomi Français Furlan Frysk עברית Hrvatski Hornjoserbsce magyar Interlingua Italiano 日本語 ქართული Taqbaylit 한국어 Norsk bokmål Nederlands Norsk nynorsk Polski Português (do Brasil) Português (Europeu) Română Русский slovenčina Slovenščina Shqip Svenska Türkçe Українська Tiếng Việt 中文 (简体) 正體中文 (繁體)
2026-01-13T09:29:57
https://www.cisco.com/site/us/en/about/purpose/fy24-report/index.html#bar_short
FY24 Purpose Report - Cisco Skip to main content Skip to search Skip to footer Cisco.com Worldwide Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Trials and demos How to buy Partners EN US Profile Log in Trials and demos MENU CLOSE How to buy Partners Profile Log in EN US Close Close Close Close Close Hello, how can I help? About Purpose Power an Inclusive Future for All FY24 Purpose Report Celebrating 40 Years of Impact Driven by our Purpose, we combine our technology, people, and broader networks to address society&#39;s greatest challenges. We share the progress we&#39;ve made in our annual report. FY24 Purpose Report (PDF) Overview Explore the Report Looking Ahead FY24 Purpose Report 40 Years of Impact We built the digital highways that have become the backbone for modern communication. Now, we’re harnessing the power of connection to build a better future for people, communities, and the planet. For 40 years, connection has been core to Cisco’s identity. At Cisco, we’re proud of how our products and services bridge gaps, enable collaboration, and drive sustainability in meaningful ways. We prove every day that running a successful business with a commitment to do good makes progress possible. Letter from the CEO Our Timeline of Impact 1984 Cisco Systems, Inc Developed by Sandy Lerner and Leonard Bosack with a team of colleagues at Stanford University, the multiprotocol router connected disparate computer networks, leading to Cisco’s founding. 1997 Cisco Networking Academy Launched to educate high school and college students on how to design, install, and maintain computer networks. 1997 Cisco Foundation Established to support programs that leverage the Internet to help people in need and drive positive change. 1998 Cisco Community Investment Report Published report detailing Cisco’s philanthropic and community investment efforts. 1999 NetAid Harnessed the Internet to raise US$830K to end global poverty. By live-streaming celebrated musicians across three locations, NetAid garnered 2.4M views across 80 countries and set a record for the largest Internet broadcast event for a single day. 2000 Habitat for Humanity Provided funding and volunteer support to build homes and wire houses for Internet access. 2005 Corporate Citizenship Report Made a formal commitment to transparency and accountability by publishing details on Cisco&#39;s Corporate Social Responsibility efforts. 2005 Crisis Response Deployed communications equipment to assist emergency personnel in the aftermath of Hurricane Katrina and formed a dedicated emergency response team. 2006 Goal to Reduce Emissions Set our first greenhouse gas emissions reduction goal. 2011 Veterans Program Established program to help transitioning U.S. military veterans and families find employment and educational opportunities. 2011 On-Campus Solar Energy Installed first solar energy project at Cisco&#39;s Research Triangle Park campus. 2012 Global Human Rights Policy Formalized our commitment to respect human rights for all people. 2014 Talos Formed to provide accurate, rapid, and actionable threat intelligence for Cisco customers, products, and services. 2015 Country Digital Acceleration Launched program to collaborate with government and private sector leaders in building sustainable, secure, and inclusive communities. 2016 White House Equal Pay Pledge Became a founding signer of the White House Equal Pay Pledge and committed to paying employees fairly and equitably. 2018 Homelessness Grant Announced a five-year, US$50M commitment to end homelessness in Santa Clara County. 2019 Global Citizen Announced a partnership with Global Citizen to power the movement to end extreme poverty. 2020 Community Enablement Commitment Transformed longstanding advocacy for community enablement into a global, company-wide commitment. 2020 COVID-19 Response Introduced $2.5B financing program to support customers and keep businesses running; donated US$50M in cash and personal protective equipment (PPE) to organizations supporting vulnerable citizens; and provided funding to deploy COVID-19-related technology solutions. 2021 Cisco Foundation Climate Commitment Committed US$100M over the next 10 years to address climate change. 2021 Net Zero Announced a goal to reach net-zero greenhouse gas emissions across our value chain by 2040. 2022 Responsible AI Launched our Responsible AI (RAI) Principles and RAI Framework to formalize our commitment to build safe and trustworthy AI. 2023 One Billion Lives Exceeded our goal—ahead of schedule—to positively impact one billion people globally from FY16-FY23 through Cisco Networking Academy and social innovation grants. 2024 40 Communities Announcing our next big ambition: over the next 10 years, we plan to engage, support, and invest in 40 communities around the globe. Previous Next Explore this year’s report View all Power Power We build and deliver technology that powers the world’s connectivity, whether that’s between computers, throughout communities, or across continents. And we do so with the highest standards of ethics and integrity in mind—for ourselves, for our customers and partners, and for their users. That’s the power, and importance, of connection. Explore the Power section  0 1600 Active, completed, or in-pipeline projects across 50 countries through Country Digital Acceleration 0 B 800 billion Security events observed each day by Cisco Talos, protecting the world against cyber threats 0 27 Languages available for stakeholders to use Cisco’s EthicsLine 0 % 99.9% Of employees completed our annual Code of Business Conduct certification Featured Stories Connectivity in the Amazon The first floating Networking Academy provides free WiFi within a 30-meter radius, offers IT training, and promotes digital inclusion for communities. Responsible Mineral Sourcing We joined the Initiative for Responsible Mining Assurance to support the visibility, accountability, and inclusion of rightsholders as decision-makers at all levels of the mineral supply chain. Show more Inclusive Inclusive We’re recognized as one of the world’s best workplaces, and we have an unrelenting focus on employee wellbeing, benefits, giving, and inclusion. We strive to create the best possible employee experience, because we know our greatest asset is our people. Explore the Inclusive section  0 % 86% Employees participated in community impact efforts through donations, volunteering, and more 0 720,000 Volunteer hours logged by employees Launched BridgeIT, a Cisco Enterprise Chat AI, to intelligently guide employees and help them work faster, safer, and smarter 0 31 Inclusive Communities with 335 chapters across 77 countries Featured Stories Native American Network Cisco’s Native American Network deployed 18 sovereign broadband access points on Zuni tribal lands in New Mexico to help close the digital divide. Wellbeing in Technology The &#34;WellNest&#34; on Webex pilot supports physical, mental, social, and financial wellbeing through an intuitive AI-powered platform. Show more Future Future Cisco has been committed to reducing its environmental impact for nearly two decades, but there’s more to be done as we work toward a regenerative future. Our sustainability strategy, the Plan for Possible, guides us as we build our products, accelerate clean energy access, support suppliers’ reduced environmental impacts, and foster climate resiliency in communities. Explore the Future section  0 % 96% Of electricity for Cisco facilities came from renewable sources 0 % 73% Reduction in Scope 1 and 2 emissions FY25 goal: 90% reduction 0 % 75% Of the waste generated at our facilities was diverted from landfill globally 0 % 96% Of new Cisco products and packaging incorporate Circular Design Principles FY25 goal: 100% meeting circular design criteria Featured Stories Connected Conservation Cisco donated Cisco Meraki routers to African Parks to help them harness reliable Internet technology. Cisco Refresh We provide a second life to our products and reduce waste through the Cisco Refresh program, and we provide discounts to businesses joining the circular economy. Show more For All For All Through our technology, our people, and our broader networks, we create solutions that help address the world’s most critical challenges—from the AI skills gap to social inequities to environmental crises. We continue to show up to create a better future for all, by all, with all stakeholders who share our vision. Explore the For All section 0 M 24 million Cisco Networking Academy students since 1997 0 &#43; 30 plus Natural disasters and humanitarian crises responded to by Cisco Crisis Response $ 0 M USD 35 million US dollars Approved to fund climate solutions through the Cisco Foundation since FY21 $ 0 B USD 1.5 billion US dollars In Title IV Federal Funding that we helped preserve for HBCUs since FY20 Featured Stories Women Rock-IT Women Rock-IT celebrated 10 years, and their annual International Girls in ICT day programming reached 1.2 million on social media. Impact in India Cisco partners with NGOs and government agencies in India to create technology-based solutions that support critical human needs. View all Looking Ahead To celebrate our 40th year, we’re looking ahead to our future with Splunk and how we can drive even greater success for our customers, partners, employees, and communities together. There’s no better way to celebrate our anniversary than setting our next big ambition to propel us into the future. Learn more from Chief People, Policy &amp; Purpose Officer Fran Katsoudas on what’s next for Cisco’s Purpose work. Explore “Looking Ahead” 40 Years of Impact Power an Inclusive Future for All Driven by our Purpose, we combine our technology, people, and broader networks to address society&#39;s greatest challenges. We share the progress we&#39;ve made in our annual report. FY24 Purpose Report (PDF) Purpose Reporting Hub Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Cookies / Do not sell or share my personal data Accessibility Trademarks Supply Chain Transparency Newsroom Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:57
https://akismet.com/developers/detailed-docs/errors/akismet-error-10001/
Akismet Error #10001 &#8211; Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Getting started Plugins and libraries Detailed docs Building your application Key verification Comment check Submit spam (missed&nbsp;spam) Submit ham (false&nbsp;positives) Key/sites activity Usage limit Response error codes Akismet Error #10001 Akismet Error #10003 Akismet Error #10402 Akismet Error #10011 Akismet Error #10010 Akismet Error #10009 Akismet Error #10006 Akismet Error #10005 Akismet Error #10404 Akismet Error #10403 Akismet Error #30001 Akismet Error #10001 Your site is using an expired Yahoo! Small Business API key. Akismet Error #10001 Why am I receiving this error? Your web host, Yahoo! Small Business, has decided to cancel its Akismet subscription. This means that its API key, which was used to automatically activate the plugin on your site, will soon stop working. To keep your site protected from comment spam, you are encouraged to&nbsp; register a new Akismet subscription . But I never used to pay for Akismet. Yahoo!’s API key automatically activated the plugin for you. Unfortunately, Yahoo! has chosen to cancel this subscription and will no longer provide the service to its customers. Do I qualify for a free key? Akismet is only free for personal use. If your site is designed around a business, or promotes commercial products or services, you will need a Pro subscription. Business and Enterprise plans are also available. All paid subscriptions also enjoy  priority support . I think I already have an API Key. How can I check? You can enter your email address and submit the form&nbsp; here . You may also&nbsp; get in touch with us , and we will be happy to take a look. Can I just de-activate the Akismet plugin? Yes. To deactivate the Akismet plugin, go to the Plugins menu in your WordPress dashboard and click on the &#8216;Deactivate&#8217; link found directly under &#8216;Akismet.&#8217; Please note that your site will then be left completely unprotected from comment spam, which is not recommended. Ready to get started?&nbsp; Check out our available plans , and kiss that spam goodbye! Can we help with anything else? I need to update my credit card. I forgot my API key. I need to reset my password. I need to cancel my subscription. Priority support Want to get help even faster? Don&#8217;t forget that our Pro subscription includes priority email support. Related Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:57
https://www.cisco.com/site/ae/en/solutions/service-provider/index.html
Cisco Networking for Service Providers - Cisco Skip to main content Skip to search Skip to footer Cisco.com Middle East Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Explore Cisco How to buy Partners EN AE Log in Explore Cisco Search MENU CLOSE How to buy Partners Log in EN AE Close Close Close Close Close Hello, how can I help? Hello, how can I help? Solutions Networking for service providers Boost profit potential and scale service delivery Unlock new revenue and cut costs with simplified networking building blocks, AI-powered automation, and data-driven assurance to grow your business. See what&#39;s new Overview Smarter networks. Greater value. Reduce complexity, drive new revenue, and secure your network with smarter, data-driven solutions. Simplify networking and operations Reduce costs by converging network layers to simplify operations and topology, minimize risk, and lower consumption of power, space, and cooling. Accelerate service delivery Leverage deep network insight to optimize your infrastructure so you can monetize AI, 5G, and IoT services—and deliver the performance and innovation customers demand. Deliver secure, resilient experiences Gain observability and security with data-driven insights, real-time visibility, and end-to-end protection across your owned and unowned networks. Cisco Agile Services Networking Power AI connectivity and customer experiences with Agile Services Networking. Monetize assured services and networks, simplify by converging network layers and services, and ensure resilient experiences using AI-powered automation, observability, and security across all networks. Get started Watch video (01:47) Advanced solutions for service providers Discover new revenue opportunities and reduce costs with solutions that deliver unmatched simplicity, resilience, and scale for service providers. Cisco Routed Optical Networking Converge IP and optical layers for scalable, efficient, and reliable connectivity—while reducing CapEx, energy costs, and operational complexity. Explore Routed Optical Networking Cisco Routed PON Eliminate separate OLT chassis and deliver agile, scalable broadband services with greater efficiency and operational simplicity. Explore Routed PON Cisco Mobility Services Platform Accelerate 5G and IoT deployments. Deliver enterprise-ready mobility solutions with immediate revenue potential. Explore Mobility Services Platform What our customers are saying One simplified network. 90% less power. &#34;We partnered with Cisco, using their architecture end-to-end, implementing Silicon One-based 8000 Series Routers, which perfectly aligned with our sustainability and business goals. In our journey so far, we have been able to converge 20 MPLS networks into one SRv6 network with an astounding 90% reduction in power.&#34; Markus Reber, Executive Vice President of Networks Swisscom  Watch now (01:34) Greater control, efficiency, and energy savings with Cisco &#34;It&#39;s fair to say in the market everybody has their moment of glory. What is interesting with Cisco is that the moment comes again and again. We saw Silicon One come out together with RON, which allowed us to keep growing, to keep improving. We are partnering with Cisco and that&#39;s the game changer.&#34; Bart Janssens, Senior Specialist, Packet Architecture Colt Read Colt story Watch now (03:08) Top-tier, resilient network experiences &#34;Our challenge was in ensuring detailed and proactive network performance monitoring across multiple network domains while maintaining high levels of end-to-end resiliency and throughput to prevent any disruption in the digital experience. Cisco had the perfect solution due to their ability to provide real-time and end-to-end visibility.&#34; Yasser Alkholaif, Transport Operations Director stc group Read stc story Two like-minded organizations when it comes to sustainability &#34;I am very proud of the partnership as it enables us to connect sustainability with the performance of our network and deliver new value for our customers. Staying ahead of the game means we will be able to solve new challenges for our customers, today.&#34; Iskra Nikolova, Network and Infrastructure Executive Telstra Watch now (01:32) Previous Next Networking solutions for resilient experiences Routing and switching platforms Cisco 8000 Series Routers Deliver scale and performance for metro, core, and data center networks with Silicon One-based platforms built for AI-ready connectivity. Explore 8000 Series Routers Cisco ASR 9000 Series Support application performance and power your services with rich edge routing features at scale. Explore ASR 9000 Series Cisco NCS 5700 Series Scale with high-density 400G routers for long-term growth and segment routing for SLA-based services. Explore NCS 5700 Series Cisco NCS 5500 Series Handle massive traffic growth with 100G and 400G density, streamline operations, and reduce energy use to scale efficiently and sustainably. Explore NCS 5500 Series Cisco NCS 500 Series Simplify your access network with secure, compact, and programmable routers that converge services for access use cases. Explore NCS 500 Series See all products and solutions Automation and assurance Crosswork Network Automation Reduce complexity with an AI-powered automation platform that streamlines operations and enhances service delivery at scale. Explore Crosswork Network Automation Provider Connectivity Assurance Get granular visibility and insights across multivendor, multilayer, and multidomain networks to deliver exceptional digital experiences. Explore Provider Connectivity Assurance ThousandEyes Assure every digital experience across home, enterprise, cloud, internet, and SaaS environments. Explore ThousandEyes Splunk Drive digital resilience with unified observability and use AIOps to detect, monitor, and resolve issues quickly. Explore Splunk See all products and solutions Optics and optical networking Optics Get the highest quality, performance-leading optical and coherent transceivers for any network architecture. Explore optics Optical networking solutions Maximize fiber capacity with open optical line systems and transponder solutions for DCI, metro, long-haul, and subsea transport. See optical networking solutions See all products and solutions Provider mobility Mobility Services Platform Connect people and things with a single platform that delivers fast, secure private 5G and flexible public 5G services wherever customers need them, without proprietary limits. Explore Mobility Services Platform See all products and solutions Cisco Silicon One Cisco Silicon One Build high-performance networks with a unified silicon architecture that delivers unmatched bandwidth, routing, and switching capabilities at scale. Explore Cisco Silicon One See all products and solutions Security Cisco DDoS Edge Protection Protect your network by using access, aggregation, and peering routers at the edge to block disruptive traffic. Explore DDoS Edge Protection See all products and solutions Sustainability solutions Accelerated sustainability goals Deliver network services at scale while managing energy costs and reducing emissions to meet corporate and regulatory demands. Take the next step See all products and solutions Flexible deployment, optimized growth Cisco Capital Get the Cisco technology you need to transform, simplify, and grow with flexible payment options. Learn more about our payment options Cisco Services Get the full value of your IT investment faster with Cisco Customer Experience (CX). Learn about Cisco Services Sustainability investments Transform your network and join Cisco on the journey to a sustainable and inclusive future. Learn about lifecycle management programs Contact us Evolving IP Network Architecture for the AI Era Discover drivers and opportunities for building smarter, simplified, and scalable IP networks in this analyst research paper from Omdia. Get white paper Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Statement Cookies Trademarks Supply Chain Transparency Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:57
https://l.facebook.com/l.php?u=https%3A%2F%2Fhelp.instagram.com%2F369001149843369&amp;h=AT0Jrv1wrZlBoZjc5oEMGNNho39PmzrMCywTZAOqWZgDSu1haI3UciOWSGqTDqiWxu8Pjh_el_zFZXdxdGnRe6Uu-pUlb6JfZzUBgZMYS2E661lJsZ9-ofvPsNBuouRmND3RDdSLGfbwB08V
Facebook 취향 저격 콘텐츠를 만나는 곳 Facebook에 로그인 이메일 또는 휴대폰 번호 비밀번호 로그인 비밀번호를 잊으셨나요? 새 계정 만들기 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 언어 더 보기... 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 약관 고객 센터 연락처 업로드 및 비사용자 Meta © 2026
2026-01-13T09:29:57
https://ai.google.dev/api/interactions-api?hl=zh-cn
Gemini API &nbsp;|&nbsp; Google AI for Developers 跳至主要内容 / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 获取 API 密钥 实战宝典 社区 登录 文档 API 参考 Gemini API 文档 API 参考 获取 API 密钥 实战宝典 社区 概览 API 版本 功能 模型 生成内容 Live API Live Music API Interactions API 令牌 文件 Batch API 缓存 Embeddings 文件搜索 文件搜索存储区 文档 所有方法 已弃用 PaLM(已停用) SDK 参考文档 Python Go TypeScript Java C# 首页 Gemini API API 参考 发送反馈 Gemini API Gemini Interactions API 是一项实验性 API,可让开发者使用 Gemini 模型构建生成式 AI 应用。Gemini 是 Google 旗下最强大的模型,专为多模态应用而生。它不仅能理解和处理语言、图像、音频、视频和代码等各种信息,更能跨越不同模态,实现信息的融会贯通。您可以使用 Gemini API 来实现各种用例,例如跨文本和图像进行推理、生成内容、构建对话代理、开发总结和分类系统等。 以 Markdown 格式查看 查看 OpenAPI 规范 创建互动 post https://generativelanguage.googleapis.com/v1beta/interactions 创建新的互动。 请求正文 答案 请求正文 请求正文中包含结构如下的数据: model ModelOption  (可选) 用于生成互动的 `Model` 的名称。 如果未提供 `agent`,则为必需属性。 可能的值: gemini-2.5-pro Google 旗下先进的多用途模型,擅长编码和处理复杂的推理任务。 gemini-2.5-flash 我们的首个混合推理模型,支持 100 万个 token 的上下文窗口,并具有思考预算。 gemini-2.5-flash-preview-09-2025 基于 2.5 Flash 模型的最新模型。2.5 Flash 预览版最适合大规模处理、低延迟、需要思考的高数据量任务,以及代理应用场景。 gemini-2.5-flash-lite Google 旗下最小巧且最具成本效益的模型,专为大规模使用而打造。 gemini-2.5-flash-lite-preview-09-2025 基于 Gemini 2.5 Flash Lite 的最新模型,经过优化,可实现高成本效益、高吞吐量和高质量。 gemini-2.5-flash-preview-native-audio-dialog 我们的原生音频模型经过优化,可提供更高质量的音频输出,并能更好地控制语速、声音自然度、表达详略和情绪。 gemini-2.5-flash-image-preview 我们的原生图片生成模型,在速度、灵活性和内容相关理解方面经过专门优化。文本输入和输出的价格与 2.5 Flash 相同。 gemini-2.5-pro-preview-tts 我们的 2.5 Pro 文字转语音音频模型经过优化,可实现强大的低延迟语音生成,从而提供更自然的输出,并更轻松地引导提示。 gemini-3-pro-preview 我们最智能的模型,具有出色的推理和多模态理解能力,以及强大的智能体和氛围编码能力。 将完成提示的模型。\n\n 如需了解详情,请参阅 [模型](https://ai.google.dev/gemini-api/docs/models)。 agent AgentOption  (可选) 用于生成互动的“代理”的名称。 如果未提供“model”,则为必需属性。 可能的值: deep-research-pro-preview-12-2025 Gemini Deep Research Agent 要互动的代理。 input 内容 或数组(内容)或数组(轮次)或字符串  (必需) 交互的输入(模型和代理共用)。 system_instruction string  (可选) 互动的系统指令。 tools 数组 ( Tool )  (可选) 模型在互动期间可能会调用的工具声明列表。 response_format object  (可选) 强制生成的回答为符合此字段中指定的 JSON 架构的 JSON 对象。 response_mime_type string  (可选) 响应的 MIME 类型。如果设置了 response_format,则此字段为必填字段。 stream boolean  (选填) 仅限输入。互动是否会以流式传输方式进行。 store boolean  (选填) 仅限输入。是否存储响应和请求以供日后检索。 background boolean  (可选) 是否在后台运行模型交互。 generation_config GenerationConfig  (可选) 模型配置 模型互动的配置参数。 `agent_config` 的替代方案。仅在设置了 `model` 时适用。 模型互动的配置参数。 字段 温度 数字  (可选) 控制输出的随机性。 top_p number  (可选) 抽样时要考虑的 token 的最大累积概率。 seed integer  (optional) 解码中使用的种子,用于实现可重现性。 stop_sequences array (string)  (选填) 将停止输出互动的字符序列列表。 tool_choice ToolChoice  (可选) 互动所用的工具。 工具选择的配置。 可能的类型 ToolChoiceType 此类型没有特定字段。 ToolChoiceConfig allowed_tools AllowedTools  (可选) 没有提供说明。 允许的工具的配置。 字段 mode ToolChoiceType  (可选) 工具选择的模式。 可能的值: auto any none validated 工具 数组(字符串)  (可选) 允许使用的工具的名称。 thinking_level ThinkingLevel  (可选) 模型应生成的思维令牌的级别。 可能的值: low high thinking_summaries ThinkingSummaries  (可选) 是否在回答中包含思维总结。 可能的值: auto none max_output_tokens integer  (可选) 响应中包含的令牌数量上限。 speech_config SpeechConfig  (可选) 语音互动的配置。 语音互动配置。 字段 voice string  (选填) 说话者的声音。 language string  (选填) 语音的语言。 speaker string  (选填) 说话者的姓名,应与提示中给出的说话者姓名一致。 agent_config object  (可选) 代理配置 代理的配置。 `generation_config` 的替代方案。仅在设置了 `agent` 时适用。 可能的类型 多态鉴别器: type DynamicAgentConfig 动态代理的配置。 type string  (optional) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "dynamic" DeepResearchAgentConfig Deep Research 代理的配置。 type string  (optional) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "deep-research" thinking_summaries ThinkingSummaries  (可选) 是否在回答中包含思维总结。 可能的值: auto none previous_interaction_id string  (可选) 上一次互动的 ID(如有)。 response_modalities ResponseModality  (可选) 响应的请求模态(TEXT、IMAGE、AUDIO)。 可能的值: text image audio 响应 返回 Interaction 资源。 简单请求 示例响应 { "created" : "2025-11-26T12:25:15Z" , "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "object" : "interaction" , "outputs" : [ { "text" : "Hello! I'm functioning perfectly and ready to assist you.\n\nHow are you doing today?" , "type" : "text" } ], "role" : "model" , "status" : "completed" , "updated" : "2025-11-26T12:25:15Z" , "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 7 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 7 , "total_output_tokens" : 20 , "total_reasoning_tokens" : 22 , "total_tokens" : 49 , "total_tool_use_tokens" : 0 } } 多轮 示例响应 { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "status" : "completed" , "object" : "interaction" , "created" : "2025-11-26T12:22:47Z" , "updated" : "2025-11-26T12:22:47Z" , "role" : "model" , "outputs" : [ { "type" : "text" , "text" : "The capital of France is Paris." } ], "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 50 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 50 , "total_output_tokens" : 10 , "total_reasoning_tokens" : 0 , "total_tokens" : 60 , "total_tool_use_tokens" : 0 } } 图片输入 示例响应 { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "status" : "completed" , "object" : "interaction" , "created" : "2025-11-26T12:22:47Z" , "updated" : "2025-11-26T12:22:47Z" , "role" : "model" , "outputs" : [ { "type" : "text" , "text" : "A white humanoid robot with glowing blue eyes stands holding a red skateboard." } ], "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 10 }, { "modality" : "image" , "tokens" : 258 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 268 , "total_output_tokens" : 20 , "total_reasoning_tokens" : 0 , "total_tokens" : 288 , "total_tool_use_tokens" : 0 } } 函数调用 示例响应 { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "status" : "requires_action" , "object" : "interaction" , "created" : "2025-11-26T12:22:47Z" , "updated" : "2025-11-26T12:22:47Z" , "role" : "model" , "outputs" : [ { "type" : "function_call" , "function_call" : { "name" : "get_weather" , "arguments" : { "location" : "Boston, MA" } } } ], "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 100 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 100 , "total_output_tokens" : 25 , "total_reasoning_tokens" : 0 , "total_tokens" : 125 , "total_tool_use_tokens" : 50 } } Deep Research 示例响应 { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "agent" : "deep-research-pro-preview-12-2025" , "status" : "completed" , "object" : "interaction" , "created" : "2025-11-26T12:22:47Z" , "updated" : "2025-11-26T12:22:47Z" , "role" : "model" , "outputs" : [ { "type" : "text" , "text" : "Here is a comprehensive research report on the current state of cancer research..." } ], "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 20 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 20 , "total_output_tokens" : 1000 , "total_reasoning_tokens" : 500 , "total_tokens" : 1520 , "total_tool_use_tokens" : 0 } } 检索互动 get https://generativelanguage.googleapis.com/v1beta/interactions/{id} 根据单个互动的 `Interaction.id` 检索其完整详细信息。 路径 / 查询参数 答案 路径 / 查询参数 id string  (必需) 要检索的互动的唯一标识符。 stream boolean  (选填) 如果设置为 true,则会以增量方式流式传输生成的内容。 默认为: False last_event_id string  (选填) 可选。如果设置,则从由事件 ID 标记的事件之后的下一个块恢复互动流。仅当“stream”为 true 时才可使用。 api_version string  (选填) 要使用的 API 版本。 响应 返回 Interaction 资源。 获取互动 示例响应 { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "status" : "completed" , "object" : "interaction" , "created" : "2025-11-26T12:25:15Z" , "updated" : "2025-11-26T12:25:15Z" , "role" : "model" , "outputs" : [ { "type" : "text" , "text" : "I'm doing great, thank you for asking! How can I help you today?" } ] } 删除互动 delete https://generativelanguage.googleapis.com/v1beta/interactions/{id} 按 ID 删除互动。 路径 / 查询参数 答案 路径 / 查询参数 id string  (必需) 要删除的互动的唯一标识符。 api_version string  (选填) 要使用的 API 版本。 响应 如果成功,则响应为空。 删除互动 取消互动 post https://generativelanguage.googleapis.com/v1beta/interactions/{id}/cancel 按 ID 取消互动。这仅适用于仍在运行的后台互动。 路径 / 查询参数 答案 路径 / 查询参数 id string  (必需) 要检索的互动的唯一标识符。 api_version string  (选填) 要使用的 API 版本。 响应 返回 Interaction 资源。 取消互动 示例响应 { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "agent" : "deep-research-pro-preview-12-2025" , "status" : "cancelled" , "object" : "interaction" , "created" : "2025-11-26T12:25:15Z" , "updated" : "2025-11-26T12:25:15Z" , "role" : "model" } 资源 互动 Interaction 资源。 字段 model ModelOption  (可选) 用于生成互动的 `Model` 的名称。 可能的值: gemini-2.5-pro Google 旗下先进的多用途模型,擅长编码和处理复杂的推理任务。 gemini-2.5-flash 我们的首个混合推理模型,支持 100 万个 token 的上下文窗口,并具有思考预算。 gemini-2.5-flash-preview-09-2025 基于 2.5 Flash 模型的最新模型。2.5 Flash 预览版最适合大规模处理、低延迟、需要思考的高数据量任务,以及代理应用场景。 gemini-2.5-flash-lite Google 旗下最小巧且最具成本效益的模型,专为大规模使用而打造。 gemini-2.5-flash-lite-preview-09-2025 基于 Gemini 2.5 Flash Lite 的最新模型,经过优化,可实现高成本效益、高吞吐量和高质量。 gemini-2.5-flash-preview-native-audio-dialog 我们的原生音频模型经过优化,可提供更高质量的音频输出,并能更好地控制语速、声音自然度、表达详略和情绪。 gemini-2.5-flash-image-preview 我们的原生图片生成模型,在速度、灵活性和内容相关理解方面经过专门优化。文本输入和输出的价格与 2.5 Flash 相同。 gemini-2.5-pro-preview-tts 我们的 2.5 Pro 文字转语音音频模型经过优化,可实现强大的低延迟语音生成,从而提供更自然的输出,并更轻松地引导提示。 gemini-3-pro-preview 我们最智能的模型,具有出色的推理和多模态理解能力,以及强大的智能体和氛围编码能力。 将完成提示的模型。\n\n 如需了解详情,请参阅 [模型](https://ai.google.dev/gemini-api/docs/models)。 agent AgentOption  (可选) 用于生成互动的“代理”的名称。 可能的值: deep-research-pro-preview-12-2025 Gemini Deep Research Agent 要互动的代理。 id string  (选填) 仅限输出。互动完成的唯一标识符。 状态 枚举(字符串)  (选填) 仅限输出。互动的状态。 可能的值: in_progress requires_action completed failed cancelled 创建 字符串  (选填) 仅限输出。回答的创建时间,采用 ISO 8601 格式 (YYYY-MM-DDThh:mm:ssZ)。 更新 字符串  (选填) 仅限输出。回答的上次更新时间,采用 ISO 8601 格式 (YYYY-MM-DDThh:mm:ssZ)。 角色 字符串  (选填) 仅限输出。互动的角色。 outputs 数组( 内容 )  (可选) 仅限输出。模型给出的回答。 object string  (选填) 仅限输出。互动的对象类型。始终设置为“interaction”。 一律设置为 "interaction" 使用情况 使用情况  (可选) 仅限输出。互动请求的令牌使用情况统计信息。 互动请求的令牌使用情况统计信息。 字段 total_input_tokens integer  (可选) 提示(上下文)中的 token 数量。 input_tokens_by_modality ModalityTokens  (可选) 按模态划分的输入 token 使用情况细分。 单个回答模态的 token 数。 字段 modality ResponseModality  (可选) 与令牌数量关联的模态。 可能的值: text image audio token 整数  (可选) 模态的令牌数量。 total_cached_tokens integer  (可选) 提示的缓存部分(即缓存的内容)中的 token 数量。 cached_tokens_by_modality ModalityTokens  (可选) 按模态划分的缓存令牌使用情况细分。 单个回答模态的 token 数。 字段 modality ResponseModality  (可选) 与令牌数量关联的模态。 可能的值: text image audio token 整数  (可选) 模态的令牌数量。 total_output_tokens integer  (可选) 所有生成的回答中的 token 总数。 output_tokens_by_modality ModalityTokens  (可选) 按模态划分的输出 token 用量细分。 单个回答模态的 token 数。 字段 modality ResponseModality  (可选) 与令牌数量关联的模态。 可能的值: text image audio token 整数  (可选) 模态的令牌数量。 total_tool_use_tokens integer  (可选) 工具使用提示中的 token 数量。 tool_use_tokens_by_modality ModalityTokens  (可选) 按模态划分的工具使用情况令牌用量细分。 单个回答模态的 token 数。 字段 modality ResponseModality  (可选) 与令牌数量关联的模态。 可能的值: text image audio token 整数  (可选) 模态的令牌数量。 total_reasoning_tokens integer  (可选) 思考模型的思考 token 数。 total_tokens integer  (可选) 互动请求(提示 + 回答 + 其他内部 token)的总 token 数。 previous_interaction_id string  (可选) 上一次互动的 ID(如有)。 示例 示例 { "created" : "2025-12-04T15:01:45Z" , "id" : "v1_ChdXS0l4YWZXTk9xbk0xZThQczhEcmlROBIXV0tJeGFmV05PcW5NMWU4UHM4RHJpUTg" , "model" : "gemini-2.5-flash" , "object" : "interaction" , "outputs" : [ { "text" : "Hello! I'm doing well, functioning as expected. Thank you for asking! How are you doing today?" , "type" : "text" } ] , "role" : "model" , "status" : "completed" , "updated" : "2025-12-04T15:01:45Z" , "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 7 } ] , "total_cached_tokens" : 0 , "total_input_tokens" : 7 , "total_output_tokens" : 23 , "total_reasoning_tokens" : 49 , "total_tokens" : 79 , "total_tool_use_tokens" : 0 } } 数据模型 内容 回答的内容。 可能的类型 多态鉴别器: type TextContent 文本内容块。 文本 字符串  (选填) 文本内容。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "text" 注释 注释  (可选) 模型生成的内容的引用信息。 模型生成的内容的引用信息。 字段 start_index integer  (可选) 归因于此来源的回答部分的起始位置。 索引指示段落的开始,以字节为单位衡量。 end_index integer  (可选) 归因段落的结束,不包括此索引。 source string  (选填) 文本部分归因的来源。可以是网址、标题或其他标识符。 ImageContent 图片内容块。 数据 字符串  (可选) 没有提供说明。 uri string  (选填) 没有提供说明。 mime_type ImageMimeTypeOption  (可选) 没有提供说明。 可能的值: image/png image/jpeg image/webp image/heic image/heif 图片的 MIME 类型。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "image" 分辨率 MediaResolution  (可选) 媒体的分辨率。 可能的值: low medium high AudioContent 音频内容块。 数据 字符串  (可选) 没有提供说明。 uri string  (选填) 没有提供说明。 mime_type AudioMimeTypeOption  (可选) 没有提供说明。 可能的值: audio/wav audio/mp3 audio/aiff audio/aac audio/ogg audio/flac 音频的 MIME 类型。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "audio" DocumentContent 文档内容块。 数据 字符串  (可选) 没有提供说明。 uri string  (选填) 没有提供说明。 mime_type string  (可选) 没有提供说明。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "document" VideoContent 视频内容块。 数据 字符串  (可选) 没有提供说明。 uri string  (选填) 没有提供说明。 mime_type VideoMimeTypeOption  (可选) 没有提供说明。 可能的值: video/mp4 video/mpeg video/mov video/avi video/x-flv video/mpg video/webm video/wmv video/3gpp 视频的 MIME 类型。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "video" 分辨率 MediaResolution  (可选) 媒体的分辨率。 可能的值: low medium high ThoughtContent 一种想法内容块。 签名 字符串  (选填) 与要纳入生成内容的后端来源相匹配的签名。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "thought" 总结 ThoughtSummary  (可选) 想法的摘要。 想法的总结。 FunctionCallContent 函数工具调用内容块。 name string  (必填) 要调用的工具的名称。 实参 对象  (必需) 要传递给函数的实参。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "function_call" id string  (必需) 此特定工具调用的唯一 ID。 FunctionResultContent 函数工具结果内容块。 名称 字符串  (可选) 所调用工具的名称。 is_error 布尔值  (选填) 工具调用是否导致了错误。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "function_result" 结果 对象或字符串  (必需) 工具调用的结果。 call_id string  (必需) 用于与函数调用块中的 ID 相匹配的 ID。 CodeExecutionCallContent 代码执行内容。 实参 CodeExecutionCallArguments  (可选) 要传递给代码执行的实参。 要传递给代码执行的实参。 字段 language enum (string)  (选填) 相应 `code` 的编程语言。 可能的值: python 代码 字符串  (选填) 要执行的代码。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "code_execution_call" id string  (选填) 此特定工具调用的唯一 ID。 CodeExecutionResultContent 代码执行结果内容。 结果 字符串  (可选) 代码执行的输出。 is_error boolean  (选填) 代码执行是否导致了错误。 签名 字符串  (选填) 用于后端验证的签名哈希。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "code_execution_result" call_id string  (选填) 用于与代码执行调用块中的 ID 相匹配的 ID。 UrlContextCallContent 网址上下文内容。 arguments UrlContextCallArguments  (可选) 要传递给网址上下文的实参。 要传递给网址上下文的实参。 字段 urls array (string)  (选填) 要提取的网址。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "url_context_call" id string  (选填) 此特定工具调用的唯一 ID。 UrlContextResultContent 网址上下文结果内容。 签名 字符串  (选填) 网址上下文结果的签名。 result UrlContextResult  (可选) 网址上下文的结果。 网址上下文的结果。 字段 url string  (选填) 提取的网址。 状态 枚举(字符串)  (选填) 网址检索的状态。 可能的值: success error paywall unsafe is_error 布尔值  (选填) 网址上下文是否导致了错误。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "url_context_result" call_id string  (选填) 用于与网址上下文调用块中的 ID 相匹配的 ID。 GoogleSearchCallContent Google 搜索内容。 实参 GoogleSearchCallArguments  (可选) 要传递给 Google 搜索的实参。 要传递给 Google 搜索的实参。 字段 查询 数组(字符串)  (可选) 后续网络搜索的网页搜索查询。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "google_search_call" id string  (选填) 此特定工具调用的唯一 ID。 GoogleSearchResultContent Google 搜索结果内容。 签名 字符串  (选填) Google 搜索结果的签名。 result GoogleSearchResult  (可选) Google 搜索的结果。 Google 搜索的结果。 字段 url string  (选填) 搜索结果的 URI 引用。 标题 字符串  (选填) 搜索结果的标题。 rendered_content 字符串  (可选) 可嵌入网页或应用 WebView 中的 Web 内容代码段。 is_error boolean  (选填) Google 搜索是否导致了错误。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "google_search_result" call_id string  (选填) 用于与 Google 搜索调用块中的 ID 相匹配的 ID。 McpServerToolCallContent MCPServer 工具调用内容。 name string  (必填) 所调用工具的名称。 server_name string  (必需) 所用 MCP 服务器的名称。 实参 对象  (必需) 函数的实参 JSON 对象。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "mcp_server_tool_call" id string  (必需) 此特定工具调用的唯一 ID。 McpServerToolResultContent MCPServer 工具结果内容。 名称 字符串  (可选) 相应工具调用的工具的名称。 server_name string  (选填) 所用 MCP 服务器的名称。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "mcp_server_tool_result" 结果 对象或字符串  (必需) 工具调用的结果。 call_id string  (必需) 与 MCP 服务器工具调用块中的 ID 相匹配的 ID。 FileSearchResultContent 文件搜索结果内容。 result FileSearchResult  (可选) 文件搜索的结果。 文件搜索的结果。 字段 标题 字符串  (选填) 搜索结果的标题。 文本 字符串  (选填) 搜索结果的文本。 file_search_store 字符串  (可选) 文件搜索存储区的名称。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "file_search_result" 示例 文本 { "type" : "text" , "text" : "Hello, how are you?" } 图片 { "type" : "image" , "data" : "BASE64_ENCODED_IMAGE" , "mime_type" : "image/png" } 音频 { "type" : "audio" , "data" : "BASE64_ENCODED_AUDIO" , "mime_type" : "audio/wav" } 文档 { "type" : "document" , "data" : "BASE64_ENCODED_DOCUMENT" , "mime_type" : "application/pdf" } 视频 { "type" : "video" , "uri" : "https://www.youtube.com/watch?v=9hE5-98ZeCg" } 思考 { "type" : "thought" , "summary" : [ { "type" : "text" , "text" : "The user is asking about the weather. I should use the get_weather tool." } ], "signature" : "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" } 函数调用 { "type" : "function_call" , "name" : "get_weather" , "id" : "gth23981" , "arguments" : { "location" : "Boston, MA" } } 函数结果 { "type" : "function_result" , "name" : "get_weather" , "call_id" : "gth23981" , "result" : { "weather" : "sunny" } } 代码执行调用 { "type" : "code_execution_call" , "id" : "call_123456" , "arguments" : { "language" : "python" , "code" : "print('hello world')" } } 代码执行结果 { "type" : "code_execution_result" , "call_id" : "call_123456" , "result" : "hello world\n" } 网址上下文调用 { "type" : "url_context_call" , "id" : "call_123456" , "arguments" : { "urls" : [ "https://www.example.com" ] } } 网址上下文结果 { "type" : "url_context_result" , "call_id" : "call_123456" , "result" : [ { "url" : "https://www.example.com" , "status" : "SUCCESS" } ] } Google 搜索通话 { "type" : "google_search_call" , "id" : "call_123456" , "arguments" : { "queries" : [ "weather in Boston" ] } } Google 搜索结果 { "type" : "google_search_result" , "call_id" : "call_123456" , "result" : [ { "url" : "https://www.google.com/search?q=weather+in+Boston" , "title" : "Weather in Boston" } ] } MCP 服务器工具调用 { "type" : "mcp_server_tool_call" , "id" : "call_123456" , "name" : "get_forecast" , "server_name" : "weather_server" , "arguments" : { "city" : "London" } } MCP 服务器工具结果 { "type" : "mcp_server_tool_result" , "name" : "get_forecast" , "server_name" : "weather_server" , "call_id" : "call_123456" , "result" : "sunny" } 文件搜索结果 { "type" : "file_search_result" , "result" : [ { "text" : "search result chunk" , "file_search_store" : "file_search_store" } ] } 工具 可能的类型 多态鉴别器: type 函数 可供模型使用的工具。 名称 字符串  (可选) 函数的名称。 说明 字符串  (选填) 函数的说明。 参数 对象  (可选) 函数的参数的 JSON 架构。 type string  (必填) 没有提供说明。 一律设置为 "function" GoogleSearch 模型可用于搜索 Google 的工具。 type string  (必填) 没有提供说明。 一律设置为 "google_search" CodeExecution 一种可供模型用来执行代码的工具。 type string  (必填) 没有提供说明。 一律设置为 "code_execution" UrlContext 一种可供模型用来提取网址上下文的工具。 type string  (必填) 没有提供说明。 一律设置为 "url_context" ComputerUse 一种可供模型用于与计算机互动的工具。 type string  (必填) 没有提供说明。 一律设置为 "computer_use" environment enum (string)  (选填) 正在运行的环境。 可能的值: browser excludedPredefinedFunctions array (string)  (可选) 从模型调用中排除的预定义函数列表。 McpServer MCPServer 是一种可由模型调用以执行操作的服务器。 type string  (必填) 没有提供说明。 一律设置为 "mcp_server" 名称 字符串  (可选) MCPServer 的名称。 url string  (选填) MCPServer 端点的完整网址。 示例:“https://api.example.com/mcp” headers object  (可选) 可选:身份验证标头、超时等字段(如果需要)。 allowed_tools AllowedTools  (可选) 允许使用的工具。 允许的工具的配置。 字段 mode ToolChoiceType  (可选) 工具选择的模式。 可能的值: auto any none validated 工具 数组(字符串)  (可选) 允许使用的工具的名称。 FileSearch 一种可供模型用来搜索文件的工具。 file_search_store_names 数组(字符串)  (可选) 要搜索的文件搜索存储区名称。 top_k integer  (可选) 要检索的语义检索块数量。 metadata_filter string  (可选) 要应用于语义检索文档和块的元数据过滤条件。 type string  (必填) 没有提供说明。 一律设置为 "file_search" 示例 函数 GoogleSearch CodeExecution UrlContext ComputerUse McpServer FileSearch Turn 字段 角色 字符串  (选填) 相应回合的发起者。对于输入,必须为“user”;对于模型输出,必须为“model”。 content 数组( 内容 )或字符串  (可选) 对话轮次的内容。 示例 用户回合 { "role" : "user" , "content" : [ { "type" : "text" , "text" : "user turn" } ] } 模特走秀 { "role" : "model" , "content" : [ { "type" : "text" , "text" : "model turn" } ] } InteractionSseEvent 可能的类型 多态鉴别器: event_type InteractionEvent event_type enum (string)  (可选) 没有提供说明。 可能的值: interaction.start interaction.complete interaction Interaction  (可选) 没有提供说明。 event_id string  (选填) 用于从相应事件恢复互动流的 event_id 令牌。 InteractionStatusUpdate interaction_id string  (optional) 没有提供说明。 状态 枚举(字符串)  (选填) 没有提供说明。 可能的值: in_progress requires_action completed failed cancelled event_type string  (可选) 没有提供说明。 一律设置为 "interaction.status_update" event_id string  (选填) 用于从相应事件恢复互动流的 event_id 令牌。 ContentStart index integer  (可选) 没有提供说明。 content 内容  (可选) 没有提供说明。 event_type string  (可选) 没有提供说明。 一律设置为 "content.start" event_id string  (选填) 用于从相应事件恢复互动流的 event_id 令牌。 ContentDelta 索引 整数  (可选) 没有提供说明。 event_type string  (可选) 没有提供说明。 一律设置为 "content.delta" event_id string  (选填) 用于从相应事件恢复互动流的 event_id 令牌。 delta object  (可选) 没有提供说明。 可能的类型 多态鉴别器: type TextDelta 文本 字符串  (选填) 没有提供说明。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "text" annotations Annotation  (可选) 模型生成的内容的引用信息。 模型生成的内容的引用信息。 字段 start_index integer  (可选) 归因于此来源的回答部分的起始位置。 索引指示段落的开始,以字节为单位衡量。 end_index integer  (可选) 归因段落的结束,不包括此索引。 source string  (选填) 文本部分归因的来源。可以是网址、标题或其他标识符。 ImageDelta 数据 字符串  (可选) 没有提供说明。 uri string  (选填) 没有提供说明。 mime_type ImageMimeTypeOption  (可选) 没有提供说明。 可能的值: image/png image/jpeg image/webp image/heic image/heif 图片的 MIME 类型。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "image" 分辨率 MediaResolution  (可选) 媒体的分辨率。 可能的值: low medium high AudioDelta 数据 字符串  (可选) 没有提供说明。 uri string  (选填) 没有提供说明。 mime_type AudioMimeTypeOption  (可选) 没有提供说明。 可能的值: audio/wav audio/mp3 audio/aiff audio/aac audio/ogg audio/flac 音频的 MIME 类型。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "audio" DocumentDelta 数据 字符串  (可选) 没有提供说明。 uri string  (选填) 没有提供说明。 mime_type string  (可选) 没有提供说明。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "document" VideoDelta 数据 字符串  (可选) 没有提供说明。 uri string  (选填) 没有提供说明。 mime_type VideoMimeTypeOption  (可选) 没有提供说明。 可能的值: video/mp4 video/mpeg video/mov video/avi video/x-flv video/mpg video/webm video/wmv video/3gpp 视频的 MIME 类型。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "video" 分辨率 MediaResolution  (可选) 媒体的分辨率。 可能的值: low medium high ThoughtSummaryDelta type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "thought_summary" 内容 ImageContent 或 TextContent  (可选) 没有提供说明。 ThoughtSignatureDelta 签名 字符串  (选填) 与要纳入生成内容的后端来源相匹配的签名。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "thought_signature" FunctionCallDelta 名称 字符串  (可选) 没有提供说明。 arguments object  (可选) 没有提供说明。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "function_call" id string  (选填) 此特定工具调用的唯一 ID。 FunctionResultDelta 名称 字符串  (可选) 没有提供说明。 is_error boolean  (选填) 没有提供说明。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "function_result" 结果 对象或字符串  (可选) 工具调用结果 delta。 call_id string  (可选) 用于与函数调用块中的 ID 相匹配的 ID。 CodeExecutionCallDelta 实参 CodeExecutionCallArguments  (可选) 没有提供说明。 要传递给代码执行的实参。 字段 language enum (string)  (选填) 相应 `code` 的编程语言。 可能的值: python 代码 字符串  (选填) 要执行的代码。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "code_execution_call" id string  (选填) 此特定工具调用的唯一 ID。 CodeExecutionResultDelta 结果 字符串  (可选) 没有提供说明。 is_error boolean  (选填) 没有提供说明。 签名 字符串  (选填) 没有提供说明。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "code_execution_result" call_id string  (可选) 用于与函数调用块中的 ID 相匹配的 ID。 UrlContextCallDelta arguments UrlContextCallArguments  (可选) 没有提供说明。 要传递给网址上下文的实参。 字段 urls array (string)  (选填) 要提取的网址。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "url_context_call" id string  (选填) 此特定工具调用的唯一 ID。 UrlContextResultDelta 签名 字符串  (选填) 没有提供说明。 result UrlContextResult  (可选) 没有提供说明。 网址上下文的结果。 字段 url string  (选填) 提取的网址。 状态 枚举(字符串)  (选填) 网址检索的状态。 可能的值: success error paywall unsafe is_error boolean  (选填) 没有提供说明。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "url_context_result" call_id string  (可选) 用于与函数调用块中的 ID 相匹配的 ID。 GoogleSearchCallDelta 实参 GoogleSearchCallArguments  (可选) 没有提供说明。 要传递给 Google 搜索的实参。 字段 查询 数组(字符串)  (可选) 后续网络搜索的网页搜索查询。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "google_search_call" id string  (选填) 此特定工具调用的唯一 ID。 GoogleSearchResultDelta 签名 字符串  (选填) 没有提供说明。 result GoogleSearchResult  (可选) 没有提供说明。 Google 搜索的结果。 字段 url string  (选填) 搜索结果的 URI 引用。 标题 字符串  (选填) 搜索结果的标题。 rendered_content 字符串  (可选) 可嵌入网页或应用 WebView 中的 Web 内容代码段。 is_error boolean  (选填) 没有提供说明。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "google_search_result" call_id string  (可选) 用于与函数调用块中的 ID 相匹配的 ID。 McpServerToolCallDelta 名称 字符串  (可选) 没有提供说明。 server_name string  (选填) 没有提供说明。 arguments object  (可选) 没有提供说明。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "mcp_server_tool_call" id string  (选填) 此特定工具调用的唯一 ID。 McpServerToolResultDelta 名称 字符串  (可选) 没有提供说明。 server_name string  (选填) 没有提供说明。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "mcp_server_tool_result" 结果 对象或字符串  (可选) 工具调用结果 delta。 call_id string  (可选) 用于与函数调用块中的 ID 相匹配的 ID。 FileSearchResultDelta result FileSearchResult  (可选) 没有提供说明。 文件搜索的结果。 字段 标题 字符串  (选填) 搜索结果的标题。 文本 字符串  (选填) 搜索结果的文本。 file_search_store 字符串  (可选) 文件搜索存储区的名称。 type string  (必填) 用作内容 oneof 的 OpenAPI 类型鉴别器。 一律设置为 "file_search_result" ContentStop 索引 整数  (可选) 没有提供说明。 event_type string  (可选) 没有提供说明。 一律设置为 "content.stop" event_id string  (选填) 用于从相应事件恢复互动流的 event_id 令牌。 ErrorEvent event_type string  (可选) 没有提供说明。 一律设置为 "error" error Error  (optional) 没有提供说明。 互动中的错误消息。 字段 代码 字符串  (选填) 用于标识错误类型的 URI。 message string  (选填) 人类可读的错误消息。 event_id string  (选填) 用于从相应事件恢复互动流的 event_id 令牌。 示例 互动开始 { "event_type" : "interaction.start" , "interaction" : { "id" : "v1_ChdTMjQ0YWJ5TUF1TzcxZThQdjRpcnFRcxIXUzI0NGFieU1BdU83MWU4UHY0aXJxUXM" , "model" : "gemini-2.5-flash" , "object" : "interaction" , "status" : "in_progress" } } 互动完成 { "event_type" : "interaction.complete" , "interaction" : { "created" : "2025-12-09T18:45:40Z" , "id" : "v1_ChdTMjQ0YWJ5TUF1TzcxZThQdjRpcnFRcxIXUzI0NGFieU1BdU83MWU4UHY0aXJxUXM" , "model" : "gemini-2.5-flash" , "object" : "interaction" , "outputs" : [ { "signature" : "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" , "type" : "thought" }, { "text" : "Elara\u2019s life was a symphony of quiet moments. A librarian, she found solace in the hushed aisles, the scent of aged paper, and the predictable rhythm of her days. Her small apartment, meticulously ordered, reflected this internal calm, save" , "type" : "text" }, { "text" : " for one beloved anomaly: a chipped porcelain teacup, inherited from her grandmother, which held her morning Earl Grey.\n\nOne Tuesday, stirring her tea, Elara paused. At the bottom, nestled against the porcelain, was a star." , "type" : "text" }, { "text" : " Not a star-shaped tea leaf, but a miniature, perfectly formed celestial body, radiating a faint, cool luminescence. Before she could gasp, it dissolved, leaving only the amber swirl of her brew. She dismissed it as a trick of" , "type" : "text" }, { "text" : " tired eyes.\n\nBut the next morning, a gossamer-thin feather, smaller than an eyelash and shimmering with iridescent hues, floated on the surface. It vanished the moment she tried to touch it. A week later, a single," , "type" : "text" }, { "text" : " impossibly delicate bloom, like spun moonbeam, unfolded in her cup before fading into nothingness.\n\nThese weren't illusions. Each day, Elara\u2019s chipped teacup offered a fleeting, exquisite secret. A tiny, perfect" , "type" : "text" }, { "text" : " crystal, a miniature spiral nebula, a fragment of rainbow caught in liquid form. They never lingered, never accumulated, simply *were* and then *weren't*, leaving behind a residue of quiet wonder.\n\nElara never spoke" , "type" : "text" }, { "text" : " of it. It was her private wellspring, a daily reminder that magic could exist in the smallest, most overlooked corners of the world. Her routine remained unchanged, her external life a picture of calm, but inside, a secret garden blo" , "type" : "text" }, { "text" : "omed. Each dawn brought not just tea, but the silent promise of extraordinary beauty, waiting patiently in a chipped teacup." , "type" : "text" } ], "role" : "model" , "status" : "completed" , "updated" : "2025-12-09T18:45:40Z" , "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 11 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 11 , "total_output_tokens" : 364 , "total_reasoning_tokens" : 1120 , "total_tokens" : 1495 , "total_tool_use_tokens" : 0 } } } 互动状态更新 { "event_type" : "interaction.status_update" , "interaction_id" : "v1_ChdTMjQ0YWJ5TUF1TzcxZThQdjRpcnFRcxIXUzI0NGFieU1BdU83MWU4UHY0aXJxUXM" , "status" : "in_progress" } 内容开始 { "event_type" : "content.start" , "content" : { "type" : "text" }, "index" : 1 } 内容增量 { "event_type" : "content.delta" , "delta" : { "type" : "text" , "text" : "Elara\u2019s life was a symphony of quiet moments. A librarian, she found solace in the hushed aisles, the scent of aged paper, and the predictable rhythm of her days. Her small apartment, meticulously ordered, reflected this internal calm, save" }, "index" : 1 } 内容停止 { "event_type" : "content.stop" , "index" : 1 } 错误事件 { "event_type" : "error" , "error" : { "message" : "Failed to get completed interaction: Result not found." , "code" : "not_found" } } 发送反馈 如未另行说明,那么本页面中的内容已根据 知识共享署名 4.0 许可 获得了许可,并且代码示例已根据 Apache 2.0 许可 获得了许可。有关详情,请参阅 Google 开发者网站政策 。Java 是 Oracle 和/或其关联公司的注册商标。 最后更新时间 (UTC):2025-12-11。 需要向我们提供更多信息? [[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["没有我需要的信息","missingTheInformationINeed","thumb-down"],["太复杂/步骤太多","tooComplicatedTooManySteps","thumb-down"],["内容需要更新","outOfDate","thumb-down"],["翻译问题","translationIssue","thumb-down"],["示例/代码问题","samplesCodeIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-12-11。"],[],[]] 条款 隐私权政策 Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:57
https://www.cisco.com/site/cz/cs/partners/index.html
Partneři - Cisco Skip to main content Skip to search Skip to footer Cisco.com Česká republika Produkty a služby Close Řešení Close Podpora Close Vzdělávání Close Proč Cisco Close Partneři Close Objevte produkty Cisco Jak nakupovat Partneři CS CZ Přihlásit se Objevte produkty Cisco Vyhledat NABÍDKA ZAVŘÍT Jak nakupovat Partneři Přihlásit se CS CZ Close Close Close Close Close Thank you. Your profile has been updated. Help us keep your profile up-to-date. Confirm your job details. Job Role -- Please Select -- Customer Service / Support Executive Management Finance / Accounting Information Technology Manufacturing Marketing / PR / Advertising Logistics / Operations / Administration Other (Legal, HR, Training, Vendor Manager, etc) Purchasing / Procurement Research / Development Sales / Account Manager, Business Development System / Sales Engineer Job Level -- Please Select -- Manager Contributor Director / Senior Mgr Executive Partnerství, díky kterému je možné vše Partnerství se společností Cisco vám přináší exkluzivní výhody, jako jsou programy a specializace vytvořené za odměnu, školení a podpora, které pomáhají inovovat vaše procesy, a příležitosti k transformaci vašich schopností a prodejních postupů. Vytvořit účet Cisco Jste již partnerem? Přihlásit se Zaregistrujte se jako partner společnosti Cisco nebo svůj účet přidružte Pro nové společnosti Přihlaste se pomocí účtu Cisco a zaregistrujte svou společnost jako partnera společnosti Cisco, abyste získali přístup k exkluzivnímu obsahu pro partnery. Pro jednotlivce Přihlaste se pomocí účtu Cisco a přidružte tento účet se stávající partnerskou společností Cisco, abyste získali přístup k exkluzivnímu obsahu pro partnery. Vaše ziskovost je naším cílem číslo 1 Partnerský program Program je flexibilně strukturován s důrazem na to, jak svým zákazníkům poskytujete hodnoty. Centrum Marketing Velocity Školení, která vám pomohou vylepšit marketingový přístup, přizpůsobitelné kampaně a přístup ke špičkové digitální komunitě. Cesty k transformaci Prozkoumejte možnosti, jak vám společnost Cisco může pomoci při budování nových schopností a vývoji potřeb zákazníků. Podívejte se na výhody Partneři společnosti Cisco přinášejí skutečné výsledky Stadion budoucnosti Úspěšné podniky nehrají vždy podle pravidel. Partner společnosti Cisco, společnost AmpThink, tuto hru nejen hraje, ale také ji mění – a vyhrává. Modernizace stadionů Dláždění cesty ostatním Společnost TGS, která je jedním z prvních členů komunity afroamerických partnerů společnosti Cisco, pomáhá otevírat dveře dalším firmám vlastněným černošskými podnikateli. Podpora začleňování Previous Next Najít partnera Partneři spolupracují na integraci, vytváření, nakupování a konzultacích potřebných řešení, softwaru a služeb pro jejich zákazníky. Vyhledávač partnerů Spojení s partnerem @CiscoPartners Partner společnosti Cisco Partneři společnosti Cisco Partneři společnosti Cisco Blogy partnerů Komunita Rychlé odkazy O společnosti Cisco Kontaktujte nás Kariéra Spojení s partnerem Zdroje a právní informace Zpětná vazba Nápověda Smluvní podmínky Prohlášení o ochraně osobních údajů Soubory cookie Ochranné známky Transparentnost dodavatelského řetězce Mapa webu &copy; Cisco Systems, Inc.
2026-01-13T09:29:57
https://www.cisco.com/site/ca/en/about/sitemap.html
Sitemap - Cisco Skip to main content Skip to search Skip to footer Cisco.com Canada Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Explore Cisco How to buy Partners EN CA Log in Explore Cisco Search MENU CLOSE How to buy Partners Log in EN CA Close Close Close Close Close Hello, how can I help? Sitemap Popular links Career certifications Career opportunities Case studies and customer stories Cisco Commerce Community Contact us Networking Academy Partner login Products home The Trust Center Show more About Cisco Company Overview Newsroom Leadership Purpose and sustainability Career opportunities The Trust Center Contact us Investor relations Investor relations home Annual reports Financial results Stock information Analyst relations Engage with us Cisco Community Cisco Insider Cisco Research Cisco Store Cisco Talos Internet outages map (ThousandEyes) Outshift by Cisco Show more Products Featured products Cisco AI Defense Cisco Intersight platform Cisco Networking Cloud Cisco Secure Client (including AnyConnect) Cisco Secure Firewall Cisco Webex Suite Data center and cloud networking Switches Routers and SD-WAN appliances Wireless All products Products home Products A-Z Collaboration Computing Networking Security Splunk AppDynamics Software Mobile app downloads Resources Case studies and customer stories Cisco Power Calculator Cisco Validated Compliance dCloud demos, training, and sandboxes End-of-sale and end-of-life products Overviews, demos, and tutorials Trials and demos Visio stencils Warranties Show more Solutions Featured solutions Artificial intelligence Cisco on Cisco Secure access service edge (SASE) Service providers Small and medium businesses Smart buildings Zero Trust Access from Cisco All solutions Solutions home Collaboration Computing Networking Security Industry solutions Industry Portfolio Explorer Cities and communities Education Financial services Government Healthcare Manufacturing Mining Oil and gas Retail Sports, media, and entertainment Transportation Utilities Show more Services Featured services Advanced services Cisco Lifecycle Services Smart Net Total Care Software Support Solution Support Success Tracks All services Services home Collaboration Computing Networking Observability (Splunk) Security Use cases Modern data center Show more Support For products All products All software downloads Collaboration endpoints and phones Routers Security Switches Unified Communications Wireless Contact Support Community Licensing support Returns portal (RMAs) Support Case Manager Support for acquisitions Small business phone numbers Other phone numbers (worldwide) Tools and resources Security advisories Field notices My Devices My Notifications Bug Search Tool Software research Device coverage checker All Support tools Show more Learn Learning at Cisco Career certifications Certification exams Cisco Learning Network Cisco Networking Academy Cisco U. DevNet Packet Tracer (network simulation) All training and certifications Events and webinars Events home Events calendar Cisco Live Solution webinars Technology webinars Technology topics AI application security How to set up a router How to set up a network switch What is cybersecurity? What is a data center? What is a firewall? What is a LAN? What is Wi-Fi 7? All technology topics Show more How to buy Buying from Cisco How-to-buy hub Cisco Capital financing Cisco Refresh (remanufactured equipment) Schedule a call Start a chat Buying through resellers or online Meet our partners Reseller locator Service ordering and contract management Small and medium business Licensing Enterprise Agreement Licensing Hub Software central Show more Partners Cisco Partner Program Becoming a partner Partner incentives Partner specializations Partner tools and resources Cisco Commerce Cisco Partner Summit My Profile Partner feedback Partner training SalesConnect More partner tools and resources Partner support Presales support Support Case Manager All partner support options Show more Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Statement Cookies Accessibility Trademarks Supply Chain Transparency Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:57
https://www.cisco.com/site/in/en/about/sitemap.html
Sitemap - Cisco Skip to main content Skip to search Skip to footer Cisco.com India Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Explore Cisco How to buy Partners EN IN Log in Explore Cisco Search MENU CLOSE How to buy Partners Log in EN IN Close Close Close Close Close Hello, how can I help? Sitemap Popular links Career certifications Career opportunities Case studies and customer stories Cisco Commerce Community Contact us Networking Academy Partner login Products home The Trust Center Show more About Cisco Company Overview Newsroom Leadership Purpose and sustainability Career opportunities The Trust Center Contact us Investor relations Investor relations home Annual reports Financial results Stock information Analyst relations Engage with us Cisco Community Cisco Insider Cisco Research Cisco Store Cisco Talos Internet outages map (ThousandEyes) Outshift by Cisco Show more Products Featured products Cisco AI Defense Cisco Intersight platform Cisco Networking Cloud Cisco Secure Client (including AnyConnect) Cisco Secure Firewall Cisco Webex Suite Data center and cloud networking Switches Routers and SD-WAN appliances Wireless All products Products home Products A-Z Collaboration Computing Networking Security Splunk AppDynamics Software Mobile app downloads Resources Case studies and customer stories Cisco Power Calculator Cisco Validated Compliance dCloud demos, training, and sandboxes End-of-sale and end-of-life products Overviews, demos, and tutorials Trials and demos Visio stencils Warranties Show more Solutions Featured solutions Artificial intelligence Cisco on Cisco Secure access service edge (SASE) Service providers Small and medium businesses Smart buildings Zero Trust Access from Cisco All solutions Solutions home Collaboration Computing Networking Security Industry solutions Industry Portfolio Explorer Cities and communities Education Financial services Government Healthcare Manufacturing Mining Oil and gas Retail Sports, media, and entertainment Transportation Utilities Show more Services Featured services Advanced services Cisco Lifecycle Services Smart Net Total Care Software Support Solution Support Success Tracks All services Services home Collaboration Computing Networking Observability (Splunk) Security Use cases Modern data center Show more Support For products All products All software downloads Collaboration endpoints and phones Routers Security Switches Unified Communications Wireless Contact Support Community Licensing support Returns portal (RMAs) Support Case Manager Support for acquisitions Small business phone numbers Other phone numbers (worldwide) Tools and resources Security advisories Field notices My Devices My Notifications Bug Search Tool Software research Device coverage checker All Support tools Show more Learn Learning at Cisco Career certifications Certification exams Cisco Learning Network Cisco Networking Academy Cisco U. DevNet Packet Tracer (network simulation) All training and certifications Events and webinars Events home Events calendar Cisco Live Solution webinars Technology webinars Technology topics AI application security How to set up a router How to set up a network switch What is cybersecurity? What is a data center? What is a firewall? What is a LAN? What is Wi-Fi 7? All technology topics Show more How to buy Buying from Cisco How-to-buy hub Cisco Capital financing Cisco Refresh (remanufactured equipment) Schedule a call Start a chat Buying through resellers or online Meet our partners Reseller locator Service ordering and contract management Small and medium business Licensing Enterprise Agreement Licensing Hub Software central Show more Partners Cisco Partner Program Becoming a partner Partner incentives Partner specializations Partner tools and resources Cisco Commerce Cisco Partner Summit My Profile Partner feedback Partner training SalesConnect More partner tools and resources Partner support Presales support Support Case Manager All partner support options Show more Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Statement Cookies Trademarks Supply Chain Transparency Environmental Sustainability Information Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:57
https://snyk.io/es/events/snyklaunch/
Snyk Launch 2025 | Asegurar el futuro del desarrollo de aplicaciones de IA | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API &amp; Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API &amp; Web - Todos los clientes Snyk API &amp; Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo Mayo de 2025 Asegura tu futuro de IA en Snyk Launch 2025 La IA está revolucionando rápidamente la arquitectura y el desarrollo de aplicaciones, lo que exige un nuevo enfoque en seguridad que evolucione igual de rápido. Mira la grabación a pedido de Snyk Launch 2025 para descubrir cómo establecer una base para construir con seguridad y confianza en la era de la IA. Mira a pedido El desafío de seguridad de la IA Navega por los desafíos de la era de las aplicaciones de IA  La IA está acelerando el desarrollo más que nunca, pero ¿cómo garantizar que el código que inunda tus sistemas sea seguro? Y más allá del desarrollo, ¿cómo garantizar que las aplicaciones impulsadas por IA no generen riesgos de seguridad no gestionados? Aprende a abordar las complejidades del desarrollo impulsado por la IA y a mantener la seguridad con la solución agéntica habilitada para IA de Snyk. Seguir el ritmo del desarrollo Aprende a escalar la seguridad para igualar la velocidad y el volumen sin precedentes del código generado por IA. Anticiparse a los nuevos vectores de amenaza Afronta las amenazas emergentes de la IA a medida que las aplicaciones aprovechan cada vez más los LLM. Adaptar los flujos de trabajo de los desarrolladores Explora la evolución del rol de los desarrolladores y las habilidades necesarias para una nueva era de programación asistida por IA y la creación de aplicaciones potenciadas por IA. Desarrollar la gobernanza de AppSec Aprovecha la gobernanza de AppSec para la adopción segura de la IA y la gestión de riesgos. Mira a pedido Mira Snyk Launch 2025 y descubre cómo la plataforma de seguridad impulsada por IA de Snyk puede ayudarte a desarrollar rápidamente y mantener la seguridad en la era de la IA. Puntos destacados del orden del día La empresa de la IA no es segura Escucha al CEO de Snyk hablar de los desafíos y oportunidades de la IA que están transformando el desarrollo y comprende las necesidades críticas para acelerar la innovación de forma segura. Orador: Peter McKay, director ejecutivo La evolución de la plataforma de seguridad de los desarrolladores para la era de la IA. Descubre cómo Snyk ayuda a asegurar el desarrollo a la velocidad de la IA, agilizando la gobernanza de AppSec a medida que tanto el desarrollo como los flujos de trabajo de seguridad continúan siendo impulsados por la IA. Orador: Danny Allan, director tecnológico Avanzar en la seguridad de la IA en todo el ecosistema Descubre cómo Snyk ayuda a sus socios a integrar la seguridad de la IA en sus ofertas y flujos de trabajo a través de nuevos avances en el ecosistema. Orador: Manoj Nair, director de innovación  Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:57
https://infisical.com/docs/documentation/platform/identities/gcp-auth
GCP Auth - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Machine Identities GCP Auth Platform Products CLI Reference API Reference SDKs Changelog Getting Started Overview What is Infisical? Concepts Guides Platform Reference Organizations Projects Identities Access Control Audit Logs App Connections Events Workflow Integrations External Migrations Server Admin Console Secret Sharing Connectivity Networking Gateway Authentication Methods User Authentication Machine Identities Explore Options Alibaba Cloud Auth AWS Auth Azure Auth GCP Auth JWT Auth Kubernetes Auth OCI Auth Token Auth TLS Certificate Auth Universal Auth OIDC Auth LDAP Auth Machine Identity Auth Templates Service Token MFA GitHub Team Sync Self-host Infisical Introduction Installation methods Linux Package Replication Upgrade Infisical Instance Environment Variables Release Channels Hardware requirements Guides Reference architectures Infisical Enterprise FAQ Internals Overview Permissions Architecture Security Service tokens Contributing Getting Started Contributing to platform Machine Identities GCP Auth Learn how to authenticate with Infisical for services on Google Cloud Platform GCP Auth is a GCP-native authentication method for GCP resources to access Infisical. It consists of two sub-methods/approaches: GCP ID Token Auth: For GCP services including Compute Engine , App Engine standard environment , App Engine flexible environment , Cloud Functions , Cloud Run , Google Kubernetes Engine , and Cloud Build to authenticate with Infisical. GCP IAM Auth: For Google Cloud Platform (GCP) service accounts to authenticate with Infisical. Google ID Token Auth GCP IAM Auth ​ Diagram The following sequence diagram illustrates the GCP ID Token Auth workflow for authenticating GCP resources with Infisical. ​ Concept At a high-level, Infisical authenticates a GCP resource by verifying its identity and checking that it meets specific requirements (e.g. it is an allowed GCE instance) at the /api/v1/auth/gcp-auth/login endpoint. If successful, then Infisical returns a short-lived access token that can be used to make authenticated requests to the Infisical API. To be more specific: The client running on a GCP service obtains an ID token constituting the identity for a GCP resource such as a GCE instance or Cloud Function; this is a unique JWT token that includes details about the instance as well as Google’s RS256 signature . The client sends the ID token to Infisical at the /api/v1/auth/gcp-auth/login endpoint. Infisical verifies the token against Google’s public OAuth2 certificates . Infisical checks if the entity behind the ID token is allowed to authenticate with Infisical based on set criteria such as Allowed Service Account Emails . If all is well, Infisical returns a short-lived access token that the client can use to make authenticated requests to the Infisical API. We recommend using one of Infisical’s clients like SDKs or the Infisical Agent to authenticate with Infisical using GCP ID Token Auth as they handle the authentication process including generating the instance ID token for you. Also, note that Infisical needs network-level access to send requests to the Google Cloud API as part of the GCP Auth workflow. ​ Guide In the following steps, we explore how to create and use identities for your workloads and applications on GCP to access the Infisical API using the GCP ID Token authentication method. 1 Creating an identity To create an identity, head to your Organization Settings &gt; Access Control &gt; Identities and press Create identity . When creating an identity, you specify an organization level role for it to assume; you can configure roles in Organization Settings &gt; Access Control &gt; Organization Roles. Now input a few details for your new identity. Here’s some guidance for each field: Name (required): A friendly name for the identity. Role (required): A role from the Organization Roles tab for the identity to assume. The organization role assigned will determine what organization level resources this identity can have access to. Once you’ve created an identity, you’ll be redirected to a page where you can manage the identity. Since the identity has been configured with Universal Auth by default, you should re-configure it to use GCP Auth instead. To do this, press to edit the Authentication section, remove the existing Universal Auth configuration, and add a new GCP Auth configuration onto the identity; set the Type field to GCP ID Token Auth . Here’s some more guidance on each field: Allowed Service Account Emails: A comma-separated list of trusted service account emails corresponding to the GCE resource(s) allowed to authenticate with Infisical; this could be something like [email&#160;protected] , [email&#160;protected] , etc. Allowed Projects: A comma-separated list of trusted GCP projects that the GCE instance must belong to authenticate with Infisical. Note that this validation property will only work for GCE instances. Allowed Zones: A comma-separated list of trusted zones that the GCE instances must belong to authenticate with Infisical; this should be the fully-qualified zone name in the format &lt;region&gt;-&lt;zone&gt; like us-central1-a , us-west1-b , etc. Note that this validation property will only work for GCE instances. Access Token TTL (default is 2592000 equivalent to 30 days): The lifetime for an acccess token in seconds. This value will be referenced at renewal time. Access Token Max TTL (default is 2592000 equivalent to 30 days): The maximum lifetime for an acccess token in seconds. This value will be referenced at renewal time. Access Token Max Number of Uses (default is 0 ): The maximum number of times that an access token can be used; a value of 0 implies infinite number of uses. Access Token Trusted IPs: The IPs or CIDR ranges that access tokens can be used from. By default, each token is given the 0.0.0.0/0 , allowing usage from any network address. 2 Adding an identity to a project To enable the identity to access project-level resources such as secrets within a specific project, you should add it to that project. To do this, head over to the project you want to add the identity to and go to Project Settings &gt; Access Control &gt; Machine Identities and press Add identity . Next, select the identity you want to add to the project and the project level role you want to allow it to assume. The project role assigned will determine what project level resources this identity can have access to. 3 Accessing the Infisical API with the identity To access the Infisical API as the identity, you need to generate an ID token constituting the identity of the present GCE instance and make a request to the /api/v1/auth/gcp-auth/login endpoint containing the token in exchange for an access token. We provide a few code examples below of how you can authenticate with Infisical to access the Infisical API . Sample code for generating the ID token Start by making a request from the GCE instance to obtain the ID token. For more examples of how to obtain the token in Java, Go, Node.js, etc. refer to the official documentation . ​ Sample request curl Copy Ask AI curl -H &quot;Metadata-Flavor: Google&quot; \ &#x27;http://metadata/computeMetadata/v1/instance/service-accounts/default/identity?audience=&lt;identityId&gt;&amp;format=full&#x27; Note that you should replace &lt;identityId&gt; with the ID of the identity you created in step 1. Next use send the obtained JWT token along to authenticate with Infisical and obtain an access token. ​ Sample request Request Copy Ask AI curl --location --request POST &#x27;https://app.infisical.com/api/v1/auth/gcp-auth/login&#x27; \ --header &#x27;Content-Type: application/x-www-form-urlencoded&#x27; \ --data-urlencode &#x27;identityId=...&#x27; \ --data-urlencode &#x27;jwt=...&#x27; ​ Sample response Response Copy Ask AI { &quot;accessToken&quot; : &quot;...&quot;, &quot;expiresIn&quot; : 7200, &quot;accessTokenMaxTTL&quot; : 43244 &quot;tokenType&quot; : &quot;Bearer&quot; } Next, you can use the access token to access the Infisical API We recommend using one of Infisical’s clients like SDKs or the Infisical Agent to authenticate with Infisical using GCP IAM Auth as they handle the authentication process including generating the signed JWT token. Each identity access token has a time-to-live (TTL) which you can infer from the response of the login operation; the default TTL is 7200 seconds which can be adjusted. If an identity access token expires, it can no longer authenticate with the Infisical API. In this case, a new access token should be obtained by performing another login operation. ​ Diagram The following sequence diagram illustrates the GCP IAM Auth workflow for authenticating GCP IAM service accounts with Infisical. ​ Concept At a high-level, Infisical authenticates an IAM service account by verifying its identity and checking that it meets specific requirements (e.g. it is an allowed service account) at the /api/v1/auth/gcp-auth/login endpoint. If successful, then Infisical returns a short-lived access token that can be used to make authenticated requests to the Infisical API. To be more specific: The client generates a signed JWT token using the projects.serviceAccounts.signJwt API method ; this is done using the service account credentials associated with the client. The client sends the signed JWT token to Infisical at the /api/v1/auth/gcp-auth/login endpoint. Infisical verifies the signed JWT token. Infisical checks if the service account behind the JWT token is allowed to authenticate with Infisical based Allowed Service Account Emails . If all is well, Infisical returns a short-lived access token that the client can use to make authenticated requests to the Infisical API. We recommend using one of Infisical’s clients like SDKs or the Infisical Agent to authenticate with Infisical using GCP IAM Auth as they handle the authentication process including generating the signed JWT token. Also, note that Infisical needs network-level access to send requests to the Google Cloud API as part of the GCP Auth workflow. ​ Guide In the following steps, we explore how to create and use identities for your workloads and applications on GCP to access the Infisical API using the GCP IAM authentication method. 1 Creating an identity To create an identity, head to your Organization Settings &gt; Access Control &gt; Identities and press Create identity . When creating an identity, you specify an organization level role for it to assume; you can configure roles in Organization Settings &gt; Access Control &gt; Organization Roles. Now input a few details for your new identity. Here’s some guidance for each field: Name (required): A friendly name for the identity. Role (required): A role from the Organization Roles tab for the identity to assume. The organization role assigned will determine what organization level resources this identity can have access to. Once you’ve created an identity, you’ll be redirected to a page where you can manage the identity. Since the identity has been configured with Universal Auth by default, you should re-configure it to use GCP Auth instead. To do this, press to edit the Authentication section, remove the existing Universal Auth configuration, and add a new GCP Auth configuration onto the identity; set the Type field to GCP IAM Auth . Here’s some more guidance on each field: Allowed Service Account Emails: A comma-separated list of trusted IAM service account emails that are allowed to authenticate with Infisical; this could be something like [email&#160;protected] , [email&#160;protected] , etc. Access Token TTL (default is 2592000 equivalent to 30 days): The lifetime for an acccess token in seconds. This value will be referenced at renewal time. Access Token Max TTL (default is 2592000 equivalent to 30 days): The maximum lifetime for an acccess token in seconds. This value will be referenced at renewal time. Access Token Max Number of Uses (default is 0 ): The maximum number of times that an access token can be used; a value of 0 implies infinite number of uses. Access Token Trusted IPs: The IPs or CIDR ranges that access tokens can be used from. By default, each token is given the 0.0.0.0/0 , allowing usage from any network address. 2 Adding an identity to a project To enable the identity to access project-level resources such as secrets within a specific project, you should add it to that project. To do this, head over to the project you want to add the identity to and go to Project Settings &gt; Access Control &gt; Machine Identities and press Add identity . Next, select the identity you want to add to the project and the project level role you want to allow it to assume. The project role assigned will determine what project level resources this identity can have access to. 3 Accessing the Infisical API with the identity To access the Infisical API as the identity, you need to generate a signed JWT token using the projects.serviceAccounts.signJwt API method and make a request to the /api/v1/auth/gcp-auth/login endpoint containing the signed JWT token in exchange for an access token. Make sure that the service account has the iam.serviceAccounts.signJwt permission or the roles/iam.serviceAccountTokenCreator role. We provide a few code examples below of how you can authenticate with Infisical to access the Infisical API . Sample code for generating a signed JWT token The following code provides a generic example of how you can generate a signed JWT token against the projects.serviceAccounts.signJwt API method. The shown example uses Node.js and the official google-auth-library package but you can use any language you wish. Copy Ask AI const { GoogleAuth } = require ( &quot;google-auth-library&quot; ); const auth = new GoogleAuth ({ scopes: &quot;https://www.googleapis.com/auth/cloud-platform&quot; , }); const credentials = await auth . getCredentials (); const identityId = &quot;&lt;your-infisical-identity-id&gt;&quot; ; const jwtPayload = { sub: credentials . client_email , aud: identityId , }; const { data } = await client . request ({ url: `https://iamcredentials.googleapis.com/v1/projects/-/serviceAccounts/ ${ credentials . client_email } :signJwt` , method: &quot;POST&quot; , data: { payload: JSON . stringify ( jwtPayload ) }, }); const jwt = data . signedJwt // send this jwt to Infisical in the next step ​ Sample request Request Copy Ask AI curl --location --request POST &#x27;https://app.infisical.com/api/v1/auth/gcp-auth/login&#x27; \ --header &#x27;Content-Type: application/x-www-form-urlencoded&#x27; \ --data-urlencode &#x27;identityId=...&#x27; \ --data-urlencode &#x27;jwt=...&#x27; ​ Sample response Response Copy Ask AI { &quot;accessToken&quot; : &quot;...&quot;, &quot;expiresIn&quot; : 7200, &quot;accessTokenMaxTTL&quot; : 43244 &quot;tokenType&quot; : &quot;Bearer&quot; } Next, you can use the access token to access the Infisical API We recommend using one of Infisical’s clients like SDKs or the Infisical Agent to authenticate with Infisical using GCP IAM Auth as they handle the authentication process including generating the signed JWT token. Each identity access token has a time-to-live (TTL) which you can infer from the response of the login operation; the default TTL is 7200 seconds which can be adjusted. If an identity access token expires, it can no longer authenticate with the Infisical API. In this case, a new access token should be obtained by performing another login operation. Was this page helpful? Yes No Suggest edits Raise issue Azure Auth JWT Auth ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"16:[\"$\",\"$L36\",null,{\"children\":[\"$\",\"$L5\",null,{\"appearance\":{\"default\":\"light\",\"strict\":true},\"codeblockTheme\":\"dark\",\"children\":[false,[\"$\",\"$L2d\",null,{\"id\":\"_mintlify-banner-script\",\"strategy\":\"beforeInteractive\",\"dangerouslySetInnerHTML\":{\"__html\":\"(function j(a,b,c,d,e){try{let f,g,h=[];try{h=window.location.pathname.split(\\\"/\\\").filter(a=\u003e\\\"\\\"!==a\u0026\u0026\\\"global\\\"!==a).slice(0,2)}catch{h=[]}let i=h.find(a=\u003ec.includes(a)),j=[];for(let c of(i?j.push(i):j.push(b),j.push(\\\"global\\\"),j)){if(!c)continue;let b=a[c];if(b?.content){f=b.content,g=c;break}}if(!f)return void document.documentElement.setAttribute(d,\\\"hidden\\\");let k=!0,l=0;for(;l\u003clocalStorage.length;){let a=localStorage.key(l);if(l++,!a?.endsWith(e))continue;let b=localStorage.getItem(a);if(b\u0026\u0026b===f){k=!1;break}g\u0026\u0026(a.startsWith(`lang:${g}_`)||!a.startsWith(\\\"lang:\\\"))\u0026\u0026(localStorage.removeItem(a),l--)}document.documentElement.setAttribute(d,k?\\\"visible\\\":\\\"hidden\\\")}catch(a){console.error(a),document.documentElement.setAttribute(d,\\\"hidden\\\")}})(\\n {},\\n \\\"en\\\",\\n [],\\n \\\"data-banner-state\\\",\\n \\\"bannerDismissed\\\",\\n)\"}}],[\"$\",\"$L37\",null,{\"appId\":\"$undefined\",\"autoBoot\":true,\"children\":[\"$\",\"$L38\",null,{\"value\":{\"auth\":\"$undefined\",\"userAuth\":\"$undefined\"},\"children\":[\"$\",\"$L39\",null,{\"value\":{\"subdomain\":\"infisical\",\"actualSubdomain\":\"infisical\",\"gitSource\":{\"type\":\"github\",\"owner\":\"infisical\",\"repo\":\"infisical\",\"deployBranch\":\"main\",\"contentDirectory\":\"docs\"},\"inkeep\":{\"integrationApiKey\":\"a2e2846da1a227961e3519816ce2bfb868f7d86467d289de\"},\"trieve\":{\"chatEnabled\":true,\"datasetId\":\"cdc6f647-bdca-43d9-a3e5-f398c156d553\"},\"feedback\":{\"thumbs\":true,\"edits\":true,\"issues\":true},\"entitlements\":{\"AI_CHAT\":{\"status\":\"ENABLED\"}},\"buildId\":\"69659e6f05d1218cf2d5c729:success\",\"clientVersion\":\"0.0.2335\",\"preview\":\"$undefined\"},\"children\":[\"$\",\"$L3a\",null,{\"value\":{\"docsConfig\":{\"theme\":\"mint\",\"$schema\":\"https://mintlify.com/docs.json\",\"name\":\"Infisical\",\"colors\":{\"primary\":\"#26272b\",\"light\":\"#97b31d\",\"dark\":\"#A1B659\"},\"logo\":{\"light\":\"https://mintlify.s3.us-west-1.amazonaws.com/infisical/logo/light.svg\",\"dark\":\"https://mintlify.s3.us-west-1.amazonaws.com/infisical/logo/dark.svg\",\"href\":\"https://infisical.com\"},\"favicon\":\"/favicon.ico\",\"api\":{\"openapi\":\"https://app.infisical.com/api/docs/json\",\"mdx\":{\"server\":[\"https://app.infisical.com\"]}},\"appearance\":\"$16:props:children:props:appearance\",\"background\":{\"color\":{\"light\":\"#ffffff\",\"dark\":\"#0D1117\"}},\"navbar\":{\"links\":[{\"label\":\"Log In\",\"href\":\"https://app.infisical.com/login\"}],\"primary\":{\"type\":\"button\",\"label\":\"Start for Free\",\"href\":\"https://app.infisical.com/signup\"}},\"navigation\":{\"tabs\":[{\"tab\":\"Platform\",\"groups\":[{\"group\":\"Getting Started\",\"pages\":[\"documentation/getting-started/overview\",\"documentation/getting-started/introduction\",{\"group\":\"Concepts\",\"pages\":[\"documentation/getting-started/concepts/deployment-models\",\"documentation/getting-started/concepts/platform-hierarchy\",\"documentation/getting-started/concepts/platform-iam\",\"documentation/getting-started/concepts/client-integrations\",\"documentation/getting-started/concepts/audit-logs\"]},{\"group\":\"Guides\",\"pages\":[\"documentation/guides/governance-models\",\"documentation/guides/organization-structure\"]}]},{\"group\":\"Platform Reference\",\"pages\":[\"documentation/platform/organization\",{\"group\":\"Projects\",\"pages\":[\"documentation/platform/project\",\"documentation/platform/project-templates\",{\"group\":\"KMS Configuration\",\"pages\":[\"documentation/platform/kms-configuration/overview\",\"documentation/platform/kms-configuration/aws-kms\",\"documentation/platform/kms-configuration/aws-hsm\",\"documentation/platform/kms-configuration/gcp-kms\"]}]},{\"group\":\"Identities\",\"pages\":[\"documentation/platform/identities/overview\",\"documentation/platform/identities/user-identities\",\"documentation/platform/identities/machine-identities\"]},{\"group\":\"Access Control\",\"pages\":[\"documentation/platform/access-controls/overview\",\"documentation/platform/access-controls/role-based-access-controls\",{\"group\":\"Attribute based access controls\",\"pages\":[\"documentation/platform/access-controls/abac/overview\",\"documentation/platform/access-controls/abac/managing-user-metadata\",\"documentation/platform/access-controls/abac/managing-machine-identity-attributes\"]},\"documentation/platform/access-controls/additional-privileges\",\"documentation/platform/access-controls/temporary-access\",\"documentation/platform/access-controls/assume-privilege\",\"documentation/platform/access-controls/access-requests\",\"documentation/platform/access-controls/project-access-requests\",\"documentation/platform/pr-workflows\",\"documentation/platform/groups\"]},{\"group\":\"Audit Logs\",\"pages\":[\"documentation/platform/audit-logs\",\"documentation/platform/audit-log-streams/audit-log-streams\",\"documentation/platform/audit-log-streams/audit-log-streams-with-fluentbit\"]},{\"group\":\"App Connections\",\"pages\":[\"integrations/app-connections\",\"integrations/app-connections/overview\",{\"group\":\"Connections\",\"pages\":[\"integrations/app-connections/1password\",\"integrations/app-connections/auth0\",\"integrations/app-connections/aws\",\"integrations/app-connections/azure-app-configuration\",\"integrations/app-connections/azure-adcs\",\"integrations/app-connections/azure-client-secrets\",\"integrations/app-connections/azure-devops\",\"integrations/app-connections/azure-key-vault\",\"integrations/app-connections/bitbucket\",\"integrations/app-connections/camunda\",\"integrations/app-connections/checkly\",\"integrations/app-connections/chef\",\"integrations/app-connections/cloudflare\",\"integrations/app-connections/databricks\",\"integrations/app-connections/digital-ocean\",\"integrations/app-connections/dns-made-easy\",\"integrations/app-connections/flyio\",\"integrations/app-connections/gcp\",\"integrations/app-connections/github\",\"integrations/app-connections/github-radar\",\"integrations/app-connections/gitlab\",\"integrations/app-connections/hashicorp-vault\",\"integrations/app-connections/heroku\",\"integrations/app-connections/humanitec\",\"integrations/app-connections/laravel-forge\",\"integrations/app-connections/ldap\",\"integrations/app-connections/mssql\",\"integrations/app-connections/mongodb\",\"integrations/app-connections/mysql\",\"integrations/app-connections/netlify\",\"integrations/app-connections/northflank\",\"integrations/app-connections/oci\",\"integrations/app-connections/octopus-deploy\",\"integrations/app-connections/okta\",\"integrations/app-connections/oracledb\",\"integrations/app-connections/postgres\",\"integrations/app-connections/railway\",\"integrations/app-connections/redis\",\"integrations/app-connections/render\",\"integrations/app-connections/supabase\",\"integrations/app-connections/teamcity\",\"integrations/app-connections/terraform-cloud\",\"integrations/app-connections/vercel\",\"integrations/app-connections/windmill\",\"integrations/app-connections/zabbix\"]}]},\"documentation/platform/event-subscriptions\",{\"group\":\"Workflow Integrations\",\"pages\":[\"documentation/platform/workflow-integrations/slack-integration\",\"documentation/platform/workflow-integrations/microsoft-teams-integration\"]},{\"group\":\"External Migrations\",\"pages\":[\"documentation/platform/external-migrations/overview\",\"documentation/platform/external-migrations/envkey\",\"documentation/platform/external-migrations/vault\"]},\"documentation/platform/admin-panel/server-admin\",\"documentation/platform/secret-sharing\"]},{\"group\":\"Connectivity\",\"pages\":[\"documentation/setup/networking\",{\"group\":\"Gateway\",\"pages\":[\"documentation/platform/gateways/overview\",\"documentation/platform/gateways/gateway-deployment\",{\"group\":\"Relay Deployment\",\"pages\":[\"documentation/platform/gateways/relay-deployment/overview\",\"documentation/platform/gateways/relay-deployment/terraform\"]},\"documentation/platform/gateways/security\"]}]},{\"group\":\"Authentication Methods\",\"pages\":[{\"group\":\"User Authentication\",\"pages\":[\"integrations/user-authentication\",\"documentation/platform/auth-methods/email-password\",{\"group\":\"SSO\",\"pages\":[\"documentation/platform/sso/overview\",\"documentation/platform/sso/google\",\"documentation/platform/sso/github\",\"documentation/platform/sso/gitlab\",\"documentation/platform/sso/okta\",\"documentation/platform/sso/azure\",\"documentation/platform/sso/jumpcloud\",\"documentation/platform/sso/keycloak-saml\",\"documentation/platform/sso/google-saml\",\"documentation/platform/sso/auth0-saml\",{\"group\":\"OIDC\",\"pages\":[{\"group\":\"Keycloak OIDC\",\"pages\":[\"documentation/platform/sso/keycloak-oidc/overview\",\"documentation/platform/sso/keycloak-oidc/group-membership-mapping\"]},\"documentation/platform/sso/auth0-oidc\",\"documentation/platform/sso/pingone-oidc\",{\"group\":\"General OIDC\",\"pages\":[\"documentation/platform/sso/general-oidc/overview\",\"documentation/platform/sso/general-oidc/group-membership-mapping\"]}]}]},{\"group\":\"LDAP\",\"pages\":[\"documentation/platform/ldap/overview\",\"documentation/platform/ldap/jumpcloud\",\"documentation/platform/ldap/general\"]},{\"group\":\"SCIM\",\"pages\":[\"documentation/platform/scim/overview\",\"documentation/platform/scim/okta\",\"documentation/platform/scim/azure\",\"documentation/platform/scim/jumpcloud\",\"documentation/platform/scim/pingone\",\"documentation/platform/scim/group-mappings\"]}]},{\"group\":\"Machine Identities\",\"pages\":[\"integrations/machine-authentication\",\"documentation/platform/identities/alicloud-auth\",\"documentation/platform/identities/aws-auth\",\"documentation/platform/identities/azure-auth\",\"documentation/platform/identities/gcp-auth\",\"documentation/platform/identities/jwt-auth\",\"documentation/platform/identities/kubernetes-auth\",\"documentation/platform/identities/oci-auth\",\"documentation/platform/identities/token-auth\",\"documentation/platform/identities/tls-cert-auth\",\"documentation/platform/identities/universal-auth\",{\"group\":\"OIDC Auth\",\"pages\":[\"documentation/platform/identities/oidc-auth/general\",\"documentation/platform/identities/oidc-auth/azure\",\"documentation/platform/identities/oidc-auth/github\",\"documentation/platform/identities/oidc-auth/circleci\",\"documentation/platform/identities/oidc-auth/gitlab\",\"documentation/platform/identities/oidc-auth/terraform-cloud\",\"documentation/platform/identities/oidc-auth/spire\"]},{\"group\":\"LDAP Auth\",\"pages\":[\"documentation/platform/identities/ldap-auth/general\",\"documentation/platform/identities/ldap-auth/jumpcloud\"]}]},\"documentation/platform/identities/auth-templates\",\"documentation/platform/token\",\"documentation/platform/mfa\",\"documentation/platform/github-org-sync\"]},{\"group\":\"Self-host Infisical\",\"pages\":[\"self-hosting/overview\",{\"group\":\"Installation methods\",\"pages\":[\"self-hosting/deployment-options/standalone-infisical\",\"self-hosting/deployment-options/docker-swarm\",\"self-hosting/deployment-options/docker-compose\",\"self-hosting/deployment-options/kubernetes-helm\"]},{\"group\":\"Linux Package\",\"pages\":[\"self-hosting/deployment-options/native/linux-package/installation\",\"self-hosting/deployment-options/native/linux-package/commands-configuration\",\"self-hosting/deployment-options/linux-upgrade\"]},\"self-hosting/guides/replication\",\"self-hosting/guides/upgrading-infisical\",\"self-hosting/configuration/envars\",\"self-hosting/guides/releases\",\"self-hosting/configuration/requirements\",{\"group\":\"Guides\",\"pages\":[\"self-hosting/guides/mongo-to-postgres\",\"self-hosting/guides/custom-certificates\",\"self-hosting/guides/automated-bootstrapping\",\"self-hosting/guides/production-hardening\",\"self-hosting/guides/monitoring-telemetry\"]},{\"group\":\"Reference architectures\",\"pages\":[\"self-hosting/reference-architectures/aws-ecs\",\"self-hosting/reference-architectures/linux-deployment-ha\",\"self-hosting/reference-architectures/on-prem-k8s-ha\",\"self-hosting/reference-architectures/google-cloud-run\"]},\"self-hosting/ee\",\"self-hosting/faq\"]},{\"group\":\"Internals\",\"pages\":[\"internals/overview\",{\"group\":\"Permissions\",\"pages\":[\"internals/permissions/overview\",\"internals/permissions/project-permissions\",\"internals/permissions/organization-permissions\",\"internals/permissions/migration\"]},{\"group\":\"Architecture\",\"pages\":[\"internals/architecture/components\",\"internals/architecture/cloud\"]},\"internals/security\",\"internals/service-tokens\"]},{\"group\":\"Contributing\",\"pages\":[{\"group\":\"Getting Started\",\"pages\":[\"contributing/getting-started/overview\",\"contributing/getting-started/code-of-conduct\",\"contributing/getting-started/pull-requests\"]},{\"group\":\"Contributing to platform\",\"pages\":[\"contributing/platform/developing\",\"contributing/platform/backend/how-to-create-a-feature\",\"contributing/platform/backend/folder-structure\"]}]}]},{\"tab\":\"Products\",\"menu\":[{\"item\":\"Secrets Management\",\"groups\":[{\"group\":\"Secrets Management\",\"pages\":[\"documentation/platform/secrets-mgmt/overview\",{\"group\":\"Concepts\",\"pages\":[\"documentation/platform/secrets-mgmt/concepts/secrets-mgmt\",\"documentation/platform/secrets-mgmt/concepts/access-control\",\"documentation/platform/secrets-mgmt/concepts/secrets-delivery\",\"documentation/platform/secrets-mgmt/concepts/secrets-rotation\",\"documentation/platform/secrets-mgmt/concepts/dynamic-secrets\"]},{\"group\":\"Guides\",\"pages\":[\"documentation/guides/introduction\",\"documentation/guides/local-development\",\"documentation/guides/node\",\"documentation/guides/python\",\"documentation/guides/nextjs-vercel\",\"documentation/guides/kubernetes-operator\",\"documentation/guides/microsoft-power-apps\"]}]},{\"group\":\"Product Reference\",\"pages\":[\"documentation/platform/secrets-mgmt/project\",\"documentation/platform/folder\",\"documentation/platform/secret-versioning\",\"documentation/platform/pit-recovery\",\"documentation/platform/secret-reference\",{\"group\":\"Secret Rotation\",\"pages\":[\"integrations/secret-rotations\",\"documentation/platform/secret-rotation/overview\",\"documentation/platform/secret-rotation/auth0-client-secret\",\"documentation/platform/secret-rotation/aws-iam-user-secret\",\"documentation/platform/secret-rotation/azure-client-secret\",\"documentation/platform/secret-rotation/databricks-service-principal-secret\",\"documentation/platform/secret-rotation/ldap-password\",\"documentation/platform/secret-rotation/mongodb-credentials\",\"documentation/platform/secret-rotation/mssql-credentials\",\"documentation/platform/secret-rotation/mysql-credentials\",\"documentation/platform/secret-rotation/okta-client-secret\",\"documentation/platform/secret-rotation/oracledb-credentials\",\"documentation/platform/secret-rotation/postgres-credentials\",\"documentation/platform/secret-rotation/redis-credentials\"]},{\"group\":\"Dynamic Secrets\",\"pages\":[\"integrations/dynamic-secrets\",\"documentation/platform/dynamic-secrets/overview\",\"documentation/platform/dynamic-secrets/aws-elasticache\",\"documentation/platform/dynamic-secrets/aws-iam\",\"documentation/platform/dynamic-secrets/azure-entra-id\",\"documentation/platform/dynamic-secrets/azure-sql-database\",\"documentation/platform/dynamic-secrets/cassandra\",\"documentation/platform/dynamic-secrets/couchbase\",\"documentation/platform/dynamic-secrets/elastic-search\",\"documentation/platform/dynamic-secrets/gcp-iam\",\"documentation/platform/dynamic-secrets/github\",\"documentation/platform/dynamic-secrets/ldap\",\"documentation/platform/dynamic-secrets/mongo-atlas\",\"documentation/platform/dynamic-secrets/mongo-db\",\"documentation/platform/dynamic-secrets/mssql\",\"documentation/platform/dynamic-secrets/mysql\",\"documentation/platform/dynamic-secrets/oracle\",\"documentation/platform/dynamic-secrets/postgresql\",\"documentation/platform/dynamic-secrets/rabbit-mq\",\"documentation/platform/dynamic-secrets/redis\",\"documentation/platform/dynamic-secrets/sap-ase\",\"documentation/platform/dynamic-secrets/sap-hana\",\"documentation/platform/dynamic-secrets/snowflake\",\"documentation/platform/dynamic-secrets/totp\",\"documentation/platform/dynamic-secrets/kubernetes\",\"documentation/platform/dynamic-secrets/vertica\"]},\"documentation/platform/webhooks\"]},{\"group\":\"Infrastructure Integrations\",\"pages\":[\"integrations/platforms/ansible\",\"integrations/platforms/apache-airflow\",{\"group\":\"AWS\",\"pages\":[\"integrations/platforms/aws/lambda\"]},{\"group\":\"Kubernetes Operator\",\"pages\":[\"integrations/platforms/kubernetes/overview\",\"integrations/platforms/kubernetes/infisical-secret-crd\",\"integrations/platforms/kubernetes/infisical-push-secret-crd\",\"integrations/platforms/kubernetes/infisical-dynamic-secret-crd\"]},\"integrations/platforms/kubernetes-injector\",\"integrations/platforms/kubernetes-csi\",{\"group\":\"Agent\",\"pages\":[\"integrations/platforms/infisical-agent\",\"integrations/platforms/docker-swarm-with-agent\",\"integrations/platforms/ecs-with-agent\"]},{\"group\":\"Docker\",\"pages\":[\"integrations/platforms/docker-intro\",\"integrations/platforms/docker\",\"integrations/platforms/docker-pass-envs\",\"integrations/platforms/docker-compose\"]},\"integrations/frameworks/packer\",\"integrations/frameworks/pulumi\",\"integrations/frameworks/terraform\"]},{\"group\":\"Secret Syncs\",\"pages\":[\"integrations/secret-syncs\",\"integrations/secret-syncs/overview\",{\"group\":\"Syncs\",\"pages\":[\"integrations/secret-syncs/1password\",\"integrations/secret-syncs/aws-parameter-store\",\"integrations/secret-syncs/aws-secrets-manager\",\"integrations/secret-syncs/azure-app-configuration\",\"integrations/secret-syncs/azure-devops\",\"integrations/secret-syncs/azure-key-vault\",\"integrations/secret-syncs/bitbucket\",\"integrations/secret-syncs/camunda\",\"integrations/secret-syncs/checkly\",\"integrations/secret-syncs/chef\",\"integrations/secret-syncs/cloudflare-pages\",\"integrations/secret-syncs/cloudflare-workers\",\"integrations/secret-syncs/databricks\",\"integrations/secret-syncs/digital-ocean-app-platform\",\"integrations/secret-syncs/flyio\",\"integrations/secret-syncs/gcp-secret-manager\",\"integrations/secret-syncs/github\",\"integrations/secret-syncs/gitlab\",\"integrations/secret-syncs/hashicorp-vault\",\"integrations/secret-syncs/heroku\",\"integrations/secret-syncs/humanitec\",\"integrations/secret-syncs/laravel-forge\",\"integrations/secret-syncs/netlify\",\"integrations/secret-syncs/northflank\",\"integrations/secret-syncs/oci-vault\",\"integrations/secret-syncs/octopus-deploy\",\"integrations/secret-syncs/railway\",\"integrations/secret-syncs/render\",\"integrations/secret-syncs/supabase\",\"integrations/secret-syncs/teamcity\",\"integrations/secret-syncs/terraform-cloud\",\"integrations/secret-syncs/vercel\",\"integrations/secret-syncs/windmill\",\"integrations/secret-syncs/zabbix\"]}]},{\"group\":\"CI/CD Integrations\",\"pages\":[\"integrations/cicd/aws-amplify\",\"integrations/cicd/bitbucket\",\"integrations/cicd/githubactions\",\"integrations/cicd/gitlab\",\"integrations/cicd/jenkins\"]},{\"group\":\"Framework Integrations\",\"pages\":[\"integrations/framework-integrations\",\"integrations/frameworks/spring-boot-maven\",\"integrations/frameworks/react\",\"integrations/frameworks/vue\",\"integrations/frameworks/express\",{\"group\":\"View more\",\"pages\":[\"integrations/frameworks/nextjs\",\"integrations/frameworks/nestjs\",\"integrations/frameworks/sveltekit\",\"integrations/frameworks/nuxt\",\"integrations/frameworks/gatsby\",\"integrations/frameworks/remix\",\"integrations/frameworks/vite\",\"integrations/frameworks/fiber\",\"integrations/frameworks/django\",\"integrations/frameworks/flask\",\"integrations/frameworks/laravel\",\"integrations/frameworks/rails\",\"integrations/frameworks/dotnet\",\"integrations/platforms/pm2\",\"integrations/frameworks/ab-initio\"]}]},{\"group\":\"Build Tool Integrations\",\"pages\":[\"integrations/build-tools/gradle\"]},{\"group\":\"Others\",\"pages\":[\"integrations/external/backstage\"]}]},{\"item\":\"Secrets Scanning\",\"groups\":[{\"group\":\"Secrets Scanning\",\"pages\":[\"documentation/platform/secret-scanning/overview\",{\"group\":\"Concepts\",\"pages\":[\"documentation/platform/secret-scanning/concepts/secret-scanning\"]}]},{\"group\":\"Product Reference\",\"pages\":[\"documentation/platform/secret-scanning/usage\",\"documentation/platform/secret-scanning/bitbucket\",\"documentation/platform/secret-scanning/github\",\"documentation/platform/secret-scanning/gitlab\"]}]},{\"item\":\"Certificate Management\",\"groups\":[{\"group\":\"Certificate Management\",\"pages\":[\"documentation/platform/pki/overview\",{\"group\":\"Concepts\",\"pages\":[\"documentation/platform/pki/concepts/certificate-mgmt\",\"documentation/platform/pki/concepts/certificate-lifecycle\",\"documentation/platform/pki/concepts/certificate-components\"]},{\"group\":\"Guides\",\"pages\":[\"documentation/platform/pki/guides/request-cert-agent\",\"documentation/platform/pki/guides/request-cert-api\",\"documentation/platform/pki/guides/request-cert-acme\"]}]},{\"group\":\"Product Reference\",\"pages\":[{\"group\":\"Certificate Authorities\",\"pages\":[\"documentation/platform/pki/ca/overview\",\"documentation/platform/pki/ca/private-ca\",\"documentation/platform/pki/ca/external-ca\"]},{\"group\":\"Certificates\",\"pages\":[\"documentation/platform/pki/certificates/overview\",\"documentation/platform/pki/certificates/profiles\",\"documentation/platform/pki/certificates/templates\",\"documentation/platform/pki/certificates/certificates\"]},{\"group\":\"Enrollment Methods\",\"pages\":[\"documentation/platform/pki/enrollment-methods/overview\",\"documentation/platform/pki/enrollment-methods/api\",\"documentation/platform/pki/enrollment-methods/acme\",\"documentation/platform/pki/enrollment-methods/est\"]},\"documentation/platform/pki/alerting\"]},{\"group\":\"Infrastructure Integrations\",\"pages\":[\"integrations/platforms/certificate-agent\",\"documentation/platform/pki/k8s-cert-manager\",\"documentation/platform/pki/integration-guides/gloo-mesh\",\"documentation/platform/pki/integration-guides/windows-server-acme\",\"documentation/platform/pki/integration-guides/nginx-certbot\",\"documentation/platform/pki/integration-guides/apache-certbot\",\"documentation/platform/pki/integration-guides/tomcat-certbot\",\"documentation/platform/pki/integration-guides/jboss-certbot\"]},{\"group\":\"Certificate Syncs\",\"pages\":[\"documentation/platform/pki/certificate-syncs/overview\",\"documentation/platform/pki/certificate-syncs/aws-certificate-manager\",\"documentation/platform/pki/certificate-syncs/aws-secrets-manager\",\"documentation/platform/pki/certificate-syncs/azure-key-vault\",\"documentation/platform/pki/certificate-syncs/chef\"]},{\"group\":\"External CA Integrations\",\"pages\":[\"documentation/platform/pki/ca/acme-ca\",\"documentation/platform/pki/ca/lets-encrypt\",\"documentation/platform/pki/ca/digicert\",\"documentation/platform/pki/ca/azure-adcs\"]}]},{\"item\":\"Infisical KMS\",\"groups\":[{\"group\":\"Infisical KMS\",\"pages\":[\"documentation/platform/kms/overview\",\"documentation/platform/kms/hsm-integration\",\"documentation/platform/kms/kubernetes-encryption\",\"documentation/platform/kms/kmip\"]}]},{\"item\":\"Infisical PAM\",\"groups\":[{\"group\":\"Infisical PAM\",\"pages\":[\"documentation/platform/pam/overview\",{\"group\":\"Getting Started\",\"pages\":[\"documentation/platform/pam/getting-started/setup\",{\"group\":\"Resources\",\"pages\":[\"documentation/platform/pam/getting-started/resources\",\"documentation/platform/pam/getting-started/resources/aws-iam\",\"documentation/platform/pam/getting-started/resources/kubernetes\",\"documentation/platform/pam/getting-started/resources/redis\",\"documentation/platform/pam/getting-started/resources/ssh\"]},\"documentation/platform/pam/getting-started/accounts\"]},\"documentation/platform/pam/architecture\"]},{\"group\":\"Product Reference\",\"pages\":[\"documentation/platform/pam/product-reference/auditing\",\"documentation/platform/pam/product-reference/session-recording\",\"documentation/platform/pam/product-reference/credential-rotation\"]}]},{\"item\":\"Agent Sentinel\",\"groups\":[{\"group\":\"Agent Sentinel\",\"pages\":[\"documentation/platform/agent-sentinel/overview\",{\"group\":\"Concepts\",\"pages\":[\"documentation/platform/agent-sentinel/concepts/mcp-overview\"]}]},{\"group\":\"Product Reference\",\"pages\":[\"documentation/platform/agent-sentinel/mcp-servers\",\"documentation/platform/agent-sentinel/mcp-endpoints\",\"documentation/platform/agent-sentinel/activity-logs\"]}]}]},{\"tab\":\"CLI Reference\",\"groups\":[{\"group\":\"Command line\",\"pages\":[\"cli/overview\",\"cli/usage\",{\"group\":\"Core commands\",\"pages\":[\"cli/commands/login\",\"cli/commands/init\",\"cli/commands/run\",\"cli/commands/secrets\",\"cli/commands/dynamic-secrets\",\"cli/commands/ssh\",\"cli/commands/gateway\",\"cli/commands/relay\",\"cli/commands/bootstrap\",\"cli/commands/export\",\"cli/commands/token\",\"cli/commands/service-token\",\"cli/commands/vault\",\"cli/commands/user\",\"cli/commands/reset\",{\"group\":\"infisical scan\",\"pages\":[\"cli/commands/scan\",\"cli/commands/scan-git-changes\",\"cli/commands/scan-install\"]}]},\"cli/scanning-overview\",\"cli/project-config\",\"cli/faq\"]}]},{\"tab\":\"API Reference\",\"groups\":[{\"group\":\"Overview\",\"pages\":[\"api-reference/overview/introduction\",\"api-reference/overview/authentication\"]},{\"group\":\"Organization\",\"pages\":[{\"group\":\"Organization Users\",\"pages\":[\"api-reference/endpoints/organizations/memberships\",\"api-reference/endpoints/organizations/update-membership\",\"api-reference/endpoints/organizations/delete-membership\",\"api-reference/endpoints/organizations/bulk-delete-memberships\",\"api-reference/endpoints/organizations/list-identity-memberships\"]},{\"group\":\"Organization Groups\",\"pages\":[\"api-reference/endpoints/groups/create\",\"api-reference/endpoints/groups/update\",\"api-reference/endpoints/groups/delete\",\"api-reference/endpoints/groups/get\",\"api-reference/endpoints/groups/get-by-id\",\"api-reference/endpoints/groups/add-group-user\",\"api-reference/endpoints/groups/remove-group-user\",\"api-reference/endpoints/groups/list-group-users\",\"api-reference/endpoints/groups/add-group-machine-identity\",\"api-reference/endpoints/groups/remove-group-machine-identity\",\"api-reference/endpoints/groups/list-group-machine-identities\",\"api-reference/endpoints/groups/list-group-projects\",\"api-reference/endpoints/groups/list-group-members\"]},{\"group\":\"Organization Identities\",\"pages\":[\"api-reference/endpoints/identities/create\",\"api-reference/endpoints/identities/update\",\"api-reference/endpoints/identities/delete\",\"api-reference/endpoints/identities/get-by-id\",\"api-reference/endpoints/identities/list\",\"api-reference/endpoints/identities/search\"]},{\"group\":\"OIDC SSO\",\"pages\":[\"api-reference/endpoints/organizations/oidc-sso/get-oidc-config\",\"api-reference/endpoints/organizations/oidc-sso/update-oidc-config\",\"api-reference/endpoints/organizations/oidc-sso/create-oidc-config\"]},{\"group\":\"LDAP SSO\",\"pages\":[\"api-reference/endpoints/organizations/ldap-sso/get-ldap-config\",\"api-reference/endpoints/organizations/ldap-sso/update-ldap-config\",\"api-reference/endpoints/organizations/ldap-sso/create-ldap-config\"]},{\"group\":\"SAML SSO\",\"pages\":[\"api-reference/endpoints/organizations/saml-sso/get-saml-config\",\"api-reference/endpoints/organizations/saml-sso/update-saml-config\",\"api-reference/endpoints/organizations/saml-sso/create-saml-config\"]},{\"group\":\"SCIM\",\"pages\":[{\"group\":\" Group to Org Role Mappings\",\"pages\":[\"api-reference/endpoints/organizations/scim/group-org-role-mappings/list\",\"api-reference/endpoints/organizations/scim/group-org-role-mappings/update\"]}]}]},{\"group\":\"Project\",\"pages\":[{\"group\":\"Projects\",\"pages\":[\"api-reference/endpoints/projects/get-project-by-slug\",\"api-reference/endpoints/projects/create-project\",\"api-reference/endpoints/projects/delete-project\",\"api-reference/endpoints/projects/get-project\",\"api-reference/endpoints/projects/list-projects\",\"api-reference/endpoints/projects/update-project\",\"api-reference/endpoints/projects/secret-snapshots\",{\"group\":\"Legacy\",\"pages\":[\"api-reference/endpoints/deprecated/projects/get-project-by-slug\",\"api-reference/endpoints/deprecated/projects/create-project\",\"api-reference/endpoints/deprecated/projects/delete-project\",\"api-reference/endpoints/deprecated/projects/get-project\",\"api-reference/endpoints/deprecated/organizations/projects\",\"api-reference/endpoints/deprecated/projects/update-project\",\"api-reference/endpoints/deprecated/projects/secret-snapshots\"]}]},{\"group\":\"Project Users\",\"pages\":[\"api-reference/endpoints/project-users/invite-member-to-project\",\"api-reference/endpoints/project-users/remove-member-from-project\",\"api-reference/endpoints/project-users/memberships\",\"api-reference/endpoints/project-users/get-by-username\",\"api-reference/endpoints/project-users/update-membership\",{\"group\":\"Legacy\",\"pages\":[\"api-reference/endpoints/deprecated/project-users/invite-member-to-project\",\"api-reference/endpoints/deprecated/project-users/remove-member-from-project\",\"api-reference/endpoints/deprecated/project-users/memberships\",\"api-reference/endpoints/deprecated/project-users/get-by-username\",\"api-reference/endpoints/deprecated/project-users/update-membership\"]}]},{\"group\":\"Project Groups\",\"pages\":[\"api-reference/endpoints/project-groups/create\",\"api-reference/endpoints/project-groups/delete\",\"api-reference/endpoints/project-groups/get-by-id\",\"api-reference/endpoints/project-groups/list\",\"api-reference/endpoints/project-groups/update\",{\"group\":\"Legacy\",\"pages\":[\"api-reference/endpoints/deprecated/project-groups/create\",\"api-reference/endpoints/deprecated/project-groups/delete\",\"api-reference/endpoints/deprecated/project-groups/get-by-id\",\"api-reference/endpoints/deprecated/project-groups/list\",\"api-reference/endpoints/deprecated/project-groups/update\"]}]},{\"group\":\"Project Managed Identities\",\"pages\":[\"api-reference/endpoints/project-identities/add-identity\",\"api-reference/endpoints/project-identities/list-identity\",\"api-reference/endpoints/project-identities/get-by-id\",\"api-reference/endpoints/project-identities/update-identity\",\"api-reference/endpoints/project-identities/delete-identity\"]},{\"group\":\"Project Identity Memberships\",\"pages\":[\"api-reference/endpoints/project-identities-membership/add-identity-membership\",\"api-reference/endpoints/project-identities-membership/list-identity-memberships\",\"api-reference/endpoints/project-identities-membership/get-by-id\",\"api-reference/endpoints/project-identities-membership/update-identity-membership\",\"api-reference/endpoints/project-identities-membership/delete-identity-membership\",{\"group\":\"Legacy\",\"pages\":[\"api-reference/endpoints/deprecated/project-identities-v2/add-identity-membership\",\"api-reference/endpoints/deprecated/project-identities-v2/list-identity-memberships\",\"api-reference/endpoints/deprecated/project-identities-v2/get-by-id\",\"api-reference/endpoints/deprecated/project-identities-v2/update-identity-membership\",\"api-reference/endpoints/deprecated/project-identities-v2/delete-identity-membership\"]}]},{\"group\":\"Project Templates\",\"pages\":[\"api-reference/endpoints/project-templates/create\",\"api-reference/endpoints/project-templates/update\",\"api-reference/endpoints/project-templates/delete\",\"api-reference/endpoints/project-templates/get-by-id\",\"api-reference/endpoints/project-templates/list\"]},{\"group\":\"Project Roles\",\"pages\":[\"api-reference/endpoints/project-roles/create\",\"api-reference/endpoints/project-roles/update\",\"api-reference/endpoints/project-roles/delete\",\"api-reference/endpoints/project-roles/get-by-slug\",\"api-reference/endpoints/project-roles/list\",{\"group\":\"Legacy\",\"pages\":[\"api-reference/endpoints/deprecated/project-roles/create\",\"api-reference/endpoints/deprecated/project-roles/update\",\"api-reference/endpoints/deprecated/project-roles/delete\",\"api-reference/endpoints/deprecated/project-roles/get-by-slug\",\"api-reference/endpoints/deprecated/project-roles/list\"]}]},{\"group\":\"Identity Specific Privilege\",\"pages\":[{\"group\":\"V1 (Legacy)\",\"pages\":[\"api-reference/endpoints/identity-specific-privilege/v1/create-permanent\",\"api-reference/endpoints/identity-specific-privilege/v1/create-temporary\",\"api-reference/endpoints/identity-specific-privilege/v1/update\",\"api-reference/endpoints/identity-specific-privilege/v1/delete\",\"api-reference/endpoints/identity-specific-privilege/v1/find-by-slug\",\"api-reference/endpoints/identity-specific-privilege/v1/list\"]},{\"group\":\"V2\",\"pages\":[\"api-reference/endpoints/identity-specific-privilege/v2/create\",\"api-reference/endpoints/identity-specific-privilege/v2/update\
2026-01-13T09:29:57
https://infisical.com/docs/documentation/platform/identities/gcp-auth
GCP Auth - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Machine Identities GCP Auth Platform Products CLI Reference API Reference SDKs Changelog Getting Started Overview What is Infisical? Concepts Guides Platform Reference Organizations Projects Identities Access Control Audit Logs App Connections Events Workflow Integrations External Migrations Server Admin Console Secret Sharing Connectivity Networking Gateway Authentication Methods User Authentication Machine Identities Explore Options Alibaba Cloud Auth AWS Auth Azure Auth GCP Auth JWT Auth Kubernetes Auth OCI Auth Token Auth TLS Certificate Auth Universal Auth OIDC Auth LDAP Auth Machine Identity Auth Templates Service Token MFA GitHub Team Sync Self-host Infisical Introduction Installation methods Linux Package Replication Upgrade Infisical Instance Environment Variables Release Channels Hardware requirements Guides Reference architectures Infisical Enterprise FAQ Internals Overview Permissions Architecture Security Service tokens Contributing Getting Started Contributing to platform Machine Identities GCP Auth Learn how to authenticate with Infisical for services on Google Cloud Platform GCP Auth is a GCP-native authentication method for GCP resources to access Infisical. It consists of two sub-methods/approaches: GCP ID Token Auth: For GCP services including Compute Engine , App Engine standard environment , App Engine flexible environment , Cloud Functions , Cloud Run , Google Kubernetes Engine , and Cloud Build to authenticate with Infisical. GCP IAM Auth: For Google Cloud Platform (GCP) service accounts to authenticate with Infisical. Google ID Token Auth GCP IAM Auth ​ Diagram The following sequence diagram illustrates the GCP ID Token Auth workflow for authenticating GCP resources with Infisical. ​ Concept At a high-level, Infisical authenticates a GCP resource by verifying its identity and checking that it meets specific requirements (e.g. it is an allowed GCE instance) at the /api/v1/auth/gcp-auth/login endpoint. If successful, then Infisical returns a short-lived access token that can be used to make authenticated requests to the Infisical API. To be more specific: The client running on a GCP service obtains an ID token constituting the identity for a GCP resource such as a GCE instance or Cloud Function; this is a unique JWT token that includes details about the instance as well as Google’s RS256 signature . The client sends the ID token to Infisical at the /api/v1/auth/gcp-auth/login endpoint. Infisical verifies the token against Google’s public OAuth2 certificates . Infisical checks if the entity behind the ID token is allowed to authenticate with Infisical based on set criteria such as Allowed Service Account Emails . If all is well, Infisical returns a short-lived access token that the client can use to make authenticated requests to the Infisical API. We recommend using one of Infisical’s clients like SDKs or the Infisical Agent to authenticate with Infisical using GCP ID Token Auth as they handle the authentication process including generating the instance ID token for you. Also, note that Infisical needs network-level access to send requests to the Google Cloud API as part of the GCP Auth workflow. ​ Guide In the following steps, we explore how to create and use identities for your workloads and applications on GCP to access the Infisical API using the GCP ID Token authentication method. 1 Creating an identity To create an identity, head to your Organization Settings &gt; Access Control &gt; Identities and press Create identity . When creating an identity, you specify an organization level role for it to assume; you can configure roles in Organization Settings &gt; Access Control &gt; Organization Roles. Now input a few details for your new identity. Here’s some guidance for each field: Name (required): A friendly name for the identity. Role (required): A role from the Organization Roles tab for the identity to assume. The organization role assigned will determine what organization level resources this identity can have access to. Once you’ve created an identity, you’ll be redirected to a page where you can manage the identity. Since the identity has been configured with Universal Auth by default, you should re-configure it to use GCP Auth instead. To do this, press to edit the Authentication section, remove the existing Universal Auth configuration, and add a new GCP Auth configuration onto the identity; set the Type field to GCP ID Token Auth . Here’s some more guidance on each field: Allowed Service Account Emails: A comma-separated list of trusted service account emails corresponding to the GCE resource(s) allowed to authenticate with Infisical; this could be something like [email&#160;protected] , [email&#160;protected] , etc. Allowed Projects: A comma-separated list of trusted GCP projects that the GCE instance must belong to authenticate with Infisical. Note that this validation property will only work for GCE instances. Allowed Zones: A comma-separated list of trusted zones that the GCE instances must belong to authenticate with Infisical; this should be the fully-qualified zone name in the format &lt;region&gt;-&lt;zone&gt; like us-central1-a , us-west1-b , etc. Note that this validation property will only work for GCE instances. Access Token TTL (default is 2592000 equivalent to 30 days): The lifetime for an acccess token in seconds. This value will be referenced at renewal time. Access Token Max TTL (default is 2592000 equivalent to 30 days): The maximum lifetime for an acccess token in seconds. This value will be referenced at renewal time. Access Token Max Number of Uses (default is 0 ): The maximum number of times that an access token can be used; a value of 0 implies infinite number of uses. Access Token Trusted IPs: The IPs or CIDR ranges that access tokens can be used from. By default, each token is given the 0.0.0.0/0 , allowing usage from any network address. 2 Adding an identity to a project To enable the identity to access project-level resources such as secrets within a specific project, you should add it to that project. To do this, head over to the project you want to add the identity to and go to Project Settings &gt; Access Control &gt; Machine Identities and press Add identity . Next, select the identity you want to add to the project and the project level role you want to allow it to assume. The project role assigned will determine what project level resources this identity can have access to. 3 Accessing the Infisical API with the identity To access the Infisical API as the identity, you need to generate an ID token constituting the identity of the present GCE instance and make a request to the /api/v1/auth/gcp-auth/login endpoint containing the token in exchange for an access token. We provide a few code examples below of how you can authenticate with Infisical to access the Infisical API . Sample code for generating the ID token Start by making a request from the GCE instance to obtain the ID token. For more examples of how to obtain the token in Java, Go, Node.js, etc. refer to the official documentation . ​ Sample request curl Copy Ask AI curl -H &quot;Metadata-Flavor: Google&quot; \ &#x27;http://metadata/computeMetadata/v1/instance/service-accounts/default/identity?audience=&lt;identityId&gt;&amp;format=full&#x27; Note that you should replace &lt;identityId&gt; with the ID of the identity you created in step 1. Next use send the obtained JWT token along to authenticate with Infisical and obtain an access token. ​ Sample request Request Copy Ask AI curl --location --request POST &#x27;https://app.infisical.com/api/v1/auth/gcp-auth/login&#x27; \ --header &#x27;Content-Type: application/x-www-form-urlencoded&#x27; \ --data-urlencode &#x27;identityId=...&#x27; \ --data-urlencode &#x27;jwt=...&#x27; ​ Sample response Response Copy Ask AI { &quot;accessToken&quot; : &quot;...&quot;, &quot;expiresIn&quot; : 7200, &quot;accessTokenMaxTTL&quot; : 43244 &quot;tokenType&quot; : &quot;Bearer&quot; } Next, you can use the access token to access the Infisical API We recommend using one of Infisical’s clients like SDKs or the Infisical Agent to authenticate with Infisical using GCP IAM Auth as they handle the authentication process including generating the signed JWT token. Each identity access token has a time-to-live (TTL) which you can infer from the response of the login operation; the default TTL is 7200 seconds which can be adjusted. If an identity access token expires, it can no longer authenticate with the Infisical API. In this case, a new access token should be obtained by performing another login operation. ​ Diagram The following sequence diagram illustrates the GCP IAM Auth workflow for authenticating GCP IAM service accounts with Infisical. ​ Concept At a high-level, Infisical authenticates an IAM service account by verifying its identity and checking that it meets specific requirements (e.g. it is an allowed service account) at the /api/v1/auth/gcp-auth/login endpoint. If successful, then Infisical returns a short-lived access token that can be used to make authenticated requests to the Infisical API. To be more specific: The client generates a signed JWT token using the projects.serviceAccounts.signJwt API method ; this is done using the service account credentials associated with the client. The client sends the signed JWT token to Infisical at the /api/v1/auth/gcp-auth/login endpoint. Infisical verifies the signed JWT token. Infisical checks if the service account behind the JWT token is allowed to authenticate with Infisical based Allowed Service Account Emails . If all is well, Infisical returns a short-lived access token that the client can use to make authenticated requests to the Infisical API. We recommend using one of Infisical’s clients like SDKs or the Infisical Agent to authenticate with Infisical using GCP IAM Auth as they handle the authentication process including generating the signed JWT token. Also, note that Infisical needs network-level access to send requests to the Google Cloud API as part of the GCP Auth workflow. ​ Guide In the following steps, we explore how to create and use identities for your workloads and applications on GCP to access the Infisical API using the GCP IAM authentication method. 1 Creating an identity To create an identity, head to your Organization Settings &gt; Access Control &gt; Identities and press Create identity . When creating an identity, you specify an organization level role for it to assume; you can configure roles in Organization Settings &gt; Access Control &gt; Organization Roles. Now input a few details for your new identity. Here’s some guidance for each field: Name (required): A friendly name for the identity. Role (required): A role from the Organization Roles tab for the identity to assume. The organization role assigned will determine what organization level resources this identity can have access to. Once you’ve created an identity, you’ll be redirected to a page where you can manage the identity. Since the identity has been configured with Universal Auth by default, you should re-configure it to use GCP Auth instead. To do this, press to edit the Authentication section, remove the existing Universal Auth configuration, and add a new GCP Auth configuration onto the identity; set the Type field to GCP IAM Auth . Here’s some more guidance on each field: Allowed Service Account Emails: A comma-separated list of trusted IAM service account emails that are allowed to authenticate with Infisical; this could be something like [email&#160;protected] , [email&#160;protected] , etc. Access Token TTL (default is 2592000 equivalent to 30 days): The lifetime for an acccess token in seconds. This value will be referenced at renewal time. Access Token Max TTL (default is 2592000 equivalent to 30 days): The maximum lifetime for an acccess token in seconds. This value will be referenced at renewal time. Access Token Max Number of Uses (default is 0 ): The maximum number of times that an access token can be used; a value of 0 implies infinite number of uses. Access Token Trusted IPs: The IPs or CIDR ranges that access tokens can be used from. By default, each token is given the 0.0.0.0/0 , allowing usage from any network address. 2 Adding an identity to a project To enable the identity to access project-level resources such as secrets within a specific project, you should add it to that project. To do this, head over to the project you want to add the identity to and go to Project Settings &gt; Access Control &gt; Machine Identities and press Add identity . Next, select the identity you want to add to the project and the project level role you want to allow it to assume. The project role assigned will determine what project level resources this identity can have access to. 3 Accessing the Infisical API with the identity To access the Infisical API as the identity, you need to generate a signed JWT token using the projects.serviceAccounts.signJwt API method and make a request to the /api/v1/auth/gcp-auth/login endpoint containing the signed JWT token in exchange for an access token. Make sure that the service account has the iam.serviceAccounts.signJwt permission or the roles/iam.serviceAccountTokenCreator role. We provide a few code examples below of how you can authenticate with Infisical to access the Infisical API . Sample code for generating a signed JWT token The following code provides a generic example of how you can generate a signed JWT token against the projects.serviceAccounts.signJwt API method. The shown example uses Node.js and the official google-auth-library package but you can use any language you wish. Copy Ask AI const { GoogleAuth } = require ( &quot;google-auth-library&quot; ); const auth = new GoogleAuth ({ scopes: &quot;https://www.googleapis.com/auth/cloud-platform&quot; , }); const credentials = await auth . getCredentials (); const identityId = &quot;&lt;your-infisical-identity-id&gt;&quot; ; const jwtPayload = { sub: credentials . client_email , aud: identityId , }; const { data } = await client . request ({ url: `https://iamcredentials.googleapis.com/v1/projects/-/serviceAccounts/ ${ credentials . client_email } :signJwt` , method: &quot;POST&quot; , data: { payload: JSON . stringify ( jwtPayload ) }, }); const jwt = data . signedJwt // send this jwt to Infisical in the next step ​ Sample request Request Copy Ask AI curl --location --request POST &#x27;https://app.infisical.com/api/v1/auth/gcp-auth/login&#x27; \ --header &#x27;Content-Type: application/x-www-form-urlencoded&#x27; \ --data-urlencode &#x27;identityId=...&#x27; \ --data-urlencode &#x27;jwt=...&#x27; ​ Sample response Response Copy Ask AI { &quot;accessToken&quot; : &quot;...&quot;, &quot;expiresIn&quot; : 7200, &quot;accessTokenMaxTTL&quot; : 43244 &quot;tokenType&quot; : &quot;Bearer&quot; } Next, you can use the access token to access the Infisical API We recommend using one of Infisical’s clients like SDKs or the Infisical Agent to authenticate with Infisical using GCP IAM Auth as they handle the authentication process including generating the signed JWT token. Each identity access token has a time-to-live (TTL) which you can infer from the response of the login operation; the default TTL is 7200 seconds which can be adjusted. If an identity access token expires, it can no longer authenticate with the Infisical API. In this case, a new access token should be obtained by performing another login operation. Was this page helpful? Yes No Suggest edits Raise issue Azure Auth JWT Auth ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"16:[\"$\",\"$L36\",null,{\"children\":[\"$\",\"$L5\",null,{\"appearance\":{\"default\":\"light\",\"strict\":true},\"codeblockTheme\":\"dark\",\"children\":[false,[\"$\",\"$L2d\",null,{\"id\":\"_mintlify-banner-script\",\"strategy\":\"beforeInteractive\",\"dangerouslySetInnerHTML\":{\"__html\":\"(function j(a,b,c,d,e){try{let f,g,h=[];try{h=window.location.pathname.split(\\\"/\\\").filter(a=\u003e\\\"\\\"!==a\u0026\u0026\\\"global\\\"!==a).slice(0,2)}catch{h=[]}let i=h.find(a=\u003ec.includes(a)),j=[];for(let c of(i?j.push(i):j.push(b),j.push(\\\"global\\\"),j)){if(!c)continue;let b=a[c];if(b?.content){f=b.content,g=c;break}}if(!f)return void document.documentElement.setAttribute(d,\\\"hidden\\\");let k=!0,l=0;for(;l\u003clocalStorage.length;){let a=localStorage.key(l);if(l++,!a?.endsWith(e))continue;let b=localStorage.getItem(a);if(b\u0026\u0026b===f){k=!1;break}g\u0026\u0026(a.startsWith(`lang:${g}_`)||!a.startsWith(\\\"lang:\\\"))\u0026\u0026(localStorage.removeItem(a),l--)}document.documentElement.setAttribute(d,k?\\\"visible\\\":\\\"hidden\\\")}catch(a){console.error(a),document.documentElement.setAttribute(d,\\\"hidden\\\")}})(\\n {},\\n \\\"en\\\",\\n [],\\n \\\"data-banner-state\\\",\\n \\\"bannerDismissed\\\",\\n)\"}}],[\"$\",\"$L37\",null,{\"appId\":\"$undefined\",\"autoBoot\":true,\"children\":[\"$\",\"$L38\",null,{\"value\":{\"auth\":\"$undefined\",\"userAuth\":\"$undefined\"},\"children\":[\"$\",\"$L39\",null,{\"value\":{\"subdomain\":\"infisical\",\"actualSubdomain\":\"infisical\",\"gitSource\":{\"type\":\"github\",\"owner\":\"infisical\",\"repo\":\"infisical\",\"deployBranch\":\"main\",\"contentDirectory\":\"docs\"},\"inkeep\":{\"integrationApiKey\":\"a2e2846da1a227961e3519816ce2bfb868f7d86467d289de\"},\"trieve\":{\"chatEnabled\":true,\"datasetId\":\"cdc6f647-bdca-43d9-a3e5-f398c156d553\"},\"feedback\":{\"thumbs\":true,\"edits\":true,\"issues\":true},\"entitlements\":{\"AI_CHAT\":{\"status\":\"ENABLED\"}},\"buildId\":\"69659e6f05d1218cf2d5c729:success\",\"clientVersion\":\"0.0.2335\",\"preview\":\"$undefined\"},\"children\":[\"$\",\"$L3a\",null,{\"value\":{\"docsConfig\":{\"theme\":\"mint\",\"$schema\":\"https://mintlify.com/docs.json\",\"name\":\"Infisical\",\"colors\":{\"primary\":\"#26272b\",\"light\":\"#97b31d\",\"dark\":\"#A1B659\"},\"logo\":{\"light\":\"https://mintlify.s3.us-west-1.amazonaws.com/infisical/logo/light.svg\",\"dark\":\"https://mintlify.s3.us-west-1.amazonaws.com/infisical/logo/dark.svg\",\"href\":\"https://infisical.com\"},\"favicon\":\"/favicon.ico\",\"api\":{\"openapi\":\"https://app.infisical.com/api/docs/json\",\"mdx\":{\"server\":[\"https://app.infisical.com\"]}},\"appearance\":\"$16:props:children:props:appearance\",\"background\":{\"color\":{\"light\":\"#ffffff\",\"dark\":\"#0D1117\"}},\"navbar\":{\"links\":[{\"label\":\"Log In\",\"href\":\"https://app.infisical.com/login\"}],\"primary\":{\"type\":\"button\",\"label\":\"Start for Free\",\"href\":\"https://app.infisical.com/signup\"}},\"navigation\":{\"tabs\":[{\"tab\":\"Platform\",\"groups\":[{\"group\":\"Getting Started\",\"pages\":[\"documentation/getting-started/overview\",\"documentation/getting-started/introduction\",{\"group\":\"Concepts\",\"pages\":[\"documentation/getting-started/concepts/deployment-models\",\"documentation/getting-started/concepts/platform-hierarchy\",\"documentation/getting-started/concepts/platform-iam\",\"documentation/getting-started/concepts/client-integrations\",\"documentation/getting-started/concepts/audit-logs\"]},{\"group\":\"Guides\",\"pages\":[\"documentation/guides/governance-models\",\"documentation/guides/organization-structure\"]}]},{\"group\":\"Platform Reference\",\"pages\":[\"documentation/platform/organization\",{\"group\":\"Projects\",\"pages\":[\"documentation/platform/project\",\"documentation/platform/project-templates\",{\"group\":\"KMS Configuration\",\"pages\":[\"documentation/platform/kms-configuration/overview\",\"documentation/platform/kms-configuration/aws-kms\",\"documentation/platform/kms-configuration/aws-hsm\",\"documentation/platform/kms-configuration/gcp-kms\"]}]},{\"group\":\"Identities\",\"pages\":[\"documentation/platform/identities/overview\",\"documentation/platform/identities/user-identities\",\"documentation/platform/identities/machine-identities\"]},{\"group\":\"Access Control\",\"pages\":[\"documentation/platform/access-controls/overview\",\"documentation/platform/access-controls/role-based-access-controls\",{\"group\":\"Attribute based access controls\",\"pages\":[\"documentation/platform/access-controls/abac/overview\",\"documentation/platform/access-controls/abac/managing-user-metadata\",\"documentation/platform/access-controls/abac/managing-machine-identity-attributes\"]},\"documentation/platform/access-controls/additional-privileges\",\"documentation/platform/access-controls/temporary-access\",\"documentation/platform/access-controls/assume-privilege\",\"documentation/platform/access-controls/access-requests\",\"documentation/platform/access-controls/project-access-requests\",\"documentation/platform/pr-workflows\",\"documentation/platform/groups\"]},{\"group\":\"Audit Logs\",\"pages\":[\"documentation/platform/audit-logs\",\"documentation/platform/audit-log-streams/audit-log-streams\",\"documentation/platform/audit-log-streams/audit-log-streams-with-fluentbit\"]},{\"group\":\"App Connections\",\"pages\":[\"integrations/app-connections\",\"integrations/app-connections/overview\",{\"group\":\"Connections\",\"pages\":[\"integrations/app-connections/1password\",\"integrations/app-connections/auth0\",\"integrations/app-connections/aws\",\"integrations/app-connections/azure-app-configuration\",\"integrations/app-connections/azure-adcs\",\"integrations/app-connections/azure-client-secrets\",\"integrations/app-connections/azure-devops\",\"integrations/app-connections/azure-key-vault\",\"integrations/app-connections/bitbucket\",\"integrations/app-connections/camunda\",\"integrations/app-connections/checkly\",\"integrations/app-connections/chef\",\"integrations/app-connections/cloudflare\",\"integrations/app-connections/databricks\",\"integrations/app-connections/digital-ocean\",\"integrations/app-connections/dns-made-easy\",\"integrations/app-connections/flyio\",\"integrations/app-connections/gcp\",\"integrations/app-connections/github\",\"integrations/app-connections/github-radar\",\"integrations/app-connections/gitlab\",\"integrations/app-connections/hashicorp-vault\",\"integrations/app-connections/heroku\",\"integrations/app-connections/humanitec\",\"integrations/app-connections/laravel-forge\",\"integrations/app-connections/ldap\",\"integrations/app-connections/mssql\",\"integrations/app-connections/mongodb\",\"integrations/app-connections/mysql\",\"integrations/app-connections/netlify\",\"integrations/app-connections/northflank\",\"integrations/app-connections/oci\",\"integrations/app-connections/octopus-deploy\",\"integrations/app-connections/okta\",\"integrations/app-connections/oracledb\",\"integrations/app-connections/postgres\",\"integrations/app-connections/railway\",\"integrations/app-connections/redis\",\"integrations/app-connections/render\",\"integrations/app-connections/supabase\",\"integrations/app-connections/teamcity\",\"integrations/app-connections/terraform-cloud\",\"integrations/app-connections/vercel\",\"integrations/app-connections/windmill\",\"integrations/app-connections/zabbix\"]}]},\"documentation/platform/event-subscriptions\",{\"group\":\"Workflow Integrations\",\"pages\":[\"documentation/platform/workflow-integrations/slack-integration\",\"documentation/platform/workflow-integrations/microsoft-teams-integration\"]},{\"group\":\"External Migrations\",\"pages\":[\"documentation/platform/external-migrations/overview\",\"documentation/platform/external-migrations/envkey\",\"documentation/platform/external-migrations/vault\"]},\"documentation/platform/admin-panel/server-admin\",\"documentation/platform/secret-sharing\"]},{\"group\":\"Connectivity\",\"pages\":[\"documentation/setup/networking\",{\"group\":\"Gateway\",\"pages\":[\"documentation/platform/gateways/overview\",\"documentation/platform/gateways/gateway-deployment\",{\"group\":\"Relay Deployment\",\"pages\":[\"documentation/platform/gateways/relay-deployment/overview\",\"documentation/platform/gateways/relay-deployment/terraform\"]},\"documentation/platform/gateways/security\"]}]},{\"group\":\"Authentication Methods\",\"pages\":[{\"group\":\"User Authentication\",\"pages\":[\"integrations/user-authentication\",\"documentation/platform/auth-methods/email-password\",{\"group\":\"SSO\",\"pages\":[\"documentation/platform/sso/overview\",\"documentation/platform/sso/google\",\"documentation/platform/sso/github\",\"documentation/platform/sso/gitlab\",\"documentation/platform/sso/okta\",\"documentation/platform/sso/azure\",\"documentation/platform/sso/jumpcloud\",\"documentation/platform/sso/keycloak-saml\",\"documentation/platform/sso/google-saml\",\"documentation/platform/sso/auth0-saml\",{\"group\":\"OIDC\",\"pages\":[{\"group\":\"Keycloak OIDC\",\"pages\":[\"documentation/platform/sso/keycloak-oidc/overview\",\"documentation/platform/sso/keycloak-oidc/group-membership-mapping\"]},\"documentation/platform/sso/auth0-oidc\",\"documentation/platform/sso/pingone-oidc\",{\"group\":\"General OIDC\",\"pages\":[\"documentation/platform/sso/general-oidc/overview\",\"documentation/platform/sso/general-oidc/group-membership-mapping\"]}]}]},{\"group\":\"LDAP\",\"pages\":[\"documentation/platform/ldap/overview\",\"documentation/platform/ldap/jumpcloud\",\"documentation/platform/ldap/general\"]},{\"group\":\"SCIM\",\"pages\":[\"documentation/platform/scim/overview\",\"documentation/platform/scim/okta\",\"documentation/platform/scim/azure\",\"documentation/platform/scim/jumpcloud\",\"documentation/platform/scim/pingone\",\"documentation/platform/scim/group-mappings\"]}]},{\"group\":\"Machine Identities\",\"pages\":[\"integrations/machine-authentication\",\"documentation/platform/identities/alicloud-auth\",\"documentation/platform/identities/aws-auth\",\"documentation/platform/identities/azure-auth\",\"documentation/platform/identities/gcp-auth\",\"documentation/platform/identities/jwt-auth\",\"documentation/platform/identities/kubernetes-auth\",\"documentation/platform/identities/oci-auth\",\"documentation/platform/identities/token-auth\",\"documentation/platform/identities/tls-cert-auth\",\"documentation/platform/identities/universal-auth\",{\"group\":\"OIDC Auth\",\"pages\":[\"documentation/platform/identities/oidc-auth/general\",\"documentation/platform/identities/oidc-auth/azure\",\"documentation/platform/identities/oidc-auth/github\",\"documentation/platform/identities/oidc-auth/circleci\",\"documentation/platform/identities/oidc-auth/gitlab\",\"documentation/platform/identities/oidc-auth/terraform-cloud\",\"documentation/platform/identities/oidc-auth/spire\"]},{\"group\":\"LDAP Auth\",\"pages\":[\"documentation/platform/identities/ldap-auth/general\",\"documentation/platform/identities/ldap-auth/jumpcloud\"]}]},\"documentation/platform/identities/auth-templates\",\"documentation/platform/token\",\"documentation/platform/mfa\",\"documentation/platform/github-org-sync\"]},{\"group\":\"Self-host Infisical\",\"pages\":[\"self-hosting/overview\",{\"group\":\"Installation methods\",\"pages\":[\"self-hosting/deployment-options/standalone-infisical\",\"self-hosting/deployment-options/docker-swarm\",\"self-hosting/deployment-options/docker-compose\",\"self-hosting/deployment-options/kubernetes-helm\"]},{\"group\":\"Linux Package\",\"pages\":[\"self-hosting/deployment-options/native/linux-package/installation\",\"self-hosting/deployment-options/native/linux-package/commands-configuration\",\"self-hosting/deployment-options/linux-upgrade\"]},\"self-hosting/guides/replication\",\"self-hosting/guides/upgrading-infisical\",\"self-hosting/configuration/envars\",\"self-hosting/guides/releases\",\"self-hosting/configuration/requirements\",{\"group\":\"Guides\",\"pages\":[\"self-hosting/guides/mongo-to-postgres\",\"self-hosting/guides/custom-certificates\",\"self-hosting/guides/automated-bootstrapping\",\"self-hosting/guides/production-hardening\",\"self-hosting/guides/monitoring-telemetry\"]},{\"group\":\"Reference architectures\",\"pages\":[\"self-hosting/reference-architectures/aws-ecs\",\"self-hosting/reference-architectures/linux-deployment-ha\",\"self-hosting/reference-architectures/on-prem-k8s-ha\",\"self-hosting/reference-architectures/google-cloud-run\"]},\"self-hosting/ee\",\"self-hosting/faq\"]},{\"group\":\"Internals\",\"pages\":[\"internals/overview\",{\"group\":\"Permissions\",\"pages\":[\"internals/permissions/overview\",\"internals/permissions/project-permissions\",\"internals/permissions/organization-permissions\",\"internals/permissions/migration\"]},{\"group\":\"Architecture\",\"pages\":[\"internals/architecture/components\",\"internals/architecture/cloud\"]},\"internals/security\",\"internals/service-tokens\"]},{\"group\":\"Contributing\",\"pages\":[{\"group\":\"Getting Started\",\"pages\":[\"contributing/getting-started/overview\",\"contributing/getting-started/code-of-conduct\",\"contributing/getting-started/pull-requests\"]},{\"group\":\"Contributing to platform\",\"pages\":[\"contributing/platform/developing\",\"contributing/platform/backend/how-to-create-a-feature\",\"contributing/platform/backend/folder-structure\"]}]}]},{\"tab\":\"Products\",\"menu\":[{\"item\":\"Secrets Management\",\"groups\":[{\"group\":\"Secrets Management\",\"pages\":[\"documentation/platform/secrets-mgmt/overview\",{\"group\":\"Concepts\",\"pages\":[\"documentation/platform/secrets-mgmt/concepts/secrets-mgmt\",\"documentation/platform/secrets-mgmt/concepts/access-control\",\"documentation/platform/secrets-mgmt/concepts/secrets-delivery\",\"documentation/platform/secrets-mgmt/concepts/secrets-rotation\",\"documentation/platform/secrets-mgmt/concepts/dynamic-secrets\"]},{\"group\":\"Guides\",\"pages\":[\"documentation/guides/introduction\",\"documentation/guides/local-development\",\"documentation/guides/node\",\"documentation/guides/python\",\"documentation/guides/nextjs-vercel\",\"documentation/guides/kubernetes-operator\",\"documentation/guides/microsoft-power-apps\"]}]},{\"group\":\"Product Reference\",\"pages\":[\"documentation/platform/secrets-mgmt/project\",\"documentation/platform/folder\",\"documentation/platform/secret-versioning\",\"documentation/platform/pit-recovery\",\"documentation/platform/secret-reference\",{\"group\":\"Secret Rotation\",\"pages\":[\"integrations/secret-rotations\",\"documentation/platform/secret-rotation/overview\",\"documentation/platform/secret-rotation/auth0-client-secret\",\"documentation/platform/secret-rotation/aws-iam-user-secret\",\"documentation/platform/secret-rotation/azure-client-secret\",\"documentation/platform/secret-rotation/databricks-service-principal-secret\",\"documentation/platform/secret-rotation/ldap-password\",\"documentation/platform/secret-rotation/mongodb-credentials\",\"documentation/platform/secret-rotation/mssql-credentials\",\"documentation/platform/secret-rotation/mysql-credentials\",\"documentation/platform/secret-rotation/okta-client-secret\",\"documentation/platform/secret-rotation/oracledb-credentials\",\"documentation/platform/secret-rotation/postgres-credentials\",\"documentation/platform/secret-rotation/redis-credentials\"]},{\"group\":\"Dynamic Secrets\",\"pages\":[\"integrations/dynamic-secrets\",\"documentation/platform/dynamic-secrets/overview\",\"documentation/platform/dynamic-secrets/aws-elasticache\",\"documentation/platform/dynamic-secrets/aws-iam\",\"documentation/platform/dynamic-secrets/azure-entra-id\",\"documentation/platform/dynamic-secrets/azure-sql-database\",\"documentation/platform/dynamic-secrets/cassandra\",\"documentation/platform/dynamic-secrets/couchbase\",\"documentation/platform/dynamic-secrets/elastic-search\",\"documentation/platform/dynamic-secrets/gcp-iam\",\"documentation/platform/dynamic-secrets/github\",\"documentation/platform/dynamic-secrets/ldap\",\"documentation/platform/dynamic-secrets/mongo-atlas\",\"documentation/platform/dynamic-secrets/mongo-db\",\"documentation/platform/dynamic-secrets/mssql\",\"documentation/platform/dynamic-secrets/mysql\",\"documentation/platform/dynamic-secrets/oracle\",\"documentation/platform/dynamic-secrets/postgresql\",\"documentation/platform/dynamic-secrets/rabbit-mq\",\"documentation/platform/dynamic-secrets/redis\",\"documentation/platform/dynamic-secrets/sap-ase\",\"documentation/platform/dynamic-secrets/sap-hana\",\"documentation/platform/dynamic-secrets/snowflake\",\"documentation/platform/dynamic-secrets/totp\",\"documentation/platform/dynamic-secrets/kubernetes\",\"documentation/platform/dynamic-secrets/vertica\"]},\"documentation/platform/webhooks\"]},{\"group\":\"Infrastructure Integrations\",\"pages\":[\"integrations/platforms/ansible\",\"integrations/platforms/apache-airflow\",{\"group\":\"AWS\",\"pages\":[\"integrations/platforms/aws/lambda\"]},{\"group\":\"Kubernetes Operator\",\"pages\":[\"integrations/platforms/kubernetes/overview\",\"integrations/platforms/kubernetes/infisical-secret-crd\",\"integrations/platforms/kubernetes/infisical-push-secret-crd\",\"integrations/platforms/kubernetes/infisical-dynamic-secret-crd\"]},\"integrations/platforms/kubernetes-injector\",\"integrations/platforms/kubernetes-csi\",{\"group\":\"Agent\",\"pages\":[\"integrations/platforms/infisical-agent\",\"integrations/platforms/docker-swarm-with-agent\",\"integrations/platforms/ecs-with-agent\"]},{\"group\":\"Docker\",\"pages\":[\"integrations/platforms/docker-intro\",\"integrations/platforms/docker\",\"integrations/platforms/docker-pass-envs\",\"integrations/platforms/docker-compose\"]},\"integrations/frameworks/packer\",\"integrations/frameworks/pulumi\",\"integrations/frameworks/terraform\"]},{\"group\":\"Secret Syncs\",\"pages\":[\"integrations/secret-syncs\",\"integrations/secret-syncs/overview\",{\"group\":\"Syncs\",\"pages\":[\"integrations/secret-syncs/1password\",\"integrations/secret-syncs/aws-parameter-store\",\"integrations/secret-syncs/aws-secrets-manager\",\"integrations/secret-syncs/azure-app-configuration\",\"integrations/secret-syncs/azure-devops\",\"integrations/secret-syncs/azure-key-vault\",\"integrations/secret-syncs/bitbucket\",\"integrations/secret-syncs/camunda\",\"integrations/secret-syncs/checkly\",\"integrations/secret-syncs/chef\",\"integrations/secret-syncs/cloudflare-pages\",\"integrations/secret-syncs/cloudflare-workers\",\"integrations/secret-syncs/databricks\",\"integrations/secret-syncs/digital-ocean-app-platform\",\"integrations/secret-syncs/flyio\",\"integrations/secret-syncs/gcp-secret-manager\",\"integrations/secret-syncs/github\",\"integrations/secret-syncs/gitlab\",\"integrations/secret-syncs/hashicorp-vault\",\"integrations/secret-syncs/heroku\",\"integrations/secret-syncs/humanitec\",\"integrations/secret-syncs/laravel-forge\",\"integrations/secret-syncs/netlify\",\"integrations/secret-syncs/northflank\",\"integrations/secret-syncs/oci-vault\",\"integrations/secret-syncs/octopus-deploy\",\"integrations/secret-syncs/railway\",\"integrations/secret-syncs/render\",\"integrations/secret-syncs/supabase\",\"integrations/secret-syncs/teamcity\",\"integrations/secret-syncs/terraform-cloud\",\"integrations/secret-syncs/vercel\",\"integrations/secret-syncs/windmill\",\"integrations/secret-syncs/zabbix\"]}]},{\"group\":\"CI/CD Integrations\",\"pages\":[\"integrations/cicd/aws-amplify\",\"integrations/cicd/bitbucket\",\"integrations/cicd/githubactions\",\"integrations/cicd/gitlab\",\"integrations/cicd/jenkins\"]},{\"group\":\"Framework Integrations\",\"pages\":[\"integrations/framework-integrations\",\"integrations/frameworks/spring-boot-maven\",\"integrations/frameworks/react\",\"integrations/frameworks/vue\",\"integrations/frameworks/express\",{\"group\":\"View more\",\"pages\":[\"integrations/frameworks/nextjs\",\"integrations/frameworks/nestjs\",\"integrations/frameworks/sveltekit\",\"integrations/frameworks/nuxt\",\"integrations/frameworks/gatsby\",\"integrations/frameworks/remix\",\"integrations/frameworks/vite\",\"integrations/frameworks/fiber\",\"integrations/frameworks/django\",\"integrations/frameworks/flask\",\"integrations/frameworks/laravel\",\"integrations/frameworks/rails\",\"integrations/frameworks/dotnet\",\"integrations/platforms/pm2\",\"integrations/frameworks/ab-initio\"]}]},{\"group\":\"Build Tool Integrations\",\"pages\":[\"integrations/build-tools/gradle\"]},{\"group\":\"Others\",\"pages\":[\"integrations/external/backstage\"]}]},{\"item\":\"Secrets Scanning\",\"groups\":[{\"group\":\"Secrets Scanning\",\"pages\":[\"documentation/platform/secret-scanning/overview\",{\"group\":\"Concepts\",\"pages\":[\"documentation/platform/secret-scanning/concepts/secret-scanning\"]}]},{\"group\":\"Product Reference\",\"pages\":[\"documentation/platform/secret-scanning/usage\",\"documentation/platform/secret-scanning/bitbucket\",\"documentation/platform/secret-scanning/github\",\"documentation/platform/secret-scanning/gitlab\"]}]},{\"item\":\"Certificate Management\",\"groups\":[{\"group\":\"Certificate Management\",\"pages\":[\"documentation/platform/pki/overview\",{\"group\":\"Concepts\",\"pages\":[\"documentation/platform/pki/concepts/certificate-mgmt\",\"documentation/platform/pki/concepts/certificate-lifecycle\",\"documentation/platform/pki/concepts/certificate-components\"]},{\"group\":\"Guides\",\"pages\":[\"documentation/platform/pki/guides/request-cert-agent\",\"documentation/platform/pki/guides/request-cert-api\",\"documentation/platform/pki/guides/request-cert-acme\"]}]},{\"group\":\"Product Reference\",\"pages\":[{\"group\":\"Certificate Authorities\",\"pages\":[\"documentation/platform/pki/ca/overview\",\"documentation/platform/pki/ca/private-ca\",\"documentation/platform/pki/ca/external-ca\"]},{\"group\":\"Certificates\",\"pages\":[\"documentation/platform/pki/certificates/overview\",\"documentation/platform/pki/certificates/profiles\",\"documentation/platform/pki/certificates/templates\",\"documentation/platform/pki/certificates/certificates\"]},{\"group\":\"Enrollment Methods\",\"pages\":[\"documentation/platform/pki/enrollment-methods/overview\",\"documentation/platform/pki/enrollment-methods/api\",\"documentation/platform/pki/enrollment-methods/acme\",\"documentation/platform/pki/enrollment-methods/est\"]},\"documentation/platform/pki/alerting\"]},{\"group\":\"Infrastructure Integrations\",\"pages\":[\"integrations/platforms/certificate-agent\",\"documentation/platform/pki/k8s-cert-manager\",\"documentation/platform/pki/integration-guides/gloo-mesh\",\"documentation/platform/pki/integration-guides/windows-server-acme\",\"documentation/platform/pki/integration-guides/nginx-certbot\",\"documentation/platform/pki/integration-guides/apache-certbot\",\"documentation/platform/pki/integration-guides/tomcat-certbot\",\"documentation/platform/pki/integration-guides/jboss-certbot\"]},{\"group\":\"Certificate Syncs\",\"pages\":[\"documentation/platform/pki/certificate-syncs/overview\",\"documentation/platform/pki/certificate-syncs/aws-certificate-manager\",\"documentation/platform/pki/certificate-syncs/aws-secrets-manager\",\"documentation/platform/pki/certificate-syncs/azure-key-vault\",\"documentation/platform/pki/certificate-syncs/chef\"]},{\"group\":\"External CA Integrations\",\"pages\":[\"documentation/platform/pki/ca/acme-ca\",\"documentation/platform/pki/ca/lets-encrypt\",\"documentation/platform/pki/ca/digicert\",\"documentation/platform/pki/ca/azure-adcs\"]}]},{\"item\":\"Infisical KMS\",\"groups\":[{\"group\":\"Infisical KMS\",\"pages\":[\"documentation/platform/kms/overview\",\"documentation/platform/kms/hsm-integration\",\"documentation/platform/kms/kubernetes-encryption\",\"documentation/platform/kms/kmip\"]}]},{\"item\":\"Infisical PAM\",\"groups\":[{\"group\":\"Infisical PAM\",\"pages\":[\"documentation/platform/pam/overview\",{\"group\":\"Getting Started\",\"pages\":[\"documentation/platform/pam/getting-started/setup\",{\"group\":\"Resources\",\"pages\":[\"documentation/platform/pam/getting-started/resources\",\"documentation/platform/pam/getting-started/resources/aws-iam\",\"documentation/platform/pam/getting-started/resources/kubernetes\",\"documentation/platform/pam/getting-started/resources/redis\",\"documentation/platform/pam/getting-started/resources/ssh\"]},\"documentation/platform/pam/getting-started/accounts\"]},\"documentation/platform/pam/architecture\"]},{\"group\":\"Product Reference\",\"pages\":[\"documentation/platform/pam/product-reference/auditing\",\"documentation/platform/pam/product-reference/session-recording\",\"documentation/platform/pam/product-reference/credential-rotation\"]}]},{\"item\":\"Agent Sentinel\",\"groups\":[{\"group\":\"Agent Sentinel\",\"pages\":[\"documentation/platform/agent-sentinel/overview\",{\"group\":\"Concepts\",\"pages\":[\"documentation/platform/agent-sentinel/concepts/mcp-overview\"]}]},{\"group\":\"Product Reference\",\"pages\":[\"documentation/platform/agent-sentinel/mcp-servers\",\"documentation/platform/agent-sentinel/mcp-endpoints\",\"documentation/platform/agent-sentinel/activity-logs\"]}]}]},{\"tab\":\"CLI Reference\",\"groups\":[{\"group\":\"Command line\",\"pages\":[\"cli/overview\",\"cli/usage\",{\"group\":\"Core commands\",\"pages\":[\"cli/commands/login\",\"cli/commands/init\",\"cli/commands/run\",\"cli/commands/secrets\",\"cli/commands/dynamic-secrets\",\"cli/commands/ssh\",\"cli/commands/gateway\",\"cli/commands/relay\",\"cli/commands/bootstrap\",\"cli/commands/export\",\"cli/commands/token\",\"cli/commands/service-token\",\"cli/commands/vault\",\"cli/commands/user\",\"cli/commands/reset\",{\"group\":\"infisical scan\",\"pages\":[\"cli/commands/scan\",\"cli/commands/scan-git-changes\",\"cli/commands/scan-install\"]}]},\"cli/scanning-overview\",\"cli/project-config\",\"cli/faq\"]}]},{\"tab\":\"API Reference\",\"groups\":[{\"group\":\"Overview\",\"pages\":[\"api-reference/overview/introduction\",\"api-reference/overview/authentication\"]},{\"group\":\"Organization\",\"pages\":[{\"group\":\"Organization Users\",\"pages\":[\"api-reference/endpoints/organizations/memberships\",\"api-reference/endpoints/organizations/update-membership\",\"api-reference/endpoints/organizations/delete-membership\",\"api-reference/endpoints/organizations/bulk-delete-memberships\",\"api-reference/endpoints/organizations/list-identity-memberships\"]},{\"group\":\"Organization Groups\",\"pages\":[\"api-reference/endpoints/groups/create\",\"api-reference/endpoints/groups/update\",\"api-reference/endpoints/groups/delete\",\"api-reference/endpoints/groups/get\",\"api-reference/endpoints/groups/get-by-id\",\"api-reference/endpoints/groups/add-group-user\",\"api-reference/endpoints/groups/remove-group-user\",\"api-reference/endpoints/groups/list-group-users\",\"api-reference/endpoints/groups/add-group-machine-identity\",\"api-reference/endpoints/groups/remove-group-machine-identity\",\"api-reference/endpoints/groups/list-group-machine-identities\",\"api-reference/endpoints/groups/list-group-projects\",\"api-reference/endpoints/groups/list-group-members\"]},{\"group\":\"Organization Identities\",\"pages\":[\"api-reference/endpoints/identities/create\",\"api-reference/endpoints/identities/update\",\"api-reference/endpoints/identities/delete\",\"api-reference/endpoints/identities/get-by-id\",\"api-reference/endpoints/identities/list\",\"api-reference/endpoints/identities/search\"]},{\"group\":\"OIDC SSO\",\"pages\":[\"api-reference/endpoints/organizations/oidc-sso/get-oidc-config\",\"api-reference/endpoints/organizations/oidc-sso/update-oidc-config\",\"api-reference/endpoints/organizations/oidc-sso/create-oidc-config\"]},{\"group\":\"LDAP SSO\",\"pages\":[\"api-reference/endpoints/organizations/ldap-sso/get-ldap-config\",\"api-reference/endpoints/organizations/ldap-sso/update-ldap-config\",\"api-reference/endpoints/organizations/ldap-sso/create-ldap-config\"]},{\"group\":\"SAML SSO\",\"pages\":[\"api-reference/endpoints/organizations/saml-sso/get-saml-config\",\"api-reference/endpoints/organizations/saml-sso/update-saml-config\",\"api-reference/endpoints/organizations/saml-sso/create-saml-config\"]},{\"group\":\"SCIM\",\"pages\":[{\"group\":\" Group to Org Role Mappings\",\"pages\":[\"api-reference/endpoints/organizations/scim/group-org-role-mappings/list\",\"api-reference/endpoints/organizations/scim/group-org-role-mappings/update\"]}]}]},{\"group\":\"Project\",\"pages\":[{\"group\":\"Projects\",\"pages\":[\"api-reference/endpoints/projects/get-project-by-slug\",\"api-reference/endpoints/projects/create-project\",\"api-reference/endpoints/projects/delete-project\",\"api-reference/endpoints/projects/get-project\",\"api-reference/endpoints/projects/list-projects\",\"api-reference/endpoints/projects/update-project\",\"api-reference/endpoints/projects/secret-snapshots\",{\"group\":\"Legacy\",\"pages\":[\"api-reference/endpoints/deprecated/projects/get-project-by-slug\",\"api-reference/endpoints/deprecated/projects/create-project\",\"api-reference/endpoints/deprecated/projects/delete-project\",\"api-reference/endpoints/deprecated/projects/get-project\",\"api-reference/endpoints/deprecated/organizations/projects\",\"api-reference/endpoints/deprecated/projects/update-project\",\"api-reference/endpoints/deprecated/projects/secret-snapshots\"]}]},{\"group\":\"Project Users\",\"pages\":[\"api-reference/endpoints/project-users/invite-member-to-project\",\"api-reference/endpoints/project-users/remove-member-from-project\",\"api-reference/endpoints/project-users/memberships\",\"api-reference/endpoints/project-users/get-by-username\",\"api-reference/endpoints/project-users/update-membership\",{\"group\":\"Legacy\",\"pages\":[\"api-reference/endpoints/deprecated/project-users/invite-member-to-project\",\"api-reference/endpoints/deprecated/project-users/remove-member-from-project\",\"api-reference/endpoints/deprecated/project-users/memberships\",\"api-reference/endpoints/deprecated/project-users/get-by-username\",\"api-reference/endpoints/deprecated/project-users/update-membership\"]}]},{\"group\":\"Project Groups\",\"pages\":[\"api-reference/endpoints/project-groups/create\",\"api-reference/endpoints/project-groups/delete\",\"api-reference/endpoints/project-groups/get-by-id\",\"api-reference/endpoints/project-groups/list\",\"api-reference/endpoints/project-groups/update\",{\"group\":\"Legacy\",\"pages\":[\"api-reference/endpoints/deprecated/project-groups/create\",\"api-reference/endpoints/deprecated/project-groups/delete\",\"api-reference/endpoints/deprecated/project-groups/get-by-id\",\"api-reference/endpoints/deprecated/project-groups/list\",\"api-reference/endpoints/deprecated/project-groups/update\"]}]},{\"group\":\"Project Managed Identities\",\"pages\":[\"api-reference/endpoints/project-identities/add-identity\",\"api-reference/endpoints/project-identities/list-identity\",\"api-reference/endpoints/project-identities/get-by-id\",\"api-reference/endpoints/project-identities/update-identity\",\"api-reference/endpoints/project-identities/delete-identity\"]},{\"group\":\"Project Identity Memberships\",\"pages\":[\"api-reference/endpoints/project-identities-membership/add-identity-membership\",\"api-reference/endpoints/project-identities-membership/list-identity-memberships\",\"api-reference/endpoints/project-identities-membership/get-by-id\",\"api-reference/endpoints/project-identities-membership/update-identity-membership\",\"api-reference/endpoints/project-identities-membership/delete-identity-membership\",{\"group\":\"Legacy\",\"pages\":[\"api-reference/endpoints/deprecated/project-identities-v2/add-identity-membership\",\"api-reference/endpoints/deprecated/project-identities-v2/list-identity-memberships\",\"api-reference/endpoints/deprecated/project-identities-v2/get-by-id\",\"api-reference/endpoints/deprecated/project-identities-v2/update-identity-membership\",\"api-reference/endpoints/deprecated/project-identities-v2/delete-identity-membership\"]}]},{\"group\":\"Project Templates\",\"pages\":[\"api-reference/endpoints/project-templates/create\",\"api-reference/endpoints/project-templates/update\",\"api-reference/endpoints/project-templates/delete\",\"api-reference/endpoints/project-templates/get-by-id\",\"api-reference/endpoints/project-templates/list\"]},{\"group\":\"Project Roles\",\"pages\":[\"api-reference/endpoints/project-roles/create\",\"api-reference/endpoints/project-roles/update\",\"api-reference/endpoints/project-roles/delete\",\"api-reference/endpoints/project-roles/get-by-slug\",\"api-reference/endpoints/project-roles/list\",{\"group\":\"Legacy\",\"pages\":[\"api-reference/endpoints/deprecated/project-roles/create\",\"api-reference/endpoints/deprecated/project-roles/update\",\"api-reference/endpoints/deprecated/project-roles/delete\",\"api-reference/endpoints/deprecated/project-roles/get-by-slug\",\"api-reference/endpoints/deprecated/project-roles/list\"]}]},{\"group\":\"Identity Specific Privilege\",\"pages\":[{\"group\":\"V1 (Legacy)\",\"pages\":[\"api-reference/endpoints/identity-specific-privilege/v1/create-permanent\",\"api-reference/endpoints/identity-specific-privilege/v1/create-temporary\",\"api-reference/endpoints/identity-specific-privilege/v1/update\",\"api-reference/endpoints/identity-specific-privilege/v1/delete\",\"api-reference/endpoints/identity-specific-privilege/v1/find-by-slug\",\"api-reference/endpoints/identity-specific-privilege/v1/list\"]},{\"group\":\"V2\",\"pages\":[\"api-reference/endpoints/identity-specific-privilege/v2/create\",\"api-reference/endpoints/identity-specific-privilege/v2/update\
2026-01-13T09:29:57
https://ai.google.dev/api/models?hl=hi
Models &nbsp;|&nbsp; Gemini API &nbsp;|&nbsp; Google AI for Developers सीधे मुख्य कॉन्टेंट पर जाएं / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 एपीआई पासकोड पाना कुकबुक कम्यूनिटी प्रवेश करें Docs एपीआई का संदर्भ Gemini API Docs एपीआई का संदर्भ एपीआई पासकोड पाना कुकबुक कम्यूनिटी खास जानकारी एपीआई के वर्शन मिलने वाली अनुमतियां मॉडल कॉन्टेंट जनरेट किया जा रहा है लाइव एपीआई Live Music API Interactions API टोकन फ़ाइलें Batch API संचय कर रहा है एंबेड करना फ़ाइल खोजना फ़ाइल खोजें दस्तावेज़ सभी तरीके अमान्य PaLM (डिकोड किया गया) SDK टूल के रेफ़रंस Python Go TypeScript Java C# होम पेज Gemini API एपीआई का संदर्भ सुझाव भेजें Models मॉडल एंडपॉइंट की मदद से, प्रोग्राम के हिसाब से उपलब्ध मॉडल की सूची बनाई जा सकती है. साथ ही, ज़्यादा मेटाडेटा भी पाया जा सकता है. जैसे, काम करने वाली सुविधा और कॉन्टेक्स्ट विंडो का साइज़. ज़्यादा जानने के लिए, मॉडल गाइड पढ़ें. तरीका: models.get एंडपॉइंट पाथ पैरामीटर अनुरोध का मुख्य हिस्सा जवाब का मुख्य हिस्सा अनुमति पाने के लिंक अनुरोध का उदाहरण पाएं यह किसी खास Model के बारे में जानकारी देता है. जैसे, इसका वर्शन नंबर, टोकन की सीमाएं, पैरामीटर , और अन्य मेटाडेटा. मॉडल के बारे में ज़्यादा जानकारी के लिए, Gemini मॉडल की गाइड देखें. एंडपॉइंट get https: / /generativelanguage.googleapis.com /v1beta /{name=models /*} पाथ पैरामीटर name string ज़रूरी है. मॉडल का संसाधन नाम. यह नाम, models.list तरीके से मिले मॉडल के नाम से मेल खाना चाहिए. फ़ॉर्मैट: models/{model} यह models/{model} के फ़ॉर्म में होता है. अनुरोध का मुख्य भाग अनुरोध का मुख्य हिस्सा खाली होना चाहिए. अनुरोध का उदाहरण Python from google import genai client = genai . Client () model_info = client . models . get ( model = "gemini-2.0-flash" ) print ( model_info ) models . py ऐप पर जाएं ctx := context . Background () client , err := genai . NewClient ( ctx , &amp; genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } modelInfo , err := client . Models . Get ( ctx , "gemini-2.0-flash" , nil ) if err != nil { log . Fatal ( err ) } fmt . Println ( modelInfo ) models . go शेल curl https://generativelanguage.googleapis.com/v1beta/models/gemini-2.0-flash?key = $GEMINI_API_KEY models .sh जवाब का मुख्य भाग कामयाब रहने पर, जवाब के मुख्य हिस्से में Model का एक इंस्टेंस शामिल किया जाता है. तरीका: models.list एंडपॉइंट क्वेरी पैरामीटर अनुरोध का मुख्य हिस्सा जवाब का मुख्य हिस्सा JSON काेड में दिखाना अनुमति पाने के लिंक अनुरोध का उदाहरण सूची Gemini API के ज़रिए उपलब्ध Model s की सूची दिखाता है. एंडपॉइंट get https: / /generativelanguage.googleapis.com /v1beta /models क्वेरी पैरामीटर pageSize integer हर पेज पर, ज़्यादा से ज़्यादा Models नतीजे दिखाए जा सकते हैं. अगर इसे तय नहीं किया गया है, तो हर पेज पर 50 मॉडल दिखेंगे. इस तरीके से, हर पेज पर ज़्यादा से ज़्यादा 1,000 मॉडल दिखते हैं. भले ही, आपने pageSize की बड़ी वैल्यू पास की हो. pageToken string यह एक पेज टोकन है, जो पिछले models.list कॉल से मिला था. अगले पेज को वापस पाने के लिए, एक अनुरोध से मिले pageToken को अगले अनुरोध के लिए आर्ग्युमेंट के तौर पर इस्तेमाल करें. पेज नंबर के हिसाब से डेटा दिखाने के दौरान, models.list को दिए गए अन्य सभी पैरामीटर, पेज टोकन देने वाले कॉल से मेल खाने चाहिए. अनुरोध का मुख्य भाग अनुरोध का मुख्य हिस्सा खाली होना चाहिए. अनुरोध का उदाहरण Python from google import genai client = genai . Client () print ( "List of models that support generateContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "generateContent" : print ( m . name ) print ( "List of models that support embedContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "embedContent" : print ( m . name ) models . py ऐप पर जाएं ctx := context . Background () client , err := genai . NewClient ( ctx , &amp; genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } // Retrieve the list of models. models , err := client . Models . List ( ctx , &amp; genai . ListModelsConfig {}) if err != nil { log . Fatal ( err ) } fmt . Println ( "List of models that support generateContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "generateContent" { fmt . Println ( m . Name ) break } } } fmt . Println ( "\nList of models that support embedContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "embedContent" { fmt . Println ( m . Name ) break } } } models . go शेल curl https://generativelanguage.googleapis.com/v1beta/models?key = $GEMINI_API_KEY models .sh जवाब का मुख्य भाग ListModel से मिला जवाब, जिसमें मॉडल की पेज के हिसाब से बांटी गई सूची होती है. अगर एपीआई सही से जुड़ जाता है, ताे जवाब के मुख्य भाग में नीचे दिए गए स्ट्रक्चर शामिल होता है. Fields models[] object ( Model ) लौटाए गए मॉडल. nextPageToken string यह एक टोकन है. इसका इस्तेमाल अगले पेज को वापस पाने के लिए, pageToken के तौर पर किया जा सकता है. अगर इस फ़ील्ड को शामिल नहीं किया जाता है, तो इसका मतलब है कि कोई और पेज नहीं है. JSON के काेड में दिखाना { "models" : [ { object ( Model ) } ] , "nextPageToken" : string } REST रिसॉर्स: models संसाधन: मॉडल JSON काेड में दिखाना तरीके संसाधन: मॉडल जनरेटिव लैंग्वेज मॉडल के बारे में जानकारी. Fields name string ज़रूरी है. Model का संसाधन नाम. अनुमति वाली सभी वैल्यू के लिए, मॉडल वैरिएंट देखें. फ़ॉर्मैट: models/{model} , जिसमें {model} के नाम रखने के तरीके का इस्तेमाल किया गया हो: "{baseModelId}-{version}" उदाहरण: models/gemini-1.5-flash-001 baseModelId string ज़रूरी है. बेस मॉडल का नाम. इसे जनरेशन के अनुरोध में पास करें. उदाहरण: gemini-1.5-flash version string ज़रूरी है. मॉडल का वर्शन नंबर. इससे मेजर वर्शन ( 1.0 या 1.5 ) का पता चलता है displayName string मॉडल का ऐसा नाम जिसे आसानी से पढ़ा जा सकता है. उदाहरण के लिए, "Gemini 1.5 Flash". नाम में ज़्यादा से ज़्यादा 128 वर्ण हो सकते हैं. साथ ही, इसमें UTF-8 फ़ॉर्मैट वाले कोई भी वर्ण शामिल किए जा सकते हैं. description string मॉडल के बारे में कम शब्दों में जानकारी. inputTokenLimit integer इस मॉडल के लिए, ज़्यादा से ज़्यादा इतने इनपुट टोकन इस्तेमाल किए जा सकते हैं. outputTokenLimit integer इस मॉडल के लिए, आउटपुट टोकन की ज़्यादा से ज़्यादा संख्या उपलब्ध है. supportedGenerationMethods[] string मॉडल के साथ काम करने वाले जनरेशन के तरीके. एपीआई के तरीके के नाम, पास्कल केस स्ट्रिंग के तौर पर तय किए जाते हैं. जैसे, generateMessage और generateContent . thinking boolean मॉडल में सोचने की क्षमता है या नहीं. temperature number इससे आउटपुट में रैंडमनेस को कंट्रोल किया जाता है. वैल्यू [0.0,maxTemperature] तक हो सकती हैं. वैल्यू जितनी ज़्यादा होगी, जवाब उतने ही अलग-अलग होंगे. वहीं, वैल्यू 0.0 के आस-पास होने पर, मॉडल से आम तौर पर कम चौंकाने वाले जवाब मिलेंगे. यह वैल्यू, मॉडल को कॉल करते समय बैकएंड के लिए इस्तेमाल की जाने वाली डिफ़ॉल्ट वैल्यू के बारे में बताती है. maxTemperature number यह मॉडल ज़्यादा से ज़्यादा कितने तापमान का इस्तेमाल कर सकता है. topP number न्यूक्लियस सैंपलिंग के लिए. न्यूक्लियस सैंपलिंग में, टोकन के सबसे छोटे सेट को ध्यान में रखा जाता है. इस सेट में शामिल टोकन की संभावनाओं का योग कम से कम topP होता है. यह वैल्यू, मॉडल को कॉल करते समय बैकएंड के लिए इस्तेमाल की जाने वाली डिफ़ॉल्ट वैल्यू के बारे में बताती है. topK integer टॉप-k सैंपलिंग के लिए. टॉप-k सैंपलिंग में, topK सबसे ज़्यादा संभावित टोकन के सेट को ध्यान में रखा जाता है. यह वैल्यू, मॉडल को कॉल करते समय बैकएंड के लिए इस्तेमाल की जाने वाली डिफ़ॉल्ट वैल्यू के बारे में बताती है. अगर यह फ़ील्ड खाली है, तो इसका मतलब है कि मॉडल, टॉप-के सैंपलिंग का इस्तेमाल नहीं करता है. साथ ही, जनरेशन पैरामीटर के तौर पर topK का इस्तेमाल नहीं किया जा सकता. JSON के काेड में दिखाना { "name" : string , "baseModelId" : string , "version" : string , "displayName" : string , "description" : string , "inputTokenLimit" : integer , "outputTokenLimit" : integer , "supportedGenerationMethods" : [ string ] , "thinking" : boolean , "temperature" : number , "maxTemperature" : number , "topP" : number , "topK" : integer } तरीका: models.predict एंडपॉइंट पाथ पैरामीटर अनुरोध का मुख्य हिस्सा JSON काेड में दिखाना जवाब का मुख्य हिस्सा JSON काेड में दिखाना अनुमति पाने के लिंक यह कुकी, अनुमान लगाने के लिए अनुरोध करती है. एंडपॉइंट post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predict पाथ पैरामीटर model string ज़रूरी है. अनुमान के लिए मॉडल का नाम. फ़ॉर्मैट: name=models/{model} . यह models/{model} के फ़ॉर्म में होता है. अनुरोध का मुख्य भाग अनुरोध के मुख्य हिस्से में, इस स्ट्रक्चर का डेटा शामिल होता है: फ़ील्ड instances[] value ( Value format) ज़रूरी है. वे इंस्टेंस जो अनुमान लगाने के लिए किए गए कॉल के इनपुट होते हैं. parameters value ( Value format) ज़रूरी नहीं. ये पैरामीटर, अनुमान लगाने के लिए किए जाने वाले कॉल को कंट्रोल करते हैं. जवाब का मुख्य भाग [PredictionService.Predict] के लिए जवाब का मैसेज. अगर एपीआई सही से जुड़ जाता है, ताे जवाब के मुख्य भाग में नीचे दिए गए स्ट्रक्चर शामिल होता है. Fields predictions[] value ( Value format) पूर्वानुमान लगाने वाले कॉल के आउटपुट. JSON के काेड में दिखाना { "predictions" : [ value ] } तरीका: models.predictLongRunning एंडपॉइंट पाथ पैरामीटर अनुरोध का मुख्य हिस्सा JSON काेड में दिखाना जवाब का मुख्य हिस्सा अनुमति पाने के लिंक यह models.predict की तरह ही है, लेकिन यह LRO दिखाता है. एंडपॉइंट post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predictLongRunning पाथ पैरामीटर model string ज़रूरी है. अनुमान के लिए मॉडल का नाम. फ़ॉर्मैट: name=models/{model} . अनुरोध का मुख्य भाग अनुरोध के मुख्य हिस्से में, इस स्ट्रक्चर का डेटा शामिल होता है: फ़ील्ड instances[] value ( Value format) ज़रूरी है. वे इंस्टेंस जो अनुमान लगाने के लिए किए गए कॉल के इनपुट होते हैं. parameters value ( Value format) ज़रूरी नहीं. ये पैरामीटर, अनुमान लगाने के लिए किए जाने वाले कॉल को कंट्रोल करते हैं. जवाब का मुख्य भाग कामयाब रहने पर, जवाब के मुख्य हिस्से में Operation का एक इंस्टेंस शामिल किया जाता है. सुझाव भेजें जब तक कुछ अलग से न बताया जाए, तब तक इस पेज की सामग्री को Creative Commons Attribution 4.0 License के तहत और कोड के नमूनों को Apache 2.0 License के तहत लाइसेंस मिला है. ज़्यादा जानकारी के लिए, Google Developers साइट नीतियां देखें. Oracle और/या इससे जुड़ी हुई कंपनियों का, Java एक रजिस्टर किया हुआ ट्रेडमार्क है. आखिरी बार 2025-12-16 (UTC) को अपडेट किया गया. क्या आपको हमें और कुछ बताना है? [[["समझने में आसान है","easyToUnderstand","thumb-up"],["मेरी समस्या हल हो गई","solvedMyProblem","thumb-up"],["अन्य","otherUp","thumb-up"]],[["वह जानकारी मौजूद नहीं है जो मुझे चाहिए","missingTheInformationINeed","thumb-down"],["बहुत मुश्किल है / बहुत सारे चरण हैं","tooComplicatedTooManySteps","thumb-down"],["पुराना","outOfDate","thumb-down"],["अनुवाद से जुड़ी समस्या","translationIssue","thumb-down"],["सैंपल / कोड से जुड़ी समस्या","samplesCodeIssue","thumb-down"],["अन्य","otherDown","thumb-down"]],["आखिरी बार 2025-12-16 (UTC) को अपडेट किया गया."],[],[]] शर्तें निजता Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:57
https://www.cisco.com/site/hk/zh/about/sitemap.html
網站地圖 - Cisco Skip to main content Skip to search Skip to footer Cisco.com 台灣 產品與服務 Close 解決方案 Close 支援 Close 學習 Close 選擇思科的理由 Close 合作夥伴 Close 探索思科 購買方式 合作夥伴 ZH HK 登入 探索思科 搜尋 功能表 關閉 購買方式 合作夥伴 登入 ZH HK Close Close Close Close Close 您好,有什麼需要幫助嗎? 網站地圖 熱門連結 職涯認證 職涯發展機會 案例研究和客戶成功案例 思科商務 社群 聯絡我們 Networking Academy 合作夥伴登入 產品首頁 信任中心 顯示更多內容 關於思科 公司 概覽 新聞中心 領導力 目的與永續發展 職涯發展機會 信任中心 聯絡我們 投資人關係 投資人關係首頁 年度報告 財務報告 股票資訊 分析師關係 與我們互動 思科社群 Cisco Insider Cisco Research Cisco Store Cisco Talos 網際網路中斷分布圖 (ThousandEyes) Outshift by Cisco 顯示更多內容 產品 精選產品 Cisco AI Defense Cisco Intersight 平台 Cisco Networking Cloud Cisco Secure Client(包括 AnyConnect) Cisco Secure Firewall Cisco Webex 套件 資料中心和雲端網路 交換器 路由器和 Cisco SD-WAN 設備 無線網路 所有產品 產品首頁 產品 (A-Z) 協作 運算 網路 安全性 Splunk AppDynamics 軟體 行動應用程式下載 資源 案例研究和客戶成功案例 Cisco Power Calculator Cisco Validated 法規遵循 dCloud 示範、訓練及沙箱 停止銷售與生命週期結束產品 概覽、示範及教學課程 試用與示範 Visio 模版 保固 顯示更多內容 解決方案 精選解決方案 人工智慧 Cisco on Cisco 安全存取服務邊緣 (SASE) 服務提供者 中小企業 智慧建築 思科的 Zero Trust Access 所有解決方案 解決方案首頁 協作 運算 網路 安全性 產業解決方案 產業產品組合探索工具 城市和社區 教育 金融服務 政府 醫療保健 製造業 採礦 石油與天然氣 零售業 體育、媒體及娛樂 運輸 公共事業 顯示更多內容 服務 精選服務 進階服務 Cisco Lifecycle Services Smart Net Total Care (SNTC) 軟體支援 Solution Support Success Tracks 所有服務 服務首頁 協作 運算 網路 可觀測性 (Splunk) 安全性 使用案例 現代資料中心 顯示更多內容 支援 適用於產品 所有產品 所有軟體下載 協同合作終端和電話 路由器 安全性 交換器 整合通訊 無線網路 聯絡支援部門 社群 授權支援 退貨入口網站 (RMA) 支援個案管理器 收購相關支援 中小企業電話號碼 其他電話號碼(全球) 工具與資源 安全性公告 公告 我的裝置 我的通知 錯誤搜尋工具 軟體研究 裝置涵蓋範圍檢查器 所有支援工具 顯示更多內容 學習 思科學習途徑 職涯認證 認證測驗 思科學習網路 Cisco Networking Academy Cisco U. DevNet Packet Tracer(網路模擬) 所有訓練與認證 活動與網路研討會 活動首頁 活動行事曆 Cisco Live 解決方案網路研討會 技術網路研討會 技術主題 AI 應用程式安全性 如何設定路由器 如何設定網路交換器 什麼是網路安全? 什麼是資料中心? 什麼是防火牆? 什麼是 LAN? 什麼是 Wi-Fi 7? 所有技術主題 顯示更多內容 購買方式 向思科購買 購買方式中心 Cisco Capital 租賃方案 Cisco Refresh(翻新設備) 安排通話 開始交談 透過經銷商或於線上購買 認識思科合作夥伴 經銷商尋找工具 服務訂購與合約管理 中小企業 授權 Enterprise Agreement Licensing Hub 軟體中心 顯示更多內容 合作夥伴 思科合作夥伴計畫 成為合作夥伴 合作夥伴獎勵計畫 合作夥伴專業化認證 合作夥伴工具與資源 思科商務 思科合作夥伴高峰會 我的資訊 合作夥伴意見回饋 合作夥伴培訓 SalesConnect 更多合作夥伴工具與資源 合作夥伴支援 售前支援 支援個案管理器 所有合作夥伴支援選項 顯示更多內容 快速連結 關於思科 聯絡我們 工作機會 與合作夥伴聯絡 資源與法務 意見回饋 說明 條款與條件 隱私權聲明 Cookie 商標 供應鏈透明度 網站地圖 &copy; Cisco Systems, Inc.
2026-01-13T09:29:57
https://letsencrypt.org/docs/challenge-types/#http-01-challenge
Challenge Types - Let&#39;s Encrypt Languages English Català Čeština Dansk Deutsch Greek Español Suomi Français עברית Magyar Bahasa Indonesia Italiano 日本語 한국어 Polish Português do Brasil Русский සිංහල Srpski Svenska Tamil Thai Türkçe Українська Tiếng Việt 简体中文 繁體中文 Skip navigation links Documentation Get Help Blog Donate Become a Sponsor Current Sponsors &amp; Funders Get Involved Donate About Us Let&#39;s Encrypt Frequently Asked Questions (FAQ) Policy and Legal Repository Service Status Statistics Contact Careers Annual reports Internet Security Research Group (ISRG) Donate Now Donate Now Challenge Types Last updated: December 3, 2025 See all Documentation When you get a certificate from Let’s Encrypt, our servers validate that you control the domain names in that certificate using “challenges,” as defined by the ACME standard. Most of the time, this validation is handled automatically by your ACME client, but if you need to make some more complex configuration decisions, it’s useful to know more about them. If you’re unsure, go with your client’s defaults or with HTTP-01. HTTP-01 challenge This is the most common challenge type today. Let’s Encrypt gives a token to your ACME client, and your ACME client puts a file on your web server at http://&lt;YOUR_DOMAIN&gt;/.well-known/acme-challenge/&lt;TOKEN&gt; . That file contains the token, plus a thumbprint of your account key. Once your ACME client tells Let’s Encrypt that the file is ready, Let’s Encrypt tries retrieving it (potentially multiple times from multiple vantage points). If our validation checks get the right responses from your web server, the validation is considered successful and you can go on to issue your certificate. If the validation checks fail, you’ll have to try again with a new certificate. Our implementation of the HTTP-01 challenge follows redirects, up to 10 redirects deep. It only accepts redirects to “http:” or “https:”, and only to ports 80 or 443. When redirected to an HTTPS URL, it does not validate certificates (since this challenge is intended to bootstrap valid certificates, it may encounter self-signed or expired certificates along the way). The HTTP-01 challenge can only be done on port 80. Allowing clients to specify arbitrary ports would make the challenge less secure, and so it is not allowed by the ACME standard. Pros: It’s easy to automate without extra knowledge about a domain’s configuration. It allows hosting providers to issue certificates for domains CNAMEd to them. It works with off-the-shelf web servers. It can be used to validate IP Addresses as well. Cons: It doesn’t work if your ISP blocks port 80 (this is rare, but some residential ISPs do this). Let’s Encrypt doesn’t let you use this challenge to issue wildcard certificates. If you have multiple web servers, you have to make sure the file is available on all of them. DNS-01 challenge This challenge asks you to prove that you control the DNS for your domain name by putting a specific value in a TXT record under that domain name. It is harder to configure than HTTP-01, but can work in scenarios that HTTP-01 can’t. It also allows you to issue wildcard certificates. After Let’s Encrypt gives your ACME client a token, your client will create a TXT record derived from that token and your account key, and put that record at _acme-challenge.&lt;YOUR_DOMAIN&gt; . Then Let’s Encrypt will query the DNS system for that record. If it finds a match, you can proceed to issue a certificate! Since automation of issuance and renewals is really important, it only makes sense to use DNS-01 challenges if your DNS provider has an API you can use to automate updates. Our community has started a list of such DNS providers here . Your DNS provider may be the same as your registrar (the company you bought your domain name from), or it might be different. If you want to change your DNS provider, you just need to make some small changes at your registrar. You don’t need to wait for your domain to be close to expiration to do so. Note that putting your full DNS API credentials on your web server significantly increases the impact if that web server is hacked. Best practice is to use more narrowly scoped API credentials , or perform DNS validation from a separate server and automatically copy certificates to your web server. Since Let’s Encrypt follows the DNS standards when looking up TXT records for DNS-01 validation, you can use CNAME records or NS records to delegate answering the challenge to other DNS zones. This can be used to delegate the _acme-challenge subdomain to a validation-specific server or zone. It can also be used if your DNS provider is slow to update, and you want to delegate to a quicker-updating server. Most DNS providers have a “propagation time” that governs how long it takes from the time you update a DNS record until it’s available on all of their servers. It can be hard to measure this because they often also use anycast , which means multiple servers can have the same IP address, and depending on where you are in the world you might talk to a different server (and get a different answer) than Let’s Encrypt does. The best DNS APIs provide a way for you to automatically check whether an update is fully propagated. If your DNS provider doesn’t have this, you just have to configure your client to wait long enough (often as much as an hour) to ensure the update is propagated before triggering validation. You can have multiple TXT records in place for the same name. For instance, this might happen if you are validating a challenge for a wildcard and a non-wildcard certificate at the same time. However, you should make sure to clean up old TXT records, because if the response size gets too big Let’s Encrypt will start rejecting it. Pros: You can use this challenge to issue certificates containing wildcard domain names. It works well even if you have multiple web servers. You can use this challenge to domain names whose webservers aren&rsquo;t exposed to the public internet. Cons: Keeping API credentials on your web server is risky. Your DNS provider might not offer an API. Your DNS API may not provide information on propagation times. It cannot be used to validate IP Addresses. TLS-ALPN-01 This challenge was developed after TLS-SNI-01 became deprecated, and is being developed as a separate standard . Like TLS-SNI-01, it is performed via TLS on port 443. However, it uses a custom ALPN protocol to ensure that only servers that are aware of this challenge type will respond to validation requests. This also allows validation requests for this challenge type to use an SNI field that matches the domain name being validated, making it more secure. This challenge is not suitable for most people. It is best suited to authors of TLS-terminating reverse proxies that want to perform host-based validation like HTTP-01, but want to do it entirely at the TLS layer in order to separate concerns. Right now that mainly means large hosting providers. Pros: It works if port 80 is unavailable to you. It can be performed purely at the TLS layer. It can be used to validate IP Addresses as well. Cons: ACME client support is limited. Like HTTP-01, if you have multiple servers they need to all answer with the same content. This method cannot be used to validate wildcard domains. TLS-SNI-01 This challenge was defined in draft versions of ACME. It did a TLS handshake on port 443 and sent a specific SNI header, looking for certificate that contained the token. It was removed in March 2019 because it was not secure enough. Let's Encrypt is a free, automated, and open Certificate Authority brought to you by the nonprofit Internet Security Research Group (ISRG) . Read all about our nonprofit work this year in our 2025 Annual Report . Legal Address 548 Market St, PMB 77519 San Francisco , CA 94104-5401 USA Send all mail or inquiries to: PO Box 18666 Minneapolis , MN 55418-0666 USA Subscribe for email updates about Let&#39;s Encrypt and other ISRG projects &copy; 2026 Internet Security Research Group GitHub LinkedIn Terms Privacy Policy Trademark Policy
2026-01-13T09:29:57
https://play.google.com/store/apps/details?id=notion.id&amp;hl=fr_CH
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M12 17.27L18.18 2
2026-01-13T09:29:57
https://www.cisco.com/site/hk/en/about/sitemap.html
Sitemap - Cisco Skip to main content Skip to search Skip to footer Cisco.com Hong Kong Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Explore Cisco How to buy Partners EN HK Log in Explore Cisco Search MENU CLOSE How to buy Partners Log in EN HK Close Close Close Close Close Hello, how can I help? Sitemap Popular links Career certifications Career opportunities Case studies and customer stories Cisco Commerce Community Contact us Networking Academy Partner login Products home The Trust Center Show more About Cisco Company Overview Newsroom Leadership Purpose and sustainability Career opportunities The Trust Center Contact us Investor relations Investor relations home Annual reports Financial results Stock information Analyst relations Engage with us Cisco Community Cisco Insider Cisco Research Cisco Store Cisco Talos Internet outages map (ThousandEyes) Outshift by Cisco Show more Products Featured products Cisco AI Defense Cisco Intersight platform Cisco Networking Cloud Cisco Secure Client (including AnyConnect) Cisco Secure Firewall Cisco Webex Suite Data center and cloud networking Switches Routers and SD-WAN appliances Wireless All products Products home Products A-Z Collaboration Computing Networking Security Splunk AppDynamics Software Mobile app downloads Resources Case studies and customer stories Cisco Power Calculator Cisco Validated Compliance dCloud demos, training, and sandboxes End-of-sale and end-of-life products Overviews, demos, and tutorials Trials and demos Visio stencils Warranties Show more Solutions Featured solutions Artificial intelligence Cisco on Cisco Secure access service edge (SASE) Service providers Small and medium businesses Smart buildings Zero Trust Access from Cisco All solutions Solutions home Collaboration Computing Networking Security Industry solutions Industry Portfolio Explorer Cities and communities Education Financial services Government Healthcare Manufacturing Mining Oil and gas Retail Sports, media, and entertainment Transportation Utilities Show more Services Featured services Advanced services Cisco Lifecycle Services Smart Net Total Care Software Support Solution Support Success Tracks All services Services home Collaboration Computing Networking Observability (Splunk) Security Use cases Modern data center Show more Support For products All products All software downloads Collaboration endpoints and phones Routers Security Switches Unified Communications Wireless Contact Support Community Licensing support Returns portal (RMAs) Support Case Manager Support for acquisitions Small business phone numbers Other phone numbers (worldwide) Tools and resources Security advisories Field notices My Devices My Notifications Bug Search Tool Software research Device coverage checker All Support tools Show more Learn Learning at Cisco Career certifications Certification exams Cisco Learning Network Cisco Networking Academy Cisco U. DevNet Packet Tracer (network simulation) All training and certifications Events and webinars Events home Events calendar Cisco Live Solution webinars Technology webinars Technology topics AI application security How to set up a router How to set up a network switch What is cybersecurity? What is a data center? What is a firewall? What is a LAN? What is Wi-Fi 7? All technology topics Show more How to buy Buying from Cisco How-to-buy hub Cisco Capital financing Cisco Refresh (remanufactured equipment) Schedule a call Start a chat Buying through resellers or online Meet our partners Reseller locator Service ordering and contract management Small and medium business Licensing Enterprise Agreement Licensing Hub Software central Show more Partners Cisco Partner Program Becoming a partner Partner incentives Partner specializations Partner tools and resources Cisco Commerce Cisco Partner Summit My Profile Partner feedback Partner training SalesConnect More partner tools and resources Partner support Presales support Support Case Manager All partner support options Show more Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Statement Cookies Trademarks Supply Chain Transparency Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:57
https://ai.google.dev/api/interactions-api?hl=bn
Gemini API &nbsp;|&nbsp; Google AI for Developers সরাসরি আসল কন্টেন্টে যান / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 API কী পান রান্নার বই কমিউনিটি সাইন-ইন করুন ডক্স API রেফারেন্স Gemini API ডক্স API রেফারেন্স API কী পান রান্নার বই কমিউনিটি ওভারভিউ API সংস্করণ ক্ষমতা মডেল সামগ্রী তৈরি করা হচ্ছে লাইভ API লাইভ মিউজিক API ইন্টারঅ্যাকশন API টোকেন নথি পত্র ব্যাচ API ক্যাশিং এম্বেডিং ফাইল অনুসন্ধান ফাইল অনুসন্ধানের দোকান দলিল সমস্ত পদ্ধতি অবচয় PaLM (পচনশীল) SDK রেফারেন্স Python Go টাইপস্ক্রিপ্ট Java C# এই পৃষ্ঠাটি Cloud Translation API অনুবাদ করেছে। হোম Gemini API API রেফারেন্স মতামত জানান Gemini API জেমিনি ইন্টারঅ্যাকশন API হল একটি পরীক্ষামূলক API যা ডেভেলপারদের জেমিনি মডেল ব্যবহার করে জেনারেটিভ এআই অ্যাপ্লিকেশন তৈরি করতে সাহায্য করে। জেমিনি হল আমাদের সবচেয়ে সক্ষম মডেল, যা শুরু থেকে মাল্টিমডাল হিসেবে তৈরি। এটি ভাষা, ছবি, অডিও, ভিডিও এবং কোড সহ বিভিন্ন ধরণের তথ্যকে সাধারণীকরণ এবং নির্বিঘ্নে বুঝতে, পরিচালনা করতে এবং একত্রিত করতে পারে। আপনি টেক্সট এবং ছবি জুড়ে যুক্তি, বিষয়বস্তু তৈরি, সংলাপ এজেন্ট, সারসংক্ষেপ এবং শ্রেণিবিন্যাস সিস্টেম এবং আরও অনেক কিছুর জন্য জেমিনি API ব্যবহার করতে পারেন। মার্কডাউন হিসেবে দেখুন OpenAPI স্পেক দেখুন একটি মিথস্ক্রিয়া তৈরি করা পোস্ট https://generativelanguage.googleapis.com/v1beta/interactions নতুন মিথস্ক্রিয়া তৈরি করে। অনুরোধের মূল অংশ প্রতিক্রিয়া অনুরোধের মূল অংশ অনুরোধের মূল অংশে নিম্নলিখিত কাঠামো সহ ডেটা রয়েছে: মডেল মডেল অপশন (ঐচ্ছিক) মিথস্ক্রিয়া তৈরির জন্য ব্যবহৃত `মডেল`-এর নাম। `এজেন্ট` প্রদান না করা হলে প্রয়োজন। সম্ভাব্য মান: gemini-2.5-pro আমাদের অত্যাধুনিক বহুমুখী মডেল, যা কোডিং এবং জটিল যুক্তির কাজে উৎকৃষ্ট। gemini-2.5-flash আমাদের প্রথম হাইব্রিড রিজনিং মডেল যা ১ মিলিয়ন টোকেন কনটেক্সট উইন্ডো সমর্থন করে এবং চিন্তাভাবনা বাজেট রয়েছে। gemini-2.5-flash-preview-09-2025 ২.৫ ফ্ল্যাশ মডেলের উপর ভিত্তি করে তৈরি সর্বশেষ মডেল। ২.৫ ফ্ল্যাশ প্রিভিউ বৃহৎ স্কেল প্রক্রিয়াকরণ, কম-বিলম্বিতা, উচ্চ ভলিউম কাজের জন্য যেখানে চিন্তাভাবনা প্রয়োজন এবং এজেন্টিক ব্যবহারের ক্ষেত্রে সবচেয়ে ভালো। gemini-2.5-flash-lite আমাদের সবচেয়ে ছোট এবং সবচেয়ে সাশ্রয়ী মডেল, যা ব্যাপক ব্যবহারের জন্য তৈরি। gemini-2.5-flash-lite-preview-09-2025 জেমিনি ২.৫ ফ্ল্যাশ লাইটের উপর ভিত্তি করে তৈরি সর্বশেষ মডেলটি খরচ-দক্ষতা, উচ্চ থ্রুপুট এবং উচ্চ মানের জন্য অপ্টিমাইজ করা হয়েছে। gemini-2.5-flash-preview-native-audio-dialog আমাদের নেটিভ অডিও মডেলগুলি উন্নত গতি, স্বর স্বাভাবিকতা, শব্দচয়ন এবং মেজাজের সাথে উচ্চ মানের অডিও আউটপুটের জন্য অপ্টিমাইজ করা হয়েছে। gemini-2.5-flash-image-preview আমাদের নেটিভ ইমেজ জেনারেশন মডেল, গতি, নমনীয়তা এবং প্রাসঙ্গিক বোধগম্যতার জন্য অপ্টিমাইজ করা হয়েছে। টেক্সট ইনপুট এবং আউটপুটের দাম 2.5 ফ্ল্যাশের সমান। gemini-2.5-pro-preview-tts আমাদের 2.5 প্রো টেক্সট-টু-স্পিচ অডিও মডেলটি শক্তিশালী, কম-লেটেন্সি স্পিচ জেনারেশনের জন্য অপ্টিমাইজ করা হয়েছে যাতে আরও প্রাকৃতিক আউটপুট এবং সহজে নির্দেশিত প্রম্পট পাওয়া যায়। gemini-3-pro-preview আমাদের সবচেয়ে বুদ্ধিমান মডেল, যার মধ্যে রয়েছে SOTA যুক্তি এবং মাল্টিমোডাল বোঝাপড়া, এবং শক্তিশালী এজেন্টিক এবং ভাইব কোডিং ক্ষমতা। আপনার প্রম্পটটি সম্পন্ন করবে এমন মডেল।\n\nআরও তথ্যের জন্য [models](https://ai.google.dev/gemini-api/docs/models) দেখুন। এজেন্ট এজেন্টঅপশন (ঐচ্ছিক) ইন্টারঅ্যাকশন তৈরির জন্য ব্যবহৃত `এজেন্ট`-এর নাম। `মডেল` প্রদান না করা থাকলে প্রয়োজন। সম্ভাব্য মান: deep-research-pro-preview-12-2025 জেমিনি ডিপ রিসার্চ এজেন্ট যে এজেন্টের সাথে যোগাযোগ করতে হবে। ইনপুট কন্টেন্ট বা অ্যারে ( কন্টেন্ট ) অথবা অ্যারে ( টার্ন ) অথবা স্ট্রিং (প্রয়োজনীয়) মিথস্ক্রিয়ার জন্য ইনপুট (মডেল এবং এজেন্ট উভয়ের জন্যই সাধারণ)। system_instruction স্ট্রিং (ঐচ্ছিক) মিথস্ক্রিয়ার জন্য সিস্টেম নির্দেশনা। টুলস অ্যারে ( টুল ) (ঐচ্ছিক) ইন্টারঅ্যাকশনের সময় মডেলটি যে টুল ঘোষণাগুলি কল করতে পারে তার একটি তালিকা। প্রতিক্রিয়া_বিন্যাস বস্তু (ঐচ্ছিক) জোর দেয় যে জেনারেট করা প্রতিক্রিয়াটি একটি JSON অবজেক্ট যা এই ক্ষেত্রে নির্দিষ্ট JSON স্কিমার সাথে সঙ্গতিপূর্ণ। response_mime_type স্ট্রিং (ঐচ্ছিক) প্রতিক্রিয়ার মাইম ধরণ। প্রতিক্রিয়া_বিন্যাস সেট করা থাকলে এটি প্রয়োজন। স্ট্রিম বুলিয়ান (ঐচ্ছিক) শুধুমাত্র ইনপুট। ইন্টারঅ্যাকশনটি স্ট্রিম করা হবে কিনা। স্টোর বুলিয়ান (ঐচ্ছিক) শুধুমাত্র ইনপুট। পরবর্তীতে পুনরুদ্ধারের জন্য প্রতিক্রিয়া এবং অনুরোধ সংরক্ষণ করা হবে কিনা। ব্যাকগ্রাউন্ড বুলিয়ান (ঐচ্ছিক) ব্যাকগ্রাউন্ডে মডেল ইন্টারঅ্যাকশন চালানো হবে কিনা। generation_config জেনারেশন কনফিগ (ঐচ্ছিক) মডেল কনফিগারেশন মডেল ইন্টারঅ্যাকশনের জন্য কনফিগারেশন প্যারামিটার। `agent_config` এর বিকল্প। শুধুমাত্র `model` সেট করা থাকলে প্রযোজ্য। মডেল ইন্টারঅ্যাকশনের জন্য কনফিগারেশন প্যারামিটার। ক্ষেত্র তাপমাত্রা সংখ্যা (ঐচ্ছিক) আউটপুটের এলোমেলোতা নিয়ন্ত্রণ করে। top_p নম্বর (ঐচ্ছিক) নমুনা নেওয়ার সময় বিবেচনা করার জন্য টোকেনের সর্বাধিক ক্রমবর্ধমান সম্ভাব্যতা। বীজ পূর্ণসংখ্যা (ঐচ্ছিক) পুনরুৎপাদনযোগ্যতার জন্য ডিকোডিংয়ে ব্যবহৃত বীজ। stop_sequences অ্যারে (স্ট্রিং) (ঐচ্ছিক) আউটপুট ইন্টারঅ্যাকশন বন্ধ করে দেবে এমন অক্ষর ক্রমগুলির একটি তালিকা। টুল_চয়েস টুলচয়েস (ঐচ্ছিক) মিথস্ক্রিয়ার জন্য সরঞ্জাম পছন্দ। টুল পছন্দের কনফিগারেশন। সম্ভাব্য প্রকারভেদ টুলচয়েসটাইপ এই ধরণের কোনও নির্দিষ্ট ক্ষেত্র নেই। টুলচয়েসকনফিগ allowed_tools AllowedTools (ঐচ্ছিক) কোন বিবরণ দেওয়া হয়নি। অনুমোদিত সরঞ্জামগুলির জন্য কনফিগারেশন। ক্ষেত্র মোড টুলচয়েসটাইপ (ঐচ্ছিক) টুল নির্বাচনের মোড। সম্ভাব্য মান: auto any none validated টুলস অ্যারে (স্ট্রিং) (ঐচ্ছিক) অনুমোদিত সরঞ্জামগুলির নাম। thinking_level থিংকিংলেভেল (ঐচ্ছিক) মডেলটি যে স্তরের চিন্তার টোকেন তৈরি করবে। সম্ভাব্য মান: low high thinking_summaries চিন্তাভাবনার সারাংশ (ঐচ্ছিক) উত্তরে চিন্তার সারাংশ অন্তর্ভুক্ত করা হবে কিনা। সম্ভাব্য মান: auto none সর্বোচ্চ_আউটপুট_টোকেন পূর্ণসংখ্যা (ঐচ্ছিক) প্রতিক্রিয়ায় সর্বাধিক কত টোকেন অন্তর্ভুক্ত করতে হবে। speech_config স্পীচকনফিগ (ঐচ্ছিক) বক্তৃতা মিথস্ক্রিয়ার জন্য কনফিগারেশন। বক্তৃতা মিথস্ক্রিয়ার জন্য কনফিগারেশন। ক্ষেত্র ভয়েস স্ট্রিং (ঐচ্ছিক) বক্তার কণ্ঠস্বর। ভাষার স্ট্রিং (ঐচ্ছিক) বক্তৃতার ভাষা। স্পিকার স্ট্রিং (ঐচ্ছিক) বক্তার নাম, এটি প্রম্পটে দেওয়া বক্তার নামের সাথে মিলতে হবে। agent_config অবজেক্ট (ঐচ্ছিক) এজেন্ট কনফিগারেশন এজেন্টের জন্য কনফিগারেশন। `generation_config` এর বিকল্প। `agent` সেট করা থাকলেই কেবল প্রযোজ্য। সম্ভাব্য প্রকারভেদ পলিমরফিক ডিসক্রিমিনেটর: type DynamicAgentConfig সম্পর্কে গতিশীল এজেন্টের জন্য কনফিগারেশন। স্ট্রিং টাইপ করুন (ঐচ্ছিক) এর মধ্যে একটি বিষয়বস্তুর জন্য OpenAPI টাইপ ডিসক্রিমিনেটর হিসেবে ব্যবহৃত হয়। সর্বদা &quot;dynamic&quot; তে সেট করুন। DeepResearchAgentConfig সম্পর্কে ডিপ রিসার্চ এজেন্টের জন্য কনফিগারেশন। স্ট্রিং টাইপ করুন (ঐচ্ছিক) এর মধ্যে একটি বিষয়বস্তুর জন্য OpenAPI টাইপ ডিসক্রিমিনেটর হিসেবে ব্যবহৃত হয়। সর্বদা &quot;deep-research&quot; এ সেট করুন। thinking_summaries চিন্তাভাবনার সারাংশ (ঐচ্ছিক) উত্তরে চিন্তার সারাংশ অন্তর্ভুক্ত করা হবে কিনা। সম্ভাব্য মান: auto none পূর্ববর্তী_ইন্টারঅ্যাকশন_আইডি স্ট্রিং (ঐচ্ছিক) পূর্ববর্তী ইন্টারঅ্যাকশনের আইডি, যদি থাকে। প্রতিক্রিয়া_প্রণালী প্রতিক্রিয়াপ্রণালী (ঐচ্ছিক) প্রতিক্রিয়ার অনুরোধকৃত পদ্ধতি (টেক্সট, ছবি, অডিও)। সম্ভাব্য মান: text image audio প্রতিক্রিয়া একটি ইন্টারঅ্যাকশন রিসোর্স প্রদান করে। সহজ অনুরোধ উদাহরণ প্রতিক্রিয়া { "created" : "2025-11-26T12:25:15Z" , "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "object" : "interaction" , "outputs" : [ { "text" : "Hello! I'm functioning perfectly and ready to assist you.\n\nHow are you doing today?" , "type" : "text" } ], "role" : "model" , "status" : "completed" , "updated" : "2025-11-26T12:25:15Z" , "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 7 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 7 , "total_output_tokens" : 20 , "total_reasoning_tokens" : 22 , "total_tokens" : 49 , "total_tool_use_tokens" : 0 } } মাল্টি-টার্ন উদাহরণ প্রতিক্রিয়া { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "status" : "completed" , "object" : "interaction" , "created" : "2025-11-26T12:22:47Z" , "updated" : "2025-11-26T12:22:47Z" , "role" : "model" , "outputs" : [ { "type" : "text" , "text" : "The capital of France is Paris." } ], "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 50 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 50 , "total_output_tokens" : 10 , "total_reasoning_tokens" : 0 , "total_tokens" : 60 , "total_tool_use_tokens" : 0 } } চিত্র ইনপুট উদাহরণ প্রতিক্রিয়া { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "status" : "completed" , "object" : "interaction" , "created" : "2025-11-26T12:22:47Z" , "updated" : "2025-11-26T12:22:47Z" , "role" : "model" , "outputs" : [ { "type" : "text" , "text" : "A white humanoid robot with glowing blue eyes stands holding a red skateboard." } ], "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 10 }, { "modality" : "image" , "tokens" : 258 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 268 , "total_output_tokens" : 20 , "total_reasoning_tokens" : 0 , "total_tokens" : 288 , "total_tool_use_tokens" : 0 } } ফাংশন কলিং উদাহরণ প্রতিক্রিয়া { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "status" : "requires_action" , "object" : "interaction" , "created" : "2025-11-26T12:22:47Z" , "updated" : "2025-11-26T12:22:47Z" , "role" : "model" , "outputs" : [ { "type" : "function_call" , "function_call" : { "name" : "get_weather" , "arguments" : { "location" : "Boston, MA" } } } ], "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 100 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 100 , "total_output_tokens" : 25 , "total_reasoning_tokens" : 0 , "total_tokens" : 125 , "total_tool_use_tokens" : 50 } } গভীর গবেষণা উদাহরণ প্রতিক্রিয়া { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "agent" : "deep-research-pro-preview-12-2025" , "status" : "completed" , "object" : "interaction" , "created" : "2025-11-26T12:22:47Z" , "updated" : "2025-11-26T12:22:47Z" , "role" : "model" , "outputs" : [ { "type" : "text" , "text" : "Here is a comprehensive research report on the current state of cancer research..." } ], "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 20 } ], "total_cached_tokens" : 0 , "total_input_tokens" : 20 , "total_output_tokens" : 1000 , "total_reasoning_tokens" : 500 , "total_tokens" : 1520 , "total_tool_use_tokens" : 0 } } একটি মিথস্ক্রিয়া পুনরুদ্ধার করা হচ্ছে https://generativelanguage.googleapis.com/v1beta/interactions/{id} পান `Interaction.id` এর উপর ভিত্তি করে একটি একক ইন্টারঅ্যাকশনের সম্পূর্ণ বিবরণ পুনরুদ্ধার করে। পাথ / কোয়েরি প্যারামিটার প্রতিক্রিয়া পাথ / কোয়েরি প্যারামিটার আইডি স্ট্রিং (প্রয়োজনীয়) পুনরুদ্ধারের জন্য মিথস্ক্রিয়ার অনন্য শনাক্তকারী। স্ট্রিম বুলিয়ান (ঐচ্ছিক) যদি সত্য হিসেবে সেট করা থাকে, তাহলে তৈরি হওয়া কন্টেন্ট ক্রমবর্ধমানভাবে স্ট্রিম করা হবে। ডিফল্ট: False last_event_id স্ট্রিং (ঐচ্ছিক) ঐচ্ছিক। যদি সেট করা থাকে, তাহলে ইভেন্ট আইডি দ্বারা চিহ্নিত ইভেন্টের পরের অংশ থেকে ইন্টারঅ্যাকশন স্ট্রিম পুনরায় শুরু করে। `stream` সত্য হলেই কেবল ব্যবহার করা যেতে পারে। api_version স্ট্রিং (ঐচ্ছিক) API এর কোন সংস্করণ ব্যবহার করবেন। প্রতিক্রিয়া একটি ইন্টারঅ্যাকশন রিসোর্স প্রদান করে। ইন্টারঅ্যাকশন পান উদাহরণ প্রতিক্রিয়া { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "model" : "gemini-2.5-flash" , "status" : "completed" , "object" : "interaction" , "created" : "2025-11-26T12:25:15Z" , "updated" : "2025-11-26T12:25:15Z" , "role" : "model" , "outputs" : [ { "type" : "text" , "text" : "I'm doing great, thank you for asking! How can I help you today?" } ] } একটি মিথস্ক্রিয়া মুছে ফেলা হচ্ছে https://generativelanguage.googleapis.com/v1beta/interactions/{id} মুছে ফেলুন আইডি দ্বারা মিথস্ক্রিয়া মুছে ফেলে। পাথ / কোয়েরি প্যারামিটার প্রতিক্রিয়া পাথ / কোয়েরি প্যারামিটার আইডি স্ট্রিং (প্রয়োজনীয়) মুছে ফেলার জন্য ইন্টারঅ্যাকশনের অনন্য শনাক্তকারী। api_version স্ট্রিং (ঐচ্ছিক) API এর কোন সংস্করণ ব্যবহার করবেন। প্রতিক্রিয়া সফল হলে, উত্তরটি খালি থাকবে। ইন্টার‍্যাকশন মুছে ফেলুন একটি মিথস্ক্রিয়া বাতিল করা হচ্ছে পোস্ট https://generativelanguage.googleapis.com/v1beta/interactions/{id}/cancel আইডি দ্বারা একটি ইন্টারঅ্যাকশন বাতিল করে। এটি শুধুমাত্র চলমান ব্যাকগ্রাউন্ড ইন্টারঅ্যাকশনের ক্ষেত্রে প্রযোজ্য। পাথ / কোয়েরি প্যারামিটার প্রতিক্রিয়া পাথ / কোয়েরি প্যারামিটার আইডি স্ট্রিং (প্রয়োজনীয়) পুনরুদ্ধারের জন্য মিথস্ক্রিয়ার অনন্য শনাক্তকারী। api_version স্ট্রিং (ঐচ্ছিক) API এর কোন সংস্করণ ব্যবহার করবেন। প্রতিক্রিয়া একটি ইন্টারঅ্যাকশন রিসোর্স প্রদান করে। মিথস্ক্রিয়া বাতিল করুন উদাহরণ প্রতিক্রিয়া { "id" : "v1_ChdPU0F4YWFtNkFwS2kxZThQZ05lbXdROBIXT1NBeGFhbTZBcEtpMWU4UGdOZW13UTg" , "agent" : "deep-research-pro-preview-12-2025" , "status" : "cancelled" , "object" : "interaction" , "created" : "2025-11-26T12:25:15Z" , "updated" : "2025-11-26T12:25:15Z" , "role" : "model" } রিসোর্স মিথষ্ক্রিয়া মিথস্ক্রিয়া সম্পদ। ক্ষেত্র মডেল মডেল অপশন (ঐচ্ছিক) মিথস্ক্রিয়া তৈরির জন্য ব্যবহৃত `মডেল`-এর নাম। সম্ভাব্য মান: gemini-2.5-pro আমাদের অত্যাধুনিক বহুমুখী মডেল, যা কোডিং এবং জটিল যুক্তির কাজে উৎকৃষ্ট। gemini-2.5-flash আমাদের প্রথম হাইব্রিড রিজনিং মডেল যা ১ মিলিয়ন টোকেন কনটেক্সট উইন্ডো সমর্থন করে এবং চিন্তাভাবনা বাজেট রয়েছে। gemini-2.5-flash-preview-09-2025 ২.৫ ফ্ল্যাশ মডেলের উপর ভিত্তি করে তৈরি সর্বশেষ মডেল। ২.৫ ফ্ল্যাশ প্রিভিউ বৃহৎ স্কেল প্রক্রিয়াকরণ, কম-বিলম্বিতা, উচ্চ ভলিউম কাজের জন্য যেখানে চিন্তাভাবনা প্রয়োজন এবং এজেন্টিক ব্যবহারের ক্ষেত্রে সবচেয়ে ভালো। gemini-2.5-flash-lite আমাদের সবচেয়ে ছোট এবং সবচেয়ে সাশ্রয়ী মডেল, যা ব্যাপক ব্যবহারের জন্য তৈরি। gemini-2.5-flash-lite-preview-09-2025 জেমিনি ২.৫ ফ্ল্যাশ লাইটের উপর ভিত্তি করে তৈরি সর্বশেষ মডেলটি খরচ-দক্ষতা, উচ্চ থ্রুপুট এবং উচ্চ মানের জন্য অপ্টিমাইজ করা হয়েছে। gemini-2.5-flash-preview-native-audio-dialog আমাদের নেটিভ অডিও মডেলগুলি উন্নত গতি, স্বর স্বাভাবিকতা, শব্দচয়ন এবং মেজাজের সাথে উচ্চ মানের অডিও আউটপুটের জন্য অপ্টিমাইজ করা হয়েছে। gemini-2.5-flash-image-preview আমাদের নেটিভ ইমেজ জেনারেশন মডেল, গতি, নমনীয়তা এবং প্রাসঙ্গিক বোধগম্যতার জন্য অপ্টিমাইজ করা হয়েছে। টেক্সট ইনপুট এবং আউটপুটের দাম 2.5 ফ্ল্যাশের সমান। gemini-2.5-pro-preview-tts আমাদের 2.5 প্রো টেক্সট-টু-স্পিচ অডিও মডেলটি শক্তিশালী, কম-লেটেন্সি স্পিচ জেনারেশনের জন্য অপ্টিমাইজ করা হয়েছে যাতে আরও প্রাকৃতিক আউটপুট এবং সহজে নির্দেশিত প্রম্পট পাওয়া যায়। gemini-3-pro-preview আমাদের সবচেয়ে বুদ্ধিমান মডেল, যার মধ্যে রয়েছে SOTA যুক্তি এবং মাল্টিমোডাল বোঝাপড়া, এবং শক্তিশালী এজেন্টিক এবং ভাইব কোডিং ক্ষমতা। আপনার প্রম্পটটি সম্পন্ন করবে এমন মডেল।\n\nআরও তথ্যের জন্য [models](https://ai.google.dev/gemini-api/docs/models) দেখুন। এজেন্ট এজেন্টঅপশন (ঐচ্ছিক) ইন্টারঅ্যাকশন তৈরির জন্য ব্যবহৃত `এজেন্ট`-এর নাম। সম্ভাব্য মান: deep-research-pro-preview-12-2025 জেমিনি ডিপ রিসার্চ এজেন্ট যে এজেন্টের সাথে যোগাযোগ করতে হবে। আইডি স্ট্রিং (ঐচ্ছিক) শুধুমাত্র আউটপুট। ইন্টারঅ্যাকশন সমাপ্তির জন্য একটি অনন্য শনাক্তকারী। স্ট্যাটাস এনাম (স্ট্রিং) (ঐচ্ছিক) শুধুমাত্র আউটপুট। মিথস্ক্রিয়ার অবস্থা। সম্ভাব্য মান: in_progress requires_action completed failed cancelled তৈরি স্ট্রিং (ঐচ্ছিক) শুধুমাত্র আউটপুট। ISO 8601 ফর্ম্যাটে (YYYY-MM-DDThh:mm:ssZ) প্রতিক্রিয়া তৈরির সময়। আপডেট করা স্ট্রিং (ঐচ্ছিক) শুধুমাত্র আউটপুট। ISO 8601 ফর্ম্যাটে (YYYY-MM-DDThh:mm:ssZ) প্রতিক্রিয়াটি শেষ আপডেট করার সময়। ভূমিকা স্ট্রিং (ঐচ্ছিক) শুধুমাত্র আউটপুট। মিথস্ক্রিয়ার ভূমিকা। আউটপুট অ্যারে ( বিষয়বস্তু ) (ঐচ্ছিক) শুধুমাত্র আউটপুট। মডেল থেকে প্রাপ্ত প্রতিক্রিয়া। অবজেক্ট স্ট্রিং (ঐচ্ছিক) শুধুমাত্র আউটপুট। ইন্টারঅ্যাকশনের অবজেক্টের ধরণ। সর্বদা `ইন্টারঅ্যাকশন` তে সেট করুন। সর্বদা &quot;interaction&quot; তে সেট করুন। ব্যবহার (ঐচ্ছিক ) শুধুমাত্র আউটপুট। ইন্টারঅ্যাকশন অনুরোধের টোকেন ব্যবহারের পরিসংখ্যান। ইন্টারঅ্যাকশন অনুরোধের টোকেন ব্যবহারের পরিসংখ্যান। ক্ষেত্র মোট_ইনপুট_টোকেন পূর্ণসংখ্যা (ঐচ্ছিক) প্রম্পটে (প্রসঙ্গ) টোকেনের সংখ্যা। ইনপুট_টোকেন_বাই_মোডালিটি মোডালিটি টোকেন (ঐচ্ছিক) মোডালিটি অনুসারে ইনপুট টোকেন ব্যবহারের একটি ভাঙ্গন। একটি একক প্রতিক্রিয়া পদ্ধতির জন্য টোকেন গণনা। ক্ষেত্র মোডালিটি রেসপন্স মোডালিটি (ঐচ্ছিক) টোকেন গণনার সাথে সম্পর্কিত পদ্ধতি। সম্ভাব্য মান: text image audio টোকেন পূর্ণসংখ্যা (ঐচ্ছিক) পদ্ধতির জন্য টোকেনের সংখ্যা। মোট_ক্যাশেড_টোকেন পূর্ণসংখ্যা (ঐচ্ছিক) প্রম্পটের ক্যাশে করা অংশে (ক্যাশে করা কন্টেন্ট) টোকেনের সংখ্যা। ক্যাশেড_টোকেন_বাই_মোডালিটি মোডালিটিটোকেন (ঐচ্ছিক) মোডালিটি অনুসারে ক্যাশেড টোকেন ব্যবহারের একটি ভাঙ্গন। একটি একক প্রতিক্রিয়া পদ্ধতির জন্য টোকেন গণনা। ক্ষেত্র মোডালিটি রেসপন্স মোডালিটি (ঐচ্ছিক) টোকেন গণনার সাথে সম্পর্কিত পদ্ধতি। সম্ভাব্য মান: text image audio টোকেন পূর্ণসংখ্যা (ঐচ্ছিক) পদ্ধতির জন্য টোকেনের সংখ্যা। মোট_আউটপুট_টোকেন পূর্ণসংখ্যা (ঐচ্ছিক) সমস্ত তৈরি হওয়া প্রতিক্রিয়া জুড়ে মোট টোকেনের সংখ্যা। আউটপুট_টোকেন_বাই_মোডালিটি মোডালিটি টোকেন (ঐচ্ছিক) মোডালিটি অনুসারে আউটপুট টোকেন ব্যবহারের একটি ভাঙ্গন। একটি একক প্রতিক্রিয়া পদ্ধতির জন্য টোকেন গণনা। ক্ষেত্র মোডালিটি রেসপন্স মোডালিটি (ঐচ্ছিক) টোকেন গণনার সাথে সম্পর্কিত পদ্ধতি। সম্ভাব্য মান: text image audio টোকেন পূর্ণসংখ্যা (ঐচ্ছিক) পদ্ধতির জন্য টোকেনের সংখ্যা। মোট_টুল_ব্যবহার_টোকেন পূর্ণসংখ্যা (ঐচ্ছিক) টুল-ব্যবহার প্রম্পটে উপস্থিত টোকেনের সংখ্যা। টুল_ব্যবহার_টোকেন_বাই_মডালিটি মোডালিটি টোকেন (ঐচ্ছিক) মোডালিটি অনুসারে টুল-ব্যবহারের টোকেন ব্যবহারের একটি ভাঙ্গন। একটি একক প্রতিক্রিয়া পদ্ধতির জন্য টোকেন গণনা। ক্ষেত্র মোডালিটি রেসপন্স মোডালিটি (ঐচ্ছিক) টোকেন গণনার সাথে সম্পর্কিত পদ্ধতি। সম্ভাব্য মান: text image audio টোকেন পূর্ণসংখ্যা (ঐচ্ছিক) পদ্ধতির জন্য টোকেনের সংখ্যা। মোট_যুক্তি_টোকেন পূর্ণসংখ্যা (ঐচ্ছিক) চিন্তাভাবনা মডেলের জন্য চিন্তার টোকেনের সংখ্যা। মোট_টোকেন পূর্ণসংখ্যা (ঐচ্ছিক) ইন্টারঅ্যাকশন অনুরোধের মোট টোকেন সংখ্যা (প্রম্পট + প্রতিক্রিয়া + অন্যান্য অভ্যন্তরীণ টোকেন)। পূর্ববর্তী_ইন্টারঅ্যাকশন_আইডি স্ট্রিং (ঐচ্ছিক) পূর্ববর্তী ইন্টারঅ্যাকশনের আইডি, যদি থাকে। উদাহরণ উদাহরণ { "created" : "2025-12-04T15:01:45Z" , "id" : "v1_ChdXS0l4YWZXTk9xbk0xZThQczhEcmlROBIXV0tJeGFmV05PcW5NMWU4UHM4RHJpUTg" , "model" : "gemini-2.5-flash" , "object" : "interaction" , "outputs" : [ { "text" : "Hello! I'm doing well, functioning as expected. Thank you for asking! How are you doing today?" , "type" : "text" } ] , "role" : "model" , "status" : "completed" , "updated" : "2025-12-04T15:01:45Z" , "usage" : { "input_tokens_by_modality" : [ { "modality" : "text" , "tokens" : 7 } ] , "total_cached_tokens" : 0 , "total_input_tokens" : 7 , "total_output_tokens" : 23 , "total_reasoning_tokens" : 49 , "total_tokens" : 79 , "total_tool_use_tokens" : 0 } } ডেটা মডেল কন্টেন্ট উত্তরের বিষয়বস্তু। সম্ভাব্য প্রকারভেদ পলিমরফিক ডিসক্রিমিনেটর: type টেক্সটকন্টেন্ট একটি টেক্সট কন্টেন্ট ব্লক। টেক্সট স্ট্রিং (ঐচ্ছিক) লেখার বিষয়বস্তু। স্ট্রিং টাইপ করুন (প্রয়োজনীয়) এর মধ্যে একটি বিষয়বস্তুর জন্য OpenAPI টাইপ ডিসক্রিমিনেটর হিসেবে ব্যবহৃত হয়। সর্বদা &quot;text&quot; তে সেট করুন। টীকা টীকা (ঐচ্ছিক) মডেল-জেনারেটেড কন্টেন্টের জন্য উদ্ধৃতি তথ্য। মডেল-জেনারেটেড কন্টেন্টের জন্য উদ্ধৃতি তথ্য। ক্ষেত্র start_index পূর্ণসংখ্যা (ঐচ্ছিক) এই উৎসের সাথে সম্পর্কিত প্রতিক্রিয়ার অংশের শুরু। সূচকটি অংশের শুরু নির্দেশ করে, যা বাইটে পরিমাপ করা হয়। end_index পূর্ণসংখ্যা (ঐচ্ছিক) অ্যাট্রিবিউটেড সেগমেন্টের শেষ, এক্সক্লুসিভ। উৎস স্ট্রিং (ঐচ্ছিক) লেখার একটি অংশের জন্য উৎস। এটি একটি URL, শিরোনাম, অথবা অন্য শনাক্তকারী হতে পারে। ছবির বিষয়বস্তু একটি ছবির কন্টেন্ট ব্লক। ডেটা স্ট্রিং (ঐচ্ছিক) কোন বিবরণ দেওয়া হয়নি। uri স্ট্রিং (ঐচ্ছিক) কোন বিবরণ দেওয়া হয়নি। mime_type ImageMimeTypeOption (ঐচ্ছিক) কোন বিবরণ দেওয়া হয়নি। সম্ভাব্য মান: image/png image/jpeg image/webp image/heic image/heif ছবির মাইমের ধরণ। স্ট্রিং টাইপ করুন (প্রয়োজনীয়) এর মধ্যে একটি বিষয়বস্তুর জন্য OpenAPI টাইপ ডিসক্রিমিনেটর হিসেবে ব্যবহৃত হয়। সর্বদা &quot;image&quot; তে সেট করুন। রেজোলিউশন মিডিয়া রেজোলিউশন (ঐচ্ছিক) গণমাধ্যমের সমাধান। সম্ভাব্য মান: low medium high অডিও কন্টেন্ট একটি অডিও কন্টেন্ট ব্লক। ডেটা স্ট্রিং (ঐচ্ছিক) কোন বিবরণ দেওয়া হয়নি। uri স্ট্রিং (ঐচ্ছিক) কোন বিবরণ দেওয়া হয়নি। mime_type অডিওমাইমটাইপঅপশন (ঐচ্ছিক) কোন বিবরণ দেওয়া হয়নি। সম্ভাব্য মান: audio/wav audio/mp3 audio/aiff audio/aac audio/ogg audio/flac অডিওর মাইম ধরণ। স্ট্রিং টাইপ করুন (প্রয়োজনীয়) এর মধ্যে একটি বিষয়বস্তুর জন্য OpenAPI টাইপ ডিসক্রিমিনেটর হিসেবে ব্যবহৃত হয়। সর্বদা &quot;audio&quot; তে সেট করুন। ডকুমেন্ট কন্টেন্ট একটি ডকুমেন্ট কন্টেন্ট ব্লক। ডেটা স্ট্রিং (ঐচ্ছিক) কোন বিবরণ দেওয়া হয়নি। uri স্ট্রিং (ঐচ্ছিক) কোন বিবরণ দেওয়া হয়নি। mime_type স্ট্রিং (ঐচ্ছিক) কোন বিবরণ দেওয়া হয়নি। স্ট্রিং টাইপ করুন (প্রয়োজনীয়) এর মধ্যে একটি বিষয়বস্তুর জন্য OpenAPI টাইপ ডিসক্রিমিনেটর হিসেবে ব্যবহৃত হয়। সর্বদা &quot;document&quot; তে সেট করুন। ভিডিও কন্টেন্ট একটি ভিডিও কন্টেন্ট ব্লক। ডেটা স্ট্রিং (ঐচ্ছিক) কোন বিবরণ দেওয়া হয়নি। uri স্ট্রিং (ঐচ্ছিক) কোন বিবরণ দেওয়া হয়নি। mime_type VideoMimeTypeOption (ঐচ্ছিক) কোন বিবরণ দেওয়া হয়নি। সম্ভাব্য মান: video/mp4 video/mpeg video/mov video/avi video/x-flv video/mpg video/webm video/wmv video/3gpp ভিডিওটির মাইমের ধরণ। স্ট্রিং টাইপ করুন (প্রয়োজনীয়) এর মধ্যে একটি বিষয়বস্তুর জন্য OpenAPI টাইপ ডিসক্রিমিনেটর হিসেবে ব্যবহৃত হয়। সর্বদা &quot;video&quot; তে সেট করুন। রেজোলিউশন মিডিয়া রেজোলিউশন (ঐচ্ছিক) গণমাধ্যমের সমাধান। সম্ভাব্য মান: low medium high চিন্তার বিষয়বস্তু একটি চিন্তার বিষয়বস্তু ব্লক। স্বাক্ষর স্ট্রিং (ঐচ্ছিক) প্রজন্মের অংশ হতে ব্যাকএন্ড উৎসের সাথে মিল রেখে স্বাক্ষর। স্ট্রিং টাইপ করুন (প্রয়োজনীয়) এর মধ্যে একটি বিষয়বস্তুর জন্য OpenAPI টাইপ ডিসক্রিমিনেটর হিসেবে ব্যবহৃত হয়। সর্বদা &quot;thought&quot; তে সেট করুন। সারাংশ চিন্তার সারাংশ (ঐচ্ছিক) চিন্তার সারসংক্ষেপ। চিন্তার সারসংক্ষেপ। ফাংশনকল কন্টেন্ট একটি ফাংশন টুল কন্টেন্ট ব্লক কল করে। নামের স্ট্রিং (প্রয়োজনীয়) কল করার জন্য টুলের নাম। আর্গুমেন্ট অবজেক্ট (প্রয়োজনীয়) ফাংশনে পাস করার জন্য আর্গুমেন্ট। স্ট্রিং টাইপ করুন (প্রয়োজনীয়) এর মধ্যে একটি বিষয়বস্তুর জন্য OpenAPI টাইপ ডিসক্রিমিনেটর হিসেবে ব্যবহৃত হয়। সর্বদা &quot;function_call&quot; তে সেট করুন। আইডি স্ট্রিং (প্রয়োজনীয়) এই নির্দিষ্ট টুল কলের জন্য একটি অনন্য আইডি। ফাংশন ফলাফল কন্টেন্ট একটি ফাংশন টুল ফলাফল কন্টেন্ট ব্লক। নামের স্ট্রিং (ঐচ্ছিক) যে হাতিয়ারটির নাম বলা হয়েছিল। ত্রুটি_হয় বুলিয়ান (ঐচ্ছিক) টুল কলের ফলে কোনও ত্রুটি হয়েছে কিনা। স্ট্রিং টাইপ করুন (প্রয়োজনীয়) এর মধ্যে একটি বিষয়বস্তুর জন্য OpenAPI টাইপ ডিসক্রিমিনেটর হিসেবে ব্যবহৃত হয়। সর্বদা &quot;function_result&quot; তে সেট করুন। ফলাফল বস্তু বা স্ট্রিং (প্রয়োজনীয়) টুল কলের ফলাফল। call_id স্ট্রিং (প্রয়োজনীয়) ফাংশন কল ব্লকের আইডির সাথে মিল করার জন্য আইডি। কোডএক্সিকিউশনকলকন্টেন্ট কোড এক্সিকিউশন কন্টেন্ট। আর্গুমেন্ট কোডএক্সেকিউশনকলআর্গুমেন্টস (ঐচ্ছিক) কোড এক্সিকিউশনে পাস করার জন্য আর্গুমেন্ট। কোড এক্সিকিউশনে পাস করার জন্য আর্গুমেন্ট। ক্ষেত্র ভাষা enum (স্ট্রিং) (ঐচ্ছিক) `কোড`-এর প্রোগ্রামিং ভাষা। সম্ভাব্য মান: python কোড স্ট্রিং (ঐচ্ছিক) যে কোডটি কার্যকর করা হবে। স্ট্রিং টাইপ করুন (প্রয়োজনীয়) এর মধ্যে একটি বিষয়বস্তুর জন্য OpenAPI টাইপ ডিসক্রিমিনেটর হিসেবে ব্যবহৃত হয়। সর্বদা &quot;code_execution_call&quot; তে সেট করুন। আইডি স্ট্রিং (ঐচ্ছিক) এই নির্দিষ্ট টুল কলের জন্য একটি অনন্য আইডি। কোডএক্সিকিউশন ফলাফলবিষয়বস্তু কোড এক্সিকিউশন ফলাফলের বিষয়বস্তু। ফলাফল স্ট্রিং (ঐচ্ছিক) কোড এক্সিকিউশনের আউটপুট। ত্রুটি_হয় বুলিয়ান (ঐচ্ছিক) কোড এক্সিকিউশনের ফলে কোনও ত্রুটি হয়েছে কিনা। স্বাক্ষর স্ট্রিং (ঐচ্ছিক) ব্যাকএন্ড যাচাইকরণের জন্য একটি স্বাক্ষর হ্যাশ। স্ট্রিং টাইপ করুন (প্রয়োজনীয়) এর মধ্যে একটি বিষয়বস্তুর জন্য OpenAPI টাইপ ডিসক্রিমিনেটর হিসেবে ব্যবহৃত হয়। সর্বদা &quot;code_execution_result&quot; তে সেট করুন। call_id স্ট্রিং (ঐচ্ছিক) কোড এক্সিকিউশন কল ব্লকের আইডির সাথে মিলবে এমন আইডি। UrlContextCallContent সম্পর্কে URL এর প্রসঙ্গ কন্টেন্ট। আর্গুমেন্ট UrlContextCallArguments (ঐচ্ছিক) URL প্রসঙ্গে যে আর্গুমেন্টগুলি পাস করতে হবে। URL প্রসঙ্গে যে আর্গুমেন্টগুলি পাস করতে হবে। ক্ষেত্র urls অ্যারে (স্ট্রিং) (ঐচ্ছিক) যেসব URL গুলি আনা হবে। স্ট্রিং টাইপ করুন (প্রয়োজনীয়) এর মধ্যে একটি বিষয়বস্তুর জন্য OpenAPI টাইপ ডিসক্রিমিনেটর হিসেবে ব্যবহৃত হয়। সর্বদা &quot;url_context_call&quot; এ
2026-01-13T09:29:57
https://play.google.com/store/apps/details?id=notion.id&amp;hl=fi
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M12 17.27L18.18
2026-01-13T09:29:57
https://www.cisco.com/site/us/en/about/purpose/fy24-report/index.html#bar_tall
FY24 Purpose Report - Cisco Skip to main content Skip to search Skip to footer Cisco.com Worldwide Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Trials and demos How to buy Partners EN US Profile Log in Trials and demos MENU CLOSE How to buy Partners Profile Log in EN US Close Close Close Close Close Hello, how can I help? About Purpose Power an Inclusive Future for All FY24 Purpose Report Celebrating 40 Years of Impact Driven by our Purpose, we combine our technology, people, and broader networks to address society&#39;s greatest challenges. We share the progress we&#39;ve made in our annual report. FY24 Purpose Report (PDF) Overview Explore the Report Looking Ahead FY24 Purpose Report 40 Years of Impact We built the digital highways that have become the backbone for modern communication. Now, we’re harnessing the power of connection to build a better future for people, communities, and the planet. For 40 years, connection has been core to Cisco’s identity. At Cisco, we’re proud of how our products and services bridge gaps, enable collaboration, and drive sustainability in meaningful ways. We prove every day that running a successful business with a commitment to do good makes progress possible. Letter from the CEO Our Timeline of Impact 1984 Cisco Systems, Inc Developed by Sandy Lerner and Leonard Bosack with a team of colleagues at Stanford University, the multiprotocol router connected disparate computer networks, leading to Cisco’s founding. 1997 Cisco Networking Academy Launched to educate high school and college students on how to design, install, and maintain computer networks. 1997 Cisco Foundation Established to support programs that leverage the Internet to help people in need and drive positive change. 1998 Cisco Community Investment Report Published report detailing Cisco’s philanthropic and community investment efforts. 1999 NetAid Harnessed the Internet to raise US$830K to end global poverty. By live-streaming celebrated musicians across three locations, NetAid garnered 2.4M views across 80 countries and set a record for the largest Internet broadcast event for a single day. 2000 Habitat for Humanity Provided funding and volunteer support to build homes and wire houses for Internet access. 2005 Corporate Citizenship Report Made a formal commitment to transparency and accountability by publishing details on Cisco&#39;s Corporate Social Responsibility efforts. 2005 Crisis Response Deployed communications equipment to assist emergency personnel in the aftermath of Hurricane Katrina and formed a dedicated emergency response team. 2006 Goal to Reduce Emissions Set our first greenhouse gas emissions reduction goal. 2011 Veterans Program Established program to help transitioning U.S. military veterans and families find employment and educational opportunities. 2011 On-Campus Solar Energy Installed first solar energy project at Cisco&#39;s Research Triangle Park campus. 2012 Global Human Rights Policy Formalized our commitment to respect human rights for all people. 2014 Talos Formed to provide accurate, rapid, and actionable threat intelligence for Cisco customers, products, and services. 2015 Country Digital Acceleration Launched program to collaborate with government and private sector leaders in building sustainable, secure, and inclusive communities. 2016 White House Equal Pay Pledge Became a founding signer of the White House Equal Pay Pledge and committed to paying employees fairly and equitably. 2018 Homelessness Grant Announced a five-year, US$50M commitment to end homelessness in Santa Clara County. 2019 Global Citizen Announced a partnership with Global Citizen to power the movement to end extreme poverty. 2020 Community Enablement Commitment Transformed longstanding advocacy for community enablement into a global, company-wide commitment. 2020 COVID-19 Response Introduced $2.5B financing program to support customers and keep businesses running; donated US$50M in cash and personal protective equipment (PPE) to organizations supporting vulnerable citizens; and provided funding to deploy COVID-19-related technology solutions. 2021 Cisco Foundation Climate Commitment Committed US$100M over the next 10 years to address climate change. 2021 Net Zero Announced a goal to reach net-zero greenhouse gas emissions across our value chain by 2040. 2022 Responsible AI Launched our Responsible AI (RAI) Principles and RAI Framework to formalize our commitment to build safe and trustworthy AI. 2023 One Billion Lives Exceeded our goal—ahead of schedule—to positively impact one billion people globally from FY16-FY23 through Cisco Networking Academy and social innovation grants. 2024 40 Communities Announcing our next big ambition: over the next 10 years, we plan to engage, support, and invest in 40 communities around the globe. Previous Next Explore this year’s report View all Power Power We build and deliver technology that powers the world’s connectivity, whether that’s between computers, throughout communities, or across continents. And we do so with the highest standards of ethics and integrity in mind—for ourselves, for our customers and partners, and for their users. That’s the power, and importance, of connection. Explore the Power section  0 1600 Active, completed, or in-pipeline projects across 50 countries through Country Digital Acceleration 0 B 800 billion Security events observed each day by Cisco Talos, protecting the world against cyber threats 0 27 Languages available for stakeholders to use Cisco’s EthicsLine 0 % 99.9% Of employees completed our annual Code of Business Conduct certification Featured Stories Connectivity in the Amazon The first floating Networking Academy provides free WiFi within a 30-meter radius, offers IT training, and promotes digital inclusion for communities. Responsible Mineral Sourcing We joined the Initiative for Responsible Mining Assurance to support the visibility, accountability, and inclusion of rightsholders as decision-makers at all levels of the mineral supply chain. Show more Inclusive Inclusive We’re recognized as one of the world’s best workplaces, and we have an unrelenting focus on employee wellbeing, benefits, giving, and inclusion. We strive to create the best possible employee experience, because we know our greatest asset is our people. Explore the Inclusive section  0 % 86% Employees participated in community impact efforts through donations, volunteering, and more 0 720,000 Volunteer hours logged by employees Launched BridgeIT, a Cisco Enterprise Chat AI, to intelligently guide employees and help them work faster, safer, and smarter 0 31 Inclusive Communities with 335 chapters across 77 countries Featured Stories Native American Network Cisco’s Native American Network deployed 18 sovereign broadband access points on Zuni tribal lands in New Mexico to help close the digital divide. Wellbeing in Technology The &#34;WellNest&#34; on Webex pilot supports physical, mental, social, and financial wellbeing through an intuitive AI-powered platform. Show more Future Future Cisco has been committed to reducing its environmental impact for nearly two decades, but there’s more to be done as we work toward a regenerative future. Our sustainability strategy, the Plan for Possible, guides us as we build our products, accelerate clean energy access, support suppliers’ reduced environmental impacts, and foster climate resiliency in communities. Explore the Future section  0 % 96% Of electricity for Cisco facilities came from renewable sources 0 % 73% Reduction in Scope 1 and 2 emissions FY25 goal: 90% reduction 0 % 75% Of the waste generated at our facilities was diverted from landfill globally 0 % 96% Of new Cisco products and packaging incorporate Circular Design Principles FY25 goal: 100% meeting circular design criteria Featured Stories Connected Conservation Cisco donated Cisco Meraki routers to African Parks to help them harness reliable Internet technology. Cisco Refresh We provide a second life to our products and reduce waste through the Cisco Refresh program, and we provide discounts to businesses joining the circular economy. Show more For All For All Through our technology, our people, and our broader networks, we create solutions that help address the world’s most critical challenges—from the AI skills gap to social inequities to environmental crises. We continue to show up to create a better future for all, by all, with all stakeholders who share our vision. Explore the For All section 0 M 24 million Cisco Networking Academy students since 1997 0 &#43; 30 plus Natural disasters and humanitarian crises responded to by Cisco Crisis Response $ 0 M USD 35 million US dollars Approved to fund climate solutions through the Cisco Foundation since FY21 $ 0 B USD 1.5 billion US dollars In Title IV Federal Funding that we helped preserve for HBCUs since FY20 Featured Stories Women Rock-IT Women Rock-IT celebrated 10 years, and their annual International Girls in ICT day programming reached 1.2 million on social media. Impact in India Cisco partners with NGOs and government agencies in India to create technology-based solutions that support critical human needs. View all Looking Ahead To celebrate our 40th year, we’re looking ahead to our future with Splunk and how we can drive even greater success for our customers, partners, employees, and communities together. There’s no better way to celebrate our anniversary than setting our next big ambition to propel us into the future. Learn more from Chief People, Policy &amp; Purpose Officer Fran Katsoudas on what’s next for Cisco’s Purpose work. Explore “Looking Ahead” 40 Years of Impact Power an Inclusive Future for All Driven by our Purpose, we combine our technology, people, and broader networks to address society&#39;s greatest challenges. We share the progress we&#39;ve made in our annual report. FY24 Purpose Report (PDF) Purpose Reporting Hub Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Cookies / Do not sell or share my personal data Accessibility Trademarks Supply Chain Transparency Newsroom Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:57
https://infisical.com/docs/integrations/platforms/certificate-agent#post-event-hooks
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let&#x27;s Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;./client-id&quot; # Path to file containing client ID client-secret : &quot;./client-secret&quot; # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : &quot;kubernetes-auth&quot; config : identity-id : &quot;your-kubernetes-identity-id&quot; service-account-token-path : &quot;/var/run/secrets/kubernetes.io/serviceaccount/token&quot; Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : &quot;azure-auth&quot; config : identity-id : &quot;your-azure-identity-id&quot; Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;gcp-id-token&quot; config : identity-id : &quot;your-gcp-identity-id&quot; GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : &quot;gcp-iam&quot; config : identity-id : &quot;your-gcp-identity-id&quot; service-account-key : &quot;/path/to/service-account-key.json&quot; Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;aws-iam&quot; config : identity-id : &quot;your-aws-identity-id&quot; ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : [ &quot;api.example.com&quot; , &quot;api-v2.example.com&quot; ] ttl : &quot;90d&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; # Enable automatic certificate renewal lifecycle : renew-before-expiry : &quot;30d&quot; status-check-interval : &quot;6h&quot; # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : &quot;/etc/ssl/private/web.key&quot; permission : &quot;0600&quot; # Read/write for owner only certificate : path : &quot;/etc/ssl/certs/web.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner chain : path : &quot;/etc/ssl/certs/web-chain.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo &quot;Certificate issued for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-failure : command : | echo &quot;Certificate operation failed: ${ERROR_MESSAGE}&quot; mail -s &quot;Certificate Alert&quot; [email&#160;protected] &lt; /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., [&quot;www.example.com&quot;, &quot;api.example.com&quot;] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger &#x27;Certificate renewal failed&#x27; , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo &quot;New certificate issued for ${CERT_COMMON_NAME}&quot; chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d &quot;{&#x27;text&#x27;: &#x27;Certificate for ${CERT_COMMON_NAME} renewed successfully&#x27;}&quot; timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo &quot;Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}&quot; # Send alert mail -s &quot;Certificate Failure Alert&quot; [email&#160;protected] &lt; /dev/null # Log to syslog logger -p daemon.error &quot;Certificate agent failure: ${ERROR_MESSAGE}&quot; timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : &quot;https://app.infisical.com&quot; retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; csr-path : &quot;/etc/ssl/requests/api.csr&quot; file-output : certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; lifecycle : renew-before-expiry : &quot;14d&quot; # Renew 14 days before expiration status-check-interval : &quot;6h&quot; # Check certificate status every 6 hours file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; post-hooks : on-issuance : command : &quot;systemctl reload nginx&quot; timeout : 30 on-renewal : command : &quot;systemctl reload nginx &amp;&amp; logger &#x27;Certificate renewed&#x27;&quot; timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:57
https://www.cisco.com/site/dz/en/about/sitemap.html
Sitemap - Cisco Skip to main content Skip to search Skip to footer Cisco.com Africa Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Explore Cisco How to buy Partners EN DZ Log in Explore Cisco Search MENU CLOSE How to buy Partners Log in EN DZ Close Close Close Close Close Hello, how can I help? Sitemap Popular links Career certifications Career opportunities Case studies and customer stories Cisco Commerce Community Contact us Networking Academy Partner login Products home The Trust Center Show more About Cisco Company Overview Newsroom Leadership Purpose and sustainability Career opportunities The Trust Center Contact us Investor relations Investor relations home Annual reports Financial results Stock information Analyst relations Engage with us Cisco Community Cisco Insider Cisco Research Cisco Store Cisco Talos Internet outages map (ThousandEyes) Outshift by Cisco Show more Products Featured products Cisco AI Defense Cisco Intersight platform Cisco Networking Cloud Cisco Secure Client (including AnyConnect) Cisco Secure Firewall Cisco Webex Suite Data center and cloud networking Switches Routers and SD-WAN appliances Wireless All products Products home Products A-Z Collaboration Computing Networking Security Splunk AppDynamics Software Mobile app downloads Resources Case studies and customer stories Cisco Power Calculator Cisco Validated Compliance dCloud demos, training, and sandboxes End-of-sale and end-of-life products Overviews, demos, and tutorials Trials and demos Visio stencils Warranties Show more Solutions Featured solutions Artificial intelligence Cisco on Cisco Secure access service edge (SASE) Service providers Small and medium businesses Smart buildings Zero Trust Access from Cisco All solutions Solutions home Collaboration Computing Networking Security Industry solutions Industry Portfolio Explorer Cities and communities Education Financial services Government Healthcare Manufacturing Mining Oil and gas Retail Sports, media, and entertainment Transportation Utilities Show more Services Featured services Advanced services Cisco Lifecycle Services Smart Net Total Care Software Support Solution Support Success Tracks All services Services home Collaboration Computing Networking Observability (Splunk) Security Use cases Modern data center Show more Support For products All products All software downloads Collaboration endpoints and phones Routers Security Switches Unified Communications Wireless Contact Support Community Licensing support Returns portal (RMAs) Support Case Manager Support for acquisitions Small business phone numbers Other phone numbers (worldwide) Tools and resources Security advisories Field notices My Devices My Notifications Bug Search Tool Software research Device coverage checker All Support tools Show more Learn Learning at Cisco Career certifications Certification exams Cisco Learning Network Cisco Networking Academy Cisco U. DevNet Packet Tracer (network simulation) All training and certifications Events and webinars Events home Events calendar Cisco Live Solution webinars Technology webinars Technology topics AI application security How to set up a router How to set up a network switch What is cybersecurity? What is a data center? What is a firewall? What is a LAN? What is Wi-Fi 7? All technology topics Show more How to buy Buying from Cisco How-to-buy hub Cisco Capital financing Cisco Refresh (remanufactured equipment) Schedule a call Start a chat Buying through resellers or online Meet our partners Reseller locator Service ordering and contract management Small and medium business Licensing Enterprise Agreement Licensing Hub Software central Show more Partners Cisco Partner Program Becoming a partner Partner incentives Partner specializations Partner tools and resources Cisco Commerce Cisco Partner Summit My Profile Partner feedback Partner training SalesConnect More partner tools and resources Partner support Presales support Support Case Manager All partner support options Show more Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Statement Cookies Trademarks Supply Chain Transparency Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:57
https://snyk.io/es/solutions/zero-day-vulnerability-security/
Encuentra y corrige rápidamente las vulnerabilidades de día cero con Snyk | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API &amp; Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API &amp; Web - Todos los clientes Snyk API &amp; Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo Soluciones Seguridad de la aplicación Seguridad de la cadena de suministro de software Código seguro generado por IA Vulnerabilidades de día cero Secure at inception Select Seguridad de la aplicación Seguridad de la cadena de suministro de software Código seguro generado por IA Vulnerabilidades de día cero Secure at inception Encuentra y corrige rápidamente las vulnerabilidades de día cero Snyk te ayuda a responder rápidamente a las vulnerabilidades de día cero en tus dependencias directas e indirectas para reducir el impacto en tu organización. Encuentra con un clic, corrige con una solicitud de cambio. Reserva una demostración en vivo Vulnerabilidad de alta gravedad en HTTP/2 Encuentra y corrige CVE-2023-44487 con Snyk. Lee el blog Vulnerabilidades de día cero: “cuándo”, no “si” Las vulnerabilidades de día cero surgen sin previo aviso, por lo que necesitas una solución AppSec y un manual de acción para encontrarlas y remediarlas inmediatamente con el fin de reducir el riesgo y la exposición.  La mayor parte del código de un proyecto es de terceros El software libre y de código abierto constituye del 70 al 90 % de cualquier solución de software moderna, y todo ello es vulnerable a los días cero. Las dependencias tienen sus propias dependencias Corregir las vulnerabilidades de día cero en las dependencias directas puede ser difícil, pero corregirlas en las dependencias indirectas requiere herramientas potentes. Los atacantes son cada vez más rápidos El 58 % de los hackers solo necesitan cinco horas o menos para explotar una falla de seguridad una vez que esta se reporta, así que el tiempo corre en tu contra. Los clientes de Snyk detectan y corrigen las vulnerabilidades de día cero con mayor rapidez Cuando se produjo la vulnerabilidad crítica de Log4Shell, los clientes de Snyk solucionaron la vulnerabilidad más rápido , protegiendo sus aplicaciones y a sus propios clientes, al tiempo que les ahorraban horas a los desarrolladores. Lee el estudio sobre el valor para el cliente 100x El remedio es 100 veces más rápido que el promedio del sector 280 280 horas ahorradas a los desarrolladores en promedio $13 400 $13 400 de ROI promedio por cliente “Snyk fue el primero en actualizar \[para remediar Log4Shell]... Me sentí muy cómodo al entender nuestra postura, al comprender a quién afectaba y al ser capaz de determinar los siguientes pasos”. Amanda Alvarez Technical Security Product Owner , CVS Health Permite a los desarrolladores corregir rápidamente las vulnerabilidades de día cero con Snyk Snyk ayuda a los desarrolladores y a los equipos de seguridad a encontrar y corregir las vulnerabilidades de seguridad con la mayor rapidez y sin esfuerzo, ya que los equipos de respuesta a incidentes necesitan reaccionar rápidamente ante las vulnerabilidades críticas. Inteligencia en seguridad de contenedores y código abierto líder del sector Nuestros investigadores depuran manualmente la base de datos de vulnerabilidades de Snyk reemplazándola con datos de seguridad actualizados, incluida la información más reciente sobre vulnerabilidades de día cero, para que puedas identificar con precisión los riesgos y solucionarlos rápidamente en las dependencias directas e indirectas, a menudo con solo unos clics. Obtén más información sobre la inteligencia de seguridad de Snyk Supervisión continua para encontrar más rápido Snyk se ejecuta en tus repositorios Git, escanea desde el IDE y agrega seguridad directamente en CI/CD, por lo que los proyectos se supervisan continuamente en busca de las últimas vulnerabilidades. Obtén más información sobre la visibilidad de la seguridad Correcciones sugeridas para que los desarrolladores puedan solucionar con rapidez y seguir adelante Snyk utiliza el contexto de la aplicación para brindar sugerencias de correcciones de seguridad comprobadas para el código vulnerable, incluida la recomendación de dependencias actualizadas, para que los desarrolladores puedan aplicar la corrección que consideren adecuada rápidamente. Obtén más información sobre la priorización de riesgos Prepárate para las vulnerabilidades de día cero con Snyk Descubre cómo Snyk puede permitir a los desarrolladores remediar las vulnerabilidades de día cero con mayor rapidez para reducir la exposición y el riesgo. Reserva una demostración en vivo Comienza sin pagar nada Vulnerabilidades de día cero recientes Blog Vulnerabilidad de alta gravedad encontrada en libcurl y curl (CVE-2023-38545) En este preanuncio de una nueva vulnerabilidad curl de alta gravedad, aprende a calcular el posible impacto para tu organización y obtén los pasos necesarios para prepararte para el próximo parche. Blog Cómo encontrar y corregir la vulnerabilidad crítica de día cero de WebP CVE-2023-4863 El mes pasado, se descubrieron dos vulnerabilidades WebP críticas (CVE-2023-4863 y CVE-2023-5129). En este artículo, aprenderás a identificar dónde utilizas libwebp y cómo remediar las vulnerabilidades. Blog Nueva vulnerabilidad crítica de OpenSSL: lo que debes saber Una próxima versión de OpenSSL, prevista para el 1 de noviembre de 2022, aborda una vulnerabilidad de seguridad crítica. Este artículo explica cómo detectar la vulnerabilidad en el código y describe los pasos para mitigarla. Blog Encuentra y corrige rápidamente el exploit Log4Shell con Snyk Comprueba lo fácil (y rápido) que es encontrar y corregir automáticamente Log4Shell con Snyk. Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:57
https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.threads.com%2F&amp;h=AT3MRIqS8mu0fb6wZ6Wn5k84ViLP9OPpG2Xg1U7bz-C0RKcjrfRNu5y4l9mXi03uELTtRZkyI-ZJemhl8vMDlRBuoKWOB0NuMKjErluS7a9JPwveMhKYbpWbJxZtQIkMrBwvphwswNuClxBn
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:57
https://snyk.io/es/podcasts/the-secure-developer/
The Secure Developer Podcast | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API &amp; Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API &amp; Web - Todos los clientes Snyk API &amp; Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo The Secure Developer Podcast A podcast about securing the future of DevOps and AI. Tune in for real talk with industry leaders to help you build fast and secure. The Secure Developer Meet your host As Chief Technology Officer, Danny is responsible for the global technology roadmap and security research at Snyk. With more than 25 years of software technology experience, he is passionate about solving customer problems and software innovation. Previously, Danny was CTO of Veeam Software, where he launched more than a dozen new product offerings and spearheaded the company into the leading market share position. Earlier in his career, Danny was Director of Security Research at IBM and a member of the Security Architecture Board, where he co-authored the IBM Secure Engineering Framework.  He holds multiple software patents in the cloud and security field. Skip to Results All seasons Season 10 Season 9 Season 8 Season 7 Season 6 Season 5 Season 4 Season 3 Season 2 Season 1 Mostrando 1 - 12 de 172 episodes Episode 172 A Vision For The Future Of Enterprise AI Security With Sanjay Poonen View episode Episode 171 Vulnerabilities In Enterprise AI Workflows With Nicolas Dupont View episode Episode 170 Autonomous Identity Governance With Paul Querna View episode Episode 169 Retrieval-Augmented Generation With Bob Remeika From Ragie View episode Episode 168 Securing The Future Of AI With Dr. Peter Garraghan View episode Episode 167 The Future is Now with Michael Grinich (WorkOS) View episode Episode 166 Open Authorization In The World Of AI With Aaron Parecki View episode Episode 165 The Evolution Of Platform Engineering With Massdriver CEO Cory O’Daniel View episode Episode 164 The Future Of API Security With FireTail’s Jeremy Snyder View episode Episode 163 The Case For Steward Ownership And Open Source With Melanie Rieback View episode Episode 162 Advancing AppSec With AI With Akira Brand View episode Episode 161 Authentication, Authorization, And The Future Of AI Security With Alex Salazar View episode 1 Página 2 Página 3 Página 4 Página 5 Página 15 Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:57
https://ai.google.dev/api/models?hl=pt-br
Models &nbsp;|&nbsp; Gemini API &nbsp;|&nbsp; Google AI for Developers Ir para o conteúdo principal / English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어 Conferir a chave de API Manual Comunidade Fazer login Documentos Referência da API Gemini API Documentos Referência da API Conferir a chave de API Manual Comunidade Visão geral Versões da API Recursos Modelos Geração de conteúdo API Live API Live Music API Interactions Tokens Arquivos API Batch Armazenamento em cache Embeddings Pesquisa de arquivos Armazenamentos de pesquisa de arquivos Documento Todos os métodos Descontinuado PaLM (desativado) Referências do SDK Python Go TypeScript Java C# Página inicial Gemini API Referência da API Envie comentários Models O endpoint "models" oferece uma maneira de listar de forma programática os modelos disponíveis e recuperar metadados estendidos, como funcionalidade compatível e dimensionamento da janela de contexto. Leia mais no guia de modelos . Método: models.get Endpoint Parâmetros de caminho Corpo da solicitação Corpo da resposta Escopos de autorização Exemplo de solicitação Receber Recebe informações sobre um Model específico, como número da versão, limites de token, parâmetros e outros metadados. Consulte o guia de modelos do Gemini para informações detalhadas sobre os modelos. Endpoint get https: / /generativelanguage.googleapis.com /v1beta /{name=models /*} Parâmetros de caminho name string Obrigatório. O nome do recurso do modelo. Esse nome precisa corresponder a um nome de modelo retornado pelo método models.list . Formato: models/{model} . Ele tem o formato models/{model} . Corpo da solicitação O corpo da solicitação precisa estar vazio. Exemplo de solicitação Python from google import genai client = genai . Client () model_info = client . models . get ( model = "gemini-2.0-flash" ) print ( model_info ) models . py Go ctx := context . Background () client , err := genai . NewClient ( ctx , &amp; genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } modelInfo , err := client . Models . Get ( ctx , "gemini-2.0-flash" , nil ) if err != nil { log . Fatal ( err ) } fmt . Println ( modelInfo ) models . go Concha curl https://generativelanguage.googleapis.com/v1beta/models/gemini-2.0-flash?key = $GEMINI_API_KEY models .sh Corpo da resposta Se a solicitação for bem-sucedida, o corpo da resposta conterá uma instância de Model . Método: models.list Endpoint Parâmetros de consulta Corpo da solicitação Corpo da resposta Representação JSON Escopos de autorização Exemplo de solicitação List Lista os Model s disponíveis na API Gemini. Endpoint get https: / /generativelanguage.googleapis.com /v1beta /models Parâmetros de consulta pageSize integer O número máximo de Models a serem retornados (por página). Se não for especificado, 50 modelos serão retornados por página. Esse método retorna no máximo 1.000 modelos por página, mesmo que você transmita um "pageSize" maior. pageToken string Um token de página recebido de uma chamada models.list anterior. Forneça o pageToken retornado por uma solicitação como argumento para a próxima solicitação e recupere a próxima página. Ao paginar, todos os outros parâmetros fornecidos para models.list precisam corresponder à chamada que forneceu o token da página. Corpo da solicitação O corpo da solicitação precisa estar vazio. Exemplo de solicitação Python from google import genai client = genai . Client () print ( "List of models that support generateContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "generateContent" : print ( m . name ) print ( "List of models that support embedContent: \n " ) for m in client . models . list (): for action in m . supported_actions : if action == "embedContent" : print ( m . name ) models . py Go ctx := context . Background () client , err := genai . NewClient ( ctx , &amp; genai . ClientConfig { APIKey : os . Getenv ( "GEMINI_API_KEY" ), Backend : genai . BackendGeminiAPI , }) if err != nil { log . Fatal ( err ) } // Retrieve the list of models. models , err := client . Models . List ( ctx , &amp; genai . ListModelsConfig {}) if err != nil { log . Fatal ( err ) } fmt . Println ( "List of models that support generateContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "generateContent" { fmt . Println ( m . Name ) break } } } fmt . Println ( "\nList of models that support embedContent:" ) for _ , m := range models . Items { for _ , action := range m . SupportedActions { if action == "embedContent" { fmt . Println ( m . Name ) break } } } models . go Concha curl https://generativelanguage.googleapis.com/v1beta/models?key = $GEMINI_API_KEY models .sh Corpo da resposta Resposta de ListModel contendo uma lista paginada de modelos. Se bem-sucedido, o corpo da resposta incluirá dados com a estrutura a seguir: Campos models[] object ( Model ) Os modelos retornados. nextPageToken string Um token, que pode ser enviado como pageToken para recuperar a próxima página. Se esse campo for omitido, não haverá mais páginas. Representação JSON { "models" : [ { object ( Model ) } ] , "nextPageToken" : string } Recurso REST: models Recurso: modelo Representação JSON Métodos Recurso: modelo Informações sobre um modelo de linguagem generativa. Campos name string Obrigatório. O nome do recurso do Model . Consulte Variantes de modelo para conferir todos os valores permitidos. Formato: models/{model} com uma convenção de nomenclatura {model} de: "{baseModelId}-{version}" Exemplos: models/gemini-1.5-flash-001 baseModelId string Obrigatório. O nome do modelo de base. Transmita isso para a solicitação de geração. Exemplos: gemini-1.5-flash version string Obrigatório. O número da versão do modelo. Isso representa a versão principal ( 1.0 ou 1.5 ) displayName string O nome legível do modelo. Por exemplo, "Gemini 1.5 Flash". O nome pode ter até 128 caracteres e conter qualquer caractere UTF-8. description string Uma breve descrição do modelo. inputTokenLimit integer Número máximo de tokens de entrada permitidos para este modelo. outputTokenLimit integer Número máximo de tokens de saída disponíveis para este modelo. supportedGenerationMethods[] string Os métodos de geração compatíveis do modelo. Os nomes dos métodos de API correspondentes são definidos como strings em PascalCase, como generateMessage e generateContent . thinking boolean Se o modelo é compatível com o pensamento. temperature number Controla a aleatoriedade da saída. Os valores podem variar em [0.0,maxTemperature] , inclusive. Um valor mais alto vai produzir respostas mais variadas, enquanto um valor mais próximo de 0.0 geralmente resulta em respostas menos surpreendentes do modelo. Esse valor especifica o padrão a ser usado pelo back-end ao fazer a chamada para o modelo. maxTemperature number A temperatura máxima que este modelo pode usar. topP number Para amostragem de núcleo . A amostragem de núcleo considera o menor conjunto de tokens cuja soma de probabilidade é pelo menos topP . Esse valor especifica o padrão a ser usado pelo back-end ao fazer a chamada para o modelo. topK integer Para amostragem Top-k. A amostragem Top-K considera o conjunto de topK tokens mais prováveis. Esse valor especifica o padrão a ser usado pelo back-end ao fazer a chamada para o modelo. Se estiver vazio, indica que o modelo não usa a amostragem top-k e que topK não é permitido como um parâmetro de geração. Representação JSON { "name" : string , "baseModelId" : string , "version" : string , "displayName" : string , "description" : string , "inputTokenLimit" : integer , "outputTokenLimit" : integer , "supportedGenerationMethods" : [ string ] , "thinking" : boolean , "temperature" : number , "maxTemperature" : number , "topP" : number , "topK" : integer } Método: models.predict Endpoint Parâmetros de caminho Corpo da solicitação Representação JSON Corpo da resposta Representação JSON Escopos de autorização Executa uma solicitação de previsão. Endpoint post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predict Parâmetros de caminho model string Obrigatório. O nome do modelo para predição. Formato: name=models/{model} . Ele tem o formato models/{model} . Corpo da solicitação O corpo da solicitação contém dados com a seguinte estrutura: Campos instances[] value ( Value format) Obrigatório. As instâncias que são a entrada da chamada de previsão. parameters value ( Value format) Opcional. Os parâmetros que regem a chamada de previsão. Corpo da resposta Mensagem de resposta para [PredictionService.Predict]. Se bem-sucedido, o corpo da resposta incluirá dados com a estrutura a seguir: Campos predictions[] value ( Value format) As saídas da chamada de previsão. Representação JSON { "predictions" : [ value ] } Método: models.predictLongRunning Endpoint Parâmetros de caminho Corpo da solicitação Representação JSON Corpo da resposta Escopos de autorização Igual a "models.predict", mas retorna um LRO. Endpoint post https: / /generativelanguage.googleapis.com /v1beta /{model=models /*}:predictLongRunning Parâmetros de caminho model string Obrigatório. O nome do modelo para predição. Formato: name=models/{model} . Corpo da solicitação O corpo da solicitação contém dados com a seguinte estrutura: Campos instances[] value ( Value format) Obrigatório. As instâncias que são a entrada da chamada de previsão. parameters value ( Value format) Opcional. Os parâmetros que regem a chamada de previsão. Corpo da resposta Se a solicitação for bem-sucedida, o corpo da resposta conterá uma instância de Operation . Envie comentários Exceto em caso de indicação contrária, o conteúdo desta página é licenciado de acordo com a Licença de atribuição 4.0 do Creative Commons , e as amostras de código são licenciadas de acordo com a Licença Apache 2.0 . Para mais detalhes, consulte as políticas do site do Google Developers . Java é uma marca registrada da Oracle e/ou afiliadas. Última atualização 2025-12-16 UTC. Quer enviar seu feedback? [[["Fácil de entender","easyToUnderstand","thumb-up"],["Meu problema foi resolvido","solvedMyProblem","thumb-up"],["Outro","otherUp","thumb-up"]],[["Não contém as informações de que eu preciso","missingTheInformationINeed","thumb-down"],["Muito complicado / etapas demais","tooComplicatedTooManySteps","thumb-down"],["Desatualizado","outOfDate","thumb-down"],["Problema na tradução","translationIssue","thumb-down"],["Problema com as amostras / o código","samplesCodeIssue","thumb-down"],["Outro","otherDown","thumb-down"]],["Última atualização 2025-12-16 UTC."],[],[]] Termos de Serviço Privacidade Manage cookies English Deutsch Español – América Latina Français Indonesia Italiano Polski Português – Brasil Shqip Tiếng Việt Türkçe Русский עברית العربيّة فارسی हिंदी বাংলা ภาษาไทย 中文 – 简体 中文 – 繁體 日本語 한국어
2026-01-13T09:29:57
https://infisical.com/docs/integrations/platforms/certificate-agent#certificate-issuance-with-automatic-renewal
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let&#x27;s Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;./client-id&quot; # Path to file containing client ID client-secret : &quot;./client-secret&quot; # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : &quot;kubernetes-auth&quot; config : identity-id : &quot;your-kubernetes-identity-id&quot; service-account-token-path : &quot;/var/run/secrets/kubernetes.io/serviceaccount/token&quot; Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : &quot;azure-auth&quot; config : identity-id : &quot;your-azure-identity-id&quot; Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;gcp-id-token&quot; config : identity-id : &quot;your-gcp-identity-id&quot; GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : &quot;gcp-iam&quot; config : identity-id : &quot;your-gcp-identity-id&quot; service-account-key : &quot;/path/to/service-account-key.json&quot; Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;aws-iam&quot; config : identity-id : &quot;your-aws-identity-id&quot; ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : [ &quot;api.example.com&quot; , &quot;api-v2.example.com&quot; ] ttl : &quot;90d&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; # Enable automatic certificate renewal lifecycle : renew-before-expiry : &quot;30d&quot; status-check-interval : &quot;6h&quot; # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : &quot;/etc/ssl/private/web.key&quot; permission : &quot;0600&quot; # Read/write for owner only certificate : path : &quot;/etc/ssl/certs/web.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner chain : path : &quot;/etc/ssl/certs/web-chain.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo &quot;Certificate issued for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-failure : command : | echo &quot;Certificate operation failed: ${ERROR_MESSAGE}&quot; mail -s &quot;Certificate Alert&quot; [email&#160;protected] &lt; /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., [&quot;www.example.com&quot;, &quot;api.example.com&quot;] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger &#x27;Certificate renewal failed&#x27; , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo &quot;New certificate issued for ${CERT_COMMON_NAME}&quot; chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d &quot;{&#x27;text&#x27;: &#x27;Certificate for ${CERT_COMMON_NAME} renewed successfully&#x27;}&quot; timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo &quot;Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}&quot; # Send alert mail -s &quot;Certificate Failure Alert&quot; [email&#160;protected] &lt; /dev/null # Log to syslog logger -p daemon.error &quot;Certificate agent failure: ${ERROR_MESSAGE}&quot; timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : &quot;https://app.infisical.com&quot; retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; csr-path : &quot;/etc/ssl/requests/api.csr&quot; file-output : certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; lifecycle : renew-before-expiry : &quot;14d&quot; # Renew 14 days before expiration status-check-interval : &quot;6h&quot; # Check certificate status every 6 hours file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; post-hooks : on-issuance : command : &quot;systemctl reload nginx&quot; timeout : 30 on-renewal : command : &quot;systemctl reload nginx &amp;&amp; logger &#x27;Certificate renewed&#x27;&quot; timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:57
https://akismet.com/developers/detailed-docs/errors/akismet-error-10010/
Akismet Error #10010 &#8211; Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Getting started Plugins and libraries Detailed docs Building your application Key verification Comment check Submit spam (missed&nbsp;spam) Submit ham (false&nbsp;positives) Key/sites activity Usage limit Response error codes Akismet Error #10001 Akismet Error #10003 Akismet Error #10402 Akismet Error #10011 Akismet Error #10010 Akismet Error #10009 Akismet Error #10006 Akismet Error #10005 Akismet Error #10404 Akismet Error #10403 Akismet Error #30001 Akismet Error #10010 Subscription Upgrade Required Akismet Error #10010 Why am I receiving this error? We have detected that your current subscription is not appropriate for your current usage of Akismet. We attempted to contact you via email regarding the problem as well. Please be sure to upgrade your subscription or contact us within two weeks of receiving this notice. Otherwise, at that time your API Key will be suspended. Which subscription should I choose? Our Pro subscription can be used commercially for up to nine sites. You can add sites to a current Pro subscription by following  these steps . If you need to use Akismet on 10 or more commercial sites, you can choose the Business plan, which will cover an unlimited number of sites. Otherwise,&nbsp; check out our plans page &nbsp;for the subscription that fits you best. What if an agency or studio set everything up? You can contact the folks who helped you get up and running, and let them know that their Akismet API key needs to be upgraded. Or &#8211; simply choose to&nbsp; register your own subscription &nbsp;and activate the Akismet plugin using your new API key. Can I just de-activate Akismet? Yes. If you are currently using our WordPress plugin, go to the Plugins menu in your dashboard and click on the “Deactivate” link found directly under “Akismet.” If you happen to be using a different client, please refer to its documentation regarding deactivation. Note that your site(s) will then be left unprotected from spam, which is not recommended. Can we help with anything else? I need to update my credit card. I forgot my API key. I need to reset my password. I need to cancel my subscription. Priority support Want to get help even faster? Don&#8217;t forget that our Pro subscription includes priority email support. Related Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:57
https://play.google.com/store/apps/details?id=notion.id&amp;hl=km
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M12 17.27L
2026-01-13T09:29:57
https://www.cisco.com/site/us/en/about/purpose/fy24-report/index.html#bar_short
FY24 Purpose Report - Cisco Skip to main content Skip to search Skip to footer Cisco.com Worldwide Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Trials and demos How to buy Partners EN US Profile Log in Trials and demos MENU CLOSE How to buy Partners Profile Log in EN US Close Close Close Close Close Hello, how can I help? About Purpose Power an Inclusive Future for All FY24 Purpose Report Celebrating 40 Years of Impact Driven by our Purpose, we combine our technology, people, and broader networks to address society&#39;s greatest challenges. We share the progress we&#39;ve made in our annual report. FY24 Purpose Report (PDF) Overview Explore the Report Looking Ahead FY24 Purpose Report 40 Years of Impact We built the digital highways that have become the backbone for modern communication. Now, we’re harnessing the power of connection to build a better future for people, communities, and the planet. For 40 years, connection has been core to Cisco’s identity. At Cisco, we’re proud of how our products and services bridge gaps, enable collaboration, and drive sustainability in meaningful ways. We prove every day that running a successful business with a commitment to do good makes progress possible. Letter from the CEO Our Timeline of Impact 1984 Cisco Systems, Inc Developed by Sandy Lerner and Leonard Bosack with a team of colleagues at Stanford University, the multiprotocol router connected disparate computer networks, leading to Cisco’s founding. 1997 Cisco Networking Academy Launched to educate high school and college students on how to design, install, and maintain computer networks. 1997 Cisco Foundation Established to support programs that leverage the Internet to help people in need and drive positive change. 1998 Cisco Community Investment Report Published report detailing Cisco’s philanthropic and community investment efforts. 1999 NetAid Harnessed the Internet to raise US$830K to end global poverty. By live-streaming celebrated musicians across three locations, NetAid garnered 2.4M views across 80 countries and set a record for the largest Internet broadcast event for a single day. 2000 Habitat for Humanity Provided funding and volunteer support to build homes and wire houses for Internet access. 2005 Corporate Citizenship Report Made a formal commitment to transparency and accountability by publishing details on Cisco&#39;s Corporate Social Responsibility efforts. 2005 Crisis Response Deployed communications equipment to assist emergency personnel in the aftermath of Hurricane Katrina and formed a dedicated emergency response team. 2006 Goal to Reduce Emissions Set our first greenhouse gas emissions reduction goal. 2011 Veterans Program Established program to help transitioning U.S. military veterans and families find employment and educational opportunities. 2011 On-Campus Solar Energy Installed first solar energy project at Cisco&#39;s Research Triangle Park campus. 2012 Global Human Rights Policy Formalized our commitment to respect human rights for all people. 2014 Talos Formed to provide accurate, rapid, and actionable threat intelligence for Cisco customers, products, and services. 2015 Country Digital Acceleration Launched program to collaborate with government and private sector leaders in building sustainable, secure, and inclusive communities. 2016 White House Equal Pay Pledge Became a founding signer of the White House Equal Pay Pledge and committed to paying employees fairly and equitably. 2018 Homelessness Grant Announced a five-year, US$50M commitment to end homelessness in Santa Clara County. 2019 Global Citizen Announced a partnership with Global Citizen to power the movement to end extreme poverty. 2020 Community Enablement Commitment Transformed longstanding advocacy for community enablement into a global, company-wide commitment. 2020 COVID-19 Response Introduced $2.5B financing program to support customers and keep businesses running; donated US$50M in cash and personal protective equipment (PPE) to organizations supporting vulnerable citizens; and provided funding to deploy COVID-19-related technology solutions. 2021 Cisco Foundation Climate Commitment Committed US$100M over the next 10 years to address climate change. 2021 Net Zero Announced a goal to reach net-zero greenhouse gas emissions across our value chain by 2040. 2022 Responsible AI Launched our Responsible AI (RAI) Principles and RAI Framework to formalize our commitment to build safe and trustworthy AI. 2023 One Billion Lives Exceeded our goal—ahead of schedule—to positively impact one billion people globally from FY16-FY23 through Cisco Networking Academy and social innovation grants. 2024 40 Communities Announcing our next big ambition: over the next 10 years, we plan to engage, support, and invest in 40 communities around the globe. Previous Next Explore this year’s report View all Power Power We build and deliver technology that powers the world’s connectivity, whether that’s between computers, throughout communities, or across continents. And we do so with the highest standards of ethics and integrity in mind—for ourselves, for our customers and partners, and for their users. That’s the power, and importance, of connection. Explore the Power section  0 1600 Active, completed, or in-pipeline projects across 50 countries through Country Digital Acceleration 0 B 800 billion Security events observed each day by Cisco Talos, protecting the world against cyber threats 0 27 Languages available for stakeholders to use Cisco’s EthicsLine 0 % 99.9% Of employees completed our annual Code of Business Conduct certification Featured Stories Connectivity in the Amazon The first floating Networking Academy provides free WiFi within a 30-meter radius, offers IT training, and promotes digital inclusion for communities. Responsible Mineral Sourcing We joined the Initiative for Responsible Mining Assurance to support the visibility, accountability, and inclusion of rightsholders as decision-makers at all levels of the mineral supply chain. Show more Inclusive Inclusive We’re recognized as one of the world’s best workplaces, and we have an unrelenting focus on employee wellbeing, benefits, giving, and inclusion. We strive to create the best possible employee experience, because we know our greatest asset is our people. Explore the Inclusive section  0 % 86% Employees participated in community impact efforts through donations, volunteering, and more 0 720,000 Volunteer hours logged by employees Launched BridgeIT, a Cisco Enterprise Chat AI, to intelligently guide employees and help them work faster, safer, and smarter 0 31 Inclusive Communities with 335 chapters across 77 countries Featured Stories Native American Network Cisco’s Native American Network deployed 18 sovereign broadband access points on Zuni tribal lands in New Mexico to help close the digital divide. Wellbeing in Technology The &#34;WellNest&#34; on Webex pilot supports physical, mental, social, and financial wellbeing through an intuitive AI-powered platform. Show more Future Future Cisco has been committed to reducing its environmental impact for nearly two decades, but there’s more to be done as we work toward a regenerative future. Our sustainability strategy, the Plan for Possible, guides us as we build our products, accelerate clean energy access, support suppliers’ reduced environmental impacts, and foster climate resiliency in communities. Explore the Future section  0 % 96% Of electricity for Cisco facilities came from renewable sources 0 % 73% Reduction in Scope 1 and 2 emissions FY25 goal: 90% reduction 0 % 75% Of the waste generated at our facilities was diverted from landfill globally 0 % 96% Of new Cisco products and packaging incorporate Circular Design Principles FY25 goal: 100% meeting circular design criteria Featured Stories Connected Conservation Cisco donated Cisco Meraki routers to African Parks to help them harness reliable Internet technology. Cisco Refresh We provide a second life to our products and reduce waste through the Cisco Refresh program, and we provide discounts to businesses joining the circular economy. Show more For All For All Through our technology, our people, and our broader networks, we create solutions that help address the world’s most critical challenges—from the AI skills gap to social inequities to environmental crises. We continue to show up to create a better future for all, by all, with all stakeholders who share our vision. Explore the For All section 0 M 24 million Cisco Networking Academy students since 1997 0 &#43; 30 plus Natural disasters and humanitarian crises responded to by Cisco Crisis Response $ 0 M USD 35 million US dollars Approved to fund climate solutions through the Cisco Foundation since FY21 $ 0 B USD 1.5 billion US dollars In Title IV Federal Funding that we helped preserve for HBCUs since FY20 Featured Stories Women Rock-IT Women Rock-IT celebrated 10 years, and their annual International Girls in ICT day programming reached 1.2 million on social media. Impact in India Cisco partners with NGOs and government agencies in India to create technology-based solutions that support critical human needs. View all Looking Ahead To celebrate our 40th year, we’re looking ahead to our future with Splunk and how we can drive even greater success for our customers, partners, employees, and communities together. There’s no better way to celebrate our anniversary than setting our next big ambition to propel us into the future. Learn more from Chief People, Policy &amp; Purpose Officer Fran Katsoudas on what’s next for Cisco’s Purpose work. Explore “Looking Ahead” 40 Years of Impact Power an Inclusive Future for All Driven by our Purpose, we combine our technology, people, and broader networks to address society&#39;s greatest challenges. We share the progress we&#39;ve made in our annual report. FY24 Purpose Report (PDF) Purpose Reporting Hub Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Cookies / Do not sell or share my personal data Accessibility Trademarks Supply Chain Transparency Newsroom Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:57
https://aws.amazon.com/blogs/storage/tag/amazon-s3-glacier-instant-retrieval/
Amazon S3 Glacier Instant Retrieval | AWS Storage Blog Skip to Main Content Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account AWS Blogs Home Blogs Editions AWS Storage Blog Tag: Amazon S3 Glacier Instant Retrieval How Canva saves over $3 million annually in Amazon S3 costs by Josh Smith on 04 MAY 2023 in Amazon DynamoDB , Amazon EC2 , Amazon RDS , Amazon S3 Glacier , Amazon Simple Storage Service (S3) , AWS Cloud Financial Management , Customer Solutions , Media &amp; Entertainment , Storage Permalink Comments Share Canva is an online design tool that empowers users worldwide to design, edit, and publish anything they can dream up. Canva runs most of its production workloads on AWS, using several core services, including Amazon S3, Amazon ECS, Amazon RDS, and Amazon DynamoDB. Running on AWS has helped Canva move fast and keep up with […] How to restore archived Amazon EC2 backup recovery points from the Amazon S3 Glacier storage classes by Prasad Duvvi and Praveen Haranahalli on 20 MAR 2023 in Amazon EC2 , Amazon Elastic Block Store (Amazon EBS) , Amazon EventBridge , Amazon S3 Glacier , Amazon Simple Notification Service (SNS) , Amazon Simple Storage Service (S3) , AWS Backup , AWS CloudFormation , AWS Lambda , AWS Step Functions , Expert (400) , Storage , Technical How-to Permalink Comments Share This is the second post in a two-part series. In part one,&nbsp;we described a process to automatically archive Amazon EC2 backup recovery points from AWS Backup to an Amazon S3 bucket in one of the Amazon S3 Glacier storage classes. In this post, we describe the process to restore an&nbsp;archived EC2 backup recovery point from […] How to archive Amazon EC2 backup recovery points to Amazon S3 Glacier storage classes by Praveen Haranahalli and Prasad Duvvi on 20 MAR 2023 in Amazon EC2 , Amazon Elastic Block Store (Amazon EBS) , Amazon EventBridge , Amazon S3 Glacier , Amazon Simple Notification Service (SNS) , Amazon Simple Storage Service (S3) , AWS Backup , AWS CloudFormation , AWS Lambda , AWS Step Functions , Expert (400) , Storage , Technical How-to Permalink Comments Share Centralizing and automating data protection helps you support your business continuity and regulatory compliance goals. Centralized data protection and enhanced visibility across backup operations can reduce the risks of disasters, improve business continuity, and simplify the auditing process. Many organizations have requirements to retain backups of their compute instances for a certain time based on […] How AWS Storage partners utilize Amazon S3 Glacier Instant Retrieval to meet customers’ data archiving needs by Henry Axelrod on 19 DEC 2022 in Amazon S3 Glacier , Amazon Simple Storage Service (S3) , AWS Partner Network , Foundational (100) , Storage , Thought Leadership Permalink Comments Share Last year at re:Invent 2021 Amazon Simple Storage Service (Amazon S3) released a new storage class called Amazon S3 Glacier Instant Retrieval, as well as additional improvements to the Amazon S3 Glacier offerings. Many AWS Storage partners were excited about the new storage class as detailed in the blog “Storing data with AWS Partner solutions […] King Hamad University Hospital and Bahrain Oncology Center use Amazon S3 to store millions of medical images by Stefan Dittforth and Zainab Allawi on 26 NOV 2022 in Amazon S3 Glacier , Amazon Simple Storage Service (S3) , AWS Cloud Financial Management , Customer Solutions , Healthcare , Intermediate (200) , Storage Permalink Comments Share King Hamad University Hospital (KHUH) and Bahrain Oncology Center is a 600-bed-hospital in Bahrain. Over a period of eleven years, KHUH accumulated around 1 million medical image studies, resulting in around 476 million files, with a total data volume of 48 TB. Read part 1 of the blog series to learn about the architecture King […] How Amagi uses Amazon S3 Glacier Instant Retrieval to optimize media storage costs by Arpit Malani , Nilesh Parekh , and Shad Hashmi on 15 SEP 2022 in Amazon S3 Glacier , Amazon Simple Storage Service (S3) , AWS Cloud Financial Management , AWS Partner Network , Customer Solutions , Intermediate (200) , Marketing &amp; Advertising , Storage Permalink Comments Share Amagi is a global leader in SaaS technology providing end-to-end cloud-managed live and on-demand video infrastructure for TV and Over-the-Top (OTT) media services for over 700 playout and 2,000 ad-insertion channels across 40 countries. Amagi enables TV networks and content owners to launch, manage, distribute, and monetize live, linear, and on-demand channels across cable, OTT, […] How Photobox optimizes storage costs for over 12 billion photos with Amazon S3 Glacier Instant Retrieval by David Descourcieres on 15 SEP 2022 in Advanced (300) , Amazon S3 Glacier , Amazon Simple Storage Service (S3) , AWS Cloud Financial Management , Best Practices , Customer Solutions , Media &amp; Entertainment , Storage , Technical How-to Permalink Comments Share albelli-Photobox Group is a leading player in the online European photo product and gifting market. We serve a pan-European customer base of over 7 million customers. At Photobox, we are focused on inspiring our customers to easily make beautiful photo products and bring their special moments to life. Whether it’s a birthday, holiday, or any […] How to move and store your genomics sequencing data with AWS DataSync by Sam Castro and Ryan Ulaszek on 06 APR 2022 in Advanced (300) , Amazon S3 Glacier , Amazon S3 Glacier Deep Archive , AWS DataSync , AWS Lambda , Storage , Technical How-to Permalink Comments Share Genomics data is expanding at a rate exceeding Moore’s law according to the National Human Genome Research Institute. As more sequencing data is produced and researchers move from genotyping to whole genome sequencing, the amount of data produced is outpacing on-premises capacity. Organizations need cloud solutions that help manage data movement, storage, and analysis. The […] Aggregate and compress logs for archiving to the Amazon S3 Glacier storage classes by Ilir Iljazi on 07 MAR 2022 in Amazon S3 Glacier , Amazon S3 Glacier Deep Archive , Amazon Simple Queue Service (SQS) , Amazon Simple Storage Service (S3) , Customer Solutions , Intermediate (200) , Storage , Thought Leadership Permalink Comments Share In distributed architectures, there is often a need to preserve application logs, and for AWS customers preservation is often done via an Amazon S3 bucket. The logs may contain information on runtime transactions, error/failure states, or application metrics and statistics. These logs are later used in business intelligence to provide useful insights and generate dashboards, […] Modernizing NASCAR’s multi-PB media archive at speed with AWS Storage by Chris Wolford on 27 JAN 2022 in Amazon DynamoDB , Amazon S3 Glacier , Amazon S3 Glacier Deep Archive , Amazon Simple Storage Service (S3) , AWS Lambda , Compute , Customer Solutions , Database , Intermediate (200) , Sports , Storage Permalink Comments Share The National Association for Stock Car Auto Racing (NASCAR) is the sanctioning body for the No. 1 form of motor sports in the United States, and owns 15 of the nation’s major motorsports entertainment facilities. About 15 years ago NASCAR began to collect all the video, audio, and image assets from over the last 70+ […] ← Older posts @charset "UTF-8";[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4{position:relative;transition:box-shadow .3s ease}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_3d631df0,[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003,[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_5962fadc:hover{box-shadow:var(--rg-shadow-gray-elevation-1, 1px 1px 20px rgba(0, 0, 0, .1))}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_3d631df0.rgft_e79955da,[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003.rgft_e79955da,[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_5962fadc:hover.rgft_e79955da{box-shadow:var(--rg-shadow-gray-elevation-2, 1px 1px 24px rgba(0, 0, 0, .25))}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003:hover{box-shadow:none}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde{position:relative;transform-style:preserve-3d;overflow:unset!important}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:before{content:"";position:absolute;inset:0;border-radius:inherit;transform:translateZ(-1px);pointer-events:none;transition-property:filter,inset;transition-duration:.3s;transition-timing-function:ease;background-clip:content-box!important;padding:1px}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_3d631df0:before{filter:blur(15px)}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_3d631df0.rgft_4df65418:hover:before{filter:blur(20px)}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_5962fadc:hover:before{filter:blur(15px)}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003:before{filter:blur(15px)}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003:hover:before{filter:none}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_e90ac70d:active:before{filter:blur(8px)!important}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_a4f580d2:before{filter:blur(8px)!important}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=fuchsia] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=fuchsia].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-fuchsia, linear-gradient(123deg, #fa6f00 0%, #e433ff 50%, #8575ff 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=fuchsia] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=fuchsia].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-fuchsia, linear-gradient(123deg, #d14600 0%, #c300e0 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=indigo] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=indigo].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-indigo, linear-gradient(123deg, #0099ff 0%, #5c7fff 50%, #8575ff 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=indigo] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=indigo].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-indigo, linear-gradient(123deg, #006ce0 0%, #295eff 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=orange] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=orange].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-orange, linear-gradient(123deg, #ff1ae0 0%, #ff386a 50%, #fa6f00 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=orange] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=orange].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-orange, linear-gradient(123deg, #d600ba 0%, #eb003b 50%, #d14600 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=teal] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=teal].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-teal, linear-gradient(123deg, #00bd6b 0%, #00a4bd 50%, #0099ff 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=teal] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=teal].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-teal, linear-gradient(123deg, #008559 0%, #007e94 50%, #006ce0 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=blue] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=blue].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-blue, linear-gradient(123deg, #00bd6b 0%, #0099ff 50%, #8575ff 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=blue] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=blue].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-blue, linear-gradient(123deg, #008559 0%, #006ce0 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=violet] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=violet].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-violet, linear-gradient(123deg, #ad5cff 0%, #0099ff 50%, #00a4bd 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=violet] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=violet].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-violet, linear-gradient(123deg, #962eff 0%, #006ce0 50%, #007e94 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=purple] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=purple].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-purple, linear-gradient(123deg, #ff1ae0 0%, #8575ff 50%, #00a4bd 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=purple] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=purple].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-purple, linear-gradient(123deg, #d600ba 0%, #6842ff 50%, #007e94 100%))}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:linear-gradient(123deg,#d14600,#c300e0,#6842ff)}[data-eb-6a8f3296] [data-rg-theme=fuchsia] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=fuchsia].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-fuchsia, linear-gradient(123deg, #d14600 0%, #c300e0 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-theme=indigo] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=indigo].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-indigo, linear-gradient(123deg, #006ce0 0%, #295eff 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-theme=orange] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=orange].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-orange, linear-gradient(123deg, #d600ba 0%, #eb003b 50%, #d14600 100%))}[data-eb-6a8f3296] [data-rg-theme=teal] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=teal].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-teal, linear-gradient(123deg, #008559 0%, #007e94 50%, #006ce0 100%))}[data-eb-6a8f3296] [data-rg-theme=blue] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=blue].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-blue, linear-gradient(123deg, #008559 0%, #006ce0 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-theme=violet] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=violet].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-violet, linear-gradient(123deg, #962eff 0%, #006ce0 50%, #007e94 100%))}[data-eb-6a8f3296] [data-rg-theme=purple] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=purple].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-purple, linear-gradient(123deg, #d600ba 0%, #6842ff 50%, #007e94 100%))}[data-eb-6a8f3296] a.rgft_f7822e54,[data-eb-6a8f3296] button.rgft_f7822e54{--button-size: 44px;--button-pad-h: 24px;--button-pad-borderless-h: 26px;border:2px solid var(--rg-color-background-page-inverted, #0F141A);padding:8px var(--button-pad-h, 24px);border-radius:40px!important;align-items:center;justify-content:center;display:inline-flex;height:var(--button-size, 44px);text-decoration:none!important;text-wrap:nowrap;cursor:pointer;position:relative;transition:all .3s ease}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_094d67e1,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_094d67e1{--button-size: 32px;--button-pad-h: 14px;--button-pad-borderless-h: 16px}[data-eb-6a8f3296] a.rgft_f7822e54>span,[data-eb-6a8f3296] button.rgft_f7822e54>span{color:var(--btn-text-color, inherit)!important}[data-eb-6a8f3296] a.rgft_f7822e54:focus-visible,[data-eb-6a8f3296] button.rgft_f7822e54:focus-visible{outline:2px solid var(--rg-color-focus-ring, #006CE0)!important;outline-offset:4px!important;transition:outline 0s}[data-eb-6a8f3296] a.rgft_f7822e54:focus:not(:focus-visible),[data-eb-6a8f3296] button.rgft_f7822e54:focus:not(:focus-visible){outline:none!important}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_303c672b,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_303c672b{--btn-text-color: var(--rg-color-text-utility-inverted, #FFFFFF);background-color:var(--rg-color-btn-primary-bg, #161D26);border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_18409398,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_18409398{--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-btn-secondary-bg, #FFFFFF);border-color:var(--rg-color-background-page-inverted, #0F141A)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_090951dc{--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-background-object, #F3F3F7);border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_15529d9f,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_15529d9f{--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-btn-secondary-bg, #FFFFFF);border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb950a4e{--btn-text-color: var(--rg-color-text-utility, #161D26);border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb950a4e{background-image:linear-gradient(97deg,#ffc0ad,#f8c7ff 37.79%,#d2ccff 75.81%,#c2d1ff)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb950a4e{--rg-gradient-angle:97deg;background-image:var(--rg-gradient-a, linear-gradient(120deg, #f8c7ff 20.08%, #d2ccff 75.81%))}[data-eb-6a8f3296] [data-rg-mode=dark] a.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] [data-rg-mode=dark] button.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] a[data-rg-mode=dark].rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] button[data-rg-mode=dark].rgft_f7822e54.rgft_bb950a4e{background-image:var(--rg-gradient-a, linear-gradient(120deg, #78008a 24.25%, #b2008f 69.56%))}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb419678,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb419678{--btn-text-color: var(--rg-color-text-utility-inverted, #FFFFFF);background-color:var(--rg-color-btn-visited-bg, #656871);border-color:var(--rg-color-btn-visited-bg, #656871)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb419678.rgft_18409398,[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb419678.rgft_15529d9f,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb419678.rgft_18409398,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb419678.rgft_15529d9f{--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-btn-secondary-visited-bg, #FFFFFF)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_badebaf5,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_badebaf5{--btn-text-color: var(--rg-color-btn-disabled-text, #B4B4BB);background-color:var(--rg-color-btn-disabled-bg, #F3F3F7);border-color:var(--rg-color-btn-disabled-bg, #F3F3F7);cursor:default}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_badebaf5.rgft_18409398,[data-eb-6a8f3296] a.rgft_f7822e54.rgft_badebaf5.rgft_15529d9f,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_badebaf5.rgft_18409398,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_badebaf5.rgft_15529d9f{border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_badebaf5.rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_badebaf5.rgft_090951dc{--btn-text-color: var(--rg-color-btn-tertiary-disabled-text, #B4B4BB);background-color:#0000}[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_18409398:not(.rgft_bb950a4e),[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_15529d9f:not(.rgft_bb950a4e),[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_18409398:not(.rgft_bb950a4e),[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_15529d9f:not(.rgft_bb950a4e){--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-btn-secondary-bg, #FFFFFF)}[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc{box-shadow:none}[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc{background-image:linear-gradient(97deg,#ffc0ad80,#f8c7ff80 37.79%,#d2ccff80 75.81%,#c2d1ff80)}[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc{--rg-gradient-angle:97deg;background-image:var(--rg-gradient-a-50, linear-gradient(120deg, #f8c7ff 20.08%, #d2ccff 75.81%))}[data-eb-6a8f3296] [data-rg-mode=dark] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] [data-rg-mode=dark] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] a[data-rg-mode=dark].rgft_f7822e54.rgft_090951dc:hover:not(.rgft_badebaf5),[data-eb-6a8f3296] button[data-rg-mode=dark].rgft_f7822e54.rgft_090951dc:hover:not(.rgft_badebaf5){background-image:var(--rg-gradient-a-50, linear-gradient(120deg, #78008a 24.25%, #b2008f 69.56%))}[data-eb-6a8f3296] a.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc{box-shadow:none}[data-eb-6a8f3296] a.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc{background-image:linear-gradient(97deg,#ffc0ad,#f8c7ff 37.79%,#d2ccff 75.81%,#c2d1ff)}[data-eb-6a8f3296] a.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc{--rg-gradient-angle:97deg;background-image:var(--rg-gradient-a-pressed, linear-gradient(120deg, rgba(248, 199, 255, .5) 20.08%, #d2ccff 75.81%))}[data-eb-6a8f3296] [data-rg-mode=dark] a.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] [data-rg-mode=dark] button.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] a[data-rg-mode=dark].rgft_f7822e54.rgft_090951dc:active:not(.rgft_badebaf5),[data-eb-6a8f3296] button[data-rg-mode=dark].rgft_f7822e54.rgft_090951dc:active:not(.rgft_badebaf5){background-image:var(--rg-gradient-a-pressed, linear-gradient(120deg, rgba(120, 0, 138, .5) 24.25%, #b2008f 69.56%))}[data-eb-6a8f3296] .rgft_8711ccd9{-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale;background:#0000;border:none;margin:0}[data-eb-6a8f3296] .rgft_8711ccd9.rgft_5e58a6df{text-align:center}[data-eb-6a8f3296] .rgft_8711ccd9.rgft_b7ada98b{display:block}[data-eb-6a8f3296] .rgft_8711ccd9.rgft_beb26dc7{font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}[data-eb-6a8f3296] .rgft_8711ccd9 a{display:inline;position:relative;cursor:pointer;text-decoration:none!important;color:var(--rg-color-link-default, #006CE0);background:linear-gradient(to right,currentcolor,currentcolor);background-size:100% .1em;background-position:0 100%;background-repeat:no-repeat}[data-eb-6a8f3296] .rgft_8711ccd9 a:focus-visible{color:var(--rg-color-link-focus, #006CE0)}[data-eb-6a8f3296] .rgft_8711ccd9 a:hover{color:var(--rg-color-link-hover, #003B8F);animation:rgft_d72bdead .3s cubic-bezier(0,0,.2,1)}[data-eb-6a8f3296] .rgft_8711ccd9 a:visited{color:var(--rg-color-link-visited, #6842FF)}@keyframes rgft_d72bdead{0%{background-size:0 .1em}to{background-size:100% .1em}}[data-eb-6a8f3296] .rgft_8711ccd9 b,[data-eb-6a8f3296] b.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 strong,[data-eb-6a8f3296] strong.rgft_8711ccd9{font-weight:700}[data-eb-6a8f3296] i.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 i,[data-eb-6a8f3296] em.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 em{font-style:italic}[data-eb-6a8f3296] u.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 u{text-decoration:underline}[data-eb-6a8f3296] code.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 code{font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace;border-radius:4px;border:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);color:var(--rg-color-text-secondary, #232B37);padding-top:var(--rg-padding-8);padding-right:var(--rg-padding-8);padding-bottom:var(--rg-padding-8);padding-left:var(--rg-padding-8)}[data-eb-6a8f3296] .rgft_12e1c6fa{display:inline!important;vertical-align:middle}[data-eb-6a8f3296] .rgft_8711ccd9 p img{aspect-ratio:16/9;height:100%;object-fit:cover;width:100%;border-radius:8px;order:1;margin-bottom:var(--rg-margin-4)}[data-eb-6a8f3296] .rgft_8711ccd9 table{table-layout:fixed;border-spacing:0;width:100%}[data-eb-6a8f3296] .rgft_8711ccd9 table td{font-size:14px;border-right:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-bottom:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);padding-top:var(--rg-padding-6);padding-right:var(--rg-padding-6);padding-bottom:var(--rg-padding-6);padding-left:var(--rg-padding-6)}[data-eb-6a8f3296] .rgft_8711ccd9 table td:first-of-type{border-left:1px solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_8711ccd9 table thead tr:first-of-type>*:first-of-type,[data-eb-6a8f3296] .rgft_8711ccd9 table:not(:has(thead)) tr:first-of-type>*:first-of-type{border-top-left-radius:16px}[data-eb-6a8f3296] .rgft_8711ccd9 table thead tr:first-of-type>*:last-of-type,[data-eb-6a8f3296] .rgft_8711ccd9 table:not(:has(thead)) tr:first-of-type>*:last-of-type{border-top-right-radius:16px}[data-eb-6a8f3296] .rgft_8711ccd9 table tr:last-of-type td:first-of-type{border-bottom-left-radius:16px}[data-eb-6a8f3296] .rgft_8711ccd9 table tr:last-of-type td:last-of-type{border-bottom-right-radius:16px}[data-eb-6a8f3296] .rgft_8711ccd9 table:not(:has(thead),:has(th)) tr:first-of-type td{border-top:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-right:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-bottom:1px solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_8711ccd9 table th{color:var(--rg-color-text-primary-inverted, #FFFFFF);min-width:280px;max-width:400px;padding:0;text-align:left;vertical-align:top;background-color:var(--rg-color-background-object-inverted, #232B37);border-left:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-right:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-bottom:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);padding-top:var(--rg-padding-6);padding-right:var(--rg-padding-6);padding-bottom:var(--rg-padding-6);padding-left:var(--rg-padding-6);row-gap:var(--rg-margin-5);column-gap:var(--rg-margin-5);max-width:100%;min-width:150px}@media (min-width: 480px) and (max-width: 767px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:100%;min-width:150px}}@media (min-width: 768px) and (max-width: 1023px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:240px;min-width:180px}}@media (min-width: 1024px) and (max-width: 1279px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:350px;min-width:240px}}@media (min-width: 1280px) and (max-width: 1599px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:400px;min-width:280px}}@media (min-width: 1600px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:400px;min-width:280px}}[data-eb-6a8f3296] .rgft_8711ccd9 table th:first-of-type{border-top-left-radius:16px;border-top:0 solid var(--rg-color-border-lowcontrast, #CCCCD1);border-left:0 solid var(--rg-color-border-lowcontrast, #CCCCD1);border-right:0 solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_8711ccd9 table th:nth-of-type(n+3){border-left:0 solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_8711ccd9 table th:last-of-type{border-top-right-radius:16px;border-top:0 solid var(--rg-color-border-lowcontrast, #CCCCD1);border-right:0 solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_a1b66739{display:inline-flex;flex-direction:column;align-items:center;justify-content:center;color:var(--rg-color-text-primary, #161D26);--icon-color: currentcolor}[data-eb-6a8f3296] .rgft_a1b66739.rgft_bc1a8743{height:16px;width:16px}[data-eb-6a8f3296] .rgft_a1b66739.rgft_c0cbb35d{height:20px;width:20px}[data-eb-6a8f3296] .rgft_a1b66739.rgft_bd40fe12{height:32px;width:32px}[data-eb-6a8f3296] .rgft_a1b66739.rgft_27320e58{height:48px;width:48px}[data-eb-6a8f3296] .rgft_a1b66739 svg{fill:none;stroke:none}[data-eb-6a8f3296] .rgft_a1b66739 path[data-fill]:not([fill]){fill:var(--icon-color)}[data-eb-6a8f3296] .rgft_a1b66739 path[data-stroke]{stroke-width:2}[data-eb-6a8f3296] .rgft_a1b66739 path[data-stroke]:not([stroke]){stroke:var(--icon-color)}[data-eb-6a8f3296] .rgft_3ed66ff4{display:inline-flex;flex-direction:column;align-items:center;justify-content:center;color:var(--rg-color-text-primary, #161D26)}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_9124b200{height:10px;width:10px}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_bc1a8743{height:16px;width:16px}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_c0cbb35d{height:20px;width:20px}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_bd40fe12{height:32px;width:32px}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_27320e58{height:48px;width:48px}[data-eb-6a8f3296] .rgft_98b54368{color:var(--rg-color-text-body, #232B37)}[data-eb-6a8f3296] .rgft_98b54368.rgft_275611e5{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_98b54368.rgft_275611e5{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_98b54368.rgft_275611e5{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_98b54368.rgft_275611e5{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_98b54368.rgft_275611e5{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_98b54368.rgft_275611e5{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_98b54368.rgft_275611e5{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_98b54368.rgft_275611e5{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_98b54368.rgft_007aef8b{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_98b54368.rgft_007aef8b{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_98b54368.rgft_007aef8b{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_98b54368.rgft_007aef8b{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_98b54368.rgft_007aef8b{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_98b54368.rgft_007aef8b{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_98b54368.rgft_007aef8b{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_98b54368.rgft_007aef8b{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_98b54368.rgft_ff19c5f9{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_98b54368.rgft_ff19c5f9{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_98b54368.rgft_ff19c5f9{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_98b54368.rgft_ff19c5f9{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_98b54368.rgft_ff19c5f9{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_98b54368.rgft_ff19c5f9{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_98b54368.rgft_ff19c5f9{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_98b54368.rgft_ff19c5f9{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_98b54368 ul{list-style-type:disc;margin-top:2rem}[data-eb-6a8f3296] .rgft_98b54368.rgft_2a7f98ee{display:inline;position:relative;cursor:pointer;text-decoration:none!important;color:var(--rg-color-link-default, #006CE0);background:linear-gradient(to right,currentcolor,currentcolor);background-size:100% .1em;background-position:0 100%;background-repeat:no-repeat}[data-eb-6a8f3296] .rgft_98b54368.rgft_2a7f98ee:focus-visible{color:var(--rg-color-link-focus, #006CE0)}[data-eb-6a8f3296] .rgft_98b54368.rgft_2a7f98ee:hover{color:var(--rg-color-link-hover, #003B8F);animation:rgft_9beb7cc5 .3s cubic-bezier(0,0,.2,1)}[data-eb-6a8f3296] .rgft_98b54368.rgft_2a7f98ee:visited{color:var(--rg-color-link-visited, #6842FF)}@keyframes rgft_9beb7cc5{0%{background-size:0 .1em}to{background-size:100% .1em}}[data-eb-6a8f3296] .rgft_d835af5c{color:var(--rg-color-text-title, #161D26)}[data-eb-6a8f3296] .rgft_d835af5c.rgft_3e9243e1{font-size:calc(4.5rem * var(--font-size-multiplier, 1.6));line-height:1.111;font-weight:500;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_3e9243e1{font-size:calc(3.75rem * var(--font-size-multiplier, 1.6));line-height:1.133;font-weight:500}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_3e9243e1{font-size:calc(3rem * var(--font-size-multiplier, 1.6));line-height:1.167;font-weight:500}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d835af5c.rgft_3e9243e1{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d835af5c.rgft_3e9243e1{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d835af5c.rgft_3e9243e1{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d835af5c.rgft_3e9243e1{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d835af5c.rgft_3e9243e1{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d835af5c.rgft_54816d41{font-size:calc(3.75rem * var(--font-size-multiplier, 1.6));line-height:1.133;font-weight:500;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_54816d41{font-size:calc(3rem * var(--font-size-multiplier, 1.6));line-height:1.167;font-weight:500}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_54816d41{font-size:calc(2.5rem * var(--font-size-multiplier, 1.6));line-height:1.2;font-weight:500}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d835af5c.rgft_54816d41{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d835af5c.rgft_54816d41{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d835af5c.rgft_54816d41{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d835af5c.rgft_54816d41{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d835af5c.rgft_54816d41{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d835af5c.rgft_852a8b78{font-size:calc(3rem * var(--font-size-multiplier, 1.6));line-height:1.167;font-weight:500;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_852a8b78{font-size:calc(2.5rem * var(--font-size-multiplier, 1.6));line-height:1.2;font-weight:500}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_852a8b78{font-size:calc(2rem * var(--font-size-multiplier, 1.6));line-height:1.25;font-weight:500}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d835af5c.rgft_852a8b78{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d835af5c.rgft_852a8b78{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d835af5c.rgft_852a8b78{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d835af5c.rgft_852a8b78{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d835af5c.rgft_852a8b78{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_286fbc8d{letter-spacing:1.6px;text-transform:uppercase;color:var(--rg-color-text-eyebrow, #161D26)}[data-eb-6a8f3296] .rgft_286fbc8d.rgft_cf5cdf86{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_286fbc8d.rgft_cf5cdf86{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.714;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_286fbc8d.rgft_cf5cdf86{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:2;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_286fbc8d.rgft_cf5cdf86{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_286fbc8d.rgft_cf5cdf86{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_286fbc8d.rgft_cf5cdf86{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_286fbc8d.rgft_cf5cdf86{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_286fbc8d.rgft_cf5cdf86{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_286fbc8d.rgft_c6f92487{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.714;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_286fbc8d.rgft_c6f92487{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:2;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_286fbc8d.rgft_c6f92487{font-size:calc(.625rem * var(--font-size-multiplier, 1.6));line-height:2.4;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_286fbc8d.rgft_c6f92487{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_286fbc8d.rgft_c6f92487{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_286fbc8d.rgft_c6f92487{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_286fbc8d.rgft_c6f92487{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_286fbc8d.rgft_c6f92487{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d27b4751{color:var(--rg-color-text-utility, #161D26)}[data-eb-6a8f3296] .rgft_d27b4751.rgft_927d7fd1{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_927d7fd1{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_927d7fd1{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d27b4751.rgft_927d7fd1{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d27b4751.rgft_927d7fd1{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d27b4751.rgft_927d7fd1{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d27b4751.rgft_927d7fd1{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d27b4751.rgft_927d7fd1{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d27b4751.rgft_100c8a76{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_100c8a76{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_100c8a76{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d27b4751.rgft_100c8a76{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d27b4751.rgft_100c8a76{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d27b4751.rgft_100c8a76{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d27b4751.rgft_100c8a76{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d27b4751.rgft_100c8a76{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d27b4751.rgft_453dc601{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_453dc601{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_453dc601{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d27b4751.rgft_453dc601{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d27b4751.rgft_453dc601{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d27b4751.rgft_453dc601{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d27b4751.rgft_453dc601{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d27b4751.rgft_453dc601{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d27b4751.rgft_949ed5ce{font-size:calc(.625rem * var(--font-size-multiplier, 1.6));line-height:1.2;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_949ed5ce{font-size:calc(.625rem * var(--font-size-multiplier, 1.6));line-height:1.2;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_949ed5ce{font-size:calc(.625rem * var(--font-size-multiplier, 1.6));line-height:1.2;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d27b4751.rgft_949ed5ce{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d27b4751.rgft_949ed5ce{font-family:Sh
2026-01-13T09:29:57
https://www.telerik.com/blogs/why-semantic-html-matters-introductory-guide-new-developers
Why Semantic HTML Matters: A Guide for New Developers skip navigation All Products Product Bundles DevCraft All Telerik .NET tools and Kendo UI JavaScript components in one package. Now enhanced with: MCP Servers Embedded Reporting Document Processing Libraries SSO Account Sign-in Web Kendo UI UI for Angular UI for Vue UI for jQuery KendoReact UI for Blazor UI for ASP.NET Core UI for ASP.NET MVC UI for ASP.NET AJAX Mobile UI for .NET MAUI Document Management Telerik Document Processing Desktop UI for .NET MAUI UI for WinUI UI for WinForms UI for WPF Reporting Telerik Reporting Telerik Report Server Testing &amp; Mocking Test Studio Telerik JustMock CMS Sitefinity AI Productivity Tools MCP Servers UI/UX Tools ThemeBuilder Design System Kit Templates and Building Blocks Debugging Fiddler Fiddler Everywhere Fiddler Classic Fiddler Everywhere Reporter FiddlerCore Free Tools KendoReact Free VB.NET to C# Converter Testing Framework View all products Demos Services Blogs Docs &amp; Support Pricing Shopping cart Your Account Account Overview Your Licenses Downloads Support Center Forum Profile Payment Methods Edit Profile Log out Login Contact Us Get A Free Trial close mobile menu Why Semantic HTML Matters: An Introductory Guide for New Developers by Hassan Djirdeh Published: November 15, 2024 6 min read Web , People , Accessibility 0 Comments Let&rsquo;s look at the basics of semantic HTML and see practical examples so you can start using it effectively. In the vast world of web development, HyperText Markup Language (HTML) stands as one of the foundational languages that every web developer must grasp. It&rsquo;s the skeleton of a webpage, defining its structure and content. However, not all HTML is created equal, and understanding the nuances of semantic HTML is crucial for creating accessible, SEO-friendly and maintainable websites. In this article, we&rsquo;ll take a look through the basics of semantic HTML, explain its importance and provide practical examples to help you start using it effectively. HTML: The Bedrock of Modern Web UI Development Before diving into semantic HTML, it&rsquo;s essential to understand the role HTML plays in the broader context of web development. HTML serves as the foundational element for all webpages and is the fundamental building block upon which every website is constructed. When Tim Berners-Lee invented HTML in 1991 , his goal was to create a language that allowed documents to be shared across a network of computers, which eventually evolved into the World Wide Web . Since then, HTML has undergone significant transformations, adapting to the needs of a rapidly growing digital world. HTML&rsquo;s primary purpose is to structure content on the web. It instructs the browser on how to render text, images and other multimedia elements, turning raw data into something visually meaningful and interactive. But HTML is not just about presentation; it&rsquo;s also about semantics&mdash;providing context and meaning to content, which is where the evolution into semantic HTML comes into play. What Is Semantic HTML? Semantic HTML refers to the use of HTML elements that clearly describe their meaning in a human and machine-readable way. In simple terms, when we use semantic elements, we&rsquo;re telling the browser and other technologies (like screen readers and search engines) what kind of content is inside the element. For example, consider the following two HTML snippets: &lt;!-- Non-semantic HTML --&gt; &lt; div id = " header " &gt; &lt; div class = " logo " &gt; MyLogo &lt;/ div &gt; &lt; div class = " nav " &gt; Home | About | Contact &lt;/ div &gt; &lt;/ div &gt; &lt;!-- Semantic HTML --&gt; &lt; header &gt; &lt; h1 &gt; MyLogo &lt;/ h1 &gt; &lt; nav &gt; &lt; ul &gt; &lt; li &gt; Home &lt;/ li &gt; &lt; li &gt; About &lt;/ li &gt; &lt; li &gt; Contact &lt;/ li &gt; &lt;/ ul &gt; &lt;/ nav &gt; &lt;/ header &gt; Both of these snippets will render similarly in a browser. However, the second example uses semantic HTML elements like &lt;header&gt; , &lt;h1&gt; and &lt;nav&gt; , which provide more context about the content they contain. This not only makes code more readable and easier to maintain but also improves accessibility and SEO. Why Is Semantic HTML Important? Accessibility Accessibility is a key consideration when developing modern websites, and semantic HTML plays a vital role in making a website accessible to users with disabilities. For example, screen readers rely on semantic elements to understand the structure of a page and to provide meaningful navigation options to users. When we use semantic tags like &lt;article&gt; , &lt;section&gt; , &lt;header&gt; and &lt;footer&gt; , we help screen readers to better interpret the content, which enhances the user experience for individuals who rely on these technologies. Consider a visually impaired user who uses a screen reader. If our webpage is structured with non-semantic &lt;div&gt; and tags, the screen reader might struggle to convey the structure and importance of the content. On the other hand, semantic HTML provides clear cues about the role of each piece of content, making the web more inclusive. SEO (Search Engine Optimization) Search engines like Google also benefit from semantic HTML. Semantic tags give additional context and meaning to the content, which search engines use to understand the hierarchy and context of a webpage. This understanding helps search engines to rank a webpage more accurately for relevant queries. For example, the &lt;article&gt; tag indicates that the content inside it is a standalone piece of information, which might be important in the context of a search query. Similarly, the &lt;header&gt; and &lt;footer&gt; tags define the top and bottom sections of a page, helping search engines to better comprehend the structure of a site. Code Maintainability Writing clean, semantic HTML improves the maintainability of a codebase. When we use meaningful elements, other developers (or even your future self) can more easily understand the purpose of each section of the code. This can save time and reduce errors during updates and debugging. Consider a large project where we need to update the navigation structure across multiple pages. If we&rsquo;ve used a &lt;nav&gt; element consistently, we can quickly locate and modify the relevant sections. In contrast, if we&rsquo;ve used non-semantic &lt;div&gt; elements with arbitrary classes, finding the right elements to update could be a more time-consuming and error-prone process. Common Semantic HTML Elements Now that we&rsquo;ve covered why semantic HTML is important, let&rsquo;s look at some of the most commonly used semantic elements and their purposes. Header The &lt;header&gt; element represents introductory content or a group of navigational links. It typically contains headings, logos or other elements that are at the beginning of a section or page. &lt; header &gt; &lt; h1 &gt; Website Title &lt;/ h1 &gt; &lt; nav &gt; &lt; ul &gt; &lt; li &gt; &lt; a href = " # " &gt; Home &lt;/ a &gt; &lt;/ li &gt; &lt; li &gt; &lt; a href = " # " &gt; About &lt;/ a &gt; &lt;/ li &gt; &lt; li &gt; &lt; a href = " # " &gt; Contact &lt;/ a &gt; &lt;/ li &gt; &lt;/ ul &gt; &lt;/ nav &gt; &lt;/ header &gt; Nav The &lt;nav&gt; element is used for defining a set of navigation links. This helps users and search engines easily identify the main navigation areas of your site. &lt; nav &gt; &lt; ul &gt; &lt; li &gt; &lt; a href = " # " &gt; Home &lt;/ a &gt; &lt;/ li &gt; &lt; li &gt; &lt; a href = " # " &gt; Blog &lt;/ a &gt; &lt;/ li &gt; &lt; li &gt; &lt; a href = " # " &gt; Contact &lt;/ a &gt; &lt;/ li &gt; &lt;/ ul &gt; &lt;/ nav &gt; Main The &lt;main&gt; element is used to enclose the dominant content of the &lt;body&gt; of a document. The content inside &lt;main&gt; should be unique to the document and not include content that is repeated across documents like sidebars or footers. &lt; main &gt; &lt; article &gt; &lt; h2 &gt; Article Title &lt;/ h2 &gt; &lt; p &gt; This is the main content of the article. &lt;/ p &gt; &lt;/ article &gt; &lt;/ main &gt; Article The &lt;article&gt; element is intended to represent a self-contained composition in a document, page or website, which is designed to be independently distributed or repurposed, such as in syndication. &lt; article &gt; &lt; h2 &gt; Understanding Semantic HTML &lt;/ h2 &gt; &lt; p &gt; Semantic HTML is essential for accessibility, SEO, and maintainability. &lt;/ p &gt; &lt;/ article &gt; Section The &lt;section&gt; element represents a standalone section of content that typically comes with a heading. It&rsquo;s used to group related content together. &lt; section &gt; &lt; h3 &gt; Introduction &lt;/ h3 &gt; &lt; p &gt; This section introduces the topic. &lt;/ p &gt; &lt;/ section &gt; Aside The &lt;aside&gt; element is intended for content that is related to the surrounding content but not essential to its primary message. &lt; aside &gt; &lt; h4 &gt; Related Information &lt;/ h4 &gt; &lt; p &gt; This is additional information related to the main content. &lt;/ p &gt; &lt;/ aside &gt; Footer The &lt;footer&gt; element signifies the end section of a page or content, often including details about the author, copyright information or related links. &lt; footer &gt; &lt; p &gt; &copy; 2024 MyWebsite. All rights reserved. &lt;/ p &gt; &lt;/ footer &gt; To see how all the above elements work in practice, let&rsquo;s consider a simple webpage structure: &lt;!DOCTYPE html&gt; &lt; html lang = " en " &gt; &lt; head &gt; &lt; meta charset = " UTF-8 " /&gt; &lt; meta name = " viewport " content = " width=device-width, initial-scale=1.0 " /&gt; &lt; title &gt; My Webpage &lt;/ title &gt; &lt;/ head &gt; &lt; body &gt; &lt; header &gt; &lt; h1 &gt; My Webpage &lt;/ h1 &gt; &lt; nav &gt; &lt; ul &gt; &lt; li &gt; &lt; a href = " # " &gt; Home &lt;/ a &gt; &lt;/ li &gt; &lt; li &gt; &lt; a href = " # " &gt; About &lt;/ a &gt; &lt;/ li &gt; &lt; li &gt; &lt; a href = " # " &gt; Contact &lt;/ a &gt; &lt;/ li &gt; &lt;/ ul &gt; &lt;/ nav &gt; &lt;/ header &gt; &lt; main &gt; &lt; article &gt; &lt; h2 &gt; Understanding Semantic HTML &lt;/ h2 &gt; &lt; p &gt; Semantic HTML is essential for accessibility, SEO, and maintainability. &lt;/ p &gt; &lt;/ article &gt; &lt; section &gt; &lt; h3 &gt; Benefits of Semantic HTML &lt;/ h3 &gt; &lt; p &gt; It helps with search engine optimization, accessibility, and code readability. &lt;/ p &gt; &lt;/ section &gt; &lt;/ main &gt; &lt; aside &gt; &lt; h4 &gt; Did You Know? &lt;/ h4 &gt; &lt; p &gt; Using semantic HTML can improve your site&rsquo;s accessibility. &lt;/ p &gt; &lt;/ aside &gt; &lt; footer &gt; &lt; p &gt; &copy; 2024 My Webpage. All rights reserved. &lt;/ p &gt; &lt;/ footer &gt; &lt;/ body &gt; &lt;/ html &gt; In the above example, we&rsquo;ve used a variety of semantic elements to structure the webpage. Each element has a specific role, making the HTML more meaningful and easier to understand for both humans and machines. For a full list of roughly 100 semantic elements that exist in HTML, refer to the MDN HTML elements reference guide . Wrap-up Semantic HTML is more than just a buzzword; it&rsquo;s a crucial aspect of modern web development. By using semantic elements, we can create content that is accessible, SEO-friendly and easier to maintain. Some best practices for writing semantic HTML include: Use the right element for the job. Always try to use the most appropriate semantic element for the content you&rsquo;re marking up. For example, use &lt;article&gt; for blog posts or news articles and &lt;section&gt; for grouping related content. Avoid divitis. &ldquo;Divitis&rdquo; is a term used to describe the overuse of &lt;div&gt; elements. While &lt;div&gt; has its place, relying too heavily on it when more descriptive elements are available can make your code less readable and less semantic. Keep accessibility in mind. When choosing elements, consider how they will affect users who rely on assistive technologies. Use landmarks (like &lt;nav&gt; , &lt;main&gt; and &lt;footer&gt; ) to help these users navigate your content more easily. Validate your HTML. Use tools like the W3C HTML Validator to check that your code is valid and follows best practices. This can help catch errors and ensure your semantic HTML is well-formed. Whether you&rsquo;re building a simple personal blog or a complex web application, understanding and applying semantic HTML will set a strong foundation for your project, making it more robust and user-friendly for all. Understanding Color and Accessibility When it comes to making your applications accessible, the colors that you choose play a huge role! Accessibility , Developer Community , HTML About the Author Hassan Djirdeh Hassan is a senior frontend engineer and has helped build large production applications at-scale at organizations like Doordash, Instacart and Shopify. Hassan is also a published author and course instructor where he&rsquo;s helped thousands of students learn in-depth frontend engineering skills like React, Vue, TypeScript, and GraphQL. Related Posts People Accessibility Designing for Accessibility People Accessibility Humanity The History of Web Accessibility and How It Impacts Design Today Design UX People Accessibility UX Crash Course: Nielsen’s Usability Heuristics Comments Comments are disabled in preview mode. Please enable JavaScript to view the comments powered by Disqus. All articles Topics Web Web Blazor ASP.NET Core ASP.NET MVC ASP.NET AJAX Angular React jQuery Vue Mobile Mobile .NET MAUI/Hybrid Desktop Desktop .NET MAUI/Blazor Hybrid WPF WinForms WinUI Design Design UX Design Systems Productivity Productivity Reporting Testing Debugging Document Processing People People Accessibility Humanity Release AI Latest Stories in Your Inbox Subscribe to be the first to get our expert-written articles and tutorials for developers! All fields are required Email Country/Territory Select country/territory United States Afghanistan Albania Algeria American Samoa Andorra Angola Anguilla Antarctica Antigua and Barbuda Argentina Armenia Aruba Australia Austria Azerbaijan Bahamas Bahrain Bangladesh Barbados Belgium Belize Benin Bermuda Bhutan Bolivia Bosnia and Herzegovina Botswana Bouvet Island Brazil British Indian Ocean Terr. Brunei Darussalam Bulgaria Burkina Faso Burundi Cambodia Cameroon Canada Cape Verde Cayman Islands Central African Republic Chad Chile China Christmas Island Cocos (Keeling) Islands Colombia Comoros Congo (Brazzaville) Congo, the democratic republic of the Cook Islands Costa Rica Cote d&#39;Ivoire Croatia (Hrvatska) Curacao Cyprus Czech Republic Denmark Djibouti Dominica Dominican Republic Ecuador Egypt El Salvador Equatorial Guinea Eritrea Estonia Eswatini Ethiopia Falkland Islands Faroe Islands Fiji Finland France French Guiana French Polynesia French Southern Terr. Gabon Gambia Georgia Germany Ghana Gibraltar Greece Greenland Grenada Guadeloupe Guam Guatemala Guernsey Guinea Guinea-Bissau Guyana Haiti Heard and McDonald Is. Honduras Hong Kong Hungary Iceland India Indonesia Iraq Ireland Israel Italy Jamaica Japan Jersey Jordan Kazakhstan Kenya Kiribati Kuwait Kyrgyzstan Lao People&#39;s Dem. Rep. Latvia Lebanon Lesotho Liberia Libya Liechtenstein Lithuania Luxembourg Macao Madagascar Malawi Malaysia Maldives Mali Malta Man, Isle of Marshall Islands Martinique Mauritania Mauritius Mayotte Mexico Micronesia Moldova Monaco Mongolia Montenegro Montserrat Morocco Mozambique Myanmar Namibia Nauru Nepal Netherlands New Caledonia New Zealand Nicaragua Niger Nigeria Niue Norfolk Island North Macedonia Northern Mariana Is. Norway Oman Pakistan Palau Palestine, State Of Panama Papua New Guinea Paraguay Peru Philippines Pitcairn Poland Portugal Puerto Rico Qatar Republic of Korea (South Korea) Reunion Romania Rwanda S.Georgia and S.Sandwich Is. Saint Kitts and Nevis Saint Lucia Samoa San Marino Sao Tome and Principe Saudi Arabia Senegal Serbia Seychelles Sierra Leone Singapore Slovakia Slovenia Solomon Islands Somalia South Africa South Sudan Spain Sri Lanka St. Helena St. Pierre and Miquelon St. Vincent and Grenadines Sudan Suriname Svalbard and Jan Mayen Is. Sweden Switzerland Taiwan Tajikistan Tanzania Thailand Timor-Leste Togo Tokelau Tonga Trinidad and Tobago Tunisia Turkey Turkmenistan Turks and Caicos Islands Tuvalu U.S. Minor Outlying Is. Uganda Ukraine United Arab Emirates United Kingdom Uruguay Uzbekistan Vanuatu Vatican (Holy See) Venezuela Viet Nam Virgin Islands (British) Virgin Islands (U.S.) Wallis and Futuna Is. Western Sahara Yemen Zambia Zimbabwe State/Province Select Progress collects the Personal Information set out in our Privacy Policy and the Supplemental Privacy notice for residents of California and other US States and uses it for the purposes stated in that policy. You can also ask us not to share your Personal Information to third parties here: Do Not Sell or Share My Info Blog By submitting this form, I understand and acknowledge my data will be processed in accordance with Progress' Privacy Policy . I agree to receive marketing communications from Progress Software or its Partners , containing information about Progress Software’s products, services and/or events. I understand I may opt out from marketing communication at any time. By submitting this form, you understand and agree that your personal data will be processed by Progress Software or its Partners as described in our Privacy Policy . You may opt out from marketing communication at any time here or through the opt out option placed in the e-mail communication sent by us or our Partners. We see that you have already chosen to receive marketing materials from us. If you wish to change this at any time you may do so by clicking here . Thank you for your continued interest in Progress. Based on either your previous activity on our websites or our ongoing relationship, we will keep you updated on our products, solutions, services, company news and events. If you decide that you want to be removed from our mailing lists at any time, you can change your contact preferences by clicking here . Subscribe Complete .NET Toolbox Telerik DevCraft Complete JavaScript Toolbox Kendo UI Get Products Free Trials Pricing Resources DX Hub Demos Documentation Release History Forums Blogs Webinars Videos Professional Services Partners Virtual Classroom Events FAQs Recognition Success Stories Testimonials Get in touch Contact Us USA: +1 888 679 0442 UK: +44 13 4483 8186 India: +91 406 9019447 Bulgaria: +359 2 8099850 Australia: +61 3 7068 8610 165k+ 50k+ 17k+ 4k+ 14k+ Contact Us 165k+ 50k+ 17k+ 4k+ 14k+ Telerik and Kendo UI are part of Progress product portfolio. Progress is the leading provider of application development and digital experience technologies. Company Technology Awards Press Releases Media Coverage Careers Offices Company Technology Awards Press Releases Media Coverage Careers Offices Copyright &copy; 2026 Progress Software Corporation and/or its subsidiaries or affiliates. All Rights Reserved. Progress and certain product names used herein are trademarks or registered trademarks of Progress Software Corporation and/or one of its subsidiaries or affiliates in the U.S. and/or other countries. See Trademarks for appropriate markings. All rights in any other trademarks contained herein are reserved by their respective owners and their inclusion does not imply an endorsement, affiliation, or sponsorship as between Progress and the respective owners. Terms of Use Site Feedback Privacy Center Trust Center Do Not Sell or Share My Personal Information Powered by Progress Sitefinity
2026-01-13T09:29:57
https://www.facebook.com/login/?next=https%3A%2F%2Fl.facebook.com%2Fl.php%3Fu%3Dhttps%253A%252F%252Fwww.meta.ai%252F%26amp%253Bh%3DAT1DcrLVspry1AEMP_6Agf82ehhyc5c6xSpft5p5Eaerg5GUoJnwOkCtruxFSliK4GAtk1iuw5XMFcjamw08dCpoXPvbkwUMNYZ1f54p7PxjzLOXFkv-W4XRzduMeY9mh0RjY5XcOMfJKyXl
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:57
https://www.cisco.com/site/us/en/about/purpose/fy24-report/index.html#svg-x
FY24 Purpose Report - Cisco Skip to main content Skip to search Skip to footer Cisco.com Worldwide Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Trials and demos How to buy Partners EN US Profile Log in Trials and demos MENU CLOSE How to buy Partners Profile Log in EN US Close Close Close Close Close Hello, how can I help? About Purpose Power an Inclusive Future for All FY24 Purpose Report Celebrating 40 Years of Impact Driven by our Purpose, we combine our technology, people, and broader networks to address society&#39;s greatest challenges. We share the progress we&#39;ve made in our annual report. FY24 Purpose Report (PDF) Overview Explore the Report Looking Ahead FY24 Purpose Report 40 Years of Impact We built the digital highways that have become the backbone for modern communication. Now, we’re harnessing the power of connection to build a better future for people, communities, and the planet. For 40 years, connection has been core to Cisco’s identity. At Cisco, we’re proud of how our products and services bridge gaps, enable collaboration, and drive sustainability in meaningful ways. We prove every day that running a successful business with a commitment to do good makes progress possible. Letter from the CEO Our Timeline of Impact 1984 Cisco Systems, Inc Developed by Sandy Lerner and Leonard Bosack with a team of colleagues at Stanford University, the multiprotocol router connected disparate computer networks, leading to Cisco’s founding. 1997 Cisco Networking Academy Launched to educate high school and college students on how to design, install, and maintain computer networks. 1997 Cisco Foundation Established to support programs that leverage the Internet to help people in need and drive positive change. 1998 Cisco Community Investment Report Published report detailing Cisco’s philanthropic and community investment efforts. 1999 NetAid Harnessed the Internet to raise US$830K to end global poverty. By live-streaming celebrated musicians across three locations, NetAid garnered 2.4M views across 80 countries and set a record for the largest Internet broadcast event for a single day. 2000 Habitat for Humanity Provided funding and volunteer support to build homes and wire houses for Internet access. 2005 Corporate Citizenship Report Made a formal commitment to transparency and accountability by publishing details on Cisco&#39;s Corporate Social Responsibility efforts. 2005 Crisis Response Deployed communications equipment to assist emergency personnel in the aftermath of Hurricane Katrina and formed a dedicated emergency response team. 2006 Goal to Reduce Emissions Set our first greenhouse gas emissions reduction goal. 2011 Veterans Program Established program to help transitioning U.S. military veterans and families find employment and educational opportunities. 2011 On-Campus Solar Energy Installed first solar energy project at Cisco&#39;s Research Triangle Park campus. 2012 Global Human Rights Policy Formalized our commitment to respect human rights for all people. 2014 Talos Formed to provide accurate, rapid, and actionable threat intelligence for Cisco customers, products, and services. 2015 Country Digital Acceleration Launched program to collaborate with government and private sector leaders in building sustainable, secure, and inclusive communities. 2016 White House Equal Pay Pledge Became a founding signer of the White House Equal Pay Pledge and committed to paying employees fairly and equitably. 2018 Homelessness Grant Announced a five-year, US$50M commitment to end homelessness in Santa Clara County. 2019 Global Citizen Announced a partnership with Global Citizen to power the movement to end extreme poverty. 2020 Community Enablement Commitment Transformed longstanding advocacy for community enablement into a global, company-wide commitment. 2020 COVID-19 Response Introduced $2.5B financing program to support customers and keep businesses running; donated US$50M in cash and personal protective equipment (PPE) to organizations supporting vulnerable citizens; and provided funding to deploy COVID-19-related technology solutions. 2021 Cisco Foundation Climate Commitment Committed US$100M over the next 10 years to address climate change. 2021 Net Zero Announced a goal to reach net-zero greenhouse gas emissions across our value chain by 2040. 2022 Responsible AI Launched our Responsible AI (RAI) Principles and RAI Framework to formalize our commitment to build safe and trustworthy AI. 2023 One Billion Lives Exceeded our goal—ahead of schedule—to positively impact one billion people globally from FY16-FY23 through Cisco Networking Academy and social innovation grants. 2024 40 Communities Announcing our next big ambition: over the next 10 years, we plan to engage, support, and invest in 40 communities around the globe. Previous Next Explore this year’s report View all Power Power We build and deliver technology that powers the world’s connectivity, whether that’s between computers, throughout communities, or across continents. And we do so with the highest standards of ethics and integrity in mind—for ourselves, for our customers and partners, and for their users. That’s the power, and importance, of connection. Explore the Power section  0 1600 Active, completed, or in-pipeline projects across 50 countries through Country Digital Acceleration 0 B 800 billion Security events observed each day by Cisco Talos, protecting the world against cyber threats 0 27 Languages available for stakeholders to use Cisco’s EthicsLine 0 % 99.9% Of employees completed our annual Code of Business Conduct certification Featured Stories Connectivity in the Amazon The first floating Networking Academy provides free WiFi within a 30-meter radius, offers IT training, and promotes digital inclusion for communities. Responsible Mineral Sourcing We joined the Initiative for Responsible Mining Assurance to support the visibility, accountability, and inclusion of rightsholders as decision-makers at all levels of the mineral supply chain. Show more Inclusive Inclusive We’re recognized as one of the world’s best workplaces, and we have an unrelenting focus on employee wellbeing, benefits, giving, and inclusion. We strive to create the best possible employee experience, because we know our greatest asset is our people. Explore the Inclusive section  0 % 86% Employees participated in community impact efforts through donations, volunteering, and more 0 720,000 Volunteer hours logged by employees Launched BridgeIT, a Cisco Enterprise Chat AI, to intelligently guide employees and help them work faster, safer, and smarter 0 31 Inclusive Communities with 335 chapters across 77 countries Featured Stories Native American Network Cisco’s Native American Network deployed 18 sovereign broadband access points on Zuni tribal lands in New Mexico to help close the digital divide. Wellbeing in Technology The &#34;WellNest&#34; on Webex pilot supports physical, mental, social, and financial wellbeing through an intuitive AI-powered platform. Show more Future Future Cisco has been committed to reducing its environmental impact for nearly two decades, but there’s more to be done as we work toward a regenerative future. Our sustainability strategy, the Plan for Possible, guides us as we build our products, accelerate clean energy access, support suppliers’ reduced environmental impacts, and foster climate resiliency in communities. Explore the Future section  0 % 96% Of electricity for Cisco facilities came from renewable sources 0 % 73% Reduction in Scope 1 and 2 emissions FY25 goal: 90% reduction 0 % 75% Of the waste generated at our facilities was diverted from landfill globally 0 % 96% Of new Cisco products and packaging incorporate Circular Design Principles FY25 goal: 100% meeting circular design criteria Featured Stories Connected Conservation Cisco donated Cisco Meraki routers to African Parks to help them harness reliable Internet technology. Cisco Refresh We provide a second life to our products and reduce waste through the Cisco Refresh program, and we provide discounts to businesses joining the circular economy. Show more For All For All Through our technology, our people, and our broader networks, we create solutions that help address the world’s most critical challenges—from the AI skills gap to social inequities to environmental crises. We continue to show up to create a better future for all, by all, with all stakeholders who share our vision. Explore the For All section 0 M 24 million Cisco Networking Academy students since 1997 0 &#43; 30 plus Natural disasters and humanitarian crises responded to by Cisco Crisis Response $ 0 M USD 35 million US dollars Approved to fund climate solutions through the Cisco Foundation since FY21 $ 0 B USD 1.5 billion US dollars In Title IV Federal Funding that we helped preserve for HBCUs since FY20 Featured Stories Women Rock-IT Women Rock-IT celebrated 10 years, and their annual International Girls in ICT day programming reached 1.2 million on social media. Impact in India Cisco partners with NGOs and government agencies in India to create technology-based solutions that support critical human needs. View all Looking Ahead To celebrate our 40th year, we’re looking ahead to our future with Splunk and how we can drive even greater success for our customers, partners, employees, and communities together. There’s no better way to celebrate our anniversary than setting our next big ambition to propel us into the future. Learn more from Chief People, Policy &amp; Purpose Officer Fran Katsoudas on what’s next for Cisco’s Purpose work. Explore “Looking Ahead” 40 Years of Impact Power an Inclusive Future for All Driven by our Purpose, we combine our technology, people, and broader networks to address society&#39;s greatest challenges. We share the progress we&#39;ve made in our annual report. FY24 Purpose Report (PDF) Purpose Reporting Hub Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Cookies / Do not sell or share my personal data Accessibility Trademarks Supply Chain Transparency Newsroom Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:57
https://play.google.com/store/apps/details?id=notion.id&amp;hl=fil
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M12 17.27L18.
2026-01-13T09:29:57
https://snyk.io/es/solutions/application-security/
Solución de seguridad de aplicaciones (AppSec) | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API &amp; Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API &amp; Web - Todos los clientes Snyk API &amp; Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo Soluciones Seguridad de la aplicación Seguridad de la cadena de suministro de software Código seguro generado por IA Vulnerabilidades de día cero Secure at inception Select Seguridad de la aplicación Seguridad de la cadena de suministro de software Código seguro generado por IA Vulnerabilidades de día cero Secure at inception Solución de seguridad de aplicaciones que acelera el desarrollo Snyk permite a los desarrolladores crear de forma segura desde el principio, al tiempo que ofrece a los equipos de seguridad una visibilidad completa y controles exhaustivos. Reserva una demostración en vivo Demostración de Snyk bajo demanda Mira la grabación de la demostración para descubrir cómo los equipos pueden encontrar y corregir vulnerabilidades en el código, las dependencias, las imágenes de contenedores y la IaC. Mirar ahora Capacita a los desarrolladores que generen código de forma segura La solución de seguridad de aplicaciones de Snyk tiene en cuenta la tecnología, los procesos y las personas implicadas, y les proporciona a los equipos la experiencia en seguridad que necesitan dentro de las herramientas y flujos de trabajo que utilizan. Código sin vulnerabilidades El escaneo rápido y preciso de Snyk y las soluciones PR (solicitudes de cambio) automáticas ayudan a los desarrolladores a encontrar y corregir vulnerabilidades a medida que escriben el código. Capacitación y educación Convierte a los desarrolladores en expertos en seguridad gracias a la priorización de las correcciones y a los consejos prácticos de remedio de las herramientas que utilizan. Visibilidad e inteligencia Las políticas personalizables permiten a los equipos de seguridad crear barreras de seguridad al tiempo que mantienen la visibilidad y la seguridad. Consulta la solución de seguridad de aplicaciones de Snyk en acción ¿No eres experto en seguridad? No hay problema, nuestra intuitiva plataforma de seguridad para desarrolladores hace que la seguridad de las aplicaciones sea algo natural. Mira una demostración de la plataforma Snyk Play Video Snyk para la seguridad de las aplicaciones Potencia tu programa AppSec con Snyk. Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Haz realidad tu sueño de seguridad de las aplicaciones Las herramientas de seguridad tradicionales pueden cubrir lo básico, pero con Snyk, la seguridad de las aplicaciones puede ser mucho más. Informes avanzados de AppSec Snyk ayuda a cumplir las normativas, al tiempo que proporciona un marco y pruebas para su crecimiento y mejoras a lo largo del tiempo mediante la visualización y cuantificación de la postura de seguridad de tus aplicaciones. Obtén más información sobre los informes de Snyk Escaneo de vulnerabilidades basado en IA Nuestro escaneo ilimitado (sin restricciones de líneas de código) permite a los equipos de desarrollo y seguridad realizar escaneos tempranos y frecuentes, abordar las vulnerabilidades de forma proactiva y trabajar con independencia de los problemas de programación y compiladores. Y gracias a DeepCode AI , Snyk asegura tu código escrito con IA tan rápido como lo escriben los asistentes de codificación con IA. Obtén más información sobre Snyk para IA Snyk te acompaña Snyk se integra a la perfección con las herramientas de desarrollo en las que confían tus equipos en cada fase del ciclo de vida del desarrollo, lo que agiliza su implementación y facilita su uso. Mira todas las integraciones Risk-based prioritization Comprehensive risk context with user-friendly risk scoring enables AppSec to assess risk and prioritize issues by criticality while providing a better understanding of potential impacts and resolution paths. Learn more about Snyk’s risk-based prioritization Protege tus aplicaciones con Snyk Empieza a utilizar Snyk para que tus desarrolladores construyan de forma segura desde el principio. Reserva una demostración en vivo Comienza sin pagar nada Un enfoque revolucionario de la seguridad tradicional Nuestros probados métodos de seguridad de aplicaciones hacen que la seguridad sea procesable para los desarrolladores, gobernable para el equipo de seguridad y mantienen el costo total de propiedad bajo para la empresa, razón por la cual cientos de organizaciones confían la seguridad de sus aplicaciones a Snyk. “Snyk es una de las herramientas de seguridad más importantes que utilizamos en Skyscanner. Nos gusta que exista un enfoque múltiple y estratificado. En lugar de que el equipo de seguridad sea el guardián y revise cada línea de código y lo apruebe todo, podemos dar poder a nuestros desarrolladores”. Alex Harriss Senior Security Engineer , Skyscanner Recursos de seguridad de las aplicaciones Article ¿Qué es la seguridad de las aplicaciones? Blog Creación de un programa AppSec centrado en los desarrolladores Article Prácticas recomendadas de AppSec Article Explicación de la seguridad de las aplicaciones web Article Pruebas de seguridad de las aplicaciones: tipos y herramientas Cheat Sheet Cómo realizar una evaluación de la seguridad de las aplicaciones Comienza Descubre cómo la solución de seguridad de aplicaciones de Snyk permite a los desarrolladores implementar código de forma segura. Reserva una demostración en vivo Comienza sin pagar nada Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:57
https://addons.mozilla.org/cs/firefox/user/18674047/
Profil uživatele Hugvan – Doplňky pro Firefox (cs) Pro používání těchto doplňků si stáhněte Firefox . Skrýt Doplňky do prohlížeče Firefox Rozšíření Motivy vzhledu Více… pro Firefox Slovníky a jazykové balíčky Ostatní stránky prohlížeče Doplňky pro Android Přihlásit se Hledat Hledat Hugvan Nahlásit tohoto uživatele Rozšíření od autora Hugvan Zatím nehodnoceno Zatím nehodnoceno Zatím nehodnoceno Zatím nehodnoceno Zatím nehodnoceno Zatím nehodnoceno Zatím nehodnoceno Zatím nehodnoceno Zatím nehodnoceno Zatím nehodnoceno Vzhledy od autora Hugvan Zatím nehodnoceno Zatím nehodnoceno Zatím nehodnoceno Zatím nehodnoceno Zatím nehodnoceno Zatím nehodnoceno Zatím nehodnoceno Zatím nehodnoceno Zatím nehodnoceno Zatím nehodnoceno Zatím nehodnoceno Zatím nehodnoceno Přejít na domovskou stránku Mozilly Počet doplňků O nás Blog doplňků pro Firefox Workshop tvorby rozšíření Pro vývojáře Pravidla pro vývojáře Blog komunity Fórum Nahlásit chybu Příručka recenzenta Prohlížeče Desktop Mobile Enterprise Produkty Browsers VPN Relay Monitor Pocket Bluesky (@firefox.com) Instagram (Firefox) YouTube (firefoxchannel) Ochrana soukromí Cookies Právní informace Není-li uvedeno jinak, obsah této stránky je šířen pod licencí Creative Commons Uveďte původ-Zachovejte licenci 3.0 nebo jakoukoli novější verzí. Změna jazyka Čeština Deutsch Dolnoserbšćina Ελληνικά English (Canadian) English (British) English (US) Español (de Argentina) Español (de Chile) Español (de España) Español (de México) suomi Français Furlan Frysk עברית Hrvatski Hornjoserbsce magyar Interlingua Italiano 日本語 ქართული Taqbaylit 한국어 Norsk bokmål Nederlands Norsk nynorsk Polski Português (do Brasil) Português (Europeu) Română Русский slovenčina Slovenščina Shqip Svenska Türkçe Українська Tiếng Việt 中文 (简体) 正體中文 (繁體)
2026-01-13T09:29:57
https://akismet.com/developers/detailed-docs/errors/akismet-error-10009/
Akismet Error #10009 &#8211; Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Getting started Plugins and libraries Detailed docs Building your application Key verification Comment check Submit spam (missed&nbsp;spam) Submit ham (false&nbsp;positives) Key/sites activity Usage limit Response error codes Akismet Error #10001 Akismet Error #10003 Akismet Error #10402 Akismet Error #10011 Akismet Error #10010 Akismet Error #10009 Akismet Error #10006 Akismet Error #10005 Akismet Error #10404 Akismet Error #10403 Akismet Error #30001 Akismet Error #10009 Subscription Upgrade Required Akismet Error #10009 Why am I receiving this error? Your service was suspended, as your current subscription is not appropriate for your current usage. A warning message has appeared in your site’s dashboard for several weeks regarding the problem. Which subscription should I choose? Our Pro subscription can be used on commercial sites for up to nine sites. You can add sites to a current Pro subscription by following  these steps . If you need to use Akismet on 10 or more commercial sites, you can choose the Business subscription, which will cover an unlimited number of sites. Otherwise,&nbsp; check out our plans page &nbsp;for the subscription that fits you best. What if an agency or studio set everything up? You can contact the folks who helped you get up and running, and let them know that their Akismet API key needs to be upgraded. Or &#8211; simply choose to&nbsp; register your own subscription &nbsp;and activate the Akismet plugin using your new API key. Can I just de-activate Akismet? Yes. If you are currently using our WordPress plugin, go to the Plugins menu in your dashboard and click on the “Deactivate” link found directly under “Akismet.” If you happen to be using a different client, please refer to its documentation regarding deactivation. Note that your site(s) will then be left unprotected from spam, which is not recommended. Can we help with anything else? I need to update my credit card. I forgot my API key. I need to reset my password. I need to cancel my subscription. Priority support Want to get help even faster? Don&#8217;t forget that our Pro subscription includes priority email support. Related Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:57
https://snyk.io/es/resource-library/
Recursos | Snyk You need to enable JavaScript to run this app. Skip to main content Plataforma Plataforma Plataforma Snyk AI Trust Seguridad moderna en una única plataforma Flujos de trabajo de IA de Snyk Flujos de trabajo basados en IA para proteger aplicaciones DeepCode AI IA de seguridad diseñada específicamente Integraciones Seguridad que abarca todo el SDLC Snyk Learn Formación en seguridad para desarrolladores Precios Productos Snyk Code Protege el código a medida que lo escribes Snyk Open Source Evita tener dependencias vulnerables Snyk Container Mantén seguras tus imágenes base Snyk IaC Corrige configuraciones incorrectas de IaC en el código Snyk API &amp; Web Encuentra y prueba API y aplicaciones web Snyk Studio Fix and secure AI-generated code Soluciones Código seguro generado por IA La IA escribe, Snyk asegura Seguridad de la aplicación Desarrolla con seguridad, mantente seguro Seguridad de la cadena de suministro de software Mitiga el riesgo de la cadena de suministro Vulnerabilidades de día cero Arregla el primer día con Snyk Inteligencia en materia de seguridad Datos completos sobre vulnerabilidad Verificador de códigos Escribe mejor código gratis Risk-Based Prioritization Fix what matters most Snyk anunció la primera plataforma AI Trust Mira a pedido Recursos Nuestros recursos Biblioteca de recursos Consulta nuestra amplia base de datos Recursos para los clientes La tienda “todo en uno” para los clientes Hacking ético Cómo puede ayudarte el hacking ético Las 10 principales vulnerabilidades Ver los tipos de vulnerabilidades más comunes Blog de Snyk Pódcasts de Snyk YouTube de Snyk AI Glossary Conocimientos y documentos Snyk Labs Investigación de IA, vulnerabilidades y DevSecOps Snyk Learn Formación en seguridad de Snyk Documentos de usuario de Snyk Empieza a utilizar Snyk Soporte de Snyk ¿Cómo podemos ayudar? Base de datos de vulnerabilidades de Snyk Descubre nuevas vulnerabilidades Actualizaciones de Snyk Mantente informado Snyk Partner Solutions Directory Explora las integraciones de socios de Snyk Nuestra comunidad y juegos Eventos y seminarios web Embajadores Comunidad de DevSecCon VulnVortex Audiencia Snyk para desarrolladores Información centrada en el desarrollo bajo demanda Snyk para el gobierno AppSec basada en la misión Snyk para líderes de seguridad Opiniones de los líderes del sector Presentación de Snyk Labs Ver sitio web Empresa Empresa La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter Nuestros servicios Maximiza el ROI de tu AppSec Nuestros clientes Ayudamos a los clientes a ahorrar tiempo y dinero Nuestros socios Seguridad de clase empresarial con socios Estudios de casos Consulta las historias y estadísticas de nuestros clientes Prensa Consulta los últimos comunicados de prensa Contáctanos Ponte en contacto con nosotros si tienes preguntas o comentarios Empleos Únete hoy a Snyk Serie de clases magistrales de Snyk Explorar eventos y seminarios web Precios Evo New ES Selecciona tu idioma English Deutsch Español Français 日本語 Português (BR) Inicio de sesión Clientes del plan Gratis y Equipo Snyk app.snyk.io Clientes del plan Empresarial 🇺🇸 Snyk US - 1 app.snyk.io 🇺🇸 Snyk US - 2 app.us.snyk.io 🇪🇺 Snyk EU app.eu.snyk.io 🇦🇺 Snyk AU app.au.snyk.io La región donde se alojan tus datos se rige por acuerdos locales, y puede no coincidir con tu propia ubicación. Descubre más . Snyk API &amp; Web - Todos los clientes Snyk API &amp; Web (DAST) plus.probely.app Regístrate Reserva una demostración en vivo Recursos Artículo Catch Vulnerabilities Early: Your Snyk MCP Cheat Sheet Leer ahora Artículo Seguro desde el inicio: El nuevo imperativo del desarrollo impulsado por la inteligencia artificial Leer ahora White paper From Innovation to Integrity: Safeguarding APIs in Complex Ecosystems Leer ahora Analyst report Snyk named a Leader in 2025 Gartner® Magic Quadrant™ for AST Leer ahora Informe 5 Steps to AI-Ready Security Without Pipeline Drag: A Platform Leader&#x27;s Cheatsheet Leer ahora Ver filtros Tipo Artículos Informes de analistas Guías de compradores Estudios de casos Hojas de referencia Libros electrónicos Infografía Lecciones Podcasts Informes Libros blancos Videos Tema IA Seguridad de las aplicaciones Seguridad del código Cumplimiento Seguridad del contenedor DevSecOps Seguridad de IaC Cadena de suministro de software Seguridad de código abierto Aplicar filtros Restablecer filtros Mostrando 1 - 24 de 654 recursos Article Debunking the Top 5 Myths About DAST Modern Dynamic Application Security Testing (DAST) has evolved far beyond its outdated reputation for being slow or noisy. This guide debunks five common myths, demonstrating how AI-driven DAST provides fast, automated runtime security that catches critical vulnerabilities static analysis often misses. Article From SBOM to AI-BOM: Rethinking Visibility in AI-Native Systems AI supply chains move too fast for SBOMs. Learn why AI-BOM is becoming the foundation for AI security and governance. Article Best Practices for DAST Scanning, Execution &amp; Implementation in the SDLC Master DAST scanning best practices for your SDLC. Learn to define scope, optimize execution in CI/CD, prioritize results, manage false positives, &amp; integrate Snyk API &amp; Web for application security. Article SAST for SQL Injection Detection: A Complete Guide Static Application Security Testing (SAST) is a cornerstone of a proactive defense against SQL injection (SQLi). Snyk Code uses the power of SAST to detect SQL injection vulnerabilities in source code, prevent attacks early, &amp; strengthen application security before deployment. Cheat Sheet 5 Steps to AI-Ready Security Without Pipeline Drag: A Platform Leader&#x27;s Cheatsheet White Paper From Innovation to Integrity: Safeguarding APIs in Complex Ecosystems Video A New Model You Haven&#x27;t Heard About (GitHub Raptor Mini) Video How to Add MCP Servers to Google&#x27;s Antigravity IDE Video Beyond AppSec: Discover and Assess Risk in Your AI Lifecycle With Snyk Labs Article Catch Vulnerabilities Early: Your Snyk MCP Cheat Sheet Integrate security into AI workflows with the Snyk MCP Server cheat sheet. Learn installation, configuration, transport types, core security scanning functions (Code, SCA, IaC), and rules for agentic AI tools. Buyer&#x27;s Guide AI Security Tool Evaluation Framework: A Strategic Guide for CISOs Buyer&#x27;s Guide CISO’s Guide to Evolving AppSec in the AI Era: From Reactive Fixing to Proactive Risk Reduction Article Top CI/CD Pipeline Security Best Practices for AI-Powered Development Fortify your AI development lifecycle. Learn top CI/CD security best practices to protect against prompt injection, data poisoning, and model inversion from code to cloud. Report How MCP and the A2A Protocols Impact API Management Gartner Report Video How to Add MCP Servers to JetBrains Article Implementing SAST in Azure DevOps: A Complete Guide for DevSecOps Integration By integrating SAST directly into our Azure DevOps pipelines, we catch issues like SQL injection, cross-site scripting, and insecure authentication patterns before they reach production. Video Google Gemini 3 Pro Builds an App with ONE PROMPT... Article AI in SDLC: A Complete Guide to AI-Powered Software Development Discover how AI is transforming the Software Development Life Cycle (SDLC). Learn the benefits, challenges, and real-world use cases of AI-powered software development. Article Buffer Overflow Security Analysis: From Prevention to Detection &amp; Defense Protect your applications from buffer overflow attacks with a multi-layered security approach. Learn how SAST, DAST, runtime protections, and Snyk’s proactive tools help detect, prevent, and remediate memory corruption vulnerabilities in C/C++ and other high-risk environments. Article What Is Toxic Flow Analysis in Cybersecurity? Framework, Identification Techniques &amp; Implementation Toxic Flow Analysis maps how sensitive data moves across systems to uncover hidden risks, strengthen defenses, and improve security posture. Video 288% ROI: Quantifying the Total Economic Impact of the Snyk AI Security Platform eBook The Gorilla Guide® To Unified SAST and DAST in the AI Era | Snyk Article 5 AI Cloud Security Best Practices: A Comprehensive Guide for Securing AI Systems in the Cloud Discover the top 5 AI cloud security best practices to protect your AI models, data, and pipelines. Learn how to secure AI systems in the cloud against emerging threats with this comprehensive guide. Article How Claude Code Is Raising the Ceiling of Intelligence Anthropic&#x27;s Claude Code is evolving into a customizable agent framework. Learn about 7 new features: extended thinking, tool use, MCP, memory, and secure execution. 1 Página 2 Página 3 Página 4 Página 5 Página 28 Plataforma Plataforma Snyk AI Trust Flujos de trabajo de IA de Snyk DeepCode AI Integraciones Nuestros recursos Biblioteca de recursos Blog Pódcasts de Snyk Conocimientos y documentos Snyk Labs Snyk Learn Documentos de usuario de Snyk Soporte de Snyk Base de datos de vulnerabilidades de Snyk Actualizaciones de Snyk Snyk Trust Center Empresa y comunidad Acerca de Snyk Contáctanos Reserva una demostración Empleos Eventos y seminarios web Embajadores Por qué Snyk Snyk frente a GitHub Advanced Security Snyk frente a Veracode Snyk frente a Checkmarx Snyk frente a Black Duck Snyk frente Wiz La plataforma de seguridad para desarrolladores Snyk te ofrece la visibilidad, el contexto y el control que necesitas para trabajar junto a los desarrolladores en la reducción del riesgo de las aplicaciones. Subscribe to our newsletter © 2025 Snyk Limited Registrada en Inglaterra y Gales Términos legales Aviso de privacidad Condiciones de uso del sitio web Para residentes en California: No vender mis datos personales
2026-01-13T09:29:57
https://certbot.eff.org/
Certbot Skip to main content a project of the Electronic Frontier Foundation EN فارسی certbot instructions about certbot contribute to certbot hosting providers with HTTPS get help donate donate to EFF &#x2261; home certbot instructions about certbot contribute to certbot hosting providers with HTTPS get help donate &times; Get your site on https:// Find out if your hosting provider has HTTPS built in &mdash; no Certbot needed. See the list of providers See if your hosting provider offers HTTPS. Or, run Certbot once to automatically get free HTTPS certificates forever. Get Certbot instructions Or, get instructions for Certbot. What&#39;s your HTTP website running on? My HTTP website is running Software Apache Nginx HAProxy Plesk Other Web Hosting Product on System Bitnami FreeBSD Windows OpenBSD macOS Web Hosting Service Linux (snap) Linux (pip) Help, I&#39;m not sure! Use our instruction generator to find custom commands to get Certbot on your server's environment. Pick your server's software and system above. To use Certbot, you&#39;ll need... comfort with the command line Command Line A command line is a way of interacting with a computer by typing text-based commands to it and receiving text-based replies. Certbot is run from a command-line interface, usually on a Unix-like server. In order to use Certbot for most purposes, you’ll need to be able to install and run it on the command line of your web server, which is usually accessed over SSH. A command line is a way of interacting with a computer by typing text-based commands to it and recei... From our Certbot Glossary command line Command Line A command line is a way of interacting with a computer by typing text-based commands to it and receiving text-based replies. Certbot is run from a command-line interface, usually on a Unix-like server. In order to use Certbot for most purposes, you’ll need to be able to install and run it on the command line of your web server, which is usually accessed over SSH. From our Certbot Glossary ...and an HTTP website HTTP HTTP (Hypertext Transfer Protocol) is the traditional, but insecure, method for web browsers to request the content of web pages and other online resources from web servers. It is an Internet standard and normally used with TCP port 80. Almost all websites in the world support HTTP, but websites that have been configured with Certbot or some other method of setting up HTTPS may automatically redirect users from the HTTP version of the site to the HTTPS version. HTTP (Hypertext Transfer Protocol) is the traditional, but insecure, method for web browsers to requ... From our Certbot Glossary HTTP website HTTP HTTP (Hypertext Transfer Protocol) is the traditional, but insecure, method for web browsers to request the content of web pages and other online resources from web servers. It is an Internet standard and normally used with TCP port 80. Almost all websites in the world support HTTP, but websites that have been configured with Certbot or some other method of setting up HTTPS may automatically redirect users from the HTTP version of the site to the HTTPS version. From our Certbot Glossary that is already online Website That’s Already Online Certbot is usually meant to be used to switch an existing HTTP site to work in HTTPS (and, afterward, to continue renewing the site’s HTTPS certificates whenever necessary). Some Certbot documentation assumes or recommends that you have a working web site that can already be accessed using HTTP on port 80. That means, for example, that if you use a web browser to go to your domain using http://, your web server answers and some kind of content comes up (even if it’s just a default welcome page rather than the final version of your site). Some methods of using Certbot have this as a prerequisite, so you’ll have a smoother experience if you already have a site set up with HTTP. (If your site can’t be accessed this way as a matter of policy, you’ll probably need to use DNS validation in order to get a certificate with Certbot.) Certbot is usually meant to be used to switch an existing HTTP site to work in HTTPS (and, afterward... From our Certbot Glossary already online Website That’s Already Online Certbot is usually meant to be used to switch an existing HTTP site to work in HTTPS (and, afterward, to continue renewing the site’s HTTPS certificates whenever necessary). Some Certbot documentation assumes or recommends that you have a working web site that can already be accessed using HTTP on port 80. That means, for example, that if you use a web browser to go to your domain using http://, your web server answers and some kind of content comes up (even if it’s just a default welcome page rather than the final version of your site). Some methods of using Certbot have this as a prerequisite, so you’ll have a smoother experience if you already have a site set up with HTTP. (If your site can’t be accessed this way as a matter of policy, you’ll probably need to use DNS validation in order to get a certificate with Certbot.) From our Certbot Glossary with an open port 80 Port 80 Different Internet services are distinguished by using different TCP port numbers. Unencrypted HTTP normally uses TCP port 80, while encrypted HTTPS normally uses TCP port 443. To use certbot --webroot, certbot --apache, or certbot --nginx, you should have an existing HTTP website that’s already online hosted on the server where you’re going to use Certbot. This site should be available to the rest of the Internet on port 80. To use certbot --standalone, you don’t need an existing site, but you have to make sure connections to port 80 on your server are not blocked by a firewall, including a firewall that may be run by your Internet service provider or web hosting provider. Please check with your ISP or hosting provider if you’re not sure. (Using DNS validation does not require Let’s Encrypt to make any inbound connection to your server, so with this method in particular it’s not necessary to have an existing HTTP website or the ability to receive connections on port 80.) Different Internet services are distinguished by using different TCP port numbers. Unencrypted HTTP ... From our Certbot Glossary port 80 Port 80 Different Internet services are distinguished by using different TCP port numbers. Unencrypted HTTP normally uses TCP port 80, while encrypted HTTPS normally uses TCP port 443. To use certbot --webroot, certbot --apache, or certbot --nginx, you should have an existing HTTP website that’s already online hosted on the server where you’re going to use Certbot. This site should be available to the rest of the Internet on port 80. To use certbot --standalone, you don’t need an existing site, but you have to make sure connections to port 80 on your server are not blocked by a firewall, including a firewall that may be run by your Internet service provider or web hosting provider. Please check with your ISP or hosting provider if you’re not sure. (Using DNS validation does not require Let’s Encrypt to make any inbound connection to your server, so with this method in particular it’s not necessary to have an existing HTTP website or the ability to receive connections on port 80.) From our Certbot Glossary ...which is hosted on a server Server A server is a computer on the Internet that provides a service, like a web site or an email service. Most web site owners pay a hosting provider for the use of a server located in a data center and administered over the Internet. This might be a physical dedicated server, a virtual private server (VPS), or a shared server. Other servers provide other parts of the Internet infrastructure, such as DNS servers. A server is a computer on the Internet that provides a service, like a web site or an email service.... From our Certbot Glossary server Server A server is a computer on the Internet that provides a service, like a web site or an email service. Most web site owners pay a hosting provider for the use of a server located in a data center and administered over the Internet. This might be a physical dedicated server, a virtual private server (VPS), or a shared server. Other servers provide other parts of the Internet infrastructure, such as DNS servers. From our Certbot Glossary which you can access via ssh SSH SSH (which stands for “secure shell”) is a technology for connecting to a remote server and accessing a command line on that server, often in order to administer it. The administrator of a server can grant SSH access to others, and can also use SSH access directly in order to administer the server remotely. SSH is usually used to access servers running Unix-like operating systems, but your own computer doesn’t have to be running Unix in order to use SSH. You normally use SSH from your computer’s command line in a terminal by typing a command such as ssh username@example.com , especially if your own computer runs Linux or macOS. After logging in, you’ll have access to the server’s command line. If you use Windows on your computer, you might also use a dedicated SSH application such as PuTTY. Most Certbot users run Certbot from a command prompt on a remote server over SSH. SSH (which stands for “secure shell”) is a technology for connecting to a remote server and accessin... From our Certbot Glossary ssh SSH SSH (which stands for “secure shell”) is a technology for connecting to a remote server and accessing a command line on that server, often in order to administer it. The administrator of a server can grant SSH access to others, and can also use SSH access directly in order to administer the server remotely. SSH is usually used to access servers running Unix-like operating systems, but your own computer doesn’t have to be running Unix in order to use SSH. You normally use SSH from your computer’s command line in a terminal by typing a command such as ssh username@example.com , especially if your own computer runs Linux or macOS. After logging in, you’ll have access to the server’s command line. If you use Windows on your computer, you might also use a dedicated SSH application such as PuTTY. Most Certbot users run Certbot from a command prompt on a remote server over SSH. From our Certbot Glossary with the ability to sudo sudo Sudo is the most common command on Unix-like operating systems to run a specific command as root (the system administrator). If you’re logged in to your server as a user other than root, you’ll likely need to put sudo before your Certbot commands so that they run as root (for example, sudo certbot instead of just certbot), especially if you’re using Certbot’s integration with a web server like Apache or Nginx. (The certbot-auto script automatically runs sudo if it’s necessary and you didn’t specify it.) Sudo is the most common command on Unix-like operating systems to run a specific command as root (th... From our Certbot Glossary sudo sudo Sudo is the most common command on Unix-like operating systems to run a specific command as root (the system administrator). If you’re logged in to your server as a user other than root, you’ll likely need to put sudo before your Certbot commands so that they run as root (for example, sudo certbot instead of just certbot), especially if you’re using Certbot’s integration with a web server like Apache or Nginx. (The certbot-auto script automatically runs sudo if it’s necessary and you didn’t specify it.) From our Certbot Glossary optional if you want a wildcard cert Wildcard Certificate A wildcard certificate is a certificate that includes one or more names starting with *. . Browsers will accept any label in place of the asterisk ( * ). For example, a certificate for *.example.com will be valid for www.example.com , mail.example.com , hello.example.com , and goodbye.example.com . However, a wildcard certificate including only the name *.example.com will not be valid for example.com : the substituted label can not be empty. If you want the certificate to be valid for example.com , you also need to include example.com (i.e. without the *. part) on the certificate. Additionally, the asterisk can only be substituted by a single label and not by multiple labels. For example, the name hello.goodbye.example.com will not be covered by a certificate including only the name *.example.com . It will be covered however, by *.goodbye.example.com . Note that a wildcard name can not contain multiple asterisks. For example, *.*.example.com is not valid. A wildcard certificate is a certificate that includes one or more names starting with *. . Browsers w... From our Certbot Glossary wildcard cert Wildcard Certificate A wildcard certificate is a certificate that includes one or more names starting with *. . Browsers will accept any label in place of the asterisk ( * ). For example, a certificate for *.example.com will be valid for www.example.com , mail.example.com , hello.example.com , and goodbye.example.com . However, a wildcard certificate including only the name *.example.com will not be valid for example.com : the substituted label can not be empty. If you want the certificate to be valid for example.com , you also need to include example.com (i.e. without the *. part) on the certificate. Additionally, the asterisk can only be substituted by a single label and not by multiple labels. For example, the name hello.goodbye.example.com will not be covered by a certificate including only the name *.example.com . It will be covered however, by *.goodbye.example.com . Note that a wildcard name can not contain multiple asterisks. For example, *.*.example.com is not valid. From our Certbot Glossary : DNS credentials DNS Credentials DNS credentials are a password or other kind of secret (such as an API key) that your DNS provider lets you use to change the contents of your DNS records. They are usually issued by your domain registrar (or by another DNS provider, if your DNS provider isn’t the same as your registrar). DNS credentials are a sensitive kind of secret because they can be used to take over your site completely. You should never share these credentials publicly or with an unauthorized person. It can be OK to provide a copy of them to Certbot to let it perform DNS validation automatically, since it runs locally on your machine. DNS credentials are a password or other kind of secret (such as an API key) that your DNS provider l... From our Certbot Glossary DNS credentials DNS Credentials DNS credentials are a password or other kind of secret (such as an API key) that your DNS provider lets you use to change the contents of your DNS records. They are usually issued by your domain registrar (or by another DNS provider, if your DNS provider isn’t the same as your registrar). DNS credentials are a sensitive kind of secret because they can be used to take over your site completely. You should never share these credentials publicly or with an unauthorized person. It can be OK to provide a copy of them to Certbot to let it perform DNS validation automatically, since it runs locally on your machine. From our Certbot Glossary Don&#39;t have these requirements? Not to worry! Some hosting providers automate the HTTPS process. See the full list of hosting providers , or find out more about how to set up your system . Want to learn more? See our explainers Want to contribute to Certbot? See opportunites to help certbot home about certbot certbot instructions hosting providers with HTTPS get help frequently asked questions certbot glossary certbot documentation community forum contact us contribute to certbot donate to EFF privacy
2026-01-13T09:29:57
https://akismet.com/developers/plugins-and-libraries/
Plugins and libraries &#8211; Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Getting started Plugins and libraries Detailed docs Building your application Key verification Comment check Submit spam (missed&nbsp;spam) Submit ham (false&nbsp;positives) Key/sites activity Usage limit Response error codes Akismet Error #10001 Akismet Error #10003 Akismet Error #10402 Akismet Error #10011 Akismet Error #10010 Akismet Error #10009 Akismet Error #10006 Akismet Error #10005 Akismet Error #10404 Akismet Error #10403 Akismet Error #30001 Plugins and libraries While most people know about the Akismet plugin for WordPress sites, Akismet has also been integrated into other systems and libraries. Here are the ones we know about: Plugins WordPress plugins Contact forms Jetpack Contact Form 7 &nbsp;with&nbsp; Flamingo Gravity Forms Other contact forms E-commerce WooCommerce product reviews: after it&#8217;s setup, Akismet will start protecting your product reviews against spam straight away, with zero configuration required. However, for protection against fraudulent orders, you will need an anti‑fraud solution . Comments Official WordPress Plugin Donations GiveWP Other Content Management Systems (CMS) Drupal AntiSpam Module &nbsp;( Drupal ) Antispam &nbsp;( Perch ) AkismetKlik &nbsp;( Mediawiki ) MediaWiki-Akismet &nbsp;( Mediawiki ) Advanced Spam Cleaner &nbsp;( Moodle ) SpamDetector ( Piranha CMS ) Forums discourse-akismet &nbsp;(Discourse) Spam-o-mattic &nbsp;(vBulletin) Akismet Anti-Spam Extension &nbsp;(phpBB) Spam Remover &nbsp;(phpBB) Akismet for Flarum Other Piwigo Akismet Plugin for PHPList3 Libraries Dart:&nbsp; Dart Connector for Akismet Elixir: Akismet for Elixir Elixir: Exkismet JavaScript:&nbsp; Node.js bindings to the Akismet API JavaScript:&nbsp; Akismet for JS (Node.js): Prevent comment spam using JavaScript Kotlin/Java:&nbsp; Akismet for Kotlin/Java by Erik C. Thauvin PHP: Akismet Client Library for PHP by Omines Internetbureau PHP: laravel-akismet (newer Laravel ) PHP:&nbsp; Laravel 4 framework (older Laravel ) PHP:&nbsp; Tiki Wiki CMS Groupware PHP:&nbsp; PHP 4 class by Bret Kuhns PHP:&nbsp; Fuspam PHP function Python: akismet : unofficial Python Akismet API library. Python:&nbsp; python-akismet Python:&nbsp; pykismet3: Python 3 Akismet client (used by Django forms) Ruby:&nbsp; RubyGem: Rakismet Ruby:&nbsp; RubyGem: Akismet (unofficial) Go:&nbsp; go-akismet .NET:&nbsp; Akismet : unofficial “dot-net” Akismet API library. .NET:&nbsp; AkismetApi.Net : another, more complete, unofficial &#8220;dot-net&#8221; Akismet API library. Perl:&nbsp; Net::Akismet : Perl interface to Akismet – comment and trackback spam fighter. Haxe:&nbsp; Akismet for Haxe Rust:&nbsp; Instant Akismet If you don&#8217;t see a suitable library for your language or framework, you may be able to use our OpenAPI specification to generate one. We recommend using OpenAPI Generator . If you’ve created your own Akismet integration using our API and want to be included on this list, please contact us . Note that since Akismet&#8217;s heuristics are heavily influenced by&nbsp; missed spam &nbsp;and&nbsp; false positive &nbsp;reporting, we expect your software to implement those features to be listed on this page. We might make an exception if the context for which you are programming does not provide you with a way to realistically integrate those endpoints. Related Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:57
https://www.facebook.com/login/?next=https%3A%2F%2Fl.facebook.com%2Fl.php%3Fu%3Dhttps%253A%252F%252Fwww.instagram.com%252F%26amp%253Bh%3DAT1kWJSlFkynKLntL4eHEeq7pamAXBFivWH2qS6ehN_XRL4tIQ-0Sl9bY1oJBiMJFtzlm5fhTJiJ2exD0kHH9VQLQywC1jXx43j-1IYFjgF5VoZhzsnJWQK8bPJMweDO26-XsRWNvUMZZX20DcMVZi3hAmh2pQ
Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026
2026-01-13T09:29:57
https://www.cisco.com/site/eg/ar/about/sitemap.html
خريطة الموقع - Cisco Skip to main content Skip to search Skip to footer Cisco.com مصر المنتجات والخدمات Close الحلول Close الدعم Close تعلّم Close أسباب اختيار Cisco Close الشركاء Close استكشاف Cisco كيفية الشراء الشركاء AR EG تسجيل الدخول استكشاف Cisco بحث القائمة إغلاق كيفية الشراء الشركاء تسجيل الدخول AR EG Close Close Close Close Close مرحبًا، كيف يمكنني المساعدة؟ خريطة الموقع روابط رائجة الشهادات المهنية فرص الوظائف دراسات الحالة وقصص العملاء Cisco Commerce المجتمع اتصل بنا Networking Academy تسجيل دخول الشريك الصفحة الرئيسية للمنتجات مركز الثقة إظهار المزيد حول Cisco الشركة نظرة عامة غرفة الأخبار القيادة الغرض والاستدامة فرص الوظائف مركز الثقة اتصل بنا العلاقات مع المستثمرين الصفحة الرئيسية للعلاقات مع المستثمرين التقارير السنوية النتائج المالية معلومات الأسهم علاقات المحللين الاشتراك معنا تجمع Cisco Cisco Insider Cisco Research Cisco Store Cisco Talos خريطة انقطاعات الإنترنت (ThousandEyes) Outshift by Cisco إظهار المزيد المنتجات المنتجات المميزة Cisco AI Defense منصة Cisco Intersight Cisco Networking Cloud (سحابة شبكات Cisco) Cisco Secure Client (يتضمن AnyConnect) Cisco Secure Firewall مجموعة Cisco Webex Suite مركز البيانات والشبكات السحابية المُبدلات الموجّهات وأجهزة SD-WAN لاسلكي جميع المنتجات الصفحة الرئيسية للمنتجات المنتجات من الألف إلى الياء التعاون الحوسبة الشبكات الأمان Splunk AppDynamics البرامج تنزيلات تطبيقات الهاتف المحمول الموارد دراسات الحالة وقصص العملاء Cisco Power Calculator المعتمدة من Cisco الامتثال عروض dCloud التوضيحية، والتدريب، وأوضاع الحماية منتجات من خط إنتاج منتهٍ ومنتجات في نهاية عمرها نظرات عامة وعروض توضيحية ودروس تعليمية الإصدارات التجريبية والعروض التوضيحية Visio stencils الضمانات إظهار المزيد الحلول الحلول المميزة الذكاء الاصطناعي Cisco on Cisco حافة خدمات الوصول الآمن (SASE) مزودود الخدمة الشركات الصغيرة والمتوسطة المباني الذكية الوصول من خلال نهج Zero Trust (انعدام الثقة) من Cisco كل الحلول الصفحة الرئيسية للحلول التعاون الحوسبة الشبكات الأمان حلول المجال مستكشف المحفظة الصناعية المدن والمجتمعات التعليم الخدمات المالية الحكومة الرعاية الصحية التصنيع التعدين النفط والغاز البيع بالتجزئة الرياضة، والوسائط، والترفيه النقل والمواصلات الأدوات المساعدة إظهار المزيد الخدمات الخدمات المميزة الخدمات المتقدمة الخدمات الدائمة من Cisco خدمة Smart Net Total Care دعم البرامج دعم الحلول مسارات النجاح جميع الخدمات الصفحة الرئيسية للخدمات التعاون الحوسبة الشبكات قابلية الملاحظة (Splunk) الأمان حالات الاستخدام مركز البيانات الحديث إظهار المزيد الدعم للمنتجات جميع المنتجات جميع تنزيلات البرامج الأجهزة الطرفية والهواتف الخاصة بالتعاون الموجّهات الأمان المُبدلات الاتصالات الموحدة لاسلكي الاتصال بالدعم المجتمع دعم التراخيص بوابة المرتجعات (RMAs) تطبيق Support Case Manager الدعم لعمليات الاستحواذ أرقام الهواتف للشركات الصغيرة أرقام هواتف أخرى (حول العالم) الأدوات والموارد الخدمات الاستشارية الخاصة بالأمان الإشعارات الميدانية أجهزتي إعلاماتي أداة البحث عن أخطاء أبحاث البرامج وحدة التحقق من تغطية الأجهزة كل أدوات الدعم إظهار المزيد تعلم التعلم في Cisco الشهادات المهنية اختبارات الشهادات Cisco Learning Network (شبكة التعلم من Cisco) Cisco Networking Academy Cisco U. DevNet برنامج محاكي الشبكات Packet Tracer (محاكاة الشبكة) جميع التدريبات والشهادات الأحداث والندوات عبر الإنترنت الصفحة الرئيسة للأحداث تقويم الأحداث Cisco Live ندوات عبر الإنترنت حول الحلول ندوات عبر الإنترنت حول التكنولوجيا مواضيع التكنولوجيا أمان تطبيقات الذكاء الاصطناعي كيفية إعداد موجّه كيفية إعداد مبدّل شبكة ما المقصود بالأمن السيبراني؟ ما المقصود بمركز البيانات؟ ما جدار الحماية؟ ما المقصود بشبكة LAN؟ ما المقصود بشبكة Wi-Fi 7؟ جميع مواضيع التكنولوجيا ظهار المزيد كيفية الشراء الشراء من Cisco دليل الشراء تمويل Cisco Capital Cisco Refresh (معدات مُعاد تصنيعها) جدولة مكالمة بدء تشغيل دردشة الشراء من خلال البائعين أو عبر الإنترنت تعرّف على شركائنا محدِد موقع البائع طلب الخدمة وإدارة العقود الشركات الصغيرة والمتوسطة الترخيص اتفاقية المؤسسة مركز الترخيص موقع Software central إظهار المزيد الشركاء برنامج Cisco Partner الانضمام كشريك حوافز الشريك تخصصات الشركاء أدوات وموارد الشركاء Cisco Commerce قمة شركاء Cisco ملف التعريف الخاص بي ملاحظات الشركاء تدريب الشركاء SalesConnect المزيد من أدوات وموارد الشركاء دعم الشركاء دعم خدمات ما قبل البيع تطبيق Support Case Manager جميع خيارات دعم الشركاء إظهار المزيد ارتباطات سريعة حول سيسكو اتصل بنا الوظائف تواصل مع شريك الموارد والشؤون القانونية التعليقات المساعدة البنود والشروط بيان الخصوصية ملفات تعريف الارتباط العلامات التجارية شفافية سلسلة الإمداد خريطة الموقع &copy;  شركة Cisco Systems, Inc
2026-01-13T09:29:57
https://www.notion.com/ar/help/guides
الأدلة والدروس التعليمية - طريقة استخدام Notion Notion الميزات Notion AI إنشاء، كتابة، أتمتة الوكلاء يتعامل مع المهام اليدوية بحث المؤسسة اعثر على إجابات على الفور ملاحظات الاجتماع المدعومة بالذكاء الاصطناعي مكتوبة بشكل مثالي بواسطة الذكاء الاصطناعي المُستندات بسيط وقوي قاعدة المعرفة تجميع معرفتك في مكان واحد المشاريع إدارة أي مشروع المواقع انشر أي شيء بسرعة البدء استكشاف حالات استخدام الذكاء الاصطناعي تعرّف على قدرات Notion AI تصفح السوق قوالب لكل شيء عرض عمليات التكامل ربط تطبيقاتك مع Notion تنزيل web clipper حفظ من الويب إلى Notion جرّب تطبيق Notion لسطح المكتب للحصول على تجربة أسرع تنزيل التطبيق البريد التقويم الذكاء الاصطناعي الخطة المؤسسية التسعير استكشاف الفرق الهندسة والمنتج التصميم التسويق تقنية المعلومات حجم الفريق الشركات الناشئة الشركات الصغيرة والمتوسطة المؤسسة التعليم التعلم مركز المساعدة أكاديمية Notion قصص العملاء المدونة المجتمع برامج الشركاء الإصدار واجهة برمجة التطبيقات (API) القوالب الأمان الاستشاريون اطلب عرضاً توضيحياً تسجيل الدخول احصل على Notion مجاناً مركز المساعدة الأدلة الأدلة اصقل مهاراتك واستكشف طرقاً جديدة لاستخدام Notion. كل المواضيع Notion AI التوثيق Notes إدارة المشاريع Wiki Product Engineering Design HR &amp; people Marketing Personal المؤسسة Startup Demo Template gallery Automations ابدأ مع وكيلك الشخصي في Notion تعرَّف على وكيل Notion، زميلك في الفريق المدعوم بالذكاء الاصطناعي الذي يُنجز المهام بالنيابة عنك. يتعامل وكيلك مع المهام المعقدة متعددة الخطوات، بدءاً من إنشاء قواعد البيانات إلى تحديث المحتوى عبر مساحة عملك، حتى تتمكن من التركيز على الجانب الإستراتيجي بدلاً من الإعداد. 5 من الدقائق للقراءة حافظ على ذاكرة مثالية للاجتماعات باستخدام ملاحظات الاجتماع المدعومة بالذكاء الاصطناعي تعرف على ملاحظات الاجتماع المدعومة بالذكاء الاصطناعي من Notion، مساعد الاجتماع الذكي الخاص بك. ينسخ اجتماعاتك ويحولها إلى ملخصات منظمة للاجتماعات مباشرة في مساحة عملك. 7 من الدقائق للقراءة البدء كمنشئ قوالب على Marketplace هل تحب إنشاء إعدادات رائعة في Notion؟ هذا الدليل موجّه لك. تعلّم أساسيات إدراج منتجاتك وبيعها على Marketplace. من إعداد ملفك الشخصي كمنشئ محتوى وإدارة المدفوعات، إلى إيجاد مصادر الإلهام والتعلم المستمر. 7 من الدقائق للقراءة المهام التي يمكنك إنجازها باستخدام Notion AI تعرَّف على أداة Notion AI الجديدة - المساعد المفيد داخل مساحة عملك. في هذا الدليل، سنصطحبك في جولة حول الكيفية التي يمكن بها لأداة Notion AI أن تساعدك في اكتشاف الإجابات، وجمع المعلومات معاً، وأتمتة المهام المملة، مما يمنحك مزيداً من الوقت للتركيز على ما يهم حقاً. 10 من الدقائق للقراءة الدليل الشامل والسريع لاستخدام Notion للمؤسسات يمنحك استخدام Notion للمؤسسات إمكانية الوصول إلى المزيد من التخصيص والتحكم في الإدارة والأمان والتزويد وغيرها من الميزات. تتوفَّر مجموعة كبيرة من الميزات التي يمكنك استكشافها داخل مساحة العمل الخاصة بشركتك، لذا من المهم فهم نطاق الميزات المتاحة. 20 من الدقائق للقراءة البدء في المشاريع والمهام تعيش المشاريع والمهام جنباً إلى جنب مع ملاحظاتك ومستنداتك للحصول على تجربة سلسة لإدارة المشاريع. تعرّف على المزيد حول كيفية البدء. 8 من الدقائق للقراءة أتمتة العمل مع قوالب قاعدة البيانات المتكررة أنشئ المهام المتكررة وملاحظات الاجتماع والمستندات تلقائياً باستخدام القوالب المتكررة لقاعدة البيانات. أصبح من الأسهل من أي وقت مضى تحديث قائمة المهام الخاصة بك وجدولة الاجتماعات وإنشاء جميع أنواع المحتوى بشكل منتظم. 5 من الدقائق للقراءة Get the most out of your Business trial with Notion AI Start your Business trial and explore what’s possible with Notion AI. Connect your favorite tools, capture meetings automatically, and let your Personal Agent build end-to-end workflows — all in one place. 5 من الدقائق للقراءة Power your deep work using Research Mode in Notion Learn how to use Research Mode in Notion for deep research across your workspace, connected tools, and the web. Combine scattered data into clear, actionable briefs that support customer calls, product launches, and strategic decisions. 5 من الدقائق للقراءة Working offline in Notion—Everything you need to know With Notion’s offline functionality, your most important pages stay accessible and editable—no internet required. Whether you’re flying, commuting through dead zones, or working from a café with spotty Wi‑Fi, your projects are always within reach, keeping you productive wherever you are. 5 من الدقائق للقراءة Is Notion&#x27;s Business or Enterprise plan right for you? Bringing AI into daily workflows is one of the biggest challenges companies face. Our Business and Enterprise plans meet that head-on with powerful AI tools, custom workflows, and rock-solid security— all in one connected workspace. Find the plan that fits your team. 8 من الدقائق للقراءة Find answers and generate reports with enterprise search Finding answers at work should be as simple as using your favorite search engine. With enterprise search, you can quickly find what you need using features like Research mode for in-depth reports and AI connectors that work seamlessly with your current systems. 7 من الدقائق للقراءة How to get better answers from Notion AI Instead of relying on basic keyword searches, learn how to provide rich context that helps Notion AI understand exactly what you&#x27;re looking for, leading to more accurate and useful results. 10 من الدقائق للقراءة Organize your inbox with Notion AI&#x27;s auto labeling Learn how Notion AI&#x27;s auto labeling feature intelligently organizes your inbox for you. It labels and sorts emails as they arrive so you can focus on what matters most. 5 من الدقائق للقراءة Eliminate email busywork with Notion Mail best practices Transform your inbox with expert tips from Notion consultants — learn to set up custom views, speed up responses, and master your email workflow. 8 من الدقائق للقراءة Verify knowledge your teammates can trust Keep your pages up to date, help your team find the right information faster, and build confidence in every decision. With page verification in Notion, you can create clear sources of truth that your whole team can rely on. 7 من الدقائق للقراءة Everything you need to know about setting up and managing an organization in Notion Level-up how you manage your company with Notion’s organization level controls. Learn how to configure your settings and permissions effectively for your entire organization in one central place to manage users, permissions, and security settings. Finally, a streamlined way to keep everything secure and in sync at scale. 12 من الدقائق للقراءة Getting started with Notion Mail Your inbox, reimagined— where priorities stay clear, emails write themselves and scheduling is seamless. Tap into a smarter way to work. 10 من الدقائق للقراءة Bring your codebase into context with Notion&#x27;s GitHub integration Learn how to seamlessly integrate GitHub with Notion to streamline your development workflow, enhance team collaboration, and keep your codebase and documentation in perfect sync. 10 من الدقائق للقراءة A simple CRM for strengthening client relationships and managing work Learn how to build a custom CRM that matches how you work and includes everything you need—from client details and portals to project management and revenue tracking. 8 من الدقائق للقراءة Organize, connect, and scale your Notion knowledge management system Transform scattered company information into an organized, accessible knowledge hub with Notion. Learn how to build a central company home, create dynamic databases for client and project management, and connect your team&#x27;s knowledge seamlessly with their daily work. 7 من الدقائق للقراءة Manage client work in a flexible project tracker Streamline your client project management with a customizable Notion workspace. Discover how to create flexible project trackers, automate workflows, and build client portals that enable seamless collaboration and efficient project delivery. 8 من الدقائق للقراءة Your centralized product development hub in Notion Stay on top of your work without the back-and-forth. Notion brings together your team&#x27;s docs, tasks, and communications in one collaborative space — where work flows naturally. 7 من الدقائق للقراءة Project management that evolves with your team Create customizable project management workflows in Notion - your all-in-one workspace for databases, tasks, and timelines. We&#x27;ll walk you through building simple, powerful systems that help your team collaborate better. 8 من الدقائق للقراءة How tech startups build their company operating systems in Notion Learn how to build a truly scalable workspace in Notion. We&#x27;ll show you how to create a company hub that helps your startup work smarter — from knowledge sharing to team collaboration to project planning. 8 من الدقائق للقراءة Notify people instantly — with just a click of a button Send instant notifications to teams and stakeholders with a single button click — perfect for urgent alerts, incident response, and streamlined workflows. 4 من الدقائق للقراءة Share social media posts from Notion with webhook actions Learn how to automate your social media workflows by connecting Notion with your favorite platforms using webhook actions. 4 من الدقائق للقراءة Unleashing collaboration with Notion&#x27;s Jira integration Whether you need to streamline your Jira workflow or simplify project tracking for non-technical teams, integrating Jira with Notion offers a powerful and flexible solution. Here&#x27;s everything you need to know about Jira sync. 11 من الدقائق للقراءة Use forms to collect, organize and act on responses right in your Notion workspace Forms in Notion bridge the gap between your work and valuable feedback. They enable you to easily collect responses, streamline workflows, and quickly transform feedback into action items—all within your Notion workspace. 8 من الدقائق للقراءة Build the perfect workflow with customizable layouts Layouts unlock a whole new world of efficiency for structuring and sharing information through databases. Learn how to organize your database pages, create custom layouts, and boost productivity. 6 من الدقائق للقراءة Use AI connectors to access more of your team’s knowledge AI connectors let you find and create content using info from third-party apps (like Slack, JIRA and Google Drive) within Notion. Learn how they can boost your organization&#x27;s efficiency, enhance overall productivity, and even reduce spend on AI tools. 7 من الدقائق للقراءة Use Notion’s Data Retention settings to keep your team compliant &amp; restore content Notion&#x27;s custom data retention settings empower your team to effortlessly meet your company&#x27;s compliance requirements. In this guide, we’ll show Enterprise workspace owners how to tailor data retention settings and recover deleted pages. 5 من الدقائق للقراءة Use charts to visualize data and track progress directly in Notion Whether you need to track project timelines, analyze team performance, or simply make sense of large datasets, charts offer a solution that transforms your database pages into actionable information. 7 من الدقائق للقراءة Sprints, simplified with Notion’s sprint tracking system Simplify sprint planning and execution so your team can solve issues and ship new features faster. 5 من الدقائق للقراءة The ultimate guide to AI-powered knowledge hubs in Notion An AI-powered knowledge hub can save hours for your team every single day. Learn how to build, roll out, and maintain your AI-powered knowledge hub in Notion. 17 من الدقائق للقراءة Use Notion AI to give teams perfect memory, and save time Whether you&#x27;re supporting customers, prospects, internal support requests, or even new hires, everyone needs access to the information in your wiki. Learn how Notion AI can help them team members find what they need faster. 8 من الدقائق للقراءة Who should be a workspace member, and who should be a guest? Understanding the difference between members and guests can help you become an effective steward of your company&#x27;s knowledge and budget. 6 من الدقائق للقراءة Using Notion for Product &amp; Engineering OKRs Notion is a connected workspace, powered by AI, that enables Product &amp; Engineering teams to efficiently manage OKRs by integrating them with daily workflows. It provides a single source of truth for teams working towards the same goals, together. 5 من الدقائق للفيديو Understanding how Q&amp;A finds answers can help you get better results Ask Notion Q&amp;A any question, and it will provide an answer based on your workspace content. Learn how Notion Q&amp;A works so you can get the best, most accurate results. 5 من الدقائق للقراءة Give your to-dos a Home with Task databases Easily manage all your tasks from Home with Notion Task databases. 5 من الدقائق للقراءة Make work more efficient with database button properties Learn how database button properties can speed up project management workflows like upvoting, escalations, and approvals. Plus, how to use Notion&#x27;s suite of automation features in concert — including database button properties, database automations, and buttons. 7 من الدقائق للقراءة Getting started with Notion Calendar Get started with Notion calendar to manage your work and life. Learn how to connect your personal and work calendars, Notion databases, and more. 6 من الدقائق للقراءة How tech teams can use Notion AI to boost productivity No matter your role in tech, Notion AI can significantly enhance your productivity. By providing instant answers, generating or improving content, and summarizing databases, it allows you to focus more on the core tasks at hand. 3 من الدقائق للفيديو How marketing teams can use Notion AI to boost productivity Notion AI simplifies your work as a marketer by writing brand new pages for you, extracting key insights from database pages, and quickly showing you the information you need. 3 من الدقائق للفيديو Get answers about work content faster with Q&amp;A Learn how Q&amp;A can answer questions to help you make sense of the information in your workspace, and explore how to get the most value from your Notion AI add-on. 10 من الدقائق للقراءة Unearth fresh insights from your personal knowledge library using Q&amp;A Explore ways to use Q&amp;A to glean insights from your personal notes, research, and more — all you have to do is ask. 10 من الدقائق للقراءة Notion Enterprise security provisions Discover how Notion&#x27;s security and compliance features for Enterprise plans work together to protect your company&#x27;s most valuable property — your data. 8 من الدقائق للقراءة 5 steps to adopt Notion for your entire organization Your team is ready to start using Notion more broadly to unlock the value of a connected workspace — here’s what you need to do to get there. 10 من الدقائق للقراءة Using Notion for issue tracking Notion makes it easy to build your own issue tracking system that fits your needs. In this video, we’ll show how you can create standardized tracking forms with templates, build custom views to follow progress, and use customized tags for better filtering and ownership. 4 من الدقائق للفيديو How to write Notion formulas that extend the capabilities of your databases Learn how to write formulas in Notion databases to extract useful data, run calculations, and more. This guide covers formula terminology, how to write a formula, troubleshooting, and lots of beginner examples. 12 من الدقائق للقراءة Formulas 2.0: How to use Notion’s new and improved formulas with your existing setups If you’ve used Notion’s formulas in the past, you may be wondering “what’s changed?” This guide breaks down what’s new and what that means for you as a formulas power user. 8 من الدقائق للقراءة Create streamlined project management workflows using database automations Database automations give you the power to create custom workflows handling the repetitive admin tasks of project management, so you’ll spend less time clicking buttons and more time on high-impact work. 10 من الدقائق للقراءة Using Notion for product roadmaps For many companies, important information is scattered across various tools, creating a fragmented picture of what’s on their Product Roadmap. Product teams on Notion don’t have to worry about this problem, because they can create a living plan that connects to company goals, documentation, responsibilities and more. 4 من الدقائق للفيديو Using Notion for marketing campaigns Explore how to create a homepage to manage everything related to the campaign, create and manage all documentation and notes related to campaigns, and map tasks and dependencies to keep your projects on track. 4 من الدقائق للفيديو Using Notion for tech specs Explore how to create and collaborate on tech specs with your team by providing a centralized place for project documents, standardizing the writing process, consolidating project information, and facilitating an approval process. 3 من الدقائق للفيديو Get organized for a new semester with Notion Learn how to use Notion to create a dashboard for student life, take and organize class notes, collect resources and references, and manage everyday tasks — from shared chores to shopping lists. 10 من الدقائق للقراءة 10 AI prompts to help marketers write better copy, faster Notion AI gives you endless inspiration for content and helps you whip up blog posts, press releases, social media content, white papers, and more, to boost both creativity and efficiency. 7 من الدقائق للقراءة المستندات المرجعية Getting started Start here What is a block? Create a page Create a subpage What is a database? Create a database Start with a template Share your work Collaborate with people Badges &amp; certifications عرض الكل Workspace &amp; sidebar Intro to workspaces Navigate with the sidebar Create, join &amp; leave workspaces Create, join &amp; leave teamspaces Search in your workspace Home &amp; My tasks Workspaces on mobile Delete a workspace عرض الكل الصفحات والكتل Intro to writing &amp; editing Format your page Style &amp; customize your page الصور والملفات والوسائط Links &amp; backlinks Wikis &amp; verified pages Move &amp; duplicate content حذف المحتوى واستعادته Synced blocks Code blocks Math equations اختصارات لوحة المفاتيح Duplicate public pages Use pages offline عرض الكل قواعد البيانات مقدمة إلى قواعد البيانات Views, filters, sorts &amp; groups خصائص قاعدة البيانات الارتباطات والتجميعات Database settings قوالب قاعدة البيانات Sub-items &amp; dependencies Task databases &amp; sprints Data sources Optimize database load times &amp; performance Table view طريقة عرض لوحي Timeline view Calendar view List view Gallery view Chart view Unique ID Map view Forms Layouts Feed view عرض الكل المشاركة والتعاون المشاركة والأذونات إدارة الأعضاء والضيوف Collaborate in a workspace Inbox &amp; notifications Comments, mentions &amp; reactions التذكيرات Suggested edits Page analytics Intro to teamspaces Who’s who in a workspace People profiles People Directory Create &amp; manage groups عرض الكل البيانات وعمليات التكامل استيراد البيانات إلى Notion Export your content Back up your data التضمينات والإشارات المرجعية وإشارات الروابط Add &amp; manage integrations Notion API integrations Link previews Synced databases Connected properties Import from Asana Import from Confluence Import from Monday.com Integrate GitHub Integrate Slack Integrate Jira Common Jira Sync issues عرض الكل Automations Buttons Database buttons Database automations Webhook actions عرض الكل المعادلات مقدمة إلى المعادلات صيغ ودوال المعادلات Common formula errors عرض الكل تطبيقات Notion تطبيق Notion لسطح المكتب Notion for web Notion for mobile System requirements for Notion Notion beta program Mobile widgets Web Clipper Notion New Tab extension عرض الكل الخطط والفوترة والدفع Change your plan Billing How adding &amp; removing members impacts billing Invoices Payment methods Refunds Notion للتعليم Notion for startups Notion for creators Paid plan trials فهم استخدام الكتلة What happens when I downgrade my plan? Sales tax Can’t upgrade to the Plus Plan for students and educators عرض الكل Workspace administration SAML SSO Set up Identity Provider (IdP) for SAML SSO Manage your Enterprise workspace Domain management Provision users &amp; groups with SCIM Set up Identity Provider (IdP) for SCIM Content search Transfer content from a deprovisioned user Audit log Workspace analytics Add security &amp; compliance integrations Managed users Enterprise connection settings Custom data retention settings Deploy Notion for macOS IP address restrictions Manage teamspaces Network control Deploy Notion for Windows Organization level controls Legal holds عرض الكل الإعدادات Account settings &amp; preferences Notification settings Workspace settings Two-step verification Notion IP addresses &amp; domains HIPAA configuration Data access consent Delete your account Notion Faces Log in &amp; out تغيير لغتك Passkeys عرض الكل Troubleshooting Reset Notion I can&#x27;t log in I can’t access Notion I can&#x27;t access my own page I can’t upload or view a file Common Notion errors Record HAR files for troubleshooting عرض الكل Security &amp; privacy Security practices Privacy practices GDPR at Notion Data accessible by your workspace owner Report inappropriate content How Notion 3.0 protects against prompt injection risks How to protect yourself from malvertising Data residency for Notion Dormant account policy Shared Responsibilities Model عرض الكل Notion AI ما هو Notion AI؟ Notion AI for databases ملاحظات الاجتماع المدعومة بالذكاء الاصطناعي (نسخة تجريبية) Notion AI Connectors GitHub AI Connector Google Drive AI Connector Jira AI Connector (beta) Linear AI Connector Microsoft Teams AI Connector (beta) Microsoft SharePoint &amp; OneDrive AI Connector (beta) Slack AI Connector Notion AI complimentary responses Notion AI security &amp; privacy practices Enterprise Search security &amp; privacy practices Notion’s commitment to AI safety Notion MCP Notion Agent Google Calendar AI Connector Notion Calendar AI Connector (beta) Microsoft Outlook AI Connector Enterprise Search Research Mode Gmail AI Connector (Beta) Notion Mail AI Connector (beta) عرض الكل Notion Calendar Create a Notion Calendar account Manage your calendars &amp; events Scheduling &amp; availability Blocking Time zones Manage your linked Notion account Notion Calendar settings Notion Calendar integrations &amp; API Use Notion Calendar with Notion Notion Calendar for teams Notion Calendar keyboard shortcuts Notion Calendar apps Notion Calendar security practices عرض الكل Notion Sites Publish a Notion Site Edit &amp; customize your Notion Sites Manage your Notion Sites Connect a custom domain with Notion Sites Notion Sites availability &amp; pricing عرض الكل Notion Mail Get started with Notion Mail Navigate your inbox Compose an email Views, groups, filters &amp; properties Schedule meetings with Notion Mail Use Notion AI with Notion Mail Notion Mail settings Notion Mail keyboard shortcuts Notion Mail security practices Can’t log into Notion Mail Notion Mail for mobile عرض الكل Marketplace Finding templates on Marketplace Selling on Marketplace Getting featured in Marketplace Marketplace guidelines &amp; terms Become a Notion Solutions Partner Offering services on Marketplace Template localization on Marketplace Finding services on Marketplace عرض الكل الأدلة التصفح حسب حالة الاستخدام Notion AI التوثيق Notes إدارة المشاريع Wiki Product Engineering Design HR &amp; people Marketing Personal المؤسسة Startup Demo Template gallery Automations النمو مع Notion أكاديمية Notion واجهة برمجة التطبيقات (API) إنشاء عمليات تكامل الدعم راسلنا عبر البريد الإلكتروني انضم إلى مجتمعنا البحث عن مستشار العربية إعدادات ملفات تعريف الارتباط © 2026 Notion Labs, Inc. الشركة نبذة عنا الوظائف الأمان الحالة الشروط والخصوصية حقوقك المتعلقة بالخصوصية تنزيل iOS وAndroid Mac وWindows التقويم Web Clipper الموارد مركز المساعدة التسعير المدونة المجتمع عمليات التكامل القوالب برامج الشركاء Notion لأجل الخطة المؤسسية الشركات الصغيرة شخصي استكشف المزيد → {"props":{"pageProps":{"guides":[{"fields":{"title":"ابدأ مع وكيلك الشخصي في Notion","tags":[{"metadata":{"tags":[{"sys":{"type":"Link","linkType":"Tag","id":"newLanguageLaunch"}}],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"7zVsCQhhZLhkQ0ABao8MuP","type":"Entry","createdAt":"2023-03-07T15:23:30.432Z","updatedAt":"2025-12-08T12:51:31.952Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2589,"revision":575,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"tag"}},"locale":"ar-SA"},"fields":{"name":"Notion AI","slug":"ai","templateGalleryDescription":"قوالب تعرض قوة الذكاء الاصطناعي، مباشرة في Notion. عزِّز قدراتك بطرق جديدة وغير متوقعة.","illustration":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"ZpdpOeU8n1ImCuRha7ulk","type":"Asset","createdAt":"2023-03-07T20:49:29.854Z","updatedAt":"2025-10-06T15:57:43.858Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2219,"revision":483,"locale":"ar-SA"},"fields":{"title":"rocks","description":"","file":{"url":"//images.ctfassets.net/spoqsaf9291f/ZpdpOeU8n1ImCuRha7ulk/20c64b9a0773c8f0fb57b98ba2cfc225/rocks.png","details":{"size":21321,"image":{"width":480,"height":480}},"fileName":"rocks.png","contentType":"image/png"}}}}}],"subtitle":"تعرَّف على وكيل Notion، زميلك في الفريق المدعوم بالذكاء الاصطناعي الذي يُنجز المهام بالنيابة عنك. يتعامل وكيلك مع المهام المعقدة متعددة الخطوات، بدءاً من إنشاء قواعد البيانات إلى تحديث المحتوى عبر مساحة عملك، حتى تتمكن من التركيز على الجانب الإستراتيجي بدلاً من الإعداد.","slug":"get-started-with-your-personal-agent-in-notion","thumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"2TVSXQtXFhrby7hklLrgXo","type":"Asset","createdAt":"2025-09-18T07:10:57.352Z","updatedAt":"2025-09-18T07:10:57.352Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"ar-SA"},"fields":{"title":"Agent_guide_thumbnail","description":"","file":{"url":"//images.ctfassets.net/spoqsaf9291f/2TVSXQtXFhrby7hklLrgXo/fbe5eb66dd6991fcfce5ea5114920db3/Agent_Thumbnail_Final.png","details":{"size":102473,"image":{"width":1200,"height":630}},"fileName":"Agent Thumbnail Final.png","contentType":"image/png"}}},"format":"Article","wordCount":1160,"heroVideo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"2i07Lcu1LYLRard5HD6SYr","type":"Entry","createdAt":"2025-09-18T16:47:56.016Z","updatedAt":"2025-09-19T16:46:52.763Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"video"}},"locale":"ar-SA"},"fields":{"title":"Agent_guide_video_intro.","videoId":"yasGTeAsV6s","minutes":4}}},"sys":{"id":"3tigVt7q9cgNJ0nGq2UIu9","type":"Entry"}},{"fields":{"title":"حافظ على ذاكرة مثالية للاجتماعات باستخدام ملاحظات الاجتماع المدعومة بالذكاء الاصطناعي","tags":[{"metadata":{"tags":[{"sys":{"type":"Link","linkType":"Tag","id":"newLanguageLaunch"}}],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"5ErnUqBztj5VPdDPfDpKSy","type":"Entry","createdAt":"2023-03-23T16:51:25.309Z","updatedAt":"2025-12-08T12:51:31.829Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":53,"revision":6,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"tag"}},"locale":"ar-SA"},"fields":{"name":"الاجتماعات","slug":"meetings"}},{"metadata":{"tags":[{"sys":{"type":"Link","linkType":"Tag","id":"newLanguageLaunch"}}],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"7zVsCQhhZLhkQ0ABao8MuP","type":"Entry","createdAt":"2023-03-07T15:23:30.432Z","updatedAt":"2025-12-08T12:51:31.952Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2589,"revision":575,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"tag"}},"locale":"ar-SA"},"fields":{"name":"Notion AI","slug":"ai","templateGalleryDescription":"قوالب تعرض قوة الذكاء الاصطناعي، مباشرة في Notion. عزِّز قدراتك بطرق جديدة وغير متوقعة.","illustration":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"ZpdpOeU8n1ImCuRha7ulk","type":"Asset","createdAt":"2023-03-07T20:49:29.854Z","updatedAt":"2025-10-06T15:57:43.858Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2219,"revision":483,"locale":"ar-SA"},"fields":{"title":"rocks","description":"","file":{"url":"//images.ctfassets.net/spoqsaf9291f/ZpdpOeU8n1ImCuRha7ulk/20c64b9a0773c8f0fb57b98ba2cfc225/rocks.png","details":{"size":21321,"image":{"width":480,"height":480}},"fileName":"rocks.png","contentType":"image/png"}}}}},{"metadata":{"tags":[{"sys":{"type":"Link","linkType":"Tag","id":"newLanguageLaunch"}}],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"1kAXdA1Ukk8SuEVM2nmjXd","type":"Entry","createdAt":"2020-09-17T01:01:13.699Z","updatedAt":"2025-12-08T12:51:32.131Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":1989,"revision":463,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"tag"}},"locale":"ar-SA"},"fields":{"name":"التوثيق","slug":"documentation"}}],"subtitle":"تعرف على ملاحظات الاجتماع المدعومة بالذكاء الاصطناعي من Notion، مساعد الاجتماع الذكي الخاص بك. ينسخ اجتماعاتك ويحولها إلى ملخصات منظمة للاجتماعات مباشرة في مساحة عملك.","slug":"preserve-perfect-meeting-memory-with-ai-meeting-notes","thumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"ZzgrY2T34GAGiUbBHAboe","type":"Asset","createdAt":"2025-05-12T22:46:37.011Z","updatedAt":"2025-07-07T19:45:35.904Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"locale":"ar-SA"},"fields":{"title":"AI meeting notes thumbnail","description":"","file":{"url":"//images.ctfassets.net/spoqsaf9291f/ZzgrY2T34GAGiUbBHAboe/d449ea3097fe424a37ad7ff61fc2cfb2/AI_Meeting_Notes_thumbnail.png","details":{"size":47480,"image":{"width":1200,"height":630}},"fileName":"AI Meeting Notes thumbnail.png","contentType":"image/png"}}},"format":"Article","wordCount":1413,"heroVideo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"5gWaQLKjq27fwzoBsr0Meg","type":"Entry","createdAt":"2025-10-15T10:05:11.518Z","updatedAt":"2025-10-15T10:05:11.518Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"video"}},"locale":"ar-SA"},"fields":{"title":"AI Meeting Notes","videoId":"kXPLgh-TLnE","minutes":4}}},"sys":{"id":"707tnnw7Nn4N8Aq66iVQMD","type":"Entry"}},{"fields":{"title":"البدء كمنشئ قوالب على Marketplace","subtitle":"هل تحب إنشاء إعدادات رائعة في Notion؟ هذا الدليل موجّه لك. تعلّم أساسيات إدراج منتجاتك وبيعها على Marketplace. من إعداد ملفك الشخصي كمنشئ محتوى وإدارة المدفوعات، إلى إيجاد مصادر الإلهام والتعلم المستمر.","slug":"getting-started-as-a-template-creator-on-marketplace","thumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"4zm1kZyNgtzQhBGaN7hZSV","type":"Asset","createdAt":"2024-10-24T00:45:02.937Z","updatedAt":"2024-11-14T16:48:21.224Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":36,"revision":17,"locale":"ar-SA"},"fields":{"title":"marketplace thumbnail","description":"","file":{"url":"//images.ctfassets.net/spoqsaf9291f/4zm1kZyNgtzQhBGaN7hZSV/a86f9e0b4ac4101051b8b1e5d4290738/Marketplace_thumbnail.png","details":{"size":119098,"image":{"width":1200,"height":630}},"fileName":"Marketplace thumbnail.png","contentType":"image/png"}}},"format":"Article","wordCount":1546},"sys":{"id":"4wZLxAQR4NML7ThMivFNkF","type":"Entry"}},{"fields":{"title":"المهام التي يمكنك إنجازها باستخدام Notion AI","tags":[{"metadata":{"tags":[{"sys":{"type":"Link","linkType":"Tag","id":"newLanguageLaunch"}}],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"7zVsCQhhZLhkQ0ABao8MuP","type":"Entry","createdAt":"2023-03-07T15:23:30.432Z","updatedAt":"2025-12-08T12:51:31.952Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2589,"revision":575,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"tag"}},"locale":"ar-SA"},"fields":{"name":"Notion AI","slug":"ai","templateGalleryDescription":"قوالب تعرض قوة الذكاء الاصطناعي، مباشرة في Notion. عزِّز قدراتك بطرق جديدة وغير متوقعة.","illustration":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"ZpdpOeU8n1ImCuRha7ulk","type":"Asset","createdAt":"2023-03-07T20:49:29.854Z","updatedAt":"2025-10-06T15:57:43.858Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2219,"revision":483,"locale":"ar-SA"},"fields":{"title":"rocks","description":"","file":{"url":"//images.ctfassets.net/spoqsaf9291f/ZpdpOeU8n1ImCuRha7ulk/20c64b9a0773c8f0fb57b98ba2cfc225/rocks.png","details":{"size":21321,"image":{"width":480,"height":480}},"fileName":"rocks.png","contentType":"image/png"}}}}}],"subtitle":"تعرَّف على أداة Notion AI الجديدة - المساعد المفيد داخل مساحة عملك. في هذا الدليل، سنصطحبك في جولة حول الكيفية التي يمكن بها لأداة Notion AI أن تساعدك في اكتشاف الإجابات، وجمع المعلومات معاً، وأتمتة المهام المملة، مما يمنحك مزيداً من الوقت للتركيز على ما يهم حقاً.","slug":"everything-you-can-do-with-notion-ai","thumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"3iccILRwvopIkoERn50WA8","type":"Asset","createdAt":"2024-09-24T18:31:21.046Z","updatedAt":"2025-09-18T16:31:33.574Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":465,"revision":105,"locale":"ar-SA"},"fields":{"title":"AI writer thumbnail","description":"AI writer thumbnail","file":{"url":"//images.ctfassets.net/spoqsaf9291f/3iccILRwvopIkoERn50WA8/8b659a44bc0ed257a3faa59d460501f2/Hero_Screenshot_Final.png","details":{"size":40484,"image":{"width":1200,"height":630}},"fileName":"Hero Screenshot Final.png","contentType":"image/png"}}},"format":"Article","wordCount":2146},"sys":{"id":"7lhVVxLHEbqwK0aJ0QVYJD","type":"Entry"}},{"fields":{"title":"الدليل الشامل والسريع لاستخدام Notion للمؤسسات","tags":[{"metadata":{"tags":[{"sys":{"type":"Link","linkType":"Tag","id":"newLanguageLaunch"}}],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"3qAWtk666pCD3faSYixU2R","type":"Entry","createdAt":"2020-09-17T16:18:39.282Z","updatedAt":"2025-12-08T12:51:52.045Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2046,"revision":488,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"tag"}},"locale":"ar-SA"},"fields":{"name":"المؤسسة","slug":"enterprise"}},{"metadata":{"tags":[{"sys":{"type":"Link","linkType":"Tag","id":"newLanguageLaunch"}}],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"08IA08qy4COUm3Xp8CRiH","type":"Entry","createdAt":"2023-08-14T23:25:54.769Z","updatedAt":"2025-12-08T12:51:52.139Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":56,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"tag"}},"locale":"ar-SA"},"fields":{"name":"تكنولوجيا المعلومات","slug":"it"}},{"metadata":{"tags":[{"sys":{"type":"Link","linkType":"Tag","id":"newLanguageLaunch"}}],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"4fUz0nk2MWizt8AXyEVZHN","type":"Entry","createdAt":"2020-09-17T01:11:38.645Z","updatedAt":"2025-12-08T12:51:52.246Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":970,"revision":207,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"tag"}},"locale":"ar-SA"},"fields":{"name":"التأهيل","slug":"onboarding"}}],"subtitle":"يمنحك استخدام Notion للمؤسسات إمكانية الوصول إلى المزيد من التخصيص والتحكم في الإدارة والأمان والتزويد وغيرها من الميزات. تتوفَّر مجموعة كبيرة من الميزات التي يمكنك استكشافها داخل مساحة العمل الخاصة بشركتك، لذا من المهم فهم نطاق الميزات المتاحة.","slug":"the-ultimate-quickstart-guide-to-notion-for-enterprise","thumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"1jF0VOZV54gEp9VMIMKbuk","type":"Asset","createdAt":"2023-01-26T20:25:51.948Z","updatedAt":"2024-05-23T14:46:55.238Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":30,"revision":4,"locale":"ar-SA"},"fields":{"title":"enterprise quickstart thumb","description":"","file":{"url":"//images.ctfassets.net/spoqsaf9291f/1jF0VOZV54gEp9VMIMKbuk/7835e48d638a9f73a325795eeeb320ce/enterprise-quickstart.png","details":{"size":163696,"image":{"width":1200,"height":630}},"fileName":"enterprise-quickstart.png","contentType":"image/png"}}},"format":"Article","wordCount":4000},"sys":{"id":"5TRoSnjRYO2UjgfuQpu86","type":"Entry"}},{"fields":{"title":"البدء في المشاريع والمهام","tags":[{"metadata":{"tags":[{"sys":{"type":"Link","linkType":"Tag","id":"newLanguageLaunch"}}],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"2YleZ1NlGQCPvDOGNrpCTf","type":"Entry","createdAt":"2020-09-17T00:08:53.284Z","updatedAt":"2025-12-08T12:51:07.841Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":1737,"revision":432,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"tag"}},"locale":"ar-SA"},"fields":{"name":"إدارة المشاريع","slug":"project-management"}}],"subtitle":"تعيش المشاريع والمهام جنباً إلى جنب مع ملاحظاتك ومستنداتك للحصول على تجربة سلسة لإدارة المشاريع. تعرّف على المزيد حول كيفية البدء.","slug":"getting-started-with-projects-and-tasks","thumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"67VES2Vwkoffp14lJdfinT","type":"Asset","createdAt":"2022-11-17T04:32:21.988Z","updatedAt":"2025-07-16T07:40:49.294Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":3,"locale":"ar-SA"},"fields":{"title":"getting-started-projects thumb","description":"","file":{"url":"//images.ctfassets.net/spoqsaf9291f/67VES2Vwkoffp14lJdfinT/448c6380dfac8233201367124dbfa529/getting-started-projects__1_.png","details":{"size":125182,"image":{"width":1200,"height":630}},"fileName":"getting-started-projects (1).png","contentType":"image/png"}}},"format":"Article","wordCount":1633,"heroVideo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"3ueYjETRPGZASXBUUZAUT3","type":"Entry","createdAt":"2025-10-12T08:06:32.988Z","updatedAt":"2025-10-12T08:06:32.988Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"video"}},"locale":"ar-SA"},"fields":{"title":" Projects \u0026 tasks","videoId":"enc6qbbbqb8","minutes":3}}},"sys":{"id":"6fAwrLUoLrMPPvWbwMxEPT","type":"Entry"}},{"fields":{"title":"أتمتة العمل مع قوالب قاعدة البيانات المتكررة","tags":[{"metadata":{"tags":[{"sys":{"type":"Link","linkType":"Tag","id":"newLanguageLaunch"}}],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"4jRDkXZHx3uasVeAQQccQ","type":"Entry","createdAt":"2023-08-14T23:25:25.148Z","updatedAt":"2025-11-24T10:50:13.265Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":618,"revision":139,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"tag"}},"locale":"ar-SA"},"fields":{"name":"أساسيات Notion","slug":"notion-basics"}}],"subtitle":"أنشئ المهام المتكررة وملاحظات الاجتماع والمستندات تلقائياً باستخدام القوالب المتكررة لقاعدة البيانات. أصبح من الأسهل من أي وقت مضى تحديث قائمة المهام الخاصة بك وجدولة الاجتماعات وإنشاء جميع أنواع المحتوى بشكل منتظم.","slug":"automate-work-repeating-database-templates","thumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"29VQGbDg8UrLfrDodb3dt1","type":"Asset","createdAt":"2022-11-08T01:42:29.209Z","updatedAt":"2024-10-16T08:22:41.978Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":13,"revision":5,"locale":"ar-SA"},"fields":{"title":"Repeating tasks thumbnail","description":"","file":{"url":"//images.ctfassets.net/spoqsaf9291f/29VQGbDg8UrLfrDodb3dt1/02e2fad528b92adabfd8a32983e3337d/automate-repetitive-work.png","details":{"size":133932,"image":{"width":1200,"height":630}},"fileName":"automate-repetitive-work.png","contentType":"image/png"}}},"format":"Article","wordCount":1146},"sys":{"id":"2EVDqft4wyXGnzJU8JfMor","type":"Entry"}},{"fields":{"title":"Get the most out of your Business trial with Notion AI","tags":[{"metadata":{"tags":[{"sys":{"type":"Link","linkType":"Tag","id":"newLanguageLaunch"}}],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"7zVsCQhhZLhkQ0ABao8MuP","type":"Entry","createdAt":"2023-03-07T15:23:30.432Z","updatedAt":"2025-12-08T12:51:31.952Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2589,"revision":575,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"tag"}},"locale":"ar-SA"},"fields":{"name":"Notion AI","slug":"ai","templateGalleryDescription":"قوالب تعرض قوة الذكاء الاصطناعي، مباشرة في Notion. عزِّز قدراتك بطرق جديدة وغير متوقعة.","illustration":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"ZpdpOeU8n1ImCuRha7ulk","type":"Asset","createdAt":"2023-03-07T20:49:29.854Z","updatedAt":"2025-10-06T15:57:43.858Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2219,"revision":483,"locale":"ar-SA"},"fields":{"title":"rocks","description":"","file":{"url":"//images.ctfassets.net/spoqsaf9291f/ZpdpOeU8n1ImCuRha7ulk/20c64b9a0773c8f0fb57b98ba2cfc225/rocks.png","details":{"size":21321,"image":{"width":480,"height":480}},"fileName":"rocks.png","contentType":"image/png"}}}}}],"subtitle":"Start your Business trial and explore what’s possible with Notion AI. Connect your favorite tools, capture meetings automatically, and let your Personal Agent build end-to-end workflows — all in one place.","slug":"get-the-most-out-of-your-business-trial-with-notion-ai","thumbnail":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"spoqsaf9291f"}},"id":"6LdGy3kw0Xw93VQX8eKMtX","type":"Asset","createdAt":"2025-10-28T08:36:10.858Z","updatedAt":"2025-10-28T08:36:10.858Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"ar-SA"},"fields":{"title":"BusinessTrials_Thumbnail_Final","description":"","file":{"url":"//images.ctfassets.net/spoqsaf9291f/6LdGy3kw0Xw93VQX8eKMtX/41813d970a554d7370deda930b3c214f/Business_Trials_Thumbnail_final.png","details":{"size":80517,"image":{"width":1200,"height":630}},"fileName":"Business Trials_Thumbnail_final.png","contentType":"image/png"}}},"format":"A
2026-01-13T09:29:57
https://www.telerik.com/blogs/what-does-european-accessibility-act-mean-developers
What Does European Accessibility Act Mean for Developers? skip navigation All Products Product Bundles DevCraft All Telerik .NET tools and Kendo UI JavaScript components in one package. Now enhanced with: MCP Servers Embedded Reporting Document Processing Libraries SSO Account Sign-in Web Kendo UI UI for Angular UI for Vue UI for jQuery KendoReact UI for Blazor UI for ASP.NET Core UI for ASP.NET MVC UI for ASP.NET AJAX Mobile UI for .NET MAUI Document Management Telerik Document Processing Desktop UI for .NET MAUI UI for WinUI UI for WinForms UI for WPF Reporting Telerik Reporting Telerik Report Server Testing &amp; Mocking Test Studio Telerik JustMock CMS Sitefinity AI Productivity Tools MCP Servers UI/UX Tools ThemeBuilder Design System Kit Templates and Building Blocks Debugging Fiddler Fiddler Everywhere Fiddler Classic Fiddler Everywhere Reporter FiddlerCore Free Tools KendoReact Free VB.NET to C# Converter Testing Framework View all products Demos Services Blogs Docs &amp; Support Pricing Shopping cart Your Account Account Overview Your Licenses Downloads Support Center Forum Profile Payment Methods Edit Profile Log out Login Contact Us Get A Free Trial close mobile menu What Does the European Accessibility Act Mean for Developers? by Hassan Djirdeh Published: March 05, 2025 5 min read People , Accessibility 0 Comments European Accessibility Act (EAA) compliance is mandatory by June 28, 2025, for any digital product used in Europe. Here&rsquo;s what you need to know to make that happen. Accessibility in digital experiences has long been a goal for developers, but the European Accessibility Act (EAA) introduces legal mandates that make it an imperative. With the EAA coming into effect on June 28, 2025 , developers need to verify that their digital products and services comply with its accessibility standards. In this article, we&rsquo;ll break down: What the European Accessibility Act entails How it affects developers and businesses Recommended solutions to streamline accessibility implementation Understanding the European Accessibility Act (EAA) The European Accessibility Act (EAA) is a directive designed to improve accessibility across digital products and services within the European Union. It builds upon existing regulations like the Web Accessibility Directive , expanding requirements beyond public sector websites to private companies that offer digital goods and services to EU consumers. The EAA applies to various industries, including: Software companies &ndash; Compliance is required if you and your team build websites, mobile apps or software used in the EU. Ecommerce and online services &ndash; Businesses selling online must provide accessible shopping experiences. Banking and financial services &ndash; Digital banking apps, ATMs and payment services must be accessible. Transport and travel services &ndash; Ticket booking platforms, airport kiosks and travel apps must accommodate all users. Even if a business is not based in the EU, if an app or service is used by EU residents, compliance with the EAA is required! Technical Standards: WCAG 2.1 Level AA and EN 301 549 The European Accessibility Act (EAA) is based on WCAG 2.1 Level AA and EN 301 549 , both of which define the technical accessibility requirements for digital products and services. WCAG 2.1 Level AA (Web Content Accessibility Guidelines) establishes four core principles to test whether content is accessible to all users: Perceivable &ndash; Content must be presented in a way that all users can understand, including those with visual, auditory or cognitive impairments. This includes implementing alt text, captions and high-contrast themes. Operable &ndash; Users must be able to navigate and interact with the app using keyboards, screen readers or alternative input methods. All UI components should be focusable and usable. Understandable &ndash; Information should be easy to read and process. Forms, error messages, and instructions must be clear, consistent and concise. Robust &ndash; The app should work with assistive technologies and be compatible with evolving accessibility tools. Semantic HTML should be used to help enable compatibility across different platforms. While WCAG 2.1 Level AA provides the foundation for web accessibility, EN 301 549 , a European standard developed by ETSI under the mandate of the European Commission, extends these requirements by defining broader technical specifications, particularly for software applications, hardware and Information and Communication Technology (ICT ) products. Under EN 301 549, additional compliance areas include: Assistive technology support &ndash; Verifying that software is compatible with screen readers, braille displays and alternative input methods. Real-time text and audio descriptions &ndash; Requirements for live captions, text transcripts and alternative communication channels. Hardware and operating system accessibility &ndash; Covering physical device interfaces, operating system-level features and compatibility with accessibility settings. If your application already adheres to WCAG 2.1 Level AA, it partially meets EAA requirements. However, full compliance may require additional modifications, particularly in software interoperability, documentation and hardware integration, as outlined in EN 301 549. For a full understanding of the technical requirements and compliance obligations, be sure to read the European Accessibility Act in detail. What Developers Need to Do to Build Compliant Apps The European Accessibility Act does not necessitate a complete redesign, but developers must make structured enhancements to meet compliance. Here are some areas developers can focus on to make their applications accessible: Conduct an Accessibility Audit Assess whether your product meets WCAG 2.1 Level AA standards using tools like axe DevTools , Lighthouse and WAVE . Perform manual testing of keyboard navigation, form usability and screen reader compatibility. Improve Keyboard Navigation &amp; Assistive Tech Support Verify that all interactive elements&mdash;buttons, forms, modals, dropdowns&mdash;are fully keyboard-accessible and work with screen readers like NVDA , VoiceOver and JAWS . Enhance Color Contrast &amp; Readability Maintain a minimum contrast ratio for text and avoid using color alone to indicate status. Tools like Stark and Contrast Checker can help validate contrast levels. Use an Accessible UI Component Library Instead of developing accessibility features from scratch, developers can accelerate compliance by integrating pre-tested, WCAG-compliant UI components. Progress Telerik and Kendo UI offer a robust set of accessibility-ready components for technologies including React , Angular , Vue and Blazor , reducing development effort in meeting compliance with WCAG 2.1, Section 508 and EN 301 549 standards. For more details on how Telerik and Kendo UI support accessibility compliance, be sure to explore Progress&rsquo; Accessibility and Security Compliance Resources . Curious how the Progress Telerik and Kendo UI component libraries can help? Accessibility compliance comes baked in, giving developers one less thing to figure out. Learn more Wrap-up The European Accessibility Act (EAA) marks a significant step toward creating a more inclusive digital landscape. With compliance becoming mandatory by June 28, 2025 , developers and businesses must prioritize accessibility in their applications. Verifying that your digital products meet WCAG 2.1 Level AA and EN 301 549 standards aligns with legal obligations, enhances user experience, broadens audience reach and reinforces a commitment to inclusivity. By conducting accessibility audits, improving keyboard navigation, enhancing contrast and readability, and leveraging accessible UI component libraries like Telerik and Kendo UI, development teams can efficiently meet EAA requirements while streamlining implementation. Lastly, accessibility is not just about compliance &mdash;it&rsquo;s about providing equal access for all users. Taking proactive steps now can help future-proof your applications while fostering a more usable, inclusive and legally compliant digital environment. For more details on accessibility best practices and security compliance, be sure to explore the following resources: European Accessibility Act (EAA) &ndash; Full Legal Text Human-Centered Software Design: A State of the Marketplace Report | Whitepaper Accessibility and Digital Experience | Fireside Chat with Neil Milliken , or watch it below: Accessibility About the Author Hassan Djirdeh Hassan is a senior frontend engineer and has helped build large production applications at-scale at organizations like Doordash, Instacart and Shopify. Hassan is also a published author and course instructor where he&rsquo;s helped thousands of students learn in-depth frontend engineering skills like React, Vue, TypeScript, and GraphQL. Related Posts Design People Accessibility Understanding Color and Accessibility Web Accessibility People Why Semantic HTML Matters: An Introductory Guide for New Developers Design UX People Accessibility UX Crash Course: Nielsen’s Usability Heuristics Comments Comments are disabled in preview mode. Please enable JavaScript to view the comments powered by Disqus. All articles Topics Web Web Blazor ASP.NET Core ASP.NET MVC ASP.NET AJAX Angular React jQuery Vue Mobile Mobile .NET MAUI/Hybrid Desktop Desktop .NET MAUI/Blazor Hybrid WPF WinForms WinUI Design Design UX Design Systems Productivity Productivity Reporting Testing Debugging Document Processing People People Accessibility Humanity Release AI Latest Stories in Your Inbox Subscribe to be the first to get our expert-written articles and tutorials for developers! All fields are required Email Country/Territory Select country/territory United States Afghanistan Albania Algeria American Samoa Andorra Angola Anguilla Antarctica Antigua and Barbuda Argentina Armenia Aruba Australia Austria Azerbaijan Bahamas Bahrain Bangladesh Barbados Belgium Belize Benin Bermuda Bhutan Bolivia Bosnia and Herzegovina Botswana Bouvet Island Brazil British Indian Ocean Terr. Brunei Darussalam Bulgaria Burkina Faso Burundi Cambodia Cameroon Canada Cape Verde Cayman Islands Central African Republic Chad Chile China Christmas Island Cocos (Keeling) Islands Colombia Comoros Congo (Brazzaville) Congo, the democratic republic of the Cook Islands Costa Rica Cote d&#39;Ivoire Croatia (Hrvatska) Curacao Cyprus Czech Republic Denmark Djibouti Dominica Dominican Republic Ecuador Egypt El Salvador Equatorial Guinea Eritrea Estonia Eswatini Ethiopia Falkland Islands Faroe Islands Fiji Finland France French Guiana French Polynesia French Southern Terr. Gabon Gambia Georgia Germany Ghana Gibraltar Greece Greenland Grenada Guadeloupe Guam Guatemala Guernsey Guinea Guinea-Bissau Guyana Haiti Heard and McDonald Is. Honduras Hong Kong Hungary Iceland India Indonesia Iraq Ireland Israel Italy Jamaica Japan Jersey Jordan Kazakhstan Kenya Kiribati Kuwait Kyrgyzstan Lao People&#39;s Dem. Rep. Latvia Lebanon Lesotho Liberia Libya Liechtenstein Lithuania Luxembourg Macao Madagascar Malawi Malaysia Maldives Mali Malta Man, Isle of Marshall Islands Martinique Mauritania Mauritius Mayotte Mexico Micronesia Moldova Monaco Mongolia Montenegro Montserrat Morocco Mozambique Myanmar Namibia Nauru Nepal Netherlands New Caledonia New Zealand Nicaragua Niger Nigeria Niue Norfolk Island North Macedonia Northern Mariana Is. Norway Oman Pakistan Palau Palestine, State Of Panama Papua New Guinea Paraguay Peru Philippines Pitcairn Poland Portugal Puerto Rico Qatar Republic of Korea (South Korea) Reunion Romania Rwanda S.Georgia and S.Sandwich Is. Saint Kitts and Nevis Saint Lucia Samoa San Marino Sao Tome and Principe Saudi Arabia Senegal Serbia Seychelles Sierra Leone Singapore Slovakia Slovenia Solomon Islands Somalia South Africa South Sudan Spain Sri Lanka St. Helena St. Pierre and Miquelon St. Vincent and Grenadines Sudan Suriname Svalbard and Jan Mayen Is. Sweden Switzerland Taiwan Tajikistan Tanzania Thailand Timor-Leste Togo Tokelau Tonga Trinidad and Tobago Tunisia Turkey Turkmenistan Turks and Caicos Islands Tuvalu U.S. Minor Outlying Is. Uganda Ukraine United Arab Emirates United Kingdom Uruguay Uzbekistan Vanuatu Vatican (Holy See) Venezuela Viet Nam Virgin Islands (British) Virgin Islands (U.S.) Wallis and Futuna Is. Western Sahara Yemen Zambia Zimbabwe State/Province Select Progress collects the Personal Information set out in our Privacy Policy and the Supplemental Privacy notice for residents of California and other US States and uses it for the purposes stated in that policy. You can also ask us not to share your Personal Information to third parties here: Do Not Sell or Share My Info Blog By submitting this form, I understand and acknowledge my data will be processed in accordance with Progress' Privacy Policy . I agree to receive marketing communications from Progress Software or its Partners , containing information about Progress Software’s products, services and/or events. I understand I may opt out from marketing communication at any time. By submitting this form, you understand and agree that your personal data will be processed by Progress Software or its Partners as described in our Privacy Policy . You may opt out from marketing communication at any time here or through the opt out option placed in the e-mail communication sent by us or our Partners. We see that you have already chosen to receive marketing materials from us. If you wish to change this at any time you may do so by clicking here . Thank you for your continued interest in Progress. Based on either your previous activity on our websites or our ongoing relationship, we will keep you updated on our products, solutions, services, company news and events. If you decide that you want to be removed from our mailing lists at any time, you can change your contact preferences by clicking here . Subscribe Complete .NET Toolbox Telerik DevCraft Complete JavaScript Toolbox Kendo UI Get Products Free Trials Pricing Resources DX Hub Demos Documentation Release History Forums Blogs Webinars Videos Professional Services Partners Virtual Classroom Events FAQs Recognition Success Stories Testimonials Get in touch Contact Us USA: +1 888 679 0442 UK: +44 13 4483 8186 India: +91 406 9019447 Bulgaria: +359 2 8099850 Australia: +61 3 7068 8610 165k+ 50k+ 17k+ 4k+ 14k+ Contact Us 165k+ 50k+ 17k+ 4k+ 14k+ Telerik and Kendo UI are part of Progress product portfolio. Progress is the leading provider of application development and digital experience technologies. Company Technology Awards Press Releases Media Coverage Careers Offices Company Technology Awards Press Releases Media Coverage Careers Offices Copyright &copy; 2026 Progress Software Corporation and/or its subsidiaries or affiliates. All Rights Reserved. Progress and certain product names used herein are trademarks or registered trademarks of Progress Software Corporation and/or one of its subsidiaries or affiliates in the U.S. and/or other countries. See Trademarks for appropriate markings. All rights in any other trademarks contained herein are reserved by their respective owners and their inclusion does not imply an endorsement, affiliation, or sponsorship as between Progress and the respective owners. Terms of Use Site Feedback Privacy Center Trust Center Do Not Sell or Share My Personal Information Powered by Progress Sitefinity
2026-01-13T09:29:57
https://www.cisco.com/site/au/en/about/contact-cisco/index.html
Contact Cisco - Cisco Skip to main content Skip to search Skip to footer Cisco.com Australia / New Zealand Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Close Explore Cisco How to buy Partners EN AU Log in Explore Cisco Search MENU CLOSE How to buy Partners Log in EN AU Close Close Close Close Close About Contact Cisco Get worldwide contact information by selecting your preferred region and language Region Country/region and language Sales, support, and partner resources Connect with sales, support, and partner services to get the very most out of your Cisco experience. Cisco sales Please reach out to sales for general inquiries or to chat with a live agent. Sales inquiries Australia: 1 800 134 349 , press 1 New Zealand: 800 291 129 , press 1 Order and billing Australia: 1 800 134 349 , press 2 New Zealand: 800 291 129 , press 2 Cisco support Get 24/7 technical support for products and licensing. speak with a support case manager or chat with a support assistant. Australia: 1 800 134 349 , press 3 New Zealand: 800 291 129 , press 3 Cisco worldwide support contacts Cisco small business TAC contacts Explore support Cisco partners Partnering with Cisco unlocks exclusive benefits—including rewarding programs and specializations, modern training and enablement to grow your practice, and access to new business opportunities. Explore Cisco partners Get partner support Show more Connect with Cisco sales --> EN_AU Updated 12/09/25 --> * required fields --> Between 8:30 a.m. and 5 p.m. AEDT, a sales advisor will call you within 15 minutes. If you submit a request outside these hours, we’ll call you the next business day. If you are based in Australia or New Zealand, you may schedule a call in a one-hour time slot on a business day that accommodates your schedule. We are currently experiencing delays in response times. If you require an immediate sales response – please call us 1800 134349. Otherwise, a sales advisor will call you as soon as possible. * Required Log in with your Cisco ID or Hi! Between 8:30 a.m. and 5 p.m. AEDT, a sales advisor will call you within 15 minutes. If you submit a request outside these hours, we’ll call you the next business day. If you are based in Australia or New Zealand, you may schedule a call in a one-hour time slot on a business day that accommodates your schedule. We are currently experiencing delays in response times. If you require an immediate sales response – please call us 1800 134349. Otherwise, a sales advisor will call you as soon as possible. Want to use a different email? Sign out * Required First name Last name Email address Create a free Cisco ID Account to improve your experience. Country / Region Please select AFGHANISTAN ALAND ISLANDS ALBANIA ALGERIA AMERICAN SAMOA ANDORRA ANGOLA ANGUILLA ANTARCTICA ANTIGUA AND BARBUDA ARGENTINA ARMENIA ARUBA AUSTRALIA AUSTRIA AZERBAIJAN BAHAMAS BAHRAIN BANGLADESH BARBADOS BELGIUM BELIZE BENIN BERMUDA BHUTAN BOLIVIA BONAIRE, SINT EUSTATIUS AND SABA BOSNIA AND HERZEGOVINA BOTSWANA BOUVET ISLAND BRAZIL BRITISH INDIAN OCEAN TERRITORY BRUNEI DARUSSALAM BULGARIA BURKINA FASO BURUNDI CAMBODIA CAMEROON CANADA CAPE VERDE CAYMAN ISLANDS CENTRAL AFRICAN REPUBLIC CHAD CHILE CHINA CHRISTMAS ISLAND COCOS (KEELING) ISLANDS COLOMBIA COMOROS CONGO CONGO, THE DEMOCRATIC REPUBLIC OF THE COOK ISLANDS COSTA RICA CÔTE D'IVOIRE CROATIA CURAÇAO CYPRUS CZECH REPUBLIC DENMARK DJIBOUTI DOMINICA DOMINICAN REPUBLIC ECUADOR EGYPT EL SALVADOR EQUATORIAL GUINEA ERITREA ESTONIA ESWATINI ETHIOPIA FALKLAND ISLANDS (MALVINAS) FAROE ISLANDS FIJI FINLAND FRANCE FRENCH GUIANA FRENCH POLYNESIA FRENCH SOUTHERN TERRITORIES GABON GAMBIA GEORGIA GERMANY GHANA GIBRALTAR GREECE GREENLAND GRENADA GUADELOUPE GUAM GUATEMALA GUERNSEY GUINEA GUINEA-BISSAU GUYANA HAITI HEARD ISLAND AND MCDONALD ISLANDS HOLY SEE (VATICAN CITY STATE) HONDURAS HONG KONG SAR HUNGARY ICELAND INDIA INDONESIA IRAQ IRELAND ISRAEL ISLE OF MAN ITALY JAMAICA JAPAN JERSEY JORDAN KAZAKHSTAN KENYA KIRIBATI KOREA, REPUBLIC OF KOSOVO KUWAIT KYRGYZSTAN LAO PEOPLE'S DEMOCRATIC REPUBLIC LATVIA LEBANON LESOTHO LIBERIA LIBYAN ARAB JAMAHIRIYA LIECHTENSTEIN LITHUANIA LUXEMBOURG MACAO MADAGASCAR MALAWI MALAYSIA MALDIVES MALI MALTA MARSHALL ISLANDS MARTINIQUE MAURITANIA MAURITIUS MAYOTTE MEXICO MICRONESIA, FEDERATED STATES OF MOLDOVA, REPUBLIC OF MONACO MONGOLIA MONTENEGRO MONTSERRAT MOROCCO MOZAMBIQUE MYANMAR NAMIBIA NAURU NEPAL NETHERLANDS NETHERLANDS ANTILLES NEW CALEDONIA NEW ZEALAND NICARAGUA NIGER NIGERIA NIUE NORFOLK ISLAND NORTH MACEDONIA NORTHERN MARIANA ISLANDS NORWAY OMAN PAKISTAN PALAU PALESTINE, STATE OF PANAMA PAPUA NEW GUINEA PARAGUAY PERU PHILIPPINES PITCAIRN POLAND PORTUGAL PUERTO RICO QATAR RÉUNION ROMANIA RWANDA SAINT BARTHÉLEMY SAINT HELENA SAINT KITTS AND NEVIS SAINT LUCIA SAINT MARTIN SAINT PIERRE AND MIQUELON SAINT VINCENT AND THE GRENADINES SAMOA SAN MARINO SAO TOME AND PRINCIPE SAUDI ARABIA SENEGAL SERBIA SEYCHELLES SIERRA LEONE SINGAPORE SINT MAARTEN SLOVAKIA SLOVENIA SOLOMON ISLANDS SOMALIA SOUTH AFRICA SOUTH GEORGIA AND THE SOUTH SANDWICH ISLANDS SPAIN SRI LANKA SURINAME SVALBARD AND JAN MAYEN SWEDEN SWITZERLAND TAAF TAIWAN TAJIKISTAN TANZANIA, UNITED REPUBLIC OF THAILAND TIMOR-LESTE TOGO TOKELAU TONGA TRINIDAD AND TOBAGO TUNISIA TURKEY TURKMENISTAN TURKS AND CAICOS ISLANDS TUVALU UGANDA UKRAINE UNITED ARAB EMIRATES UNITED KINGDOM UNITED STATES UNITED STATES MINOR OUTLYING ISLANDS URUGUAY UZBEKISTAN VANUATU VENEZUELA VIETNAM VIRGIN ISLANDS, BRITISH VIRGIN ISLANDS, U.S. WALLIS AND FUTUNA WESTERN SAHARA YEMEN ZAMBIA ZIMBABWE Province Please select Alberta British Columbia Manitoba New Brunswick Newfoundland and Labrador Nova Scotia Northwest Territories Nunavut Ontario Prince Edward Island Quebec Saskatchewan Yukon Territory Preferred Language English French Business Phone Company Company size Please select 1 - 4 5 - 19 20 - 49 50 - 99 100 - 249 250 - 499 500 - 999 1000 - 4999 5000 - 9999 10000 + Job title (optional) When would you like to receive a call? Within 15 minutes Select Date and Time Date * Time * Time Zone * Topic Please select one I'd like guidance before making a purchase. I'm interested in financing options. I'm conducting product research. Comments (optional) Cisco may email me offers, promotions, and the latest news regarding Cisco products and services. I can unsubscribe at any time. Visit here to learn more. Special notice for residents of Mainland China, South Korea, and Vietnam: Upon submission of the form, you are providing consent for Cisco to process your personal information, including transferring your personal information internationally, as described on our Online Privacy Statement . If you do not wish for Cisco to process and transfer your personal information, please do not submit this form. Address 1 Thank you. Your request has been received and a Cisco sales representative will call you within 15 minutes Or, if the current time is outside business hours (8:30 a.m. and 5 p.m. AEDT), we'll call you on the next business day. Thank you. Your request has been received and a sales advisor will call you as soon as possible. Thank you for your request. A sales specialist will reach out on Learn with Cisco Industry-recognized education and validation for IT professionals seeking to build and advance their skills. Training and certifications Australia: 1 800 134 349 , press 4 New Zealand: 800 291 129 , press 4 Explore learning platforms Explore certification support Corporate headquarters 3098 Olsen Drive San Jose, CA 95128 Legal mailing address Cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134 Looking for Cisco office locations? Locate offices in the United States Locate offices worldwide Chat with sales Hello, how can I help? Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Statement Cookies Trademarks Supply Chain Transparency Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:57
https://www.heroku.com/blog/dotnet-support-on-heroku/
.NET Support on Heroku | Heroku Search overlay panel for performing site-wide searches Search For: Close Boost Performance &amp; Scale with Postgres Advanced. Join Pilot Now! Search Open Search Popup Account menu Dashboard Databases Dataclips Elements Documentation Support Login Sign Up Products Products Discover Heroku’s AI PaaS (Platform as a Service), designed for effortless app deployment and scaling. Explore our cloud application platform features, reliable managed data services, and a robust ecosystem to power your modern applications. Heroku Platform Deploy, manage, and scale apps on Heroku, an AI PaaS based on a managed container system. Heroku AI Build intelligent applications with managed inference and agents, MCP, and more. Heroku Data Services Simplify your data management with Heroku’s fully managed cloud databases and data services. Heroku Enterprise The Heroku experience developers love, with the enterprise features large companies need. Heroku Success Explore Heroku’s support options from Standard to Signature, with resources for developers and partners. Heroku Elements Marketplace Accelerate your app development with our ecosystem of add-ons, integrations, and buildpacks. Salesforce OrgFarm: Boosting Developer Productivity with Heroku and AI Explore how Salesforce scaled developer productivity for 15,000 engineers using Heroku and advanced AI solutions. Developers Developers With Heroku's flexible app platform, you can focus on building apps, not infrastructure. Benefit from a meticulously designed developer experience, a polyglot platform supporting your favorite languages, and innovative AI PaaS features to enhance your development workflow. Dev Center Dive into our comprehensive documentation and guides. Learn about building, deploying, managing, and scaling your apps. Languages Python .NET Java Node.js Go PHP Ruby Scala Clojure Salesforce OrgFarm: Boosting Developer Productivity with Heroku and AI Explore how Salesforce scaled developer productivity for 15,000 engineers using Heroku and advanced AI solutions. Customers Customers Discover how companies in diverse industries like Healthcare, Entertainment, Automotive, Retail, FinTech, and more achieve growth and foster innovation with our powerful cloud application platform. Learn how they leverage Heroku’s AI PaaS for cutting-edge solutions. Customer Stories Heroku in action: See how organizations of all sizes and industries are succeeding with Heroku. Community Stories Explore real-world experiences and perspectives on Heroku from developers and communities online. How Aspen Physician Network Transformed Patient Care with Heroku Learn how Aspen Physician Network regained data sovereignty and ensured HIPAA compliance by building a scalable, secure platform on Heroku. Pricing Resources Resources Learn more about Heroku's AI PaaS and stay up to date on all Heroku announcements. Gain insights from our team through insightful content and discover how to leverage our platform effectively. Blog Stay up-to-date on Heroku news, important product releases, and valuable insights from the Heroku team. What is Heroku? Learn how Heroku’s AI PaaS simplifies app development, deployment, and scaling. Events Find Heroku at an event near you! Explore our calendar of tech conferences and meetups. Partners For Consultants, ISVs, and technical solution providers looking to grow their business with pro-code solutions. Compliance Center Heroku is a platform you can trust. Explore our compliance certifications and security measures. Help Center Find answers to your questions in the Help Center. Browse FAQs, articles, and get support. Latest News from the Heroku Blog Heroku AI: Accelerating AI Development With New Models, Performance Improvements, and Messages API News Last Updated: December 18, 2025 Anush DSouza This month marks significant expansion for Heroku Managed Inference and Agents , directly accelerating our AI PaaS framework. We&#8217;re announcing a substantial addition to our model catalog , providing access to leading proprietary AI models such as Claude Opus 4.5,&hellip; Blog / News / .NET Support on Heroku .NET Support on Heroku Posted By Rune Soerensen Last Updated: December 03, 2024 We’re excited to announce that official support for .NET on Heroku is entering public beta starting today. Developers can now build and deploy applications in C#, F#, and Visual Basic, using frameworks like ASP.NET Core and Blazor, all with the simplicity and flexibility of the Heroku platform. .NET has long been one of the most requested frameworks to join Heroku’s lineup, and for good reason. Known for its power and versatility .NET enables developers to build everything from high-performance APIs to complex, full-stack web applications and scalable microservices. Now, developers can combine .NET’s capabilities with Heroku’s streamlined platform for a first-class developer experience. Why Now? Over the last decade .NET has evolved from a Windows-only framework into a cross-platform and open-source ecosystem. Shaped by lessons learned and inspired by best practices from other technologies, .NET elegantly emphasizes simplicity, maintainability, and performance – qualities that naturally align with Heroku’s mission to help developers focus on building great apps without unnecessary complexity. For years, developers have relied on community-built buildpacks to run .NET apps on Heroku, from the early buildpacks to the popular .NET Core buildpack . These solutions not only showed the demand, but also demonstrated what was possible. With official support for .NET, we’re building on that foundation to deliver a cohesive and reliable experience. Developers can expect consistent updates, rigorous testing and quality assurance to confidently build and scale their applications. Want to Get Started? Our buildpack makes deploying .NET applications a breeze, offering seamless functionality out of the box with the flexibility to customize as needed. Deploying is simple: heroku create --buildpack heroku/dotnet git push heroku main Note: Setting the buildpack with --buildpack heroku/dotnet is only required during the beta. Whether you’re a seasoned .NET developer or new to the framework, it’s easy to get started. Check out our Getting Started tutorial walking through steps to deploy a Blazor app using a fully managed Heroku Postgres database, running migrations, and more. Our .NET support reference has more detailed documentation. There’s no better time to use .NET for your apps — and no better place to deploy them than Heroku. Share your feedback via our public roadmap and help shape the future of .NET on Heroku! We can’t wait to see what you’ll build, and we’re here to help every step of the way. Originally Published: December 3, 2024 .NET Buildpacks Languages Nextgen Post Share Share Related Posts Heroku AI: Accelerating AI Development With New Models, Performance Improvements, and Messages API Heroku AppLink: Now Using JWT-Based Authorization for Salesforce Heroku GitHub Enterprise Integration: Unlocking Full Continuous Delivery for Enterprise Customers PaaS + IaaS: Heroku and AWS for Cloud-Native Enterprise Agility Faster Agents with Automatic Prompt Caching Ready to Get Started? Stay focused on building great data-driven applications and let Heroku tackle the rest. Talk to A Heroku Rep   Sign Up Now More from the Author Rune Soerensen .NET Languages Owner at Heroku Heroku Staff Heroku Support for .NET 10 LTS: What Developers Need to Know .NET on Heroku: Now Generally Available Browse the archives for News or all blogs . Subscribe to the RSS feed for News or all blogs . Products Heroku Platform Heroku AI Heroku Managed Inference and Agents pgvector for Heroku Postgres MCP on Heroku Heroku Data Services Heroku Postgres Heroku Key-Value Store Apache Kafka on Heroku Heroku Enterprise Heroku Private Spaces Heroku Connect Heroku Shield Heroku Success Heroku Teams Elements Marketplace Languages Python .NET Java Node.js Go PHP Ruby Scala Clojure Resources Dev Center Training &#038; Education Get Started Pricing Blog Customers Partners Compliance Center Solutions Podcasts About Us What is Heroku? Heroku &#038; Salesforce Careers Help Center Status Contact Bluesky X-twitter-square Linkedin Github Rss <img
2026-01-13T09:29:57
https://www.cisco.com/site/us/en/partners/tools/index.html
Tools and Training - Cisco Skip to main content Skip to search Skip to footer Cisco.com Worldwide Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Trials and demos How to buy Partners EN US Profile Log in Trials and demos MENU CLOSE How to buy Partners Profile Log in EN US Close Close Close Close Close Partners Cisco 360 Partner Program Tools and training Exclusive access to enablement, training, and tools. Are you a Cisco partner? Become a Cisco partner Already a partner? Log in Show more Hello, how can I help? Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Cookies / Do not sell or share my personal data Accessibility Trademarks Supply Chain Transparency Newsroom Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:57
https://akismet.com/developers/detailed-docs/errors/akismet-error-10402/
Akismet Error #10402 &#8211; Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Getting started Plugins and libraries Detailed docs Building your application Key verification Comment check Submit spam (missed&nbsp;spam) Submit ham (false&nbsp;positives) Key/sites activity Usage limit Response error codes Akismet Error #10001 Akismet Error #10003 Akismet Error #10402 Akismet Error #10011 Akismet Error #10010 Akismet Error #10009 Akismet Error #10006 Akismet Error #10005 Akismet Error #10404 Akismet Error #10403 Akismet Error #30001 Akismet Error #10402 Suspended API Key Akismet Error #10402 Why am I receiving this error? Your API key was suspended for non-payment, and your spam filtering subscription is no longer active. What should I do? Go to  https://akismet.com/account/update-payment-method/  and update your billing information. Alternatively, you can  contact support , and we can give you step-by-step instructions specific to your account. Can we help with anything else? I need to update my credit card. I forgot my API key. I need to reset my password. I need to cancel my subscription. Priority support Want to get help even faster? Don&#8217;t forget that our Pro subscription includes priority email support. Related Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:57
https://akismet.com/developers/detailed-docs/errors/akismet-error-10006/
Akismet Error #10006 &#8211; Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Getting started Plugins and libraries Detailed docs Building your application Key verification Comment check Submit spam (missed&nbsp;spam) Submit ham (false&nbsp;positives) Key/sites activity Usage limit Response error codes Akismet Error #10001 Akismet Error #10003 Akismet Error #10402 Akismet Error #10011 Akismet Error #10010 Akismet Error #10009 Akismet Error #10006 Akismet Error #10005 Akismet Error #10404 Akismet Error #10403 Akismet Error #30001 Akismet Error #10006 Subscription Upgrade Required Akismet Error #10006 Why am I receiving this error? Your service was suspended, as a Personal subscription is not appropriate for your current usage (multiple commercial sites). A warning message has appeared in your sites’ dashboards for several weeks regarding the problem. Which subscription should I choose? Our Pro subscriptions can be used on commercial sites, with 4 different usage levels to choose from depending on your needs. You can add sites to a current Pro subscription by following  these steps . If you need to use Akismet on a large network or multisite installation, one of our Business plans might be better for you. Please check out our plans page &nbsp;for the subscription that fits you best. What if an agency or studio set everything up? You can contact the folks who helped you get up and running, and let them know that their Akismet API key needs to be upgraded. Or &#8211; simply choose to&nbsp; register you own subscription &nbsp;and activate the Akismet plugin using your new API key. Can I just de-activate Akismet? Yes. If you are currently using our WordPress plugin, go to the Plugins menu in your dashboard and click on the “Deactivate” link found directly under “Akismet.” If you happen to be using a different client, please refer to its documentation regarding deactivation. Note that your site(s) will then be left unprotected from spam, which is not recommended. Can we help with anything else? I need to update my credit card. I forgot my API key. I need to reset my password. I need to cancel my subscription. Priority support Want to get help even faster? Don&#8217;t forget that our Pro subscription includes priority email support. Related Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:57
https://play.google.com/store/apps/details?id=notion.id&amp;hl=es_UY
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M12 17.27L18.18
2026-01-13T09:29:57
https://www.cisco.com/site/us/en/about/purpose/fy24-report/index.html#bar_grande
FY24 Purpose Report - Cisco Skip to main content Skip to search Skip to footer Cisco.com Worldwide Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Trials and demos How to buy Partners EN US Profile Log in Trials and demos MENU CLOSE How to buy Partners Profile Log in EN US Close Close Close Close Close Hello, how can I help? About Purpose Power an Inclusive Future for All FY24 Purpose Report Celebrating 40 Years of Impact Driven by our Purpose, we combine our technology, people, and broader networks to address society&#39;s greatest challenges. We share the progress we&#39;ve made in our annual report. FY24 Purpose Report (PDF) Overview Explore the Report Looking Ahead FY24 Purpose Report 40 Years of Impact We built the digital highways that have become the backbone for modern communication. Now, we’re harnessing the power of connection to build a better future for people, communities, and the planet. For 40 years, connection has been core to Cisco’s identity. At Cisco, we’re proud of how our products and services bridge gaps, enable collaboration, and drive sustainability in meaningful ways. We prove every day that running a successful business with a commitment to do good makes progress possible. Letter from the CEO Our Timeline of Impact 1984 Cisco Systems, Inc Developed by Sandy Lerner and Leonard Bosack with a team of colleagues at Stanford University, the multiprotocol router connected disparate computer networks, leading to Cisco’s founding. 1997 Cisco Networking Academy Launched to educate high school and college students on how to design, install, and maintain computer networks. 1997 Cisco Foundation Established to support programs that leverage the Internet to help people in need and drive positive change. 1998 Cisco Community Investment Report Published report detailing Cisco’s philanthropic and community investment efforts. 1999 NetAid Harnessed the Internet to raise US$830K to end global poverty. By live-streaming celebrated musicians across three locations, NetAid garnered 2.4M views across 80 countries and set a record for the largest Internet broadcast event for a single day. 2000 Habitat for Humanity Provided funding and volunteer support to build homes and wire houses for Internet access. 2005 Corporate Citizenship Report Made a formal commitment to transparency and accountability by publishing details on Cisco&#39;s Corporate Social Responsibility efforts. 2005 Crisis Response Deployed communications equipment to assist emergency personnel in the aftermath of Hurricane Katrina and formed a dedicated emergency response team. 2006 Goal to Reduce Emissions Set our first greenhouse gas emissions reduction goal. 2011 Veterans Program Established program to help transitioning U.S. military veterans and families find employment and educational opportunities. 2011 On-Campus Solar Energy Installed first solar energy project at Cisco&#39;s Research Triangle Park campus. 2012 Global Human Rights Policy Formalized our commitment to respect human rights for all people. 2014 Talos Formed to provide accurate, rapid, and actionable threat intelligence for Cisco customers, products, and services. 2015 Country Digital Acceleration Launched program to collaborate with government and private sector leaders in building sustainable, secure, and inclusive communities. 2016 White House Equal Pay Pledge Became a founding signer of the White House Equal Pay Pledge and committed to paying employees fairly and equitably. 2018 Homelessness Grant Announced a five-year, US$50M commitment to end homelessness in Santa Clara County. 2019 Global Citizen Announced a partnership with Global Citizen to power the movement to end extreme poverty. 2020 Community Enablement Commitment Transformed longstanding advocacy for community enablement into a global, company-wide commitment. 2020 COVID-19 Response Introduced $2.5B financing program to support customers and keep businesses running; donated US$50M in cash and personal protective equipment (PPE) to organizations supporting vulnerable citizens; and provided funding to deploy COVID-19-related technology solutions. 2021 Cisco Foundation Climate Commitment Committed US$100M over the next 10 years to address climate change. 2021 Net Zero Announced a goal to reach net-zero greenhouse gas emissions across our value chain by 2040. 2022 Responsible AI Launched our Responsible AI (RAI) Principles and RAI Framework to formalize our commitment to build safe and trustworthy AI. 2023 One Billion Lives Exceeded our goal—ahead of schedule—to positively impact one billion people globally from FY16-FY23 through Cisco Networking Academy and social innovation grants. 2024 40 Communities Announcing our next big ambition: over the next 10 years, we plan to engage, support, and invest in 40 communities around the globe. Previous Next Explore this year’s report View all Power Power We build and deliver technology that powers the world’s connectivity, whether that’s between computers, throughout communities, or across continents. And we do so with the highest standards of ethics and integrity in mind—for ourselves, for our customers and partners, and for their users. That’s the power, and importance, of connection. Explore the Power section  0 1600 Active, completed, or in-pipeline projects across 50 countries through Country Digital Acceleration 0 B 800 billion Security events observed each day by Cisco Talos, protecting the world against cyber threats 0 27 Languages available for stakeholders to use Cisco’s EthicsLine 0 % 99.9% Of employees completed our annual Code of Business Conduct certification Featured Stories Connectivity in the Amazon The first floating Networking Academy provides free WiFi within a 30-meter radius, offers IT training, and promotes digital inclusion for communities. Responsible Mineral Sourcing We joined the Initiative for Responsible Mining Assurance to support the visibility, accountability, and inclusion of rightsholders as decision-makers at all levels of the mineral supply chain. Show more Inclusive Inclusive We’re recognized as one of the world’s best workplaces, and we have an unrelenting focus on employee wellbeing, benefits, giving, and inclusion. We strive to create the best possible employee experience, because we know our greatest asset is our people. Explore the Inclusive section  0 % 86% Employees participated in community impact efforts through donations, volunteering, and more 0 720,000 Volunteer hours logged by employees Launched BridgeIT, a Cisco Enterprise Chat AI, to intelligently guide employees and help them work faster, safer, and smarter 0 31 Inclusive Communities with 335 chapters across 77 countries Featured Stories Native American Network Cisco’s Native American Network deployed 18 sovereign broadband access points on Zuni tribal lands in New Mexico to help close the digital divide. Wellbeing in Technology The &#34;WellNest&#34; on Webex pilot supports physical, mental, social, and financial wellbeing through an intuitive AI-powered platform. Show more Future Future Cisco has been committed to reducing its environmental impact for nearly two decades, but there’s more to be done as we work toward a regenerative future. Our sustainability strategy, the Plan for Possible, guides us as we build our products, accelerate clean energy access, support suppliers’ reduced environmental impacts, and foster climate resiliency in communities. Explore the Future section  0 % 96% Of electricity for Cisco facilities came from renewable sources 0 % 73% Reduction in Scope 1 and 2 emissions FY25 goal: 90% reduction 0 % 75% Of the waste generated at our facilities was diverted from landfill globally 0 % 96% Of new Cisco products and packaging incorporate Circular Design Principles FY25 goal: 100% meeting circular design criteria Featured Stories Connected Conservation Cisco donated Cisco Meraki routers to African Parks to help them harness reliable Internet technology. Cisco Refresh We provide a second life to our products and reduce waste through the Cisco Refresh program, and we provide discounts to businesses joining the circular economy. Show more For All For All Through our technology, our people, and our broader networks, we create solutions that help address the world’s most critical challenges—from the AI skills gap to social inequities to environmental crises. We continue to show up to create a better future for all, by all, with all stakeholders who share our vision. Explore the For All section 0 M 24 million Cisco Networking Academy students since 1997 0 &#43; 30 plus Natural disasters and humanitarian crises responded to by Cisco Crisis Response $ 0 M USD 35 million US dollars Approved to fund climate solutions through the Cisco Foundation since FY21 $ 0 B USD 1.5 billion US dollars In Title IV Federal Funding that we helped preserve for HBCUs since FY20 Featured Stories Women Rock-IT Women Rock-IT celebrated 10 years, and their annual International Girls in ICT day programming reached 1.2 million on social media. Impact in India Cisco partners with NGOs and government agencies in India to create technology-based solutions that support critical human needs. View all Looking Ahead To celebrate our 40th year, we’re looking ahead to our future with Splunk and how we can drive even greater success for our customers, partners, employees, and communities together. There’s no better way to celebrate our anniversary than setting our next big ambition to propel us into the future. Learn more from Chief People, Policy &amp; Purpose Officer Fran Katsoudas on what’s next for Cisco’s Purpose work. Explore “Looking Ahead” 40 Years of Impact Power an Inclusive Future for All Driven by our Purpose, we combine our technology, people, and broader networks to address society&#39;s greatest challenges. We share the progress we&#39;ve made in our annual report. FY24 Purpose Report (PDF) Purpose Reporting Hub Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Cookies / Do not sell or share my personal data Accessibility Trademarks Supply Chain Transparency Newsroom Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:57
https://addons.mozilla.org/en-CA/firefox/user/18674047/
User Profile for Hugvan – Add-ons for Firefox (en-CA) To use these add-ons, you&#x27;ll need to download Firefox . Dismiss this notice Firefox Browser Add-ons Extensions Themes More… for Firefox Dictionaries &amp; Language Packs Other Browser Sites Add-ons for Android Log in Search Search Hugvan Report this user Extensions by Hugvan There are no ratings yet There are no ratings yet There are no ratings yet There are no ratings yet There are no ratings yet There are no ratings yet There are no ratings yet There are no ratings yet There are no ratings yet There are no ratings yet Themes by Hugvan There are no ratings yet There are no ratings yet There are no ratings yet There are no ratings yet There are no ratings yet There are no ratings yet There are no ratings yet There are no ratings yet There are no ratings yet There are no ratings yet There are no ratings yet There are no ratings yet Go to Mozilla’s homepage Add-ons About Firefox Add-ons Blog Extension Workshop Developer Hub Developer Policies Community Blog Forum Report a bug Review Guide Browsers Desktop Mobile Enterprise Products Browsers VPN Relay Monitor Pocket Bluesky (@firefox.com) Instagram (Firefox) YouTube (firefoxchannel) Privacy Cookies Legal Except where otherwise noted , content on this site is licensed under the Creative Commons Attribution Share-Alike License v3.0 or any later version. Change language Čeština Deutsch Dolnoserbšćina Ελληνικά English (Canadian) English (British) English (US) Español (de Argentina) Español (de Chile) Español (de España) Español (de México) suomi Français Furlan Frysk עברית Hrvatski Hornjoserbsce magyar Interlingua Italiano 日本語 ქართული Taqbaylit 한국어 Norsk bokmål Nederlands Norsk nynorsk Polski Português (do Brasil) Português (Europeu) Română Русский slovenčina Slovenščina Shqip Svenska Türkçe Українська Tiếng Việt 中文 (简体) 正體中文 (繁體)
2026-01-13T09:29:57
https://infisical.com/docs/integrations/platforms/certificate-agent#authentication
Infisical Agent - Infisical Skip to main content Infisical home page Search... ⌘ K Ask AI Log In Start for Free Start for Free Search... Navigation Infrastructure Integrations Infisical Agent Platform Products CLI Reference API Reference SDKs Changelog Certificate Management Overview Concepts Guides Product Reference Certificate Authorities Certificates Enrollment Methods Alerting Infrastructure Integrations Infisical Agent Kubernetes cert-manager Gloo Mesh Windows Server Nginx Apache Server Tomcat JBoss/WildFly Certificate Syncs Overview AWS Certificate Manager AWS Secrets Manager Azure Key Vault Chef External CA Integrations ACME-compatible CA Let&#x27;s Encrypt DigiCert Microsoft AD CS On this page Concept Workflow Operating the Agent Authentication Agent Configuration Agent Execution Agent Certificate Configuration Parameters Post-Event Hooks Retrying mechanism Example Agent Configuration Files One-Time Certificate Issuance One-Time Certificate Issuance using a Pre-Generated CSR Certificate Issuance with Automatic Renewal Infrastructure Integrations Infisical Agent Learn how to use Infisical CLI Agent to manage certificates automatically. ​ Concept The Infisical Agent is a client daemon that is packaged into the Infisical CLI . It can be used to request a certificate from Infisical using the API enrollment method configured on a certificate profile , persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration. The Infisical Agent is notable: Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events. Leveraging workload identity: The agent can authenticate with Infisical as a machine identity using an infrastructure-native authentication method such as AWS Auth , Azure Auth , GCP Auth , Kubernetes Auth , etc. The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires. This follows a client-driven approach to certificate renewal. ​ Workflow A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps: Create a certificate profile in Infisical with the API enrollment method configured on it. Install the Infisical CLI on the target machine. Create an agent configuration file containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc. Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine. ​ Operating the Agent This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical, and how to configure it to start requesting certificates from Infisical. ​ Authentication The Infisical Agent can authenticate with Infisical as a machine identity using one of its supported authentication methods. Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical; the agent automatically handles token renewal as documented here . Universal Auth The Universal Auth method uses a client ID and secret for authentication. 1 Create a universal auth machine identity To create a universal auth machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the auth method and credentials: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;./client-id&quot; # Path to file containing client ID client-secret : &quot;./client-secret&quot; # Path to file containing client secret remove-client-secret-on-read : false # Optional: remove secret file after reading You can also provide credentials directly: Copy Ask AI auth : type : &quot;universal-auth&quot; config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; Kubernetes Auth The Kubernetes Auth method is used when running the agent in a Kubernetes environment. 1 Create a Kubernetes machine identity To create a Kubernetes machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Kubernetes service account authentication: Copy Ask AI auth : type : &quot;kubernetes-auth&quot; config : identity-id : &quot;your-kubernetes-identity-id&quot; service-account-token-path : &quot;/var/run/secrets/kubernetes.io/serviceaccount/token&quot; Azure Auth The Azure Auth method is used when running the agent in an Azure environment. 1 Create an Azure machine identity To create an Azure machine identity, follow the step by step guide outlined here . 2 Configure the agent Configure the agent to use Azure managed identity authentication: Copy Ask AI auth : type : &quot;azure-auth&quot; config : identity-id : &quot;your-azure-identity-id&quot; Native GCP ID Token The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;gcp-id-token&quot; config : identity-id : &quot;your-gcp-identity-id&quot; GCP IAM The GCP IAM method is used to authenticate with Infisical with a GCP service account key. 1 Create a GCP machine identity To create a GCP machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method, identity ID, and service account key: Copy Ask AI auth : type : &quot;gcp-iam&quot; config : identity-id : &quot;your-gcp-identity-id&quot; service-account-key : &quot;/path/to/service-account-key.json&quot; Native AWS IAM The AWS IAM method is used to authenticate with Infisical with an AWS IAM role while running in an AWS environment. 1 Create an AWS machine identity To create an AWS machine identity, follow the step by step guide outlined here . 2 Configure the agent Update the agent configuration file with the specified auth method and identity ID: Copy Ask AI auth : type : &quot;aws-iam&quot; config : identity-id : &quot;your-aws-identity-id&quot; ​ Agent Configuration The Infisical Agent relies on a YAML configuration file to define its behavior, including how it should authenticate with Infisical, the certificate it should request, and how that certificate should be managed including auto-renewal. The code snippet below shows an example configuration file that instructs the agent to request and continuously renew a certificate from Infisical. Note that not all configuration options in this file are required but this example includes all of the available options. example-cert-agent-config.yaml Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : [ &quot;api.example.com&quot; , &quot;api-v2.example.com&quot; ] ttl : &quot;90d&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; # Enable automatic certificate renewal lifecycle : renew-before-expiry : &quot;30d&quot; status-check-interval : &quot;6h&quot; # Configure where to store the issued certificate and its associated private key and certificate chain file-output : private-key : path : &quot;/etc/ssl/private/web.key&quot; permission : &quot;0600&quot; # Read/write for owner only certificate : path : &quot;/etc/ssl/certs/web.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner chain : path : &quot;/etc/ssl/certs/web-chain.crt&quot; permission : &quot;0644&quot; # Read for all, write for owner omit-root : true # Exclude the root CA certificate in chain # Configure custom commands to execute after certificate issuance, renewal, or failure events post-hooks : on-issuance : command : | echo &quot;Certificate issued for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; systemctl reload nginx timeout : 30 on-failure : command : | echo &quot;Certificate operation failed: ${ERROR_MESSAGE}&quot; mail -s &quot;Certificate Alert&quot; [email&#160;protected] &lt; /dev/null timeout : 30 To be more specific, the configuration file instructs the agent to: Authenticate with Infisical using the Universal Auth authentication method. Request a 90-day certificate against the certificate profile named prof-web-server-12345 with the common name web.company.com and the subject alternative names web.company.com and www.company.com . Automatically renew the certificate 30 days before expiration by checking the certificate status every 6 hours and retrying up to 3 times with a base delay of 200ms and a maximum delay of 5s if the certificate status check fails. Store the certificate and its associated private key and certificate chain (excluding the root CA certificate) in the filesystem at the specified paths with the specified permissions. Execute custom commands after certificate issuance, renewal, or failure events such as reloading an nginx service or sending an email notification. ​ Agent Execution After creating the configuration file, you can run the command below with the --config flag pointing to the path where the agent configuration file is located. Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml This will start the agent as a daemon process, continuously monitoring and managing certificates according to your configuration. You can also run it in the foreground for debugging: Copy Ask AI infisical cert-manager agent --config /path/to/your/agent-config.yaml --verbose For production deployments, you may consider running the agent as a system service to ensure it starts automatically and runs continuously. ​ Agent Certificate Configuration Parameters The table below provides a complete list of parameters that can be configured in the certificate configuration section of the agent configuration file: Parameter Required Description profile-name Yes The name of the certificate profile to request a certificate against (e.g., web-server-12345 ) project-slug Yes The slug of the project to request a certificate against (e.g., my-project-slug ) common-name Optional The common name for the certificate (e.g. www.example.com ) alt-names Optional The list of subject alternative names for the certificate (e.g., [&quot;www.example.com&quot;, &quot;api.example.com&quot;] ) ttl Optional (uses profile default if not specified) The time-to-live duration for the certificate, specified as a duration string (e.g. 72h , 90d , 1y , etc.) key-algorithm Optional The algorithm for the certificate key pair. One of: RSA_2048 , RSA_3072 , RSA_4096 , EC_prime256v1 , EC_secp384r1 , EC_secp521r1 . signature-algorithm Optional The algorithm used to sign the certificate. One of: RSA-SHA256 , RSA-SHA384 , RSA-SHA512 , ECDSA-SHA256 , ECDSA-SHA384 , ECDSA-SHA512 . key-usages Optional The list of key usage values for the certificate. One or more of: digital_signature , key_encipherment , non_repudiation , data_encipherment , key_agreement , key_cert_sign , crl_sign , encipher_only , decipher_only . extended-key-usages Optional The list of extended key usage values for the certificate. One or more of: server_auth , client_auth , code_signing , email_protection , timestamping , ocsp_signing . csr-path Conditional The path to a certificate signing request (CSR) file (e.g., ./csr/webserver.csr , /etc/ssl/csr.pem ). This is required if using a pre-generated CSR. file-output.private-key.path Optional (required if the csr-path is not specified) The path to store the private key (required if not using a CSR) file-output.private-key.permission Optional (defaults to 0600 ) The octal file permissions for the private key file (e.g. 0600 ) file-output.certificate.path Yes The path to store the issued certificate in the filesystem file-output.certificate.permission Optional (defaults to 0600 ) The octal file permissions for the certificate file (e.g. 0644 ) file-output.chain.path Optional The path to store the certificate chain in the filesystem. file-output.chain.permission Optional (defaults to 0600 ) The octal permissions for the chain file (e.g. 0644 ) file-output.chain.omit-root Optional (defaults to true ) Whether to exclude the root CA certificate from the returned certificate chain lifecycle.renew-before-expiry Optional (auto-renewal is disabled if not set) Duration before certificate expiration when renewal checks should begin, specified as a duration string (e.g. 72h , 90d , 1y , etc.) lifecycle.status-check-interval Optional (defaults to 10s ) How frequently the agent checks certificate status and renewal needs, specified as a duration string (e.g. 10s , 30m , 1d , etc.) post-hooks.on-issuance.command Optional The shell command to execute after a certificate is successfully issued for the first time (e.g., systemctl reload nginx , /usr/local/bin/reload-service.sh ) post-hooks.on-issuance.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-issuance post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-renewal.command Optional The shell command to execute after a certificate is successfully renewed (e.g., systemctl reload nginx , docker restart web-server ) post-hooks.on-renewal.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-renewal post-hook command before it is terminated (e.g., 30 , 60 , 120 ) post-hooks.on-failure.command Optional The shell command to execute when certificate issuance or renewal fails (e.g., logger &#x27;Certificate renewal failed&#x27; , /usr/local/bin/alert.sh ) post-hooks.on-failure.timeout Optional (defaults to 30 ) Maximum execution time in seconds for the on-failure post-hook command before it is terminated (e.g., 10 , 30 , 60 ) ​ Post-Event Hooks The Infisical Agent supports running custom commands in response to certificate lifecycle events such as issuance, renewal, and failure through the post-hooks configuration in the agent configuration file. Issuance Hook Renewal Hook Failure Hook Runs when a new certificate is successfully issued: Copy Ask AI post-hooks : on-issuance : command : | echo &quot;New certificate issued for ${CERT_COMMON_NAME}&quot; chown nginx:nginx ${CERT_FILE_PATH} chmod 644 ${CERT_FILE_PATH} systemctl reload nginx timeout : 30 Runs when a certificate is successfully renewed: Copy Ask AI post-hooks : on-renewal : command : | echo &quot;Certificate renewed for ${CERT_COMMON_NAME}&quot; # Reload services that use the certificate systemctl reload nginx systemctl reload haproxy # Send notification curl -X POST https://hooks.slack.com/... \ -d &quot;{&#x27;text&#x27;: &#x27;Certificate for ${CERT_COMMON_NAME} renewed successfully&#x27;}&quot; timeout : 60 Runs when certificate operations fail: Copy Ask AI post-hooks : on-failure : command : | echo &quot;Certificate operation failed for ${CERT_COMMON_NAME}: ${ERROR_MESSAGE}&quot; # Send alert mail -s &quot;Certificate Failure Alert&quot; [email&#160;protected] &lt; /dev/null # Log to syslog logger -p daemon.error &quot;Certificate agent failure: ${ERROR_MESSAGE}&quot; timeout : 30 ​ Retrying mechanism The Infisical Agent will automatically attempt to retry any failed API requests including authentication, certificate issuance, and renewal operations. By default, the agent will retry up to 3 times with a base delay of 200ms and a maximum delay of 5s. You can configure the retrying mechanism through the agent configuration file: Copy Ask AI infisical : address : &quot;https://app.infisical.com&quot; retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # ... rest of the agent configuration file ​ Example Agent Configuration Files Since there are several ways you might want to use the Infisical Agent to request certificates from Infisical, we provide a few example configuration files for common use cases below to help you get started. ​ One-Time Certificate Issuance The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once without performing any subsequent auto-renewal. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ One-Time Certificate Issuance using a Pre-Generated CSR The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical once using a pre-generated CSR. Note that when csr-path is specified: The private-key is omitted from the configuration file because we assume that it is pre-generated and managed externally, with only the CSR being submitted to Infisical for signing. The agent will not be able to perform any auto-renewal operations, as it is assumed to not have access to the private key required to generate a new CSR. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; csr-path : &quot;/etc/ssl/requests/api.csr&quot; file-output : certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; omit-root : true ​ Certificate Issuance with Automatic Renewal The code snippet below shows a configuration file that instructs the agent to request a certificate from Infisical and continuously renew it 14 days before expiration, checking the certificate status every 6 hours. Copy Ask AI version : v1 # Infisical server configuration infisical : address : &quot;https://app.infisical.com&quot; # The URL of the Infisical instance (e.g. https://app.infisical.com, https://eu.infisical.com, https://your-self-hosted-instance.com) retry-strategy : max-retries : 3 max-delay : &quot;5s&quot; base-delay : &quot;200ms&quot; # Infisical authentication configuration auth : type : &quot;universal-auth&quot; # The authentication method to use (e.g. universal-auth, kubernetes-auth, azure-auth, gcp-id-token, gcp-iam, aws-iam) config : client-id : &quot;your-client-id&quot; client-secret : &quot;your-client-secret&quot; # Certificate configuration certificates : - profile-name : &quot;prof-web-server-12345&quot; project-slug : &quot;my-project-slug&quot; attributes : common-name : &quot;api.example.com&quot; alt-names : - &quot;api.example.com&quot; - &quot;api-v2.example.com&quot; key-algorithm : &quot;RSA_2048&quot; signature-algorithm : &quot;RSA-SHA256&quot; key-usages : - &quot;digital_signature&quot; - &quot;key_encipherment&quot; extended-key-usages : - &quot;server_auth&quot; ttl : &quot;30d&quot; lifecycle : renew-before-expiry : &quot;14d&quot; # Renew 14 days before expiration status-check-interval : &quot;6h&quot; # Check certificate status every 6 hours file-output : private-key : path : &quot;/etc/ssl/private/api.example.com.key&quot; permission : &quot;0600&quot; certificate : path : &quot;/etc/ssl/certs/api.example.com.crt&quot; permission : &quot;0644&quot; chain : path : &quot;/etc/ssl/certs/api.example.com.chain.crt&quot; permission : &quot;0644&quot; post-hooks : on-issuance : command : &quot;systemctl reload nginx&quot; timeout : 30 on-renewal : command : &quot;systemctl reload nginx &amp;&amp; logger &#x27;Certificate renewed&#x27;&quot; timeout : 30 Was this page helpful? Yes No Suggest edits Raise issue Alerting Kubernetes cert-manager ⌘ I Infisical home page x linkedin github slack PRODUCT Secret Management Secret Scanning Share Secrets Pricing Security Blog Infisical vs Vault Forum USE CASES Infisical Agent Kubernetes Dynamic Secrets Terraform Ansible Jenkins Docker AWS ECS GitLab GitHub SDK DEVELOPERS Changelog Status Feedback &amp; Requests Trust of Center Open Source Friends How to contribute OTHERS Customers Company Handbook Careers Terms of Service Privacy Policy Subprocessors SLA Team Email Sales Support Powered by self.__next_f.push([1,"\"use strict\";\nconst {Fragment: _Fragment, jsx: _jsx, jsxs: _jsxs} = arguments[0];\nconst {useMDXComponents: _provideComponents} = arguments[0];\nfunction _createMdxContent(props) {\n const _components = {\n a: \"a\",\n code: \"code\",\n li: \"li\",\n ol: \"ol\",\n p: \"p\",\n pre: \"pre\",\n span: \"span\",\n strong: \"strong\",\n tbody: \"tbody\",\n td: \"td\",\n th: \"th\",\n thead: \"thead\",\n tr: \"tr\",\n ul: \"ul\",\n ..._provideComponents(),\n ...props.components\n }, {Accordion, AccordionGroup, CodeBlock, Heading, Step, Steps, Tab, Table, Tabs} = _components;\n if (!Accordion) _missingMdxReference(\"Accordion\", true);\n if (!AccordionGroup) _missingMdxReference(\"AccordionGroup\", true);\n if (!CodeBlock) _missingMdxReference(\"CodeBlock\", true);\n if (!Heading) _missingMdxReference(\"Heading\", true);\n if (!Step) _missingMdxReference(\"Step\", true);\n if (!Steps) _missingMdxReference(\"Steps\", true);\n if (!Tab) _missingMdxReference(\"Tab\", true);\n if (!Table) _missingMdxReference(\"Table\", true);\n if (!Tabs) _missingMdxReference(\"Tabs\", true);\n return _jsxs(_Fragment, {\n children: [_jsx(Heading, {\n level: \"2\",\n id: \"concept\",\n children: \"Concept\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent is a client daemon that is packaged into the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \".\\nIt can be used to request a certificate from Infisical using the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \", persist it to a specified path on the filesystem, and automatically monitor and renew it before expiration.\"]\n }), \"\\n\", _jsx(_components.p, {\n children: \"The Infisical Agent is notable:\"\n }), \"\\n\", _jsxs(_components.ul, {\n children: [\"\\n\", _jsx(_components.li, {\n children: \"Automating certificate management: The agent can request, persist, monitor, and renew certificates from Infisical automatically without manual intervention. It also supports post-event hooks to execute custom commands after certificate issuance, renewal, or failure events.\"\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Leveraging workload identity: The agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using an infrastructure-native authentication method such as \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/aws-auth\",\n children: \"AWS Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/azure-auth\",\n children: \"Azure Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/gcp-auth\",\n children: \"GCP Auth\"\n }), \", \", _jsx(_components.a, {\n href: \"/docs/documentation/platform/identities/kubernetes-auth\",\n children: \"Kubernetes Auth\"\n }), \", etc.\"]\n }), \"\\n\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The typical workflow for using the agent involves installing the Infisical CLI on the target machine, creating a configuration file defining the certificate to request and how it should be managed, and then starting the agent with that configuration so it can request, persist, monitor, and renew the certificate before it expires.\\nThis follows a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/certificates#client-driven-certificate-renewal\",\n children: \"client-driven approach\"\n }), \" to certificate renewal.\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"workflow\",\n children: \"Workflow\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"A typical workflow for using the Infisical Agent to request certificates from Infisical consists of the following steps:\"\n }), \"\\n\", _jsxs(_components.ol, {\n children: [\"\\n\", _jsxs(_components.li, {\n children: [\"Create a \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/certificates/profiles\",\n children: \"certificate profile\"\n }), \" in Infisical with the \", _jsx(_components.a, {\n href: \"/documentation/platform/pki/enrollment-methods/api\",\n children: \"API enrollment method\"\n }), \" configured on it.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Install the \", _jsx(_components.a, {\n href: \"/cli/overview\",\n children: \"Infisical CLI\"\n }), \" on the target machine.\"]\n }), \"\\n\", _jsxs(_components.li, {\n children: [\"Create an agent \", _jsx(_components.a, {\n href: \"/integrations/platforms/certificate-agent#agent-configuration\",\n children: \"configuration file\"\n }), \" containing details about the certificate to request and how it should be managed such as renewal thresholds, post-event hooks, etc.\"]\n }), \"\\n\", _jsx(_components.li, {\n children: \"Start the agent with that configuration so it can request, persist, monitor, and going forward automatically renew the certificate before it expires on the target machine.\"\n }), \"\\n\"]\n }), \"\\n\", _jsx(Heading, {\n level: \"2\",\n id: \"operating-the-agent\",\n children: \"Operating the Agent\"\n }), \"\\n\", _jsx(_components.p, {\n children: \"This section describes how to use the Infisical Agent to request certificates from Infisical. It covers how the agent authenticates with Infisical,\\nand how to configure it to start requesting certificates from Infisical.\"\n }), \"\\n\", _jsx(Heading, {\n level: \"3\",\n id: \"authentication\",\n children: \"Authentication\"\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"The Infisical Agent can authenticate with Infisical as a \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/machine-identities\",\n children: \"machine identity\"\n }), \" using one of its supported authentication methods.\"]\n }), \"\\n\", _jsxs(_components.p, {\n children: [\"Upon successful authentication, the agent receives a short-lived access token that it uses to make subsequent authenticated requests to obtain and renew certificates from Infisical;\\nthe agent automatically handles token renewal as documented \", _jsx(_components.a, {\n href: \"/integrations/platforms/infisical-agent#token-renewal\",\n children: \"here\"\n }), \".\"]\n }), \"\\n\", _jsxs(AccordionGroup, {\n children: [_jsxs(Accordion, {\n title: \"Universal Auth\",\n children: [_jsx(_components.p, {\n children: \"The Universal Auth method uses a client ID and secret for authentication.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a universal auth machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a universal auth machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/universal-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the auth method and credentials:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"6\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"6\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-id\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client ID\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"./client-secret\\\"\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Path to file containing client secret\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" remove-client-secret-on-read\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"false\"\n }), _jsx(_components.span, {\n style: {\n color: \"#6A9955\",\n \"--shiki-dark\": \"#6A9955\"\n },\n children: \" # Optional: remove secret file after reading\"\n })]\n }), \"\\n\"]\n })\n })\n }), _jsx(_components.p, {\n children: \"You can also provide credentials directly:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"universal-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" client-secret\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-client-secret\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Kubernetes Auth\",\n children: [_jsx(_components.p, {\n children: \"The Kubernetes Auth method is used when running the agent in a Kubernetes environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a Kubernetes machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a Kubernetes machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/kubernetes-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Kubernetes service account authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"kubernetes-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-kubernetes-identity-id\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" service-account-token-path\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"/var/run/secrets/kubernetes.io/serviceaccount/token\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Azure Auth\",\n children: [_jsx(_components.p, {\n children: \"The Azure Auth method is used when running the agent in an Azure environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create an Azure machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create an Azure machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/azure-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Configure the agent to use Azure managed identity authentication:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"azure-auth\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-azure-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"Native GCP ID Token\",\n children: [_jsx(_components.p, {\n children: \"The Native GCP ID Token method is used to authenticate with Infisical when running in a GCP environment.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method and identity ID:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"4\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"4\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-id-token\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"your-gcp-identity-id\\\"\"\n })]\n }), \"\\n\"]\n })\n })\n })]\n })]\n })]\n }), _jsxs(Accordion, {\n title: \"GCP IAM\",\n children: [_jsx(_components.p, {\n children: \"The GCP IAM method is used to authenticate with Infisical with a GCP service account key.\"\n }), _jsxs(Steps, {\n children: [_jsx(Step, {\n title: \"Create a GCP machine identity\",\n children: _jsxs(_components.p, {\n children: [\"To create a GCP machine identity, follow the step by step guide outlined \", _jsx(_components.a, {\n href: \"/documentation/platform/identities/gcp-auth\",\n children: \"here\"\n }), \".\"]\n })\n }), _jsxs(Step, {\n title: \"Configure the agent\",\n children: [_jsx(_components.p, {\n children: \"Update the agent configuration file with the specified auth method, identity ID, and service account key:\"\n }), _jsx(CodeBlock, {\n filename: \"\",\n numberOfLines: \"5\",\n language: \"yaml\",\n children: _jsx(_components.pre, {\n className: \"shiki shiki-themes dark-plus dark-plus\",\n style: {\n backgroundColor: \"#0B0C0E\",\n \"--shiki-dark-bg\": \"#0B0C0E\",\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n language: \"yaml\",\n children: _jsxs(_components.code, {\n language: \"yaml\",\n numberOfLines: \"5\",\n children: [_jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \"auth\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" type\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n style: {\n color: \"#CE9178\",\n \"--shiki-dark\": \"#CE9178\"\n },\n children: \"\\\"gcp-iam\\\"\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" config\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \":\"\n })]\n }), \"\\n\", _jsxs(_components.span, {\n className: \"line\",\n children: [_jsx(_components.span, {\n style: {\n color: \"#569CD6\",\n \"--shiki-dark\": \"#569CD6\"\n },\n children: \" identity-id\"\n }), _jsx(_components.span, {\n style: {\n color: \"#D4D4D4\",\n \"--shiki-dark\": \"#D4D4D4\"\n },\n children: \": \"\n }), _jsx(_components.span, {\n
2026-01-13T09:29:57
https://www.cisco.com/site/es/es/about/sitemap.html
Mapa del sitio - Cisco Skip to main content Skip to search Skip to footer Cisco.com España Productos y servicios Close Soluciones Close Soporte Close Formación Close ¿Por qué Cisco? Close Partners Close Descubra Cisco Cómo comprar Partners ES ES Inicio de sesión Descubra Cisco Buscar MENÚ CERRAR Cómo comprar Partners Inicio de sesión ES ES Close Close Close Close Close Hola, ¿cómo puedo ayudarlo? Mapa del sitio Enlaces populares Certificaciones profesionales Oportunidades profesionales Casos de estudio e historias de clientes Cisco Commerce Comunidad Contacto Networking Academy Inicio de sesión del partner Página de inicio de productos Trust Center Mostrar más Acerca de Cisco Empresa Descripción general Sala de prensa Liderazgo Finalidad y sostenibilidad Oportunidades profesionales Trust Center Contacto Relaciones con los inversores Página de inicio de relaciones con los inversores Informes anuales Resultados financieros Información bursátil Relaciones con analistas Interactúe con nosotros Comunidad de Cisco Cisco Insider Cisco Research Cisco Store Cisco Talos Mapa de caídas de Internet (ThousandEyes) Outshift by Cisco Mostrar más Productos Productos destacados Cisco AI Defense Plataforma Cisco Intersight Cisco Networking Cloud Cisco Secure Client (incluido AnyConnect) Cisco Secure Firewall Suite de Cisco Webex Data Center y gestión de redes de la nube Switches Routers y dispositivos SD-WAN Tecnología inalámbrica Todos los productos Página de inicio de productos Productos por orden alfabético Colaboración Informática Redes Seguridad Splunk AppDynamics Software Descargas de aplicaciones móviles Recursos Casos de estudio e historias de clientes Cisco Power Calculator Cisco Validated Cumplimiento Demostraciones, formación y espacios aislados de dCloud Productos de fin de comercialización y fin de vida útil Descripciones generales, demos y tutoriales Pruebas y demostraciones Plantillas de Visio Garantías Mostrar más Soluciones Soluciones destacadas Inteligencia artificial Cisco on Cisco Servicios de acceso seguro en el borde (SASE) Proveedores de servicios Pequeñas y medianas empresas Edificios inteligentes Acceso Zero Trust de Cisco Todas las soluciones Página de inicio de las soluciones Colaboración Informática Redes Seguridad Soluciones del sector Explorador de cartera industrial Ciudades y comunidades Educación Servicios financieros Sector público Atención sanitaria Fabricación Minería Petróleo y gas Sector minorista Deportes, medios de comunicación y entretenimiento Transporte Herramientas Mostrar más Servicios Servicios destacados Servicios avanzados Cisco Lifecycle Services Smart Net Total Care Asistencia para software Asistencia para soluciones Seguimientos de éxito Todos los servicios Página de inicio de los servicios Colaboración Informática Redes Observabilidad (Splunk) Seguridad Casos de uso Data Center moderno Mostrar más Soporte Para productos Todos los productos Todas las descargas de software Terminales y teléfonos de colaboración Routers Seguridad Switches Comunicaciones Unificadas Tecnología inalámbrica Contacte con soporte Comunidad Soporte con licencias Portal de devoluciones (RMA) Gestor de casos de soporte Soporte para adquisiciones Números de teléfono para la pequeña empresa Otros números de teléfono (mundial) Herramientas y recursos Avisos de seguridad Avisos de campo Mis dispositivos Mis notificaciones Herramienta de búsqueda de errores Investigación de software Comprobador de la cobertura de los dispositivos Todas las herramientas de soporte Mostrar más Saber más Aprender en Cisco Certificaciones profesionales Exámenes de certificaciones Cisco Learning Network Cisco Networking Academy Cisco U. DevNet Packet Tracer (simulación de red) Todas las formaciones y certificaciones Eventos y webinars Página de inicio de eventos Calendario de eventos Cisco Live Webinars de soluciones Webinars de tecnología Temas de tecnología Seguridad de aplicación de IA Cómo instalar un router Cómo configurar un switch de red ¿Qué es la ciberseguridad? ¿Qué es un Data Center? ¿Qué es un firewall? ¿Qué es una LAN? ¿Qué es Wi-Fi 7? Todos los temas de tecnología Mostrar más Cómo comprar Comprar a Cisco Centro de procedimiento de compra Financiación de Cisco Capital Cisco Refresh (equipo refabricado certificado) Programar una llamada Iniciar un chat Comprar a un revendedor o en línea Conozca a nuestros partners Buscador de revendedores Solicitudes de servicio y gestión de contratos Pequeñas y medianas empresas Opciones de licencia Enterprise Agreement Licensing Hub Software central Mostrar más Partners Programa para partners de Cisco Convertirse en partner Incentivos para partners Especializaciones para partners Recursos y herramientas para partners Cisco Commerce Reunión de partners de Cisco Mi perfil Opiniones sobre partners Formación para partners SalesConnect Más recursos y herramientas para partners Soporte para partners Soporte preventa Gestor de casos de soporte Todas las opciones de soporte para partners Mostrar más Enlaces rápidos Acerca de Cisco Contacto Empleo Póngase en contacto con un partner Recursos y bases jurídicas Comentarios Ayuda Términos y condiciones Declaración de privacidad Cookies Marcas registradas Transparencia de la cadena de suministro Mapa del sitio &copy; Cisco Systems, Inc.
2026-01-13T09:29:57
https://akismet.com/de/kontakt/
Kontaktiere uns &#8211; Akismet Zum Inhalt springen Funktionen Enterprise Entwickler Preise Ressourcen Lernen mit Akismet Support Blog Barrierefreiheit Anmelden Jetzt starten Funktionen Enterprise Entwickler Preise Ressourcen Lernen mit Akismet Support Blog Barrierefreiheit Anmelden Jetzt starten Kontaktiere uns Wir helfen dir gerne weiter! Gib uns bitte weitere Informationen: &nbsp;Ich habe eine Frage zur Registrierung oder zum Abonnement. &nbsp;Ich habe eine Frage zum Thema Abrechnung. &nbsp;Ich habe eine Frage an den technischen Support. &nbsp;Ich glaube, Akismet fängt meine Kommentare irrtümlicherweise ab. &nbsp;Ich habe eine Frage zu Enterprise oder eine sehr umfangreiche Frage. &nbsp;Ich habe eine Frage zu gemeinnützigen Konten. &nbsp;Datenschutz: Ich möchte meine E-Mail-Adresse aus jeglicher Langzeitverfolgung entfernen. &nbsp;Ihr seid alle großartig! &nbsp;Ich habe eine Frage zur Entwicklung einer Anwendung oder Bibliothek mit Akismet. &nbsp;Ich habe eine Presse-/Interview-Anfrage. &nbsp;Meine Website wurde fälschlicherweise als kommerziell eingestuft. Dein Name Deine E-Mail-Adresse Firma (optional) Deine Website-URL (optional, wenn du unten deinen API-Schlüssel eingibst) API-Schlüssel (nur erforderlich für kostenpflichtigen vorrangigen Support) Deine Nachricht Was ist die Summe von 14+7? * Absenden * Vielleicht fragst du dich: Wenn diese Leute so gut darin sind, Spam zu blockieren, warum schreiben sie dann eine dumme Frage wie diese in ihr Kontaktformular, um Spam zu verhindern? Akismet ist hervorragend darin, Kontaktformulare zu schützen. Wir verwenden es auf allen unseren anderen Websites, aber auf Akismet.com benutzen manchmal Leute das Kontaktformular, um uns mitzuteilen, dass sie von Akismet blockiert werden. Wenn Leute blockiert werden, die uns mitteilen möchten, dass sie zu Unrecht blockiert wurden, wäre das für sie wahrscheinlich ziemlich frustrierend. Das ist der Grund für die Rechenaufgabe. Sofortige Reaktion Ich muss meine Kreditkarte aktualisieren. Ich habe meinen API-Schlüssel vergessen. Ich möchte mein Passwort zurücksetzen. Ich möchte mein Abonnement kündigen. Vorrangiger Support Du möchtest noch schneller Hilfe erhalten? Vergiss nicht, dass unser Pro-Abonnement vorrangigen E-Mail-Support enthält. Produkt Funktionen Enterprise Preise Ressourcen Support Entwickler Dokumentation API-Status Legal Nutzungsbedingungen Datenschutzerklärung Meine persönlichen Informationen nicht verkaufen oder weitergeben Datenschutzhinweis für Benutzer in Kalifornien de Ein Potpourri Work With Us Abonnieren Abonniert Akismet Anmelden Du hast bereits ein WordPress.com-Konto? Melde dich jetzt an. Akismet Abonnieren Abonniert Registrieren Anmelden Kurzlink kopieren Melde diesen Inhalt Beitrag im Reader lesen Abonnements verwalten Diese Leiste einklappen
2026-01-13T09:29:57
https://ie.trustpilot.com/review/damnmodz.com
DamnModz Reviews | Read Customer Service Reviews of damnmodz.com Categories Blog Log in For businesses For businesses Log in Categories Blog Events &amp; Entertainment Gaming Gaming service Provider DamnModz Summary About Reviews Visit website Write a review Visit website Claimed profile DamnModz   Reviews   3,639 • 4.9 Gaming service Provider Write a review Visit website Write a review Companies on Trustpilot aren&#x27;t allowed to offer incentives or pay to hide reviews. Review summary Based on reviews, created with AI Reviewers overwhelmingly had a great experience with this company. Customers consistently praise the company&#x27;s service, highlighting its quality and the team&#x27;s commitment to ensuring customer satisfaction. Consumers appreciate the prompt response times and the efficiency with which their orders are handled. The products consistently meet expectations, and the user experience is generally considered seamless and enjoyable. People express confidence in the company&#x27;s staff, noting their helpfulness and professionalism. Reviewers feel secure entrusting their accounts to the company, citing the team&#x27;s respectfulness and trustworthiness. The clear and friendly communication throughout the process is another aspect that consumers value highly, further solidifying their trust in the business. See more Based on these reviews PC Promising Customer Dec 28, 2025 Verified Fast Run Service Completed Within 24 Hours Of Putting In The Order. Damnmodz Is A Very Trust Worthy Website Recommended To All New Customers. The Owner Is Very Nice, Their AI Text-Chat Is Very Helpful... See more Company replied AC ACE Jan 5, 2026 Verified I chose to get the service to get my characters gun leveled up to max and also the class assignment maxed out. I ordered during the holidays and the team at DamnModz was able to knock it out for me. G... See more Company replied OS Oscar Dec 31, 2025 Verified I purchased GTA cash and a rank up, and it was exactly what I asked for. This is my 2nd time requesting mods and I’ll definitely be back again. Great communication, very friendly and they kept me upda... See more Company replied HZ H z Dec 28, 2025 I got fast run for Christmas discount, can’t lie was a bit scared about sharing info to my 4L but they did the service with no problem in under 48 hours. 10/10 reliable services Company replied PA Panqueques Dec 8, 2025 Redirected I was scared asf to give my info for my acc but then just kept seeing some other people’s reviews gave me reassurance. It helped and then decided to go through with it and everything went well I got m... See more Company replied VA Vanixaty Dec 28, 2025 Verified Damnmodz applied the fast run service to my account in literally 1 day they the goats in GTA 5 services. There may go 2 for the fast service and always keep in touch with you on your order. Company replied MJ MJ Dec 19, 2025 Remarkably pleased with the service provided by DamnModz. I purchased Fast Run and Trophies for my 3L PSN and the entire process was smooth and professional. Sharing my credentials felt safe with them... See more Company replied DB Deron B Jan 2, 2026 Verified Another amazing experience. Easy process, super fast Response time. Jose took great care of me throughout. Definitely will be back. Company replied LilacGaming Oct 22, 2025 Was nervous at first trying the site, especially after placing an order, sure I waited long for a response but eventually was contacted and they worked pretty fast. Been playing a lot of Call of Duty... See more Company replied CU customer Jan 4, 2026 Verified It was overall good, got what i asked for and nothing bad happened, only took a bit due to the timezone difference but got it all done in 3 days due to the difference in mine and his timezones overall... See more Company replied TB Tburk Nov 5, 2025 Redirected Takes a little time but it’s worth the wait, I received everything that was purchased and it was exactly as described. It’s definitely iffy at first giving your login information out but they are the... See more Company replied Szymon🏁 Apr 27, 2025 Verified 10/10 Service, was updated on discord while my account was getting done, also trusted them with my gamertag that’s worth around £400/500 they could of easily taken it off my account for profit, but in... See more MA Mannikun Dec 27, 2025 Verified Always a bit nervous giving my account over to anyone but these guys are legit and super kind when they have helped me out, fast delivery, overall great Company replied BR Brandon 6 days ago Verified fast, reliable, safe. i&#x27;ve been buying from damnmodz for years and he&#x27;s the only person i buy from. Company replied RC Returning customer Nov 6, 2025 Verified This is my third or fourth time working with Damnmodz across several games. This is my first time having to give account information to receive what I ordered. Naturally, that leaves me in a very vu... See more Company replied Ruben Sanchez Dec 29, 2025 Redirected 5/5 for the person that helped me, I bought bo3 boosting for pc and i took massive precautions to make sure everything went well and it did Company replied Kostas Zogopoulos Oct 3, 2025 Absolutely amazing !!! 🤩 Omg I can&#x27;t describe how mutch want to have colour rare helmets and joggers DamnMods❤️is superstar team . through the process we have chat and they finish my order rapidly no... See more Company replied SP Sphynx Dec 18, 2025 Definitely would recommend, couple hiccups in the beginning but it all worked out. Great service and friendly staff. If you need something these are the guys to go to 100% 💯💯👍👍 Company replied CR Colton Rains Oct 6, 2025 Im not a bot that’s programmed to say something good about a website, just so we’re clear. Overall the purchase was worth the price/wait. I was hesitant to give my information but it worked out. Defin... See more Company replied SJ Steven James Dec 16, 2025 Jose is amazing at his job that’s who did my COD Bot Lobby and I got to tell you the experience,the way it works is so simple, everything is easy and understandable this Site is 10/10 5 Star + USE THE... See more Company replied VA Vanixaty Jun 23, 2025 Verified Bought the 4x fast run service for my main GTA 5 PS5 Account, the whole process went smooth and easy. Damnmodz completed my order in just 2 days and were quick to response all questions I had. Overall... See more PC Promising Customer Dec 25, 2025 Verified Always a pleasure shopping with damnmodz.! Been getting accounts serviced by them for years never had an issue always fast, reliable, and trustworthy. Recommend in the community for all services.! Company replied SI Sim Nov 24, 2025 Once again DamnModz delivers with excellent service and communication. Got the Bo7 singularity package. Was quick, easy, and my supplier was great. You can tell they take great pride in what they do.... See more Company replied DJH Aug 27, 2025 I had such a great experience with this service. The turnaround time was super fast, and the care they took with my account and security made me feel completely at ease. Communication was spot on... See more Company replied King Taylor Nov 15, 2025 Around my 4th time purchasing from them and it never fails to amaze me. Great service, Fast delivery, Great communication, they will take care of you and keep you satisfied every time. Company replied AM Andreas m Dec 9, 2025 Verified Thank you to DamnModz and there team for doing a fantastic job completing my order. An amazing trusted company that i wil come back for! Highly recomended! Company replied Sqxbz Oct 12, 2025 i never really review on websites. however, damnmodz is the place. at first i was suspicious. after i made a purchase and received my order i was shocked. its not like other websites (scams). damnmodz... See more Company replied BC Bob Connor Nov 12, 2025 Verified They go above and beyond to make the customer satisfied. My first order was running a little bit late and they made it up to me big time. Second order happened very fast. Almost immediately. Company replied AS Aspen Sep 29, 2025 Verified Clear communication and product received without issue. There wasca slight delay but they communicated everything promptly and I have zero complaints. I will use again. Company replied Kaeia Robertson Jan 3, 2026 Verified Very happy to receive my order and will definitely come back as main customer🤠👍 Company replied DB Deron B Dec 9, 2025 Verified Excellent service. Knock out challenges super quick. Fast response time. Great customer service. I’ll be back. Company replied JM Jayden Moses Nov 13, 2025 10/10! I paid for fast run on my OG account they got it done super quick with no problems or issues at all. 100% trusted! I’ll definitely be back for more services in the future. Thanks again, guys! Company replied CU customer Dec 28, 2025 Verified Service was kind and answered questions when needed all around good experience Company replied KC King Cali Nov 20, 2025 I order from these guys so often they know me by name lol. Always a great experience very cool and professional. Company replied CU customer Dec 8, 2025 Verified In 5 mins my order was completed fast and excellent service i would advice this site for everything you need. Company replied TE Teyy Dec 2, 2025 First time using DamnModz and i gotta say an amazing job was done i would for sure recommend this website. Company replied GO Ghost of Sparta Updated Dec 5, 2025 Went good and quick now I actually have white and blue joggers thanks just got ban one week later so not worth it Company replied Cayden Dampman Nov 30, 2025 bought from a total of 3 times and everytime has been up to satisfactory and never any problems i appreciate it alot thank you Company replied CO Consumer Dec 18, 2025 Verified Great experience even whenever i wasn’t available they waited for me to be available to do my service Company replied CU customer Dec 29, 2025 Verified Was skeptical at first, but the customer service is friendly and they delivered on their service Company replied MQ MGNG Quan Dec 24, 2025 Verified Fast delivery , the guy was very nice and he communicated very well and I will buy again Company replied CU customer Dec 27, 2025 Verified legit, great site. It takes like 3 hours for them to respond but when they do they instantly help you. Company replied JC JustAnswer Customer Dec 21, 2025 Verified Legit service, purchased fast fun and it works. Would recommend. Company replied BA Bader Dec 28, 2025 Verified Super fast only took a day like how they said provided me with a good seller Company replied Evan Biedermann May 23, 2025 MY PERSONAL ACCOUNT TOO. Let me tell you first hand it is not, i am not a bot and am really pleased with my services, i bought a service for gta 5 online and man let me tell you when i woke and and s... See more Braden Matthews Jun 26, 2025 They guys always go above and beyond for their customers. I’ve used them for call of duty and gta v now and it’s been nothing but flawless communication and execution. You can trust these guys 100%. S... See more SL Sleepyyy May 7, 2025 Damnmodz coming thru for me again, grinded me abyss camo in less than 2 weeks time. im telling yall theyre the real deal over here, super helpful from the owner to all the team members/suppliers. if u... See more What people talk about most Service Customers consistently praise the fast, reliable, and professional service, with many highlighting quick... See more Staff Customers consistently praise the staff for their helpfulness and efficiency. Many reviewers highlight... See more Response time Reviewers often highlight fast response times. Consumers state that staff are quick to react to messages and... See more Product Reviewers often highlight positive product experiences, noting that items are exactly as described and... See more User experience People report consistently positive experiences. Many reviewers describe their experiences as &quot;amazing,&quot; &quot;top... See more See all 3,639 reviews We perform checks on reviews Company details Active Trustpilot subscription Gaming service Provider Game Store Hobby Store Software Company Video Game Store About DamnModz Written by the company Welcome to DamnModz! Discover the fastest and most reliable modded accounts, unlocks, and gaming services for various titles including Call of Duty, GTA, Fortnite, Elden Ring, Forza Horizon, Clash of Clans, 8 Ball Pool, and more across all platforms. What sets us apart is our commitment to quality and customer satisfaction, as evidenced by our exceptional Trustpilot rating of 5.0. This rating is a testament to our dedication, built on the trust of thousands of gamers who have chosen us to enhance their gaming experience. Our Services Modded Accounts: Gain access to rare items, in-game currency, and unlocks across all platforms for your favorite games such as Call of Duty, GTA, Fortnite, Elden Ring, Forza Horizon, Clash of Clans, 8 Ball Pool, and more! Account Boost : Every account boost we perform prioritizes your account's safety. Using the safest and most reliable methods ensures your peace of mind throughout the process. 24/7 Support: Our team is here for you all day, every day. We're ready to help whenever you need us, making sure you get quick and easy support. Contact info United States damnmodz.com 4.9 Excellent 4K reviews 5-star 4-star 3-star 2-star 1-star How is the TrustScore calculated? Replied to 71% of negative reviews Typically replies within 2 weeks How this company uses Trustpilot 4.9 All reviews 3,639 total ● Write a review 5-star 96% 4-star 3% 3-star &lt; 1% 2-star &lt; 1% 1-star 1% How Trustpilot labels reviews More filters Most recent BR Brandon US • 1 review 6 days ago Verified fast, reliable, safe fast, reliable, safe. i&#x27;ve been buying from damnmodz for years and he&#x27;s the only person i buy from. 6 January 2026 Reply from DamnModz 5 days ago Hey Brandon, Appreciate you sticking with us for years—that loyalty means a lot. We&#x27;re glad to keep delivering fast, reliable, and safe service every time. If you ever need anything specific or have questions, just reach out. — Team DamnModz GL Gordon LeBlanc US • 1 review Jan 6, 2026 Verified Awsome work!! 4 January 2026 Reply from DamnModz 5 days ago Hey Gordon, Glad to hear you’re happy with the work! We aim to keep things quick and solid every time. If you ever need anything else or have questions, just shout. — Team DamnModz AC ACE US • 1 review Jan 5, 2026 Verified BF6 Services. I chose to get the service to get my characters gun leveled up to max and also the class assignment maxed out. I ordered during the holidays and the team at DamnModz was able to knock it out for me. Great service. Will do business with them again for sure. 5 January 2026 Reply from DamnModz 5 days ago Hey Ace, Glad to hear we could max out your gun levels and class assignments even during the busy holiday period. We stay sharp to keep things moving fast for gamers like you. Looking forward to helping you out again on your next order. — Team DamnModz SA Sami GB • 6 reviews Jan 5, 2026 Verified Great service! 30 August 2025 Reply from DamnModz Jan 5, 2026 Hey Sami, Glad to hear you had a great experience with our service! We’re all about getting you back to gaming fast and smooth. If you ever need anything else or have questions, just hit us up. — Team DamnModz CU customer NZ • 1 review Jan 4, 2026 Verified It was overall good It was overall good, got what i asked for and nothing bad happened, only took a bit due to the timezone difference but got it all done in 3 days due to the difference in mine and his timezones overall recommend 4 January 2026 Reply from DamnModz Jan 5, 2026 Hey, Glad you got everything you asked for and that the timezone difference didn’t hold you back too much. We always aim to keep things smooth and transparent, even when timing gets tricky. Appreciate the recommendation! — Team DamnModz Kaeia Robertson AU • 1 review Jan 3, 2026 Verified Very happy to receive my order and will… Very happy to receive my order and will definitely come back as main customer🤠👍 3 January 2026 Reply from DamnModz Jan 5, 2026 Hey Kaeia, Glad to hear you’re happy with your order and planning to come back as a main customer—that means a lot to us! We’ll keep delivering fast and reliable service for you. Looking forward to your next visit. — Team DamnModz DB Deron B US • 3 reviews Jan 2, 2026 Verified Another amazing experience Another amazing experience. Easy process, super fast Response time. Jose took great care of me throughout. Definitely will be back. 28 December 2025 Reply from DamnModz Jan 3, 2026 Hey Deron, Glad to hear Jose and the team made the process smooth and fast for you. Looking forward to having you back for your next boost! — Team DamnModz See 2 more reviews by Deron CU customer US • 1 review Jan 1, 2026 Verified Good sellers got it done fast 27 December 2025 Reply from DamnModz Jan 3, 2026 Hey, Glad to hear you got your order done fast—that’s how we like to roll. If you ever need anything else or have questions, just hit us up. Appreciate you choosing DamnModz! — Team DamnModz OS Oscar US • 1 review Dec 31, 2025 Verified Purchased GTA cash and a rank up I purchased GTA cash and a rank up, and it was exactly what I asked for. This is my 2nd time requesting mods and I’ll definitely be back again. Great communication, very friendly and they kept me updated throughout the entire process 28 December 2025 Reply from DamnModz Dec 31, 2025 Hey Oscar, Glad to hear your GTA cash and rank hit the mark again! We appreciate you trusting us for a second round and are stoked our updates kept you in the loop. Looking forward to helping you with your next order. — Team DamnModz CU Customer US • 1 review Dec 31, 2025 Verified Very fast and reliable Very fast and reliable! Second acc i get fast run on… 30 December 2025 Reply from DamnModz Dec 31, 2025 Hey, Glad to hear your second account came through fast and reliable! We aim to keep that speed and quality consistent for every order. If you ever need anything else or have questions, just let us know. — Team DamnModz JT Johnny T US • 1 review Dec 30, 2025 Verified The bestttttttt fast service The bestttttttt fast service, would recommend to anyone. 30 December 2025 Reply from DamnModz Dec 31, 2025 Hey Johnny, Glad to hear you’re loving the speed and service! We keep things moving fast so you can get back to gaming without the wait. Appreciate the recommendation—means a lot coming from a fellow gamer. — Team DamnModz Ruben Sanchez US • 1 review Dec 29, 2025 Redirected 5/5 BO3 PC BOOST 5/5 for the person that helped me, I bought bo3 boosting for pc and i took massive precautions to make sure everything went well and it did 28 December 2025 Unprompted review Reply from DamnModz Dec 29, 2025 Hey Ruben, Glad to hear your BO3 boosting went smoothly. We always aim to keep things safe and efficient for PC players. If you ever need anything else or have questions, just reach out. — Team DamnModz CU customer US • 1 review Dec 29, 2025 Verified Was skeptical at first Was skeptical at first, but the customer service is friendly and they delivered on their service 28 December 2025 Reply from DamnModz Dec 29, 2025 Hey, Glad to hear our team’s friendly support and fast delivery helped turn your skepticism around. We’re all about getting you back to gaming with zero hassle. If you ever need anything else or have questions, just hit us up. — Team DamnModz CU customer GB • 1 review Dec 28, 2025 Verified Service was kind and answered questions… Service was kind and answered questions when needed all around good experience 28 December 2025 Reply from DamnModz Dec 29, 2025 Hey, Glad to hear our team was able to help with your questions and that you had a good experience overall. We’re here whenever you need support or want to level up your game. Keep enjoying those wins! — Team DamnModz HZ H z JP • 1 review Dec 28, 2025 I got fast run for Christmas I got fast run for Christmas discount, can’t lie was a bit scared about sharing info to my 4L but they did the service with no problem in under 48 hours. 10/10 reliable services 27 December 2025 Unprompted review Reply from DamnModz Dec 29, 2025 Hey , Glad to hear the service went smoothly and we earned your trust. We always aim to deliver fast and reliable service without any hassle. If you ever need anything else or have questions, just reach out. — Team DamnModz VA Vanixaty US • 5 reviews Dec 28, 2025 Verified Fast Service Damnmodz applied the fast run service to my account in literally 1 day they the goats in GTA 5 services. There may go 2 for the fast service and always keep in touch with you on your order. 28 December 2025 Reply from DamnModz Dec 29, 2025 Hey, Glad to hear the fast run service hit your account in just one day—that’s exactly the speed we aim for. We appreciate you recognizing our team’s communication throughout your order. — Team DamnModz See 1 more review by Vanixaty PC Promising Customer GB • 4 reviews Dec 28, 2025 Verified Promising Customer Fast Run Service Completed Within 24 Hours Of Putting In The Order. Damnmodz Is A Very Trust Worthy Website Recommended To All New Customers. The Owner Is Very Nice, Their AI Text-Chat Is Very Helpful With Any Questions You Might Have. Their Products On The Page Are Very Descriptive &amp; Organized. Always A Top Tier Experience Shopping With Damnmodz.! 28 December 2025 Reply from DamnModz Dec 29, 2025 Hey, Glad to hear your fast run service was completed within 24 hours and that you found our chat helpful! We pride ourselves on clear product info and a smooth experience. Appreciate you recommending us to new customers. — Team DamnModz See 2 more reviews by Promising CU customer US • 1 review Dec 28, 2025 Verified Camos Did camos for me quick and easy 25 December 2025 Reply from DamnModz Dec 29, 2025 Hey, Glad to hear the camo service was quick and easy for you. We aim to keep things smooth and efficient so you can get back to gaming fast. If you ever need anything else or have questions, we’re here to help. — Team DamnModz BA Bader KW • 1 review Dec 28, 2025 Verified Super fast only took a day like how… Super fast only took a day like how they said provided me with a good seller 27 December 2025 Reply from DamnModz Dec 29, 2025 Hey Bader, Glad to hear we delivered as promised and got your order done in a day. We keep things fast and reliable so you can get back to gaming without the wait. If you ever need anything else or have questions, just hit us up. — Team DamnModz CU customer US • 1 review Dec 27, 2025 Verified Great experience first time buyer and… Great experience first time buyer and will definitely be back 27 December 2025 Reply from DamnModz Dec 29, 2025 Hey, Glad to hear your first experience went great and you’re already planning to come back. We keep things smooth and quick because we know how important that is for gamers. When you’re ready for your next order, we’ve got you covered. — Team DamnModz Previous 1 2 3 4 Next page The Trustpilot Experience We&#x27;re open to all Anyone can write a Trustpilot review. People who write reviews have ownership to edit or delete them at any time, and they’ll be displayed as long as an account is active . We champion verified reviews Companies can ask for reviews via automatic invitations. Labeled Verified, they’re about genuine experiences. Learn more about other kinds of reviews. We fight fake reviews We use dedicated people and clever technology to safeguard our platform. Find out how we combat fake reviews . We show the latest reviews Learn about Trustpilot’s review process . We encourage constructive feedback Here are 8 tips for writing great reviews . We verify reviewers Verification can help ensure real people are writing the reviews you read on Trustpilot. We advocate against bias Offering incentives for reviews or asking for them selectively can bias the TrustScore, which goes against our guidelines . Take a closer look are you human? Choose country Ireland Danmark Österreich Schweiz Deutschland Australia Canada United Kingdom Ireland New Zealand United States España Suomi Belgique België France Italia 日本 Norge Nederland Polska Brasil Portugal Sverige About About us Jobs Contact Blog How Trustpilot works Press Investor Relations Community Trust in reviews Help Center Log in Sign up Businesses Trustpilot Business Products Plans &amp; Pricing Business Login Blog for Business Data Solutions Follow us on Legal Privacy Policy Terms &amp; Conditions Guidelines for Reviewers System status Modern Slavery Statement © 2026 Trustpilot, Inc. All rights reserved.
2026-01-13T09:29:57
https://addons.mozilla.org/el/firefox/user/18674047/
Προφίλ του χρήστη Hugvan – Πρόσθετα για το Firefox (el) Για να χρησιμοποιήσετε αυτά τα πρόσθετα, θα χρειαστεί να κάνετε λήψη του Firefox . Απόρριψη σημείωσης Πρόσθετα προγράμματος περιήγησης Firefox Επεκτάσεις Θέματα Περισσότερα… για το Firefox Λεξικά και πακέτα γλωσσών Άλλα προγράμματα περιήγησης Πρόσθετα για Android Σύνδεση Αναζήτηση Αναζήτηση Hugvan Αναφορά χρήστη Επεκτάσεις από Hugvan Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Θέματα από Hugvan Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Δεν υπάρχουν ακόμη βαθμολογίες Μετάβαση στην αρχική σελίδα της Mozilla Πρόσθετα Σχετικά Blog προσθέτων Firefox Εργαστήριο επεκτάσεων Κέντρο προγραμματιστών Πολιτικές προγραμματιστών Blog κοινότητας Φόρουμ Αναφορά σφάλματος Οδηγίες κριτικής Προγράμματα περιήγησης Desktop Mobile Enterprise Προϊόντα Browsers VPN Relay Monitor Pocket Bluesky (@firefox.com) Instagram (Firefox) YouTube (firefoxchannel) Απόρρητο Cookie Νομικά Εκτός από τα μέρη όπου αναφέρεται διαφορετικά, το περιεχόμενο του ιστοτόπου υπόκειται στην άδεια Creative Commons Attribution Share-Alike License v3.0 ή τυχόν νεότερες εκδόσεις. Αλλαγή γλώσσας Čeština Deutsch Dolnoserbšćina Ελληνικά English (Canadian) English (British) English (US) Español (de Argentina) Español (de Chile) Español (de España) Español (de México) suomi Français Furlan Frysk עברית Hrvatski Hornjoserbsce magyar Interlingua Italiano 日本語 ქართული Taqbaylit 한국어 Norsk bokmål Nederlands Norsk nynorsk Polski Português (do Brasil) Português (Europeu) Română Русский slovenčina Slovenščina Shqip Svenska Türkçe Українська Tiếng Việt 中文 (简体) 正體中文 (繁體)
2026-01-13T09:29:57
https://aws.amazon.com/blogs/storage/tag/amazon-dynamodb/
Amazon DynamoDB | AWS Storage Blog Skip to Main Content Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account AWS Blogs Home Blogs Editions AWS Storage Blog Tag: Amazon DynamoDB Optimizing recommendations and analytics using Amazon DynamoDB and Amazon S3 by Sidhanth Muralidhar , Ranjan Dhar , Nishant Jain , and Meenal Sharma on 21 OCT 2025 in Advanced (300) , Amazon Athena , Amazon Bedrock , Amazon DynamoDB , Amazon EMR , Amazon Redshift , Amazon SageMaker Unified Studio , Amazon Simple Storage Service (S3) , AWS Glue , Technical How-to Permalink Comments Share Today, consumers navigate thousands of products on e-commerce sites, hundreds of shows on streaming platforms, and countless options in digital marketplaces. This choice overload creates decision fatigue, yet consumers continue to demand more variety and make more purchases online. As a result, personalization has become essential—consumers reward brands that deliver relevant, tailored online experiences. However, […] University of California Irvine backs up petabytes of research data to AWS by Philip Papadopoulos , Abhijeet Lokhande , Evan Wood , Francisco Ramon Lopez , and Nicholas Santucci on 29 MAY 2025 in Amazon Athena , Amazon CloudWatch , Amazon DynamoDB , Amazon EventBridge , Amazon S3 Glacier Deep Archive , Amazon Simple Notification Service (SNS) , Amazon Simple Storage Service (S3) , AWS Lambda , AWS Step Functions , Customer Solutions , Higher education , Intermediate (200) , Public Sector Permalink Comments Share Editor’s note: AWS is not responsible for UCI’s public GitHub repo linked in this post, which has been provided so that interested parties can explore the solution described in this post in more detail. The University of California, Irvine (UCI) is a public land-grant research university with troves of research data stored on servers in […] Using Amazon S3 Express One Zone as a caching layer for S3 Standard by Pablo Scheri , Rajiv Gupta , and Mark Twomey on 16 MAY 2025 in Advanced (300) , Amazon DynamoDB , Amazon Simple Storage Service (S3) , AWS Lambda , AWS Step Functions , Storage , Technical How-to Permalink Comments Share Data caching is a critical strategy for optimizing application performance in today’s data-intensive environments. By storing frequently accessed information in high-speed storage locations, organizations can dramatically reduce access times, optimize the use of compute resources, and improve overall system responsiveness. Effective caching strategies become particularly essential for workloads that require consistent low latency, such as […] Bringing more to the table: How Amazon S3 Tables rapidly delivered new capabilities in the first 5 months by Valerie Laufer on 09 MAY 2025 in Amazon Athena , Amazon EMR , Amazon Redshift , Amazon S3 Tables , Amazon SageMaker Lakehouse , Amazon SageMaker Unified Studio , Amazon Simple Storage Service (S3) , Announcements , AWS CloudTrail , AWS Glue , AWS Key Management Service , Intermediate (200) , Open Source Permalink Comments Share Amazon S3 redefined data storage when it launched as the first generally available AWS service in 2006 to deliver highly reliable, durable, secure, low-latency storage with virtually unlimited scale. While designed to deliver simple storage, S3 has proven to be built to handle the explosive growth of data we have seen in the last 19 […] How FICO modernizes file transfers with ETL automation using AWS Transfer Family by Ryan Anderson , Alok Rathi , Vivek Bhargava , Josh Baverstock , and Vinamra Jain on 24 APR 2025 in Advanced (300) , Amazon API Gateway , Amazon CloudWatch , Amazon DynamoDB , Amazon Elastic Block Store (Amazon EBS) , Amazon Simple Queue Service (SQS) , Amazon Simple Storage Service (S3) , AWS Fargate , AWS Lambda , AWS Secrets Manager , AWS Step Functions , AWS Transfer Family , Customer Solutions , Storage Permalink Comments Share FICO powers decisions that help people and businesses around the world prosper. Using FICO solutions, businesses in more than 80 countries do everything from protecting four billion payment cards from fraud, to improving financial inclusion, and increasing supply chain resiliency. As a global leader in credit scoring and analytics, FICO processes massive volumes of sensitive […] How Bridgewater maintains data consistency across Regions using Amazon S3 Replication by Sayan Chakraborty , Aleksei Poliakov , Eddie Sohn , and Peter Sideris on 25 MAR 2025 in Advanced (300) , Amazon CloudWatch , Amazon DynamoDB , Amazon Simple Storage Service (S3) , AWS Lambda , Customer Solutions , Storage Permalink Comments Share Bridgewater Associates is a global macro investment manager, with a core mission of understanding how the world’s markets and economies work by analyzing the drivers of markets and turning that understanding into high-quality portfolios and investment advice for their clients. The data that drives this economic research is stored in Bridgewater’s data lake, built on […] Integrating custom metadata with Amazon S3 Metadata by Bimal Gajjar and Carl Summers on 31 JAN 2025 in Advanced (300) , Amazon DynamoDB , Amazon EventBridge , Amazon Managed Service for Apache Flink , Amazon Rekognition , Amazon Simple Storage Service (S3) , AWS Lambda , Storage , Technical How-to Permalink Comments Share Organizations of all sizes face a common challenge: efficiently managing, organizing, and retrieving vast amounts of digital content. From images and videos to documents and application data, businesses are inundated with information that needs to be stored securely, accessed quickly, and analyzed effectively. The ability to extract, manage, and use metadata from this content is […] Access a point in time with Amazon S3 Object Lambda by Paul Gargan , Ed Gummett , and Ran Pergamin on 21 OCT 2024 in Advanced (300) , Amazon Athena , Amazon DynamoDB , Amazon Simple Storage Service (S3) , AWS CloudFormation , AWS Lambda , Storage , Technical How-to Permalink Comments Share UPDATE: Amazon S3 Object Lambda will no longer be available to new customers starting on November 7, 2025. For capabilities similar to S3 Object Lambda, read the user guide. Point-in-time ‘snapshots’ enable administrators, developers, testers, and end users to quickly access a storage volume or share how it was at an earlier point-in-time. They are […] Secure data in a multi-tenant environment by automatically enforcing prefix-level encryption keys in Amazon S3 by Madhav Vishnubhatta on 21 AUG 2024 in Advanced (300) , Amazon CloudWatch , Amazon DynamoDB , Amazon Simple Notification Service (SNS) , Amazon Simple Queue Service (SQS) , Amazon Simple Storage Service (S3) , Storage , Technical How-to Permalink Comments Share Many organizations need to store and process data that belong to multiple entities, commonly referred to as multi-tenancy. In these situations, it is important to secure every tenant’s data and ensure that a consumer can only access the data that they require for their responsibilities and nothing more. In particular, if a user or application […] Simplify Active Directory authentication with a custom identity provider for AWS Transfer Family by Scott Ma and Matt Boyd on 12 AUG 2024 in Advanced (300) , Amazon CloudWatch , Amazon DynamoDB , Amazon Simple Storage Service (S3) , AWS Identity and Access Management (IAM) , AWS Lambda , AWS Transfer Family , Migration &amp; Transfer Services , Storage , Technical How-to Permalink Comments Share The secure exchange of files business-to-business is a common and important business practice in highly regulated industries. As organizations grow, maintaining separate user credentials for various platforms, such as file transfer services, can become increasingly complex and time-consuming. As customers build out Managed File Transfer (MFT) environments, often they end up having to create separate, […] ← Older posts @charset "UTF-8";[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4{position:relative;transition:box-shadow .3s ease}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_3d631df0,[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003,[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_5962fadc:hover{box-shadow:var(--rg-shadow-gray-elevation-1, 1px 1px 20px rgba(0, 0, 0, .1))}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_3d631df0.rgft_e79955da,[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003.rgft_e79955da,[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_5962fadc:hover.rgft_e79955da{box-shadow:var(--rg-shadow-gray-elevation-2, 1px 1px 24px rgba(0, 0, 0, .25))}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1b2a14d4:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003:hover{box-shadow:none}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde{position:relative;transform-style:preserve-3d;overflow:unset!important}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:before{content:"";position:absolute;inset:0;border-radius:inherit;transform:translateZ(-1px);pointer-events:none;transition-property:filter,inset;transition-duration:.3s;transition-timing-function:ease;background-clip:content-box!important;padding:1px}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_3d631df0:before{filter:blur(15px)}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_3d631df0.rgft_4df65418:hover:before{filter:blur(20px)}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_5962fadc:hover:before{filter:blur(15px)}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003:before{filter:blur(15px)}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_b27cc003:hover:before{filter:none}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_e90ac70d:active:before{filter:blur(8px)!important}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_a4f580d2:before{filter:blur(8px)!important}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=fuchsia] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=fuchsia].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-fuchsia, linear-gradient(123deg, #fa6f00 0%, #e433ff 50%, #8575ff 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=fuchsia] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=fuchsia].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-fuchsia, linear-gradient(123deg, #d14600 0%, #c300e0 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=indigo] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=indigo].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-indigo, linear-gradient(123deg, #0099ff 0%, #5c7fff 50%, #8575ff 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=indigo] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=indigo].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-indigo, linear-gradient(123deg, #006ce0 0%, #295eff 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=orange] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=orange].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-orange, linear-gradient(123deg, #ff1ae0 0%, #ff386a 50%, #fa6f00 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=orange] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=orange].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-orange, linear-gradient(123deg, #d600ba 0%, #eb003b 50%, #d14600 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=teal] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=teal].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-teal, linear-gradient(123deg, #00bd6b 0%, #00a4bd 50%, #0099ff 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=teal] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=teal].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-teal, linear-gradient(123deg, #008559 0%, #007e94 50%, #006ce0 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=blue] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=blue].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-blue, linear-gradient(123deg, #00bd6b 0%, #0099ff 50%, #8575ff 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=blue] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=blue].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-blue, linear-gradient(123deg, #008559 0%, #006ce0 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=violet] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=violet].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-violet, linear-gradient(123deg, #ad5cff 0%, #0099ff 50%, #00a4bd 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=violet] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=violet].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-violet, linear-gradient(123deg, #962eff 0%, #006ce0 50%, #007e94 100%))}[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=purple] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=light][data-rg-theme=purple].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-purple, linear-gradient(123deg, #ff1ae0 0%, #8575ff 50%, #00a4bd 100%))}[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=purple] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a).rgft_38d8ffac:before,[data-eb-6a8f3296] [data-rg-mode=dark][data-rg-theme=purple].rgft_9e423fbb.rgft_1ed8cbde.rgft_38d8ffac:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-purple, linear-gradient(123deg, #d600ba 0%, #6842ff 50%, #007e94 100%))}[data-eb-6a8f3296] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:linear-gradient(123deg,#d14600,#c300e0,#6842ff)}[data-eb-6a8f3296] [data-rg-theme=fuchsia] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=fuchsia].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-fuchsia, linear-gradient(123deg, #d14600 0%, #c300e0 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-theme=indigo] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=indigo].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-indigo, linear-gradient(123deg, #006ce0 0%, #295eff 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-theme=orange] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=orange].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-orange, linear-gradient(123deg, #d600ba 0%, #eb003b 50%, #d14600 100%))}[data-eb-6a8f3296] [data-rg-theme=teal] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=teal].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-teal, linear-gradient(123deg, #008559 0%, #007e94 50%, #006ce0 100%))}[data-eb-6a8f3296] [data-rg-theme=blue] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=blue].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-blue, linear-gradient(123deg, #008559 0%, #006ce0 50%, #6842ff 100%))}[data-eb-6a8f3296] [data-rg-theme=violet] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=violet].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-violet, linear-gradient(123deg, #962eff 0%, #006ce0 50%, #007e94 100%))}[data-eb-6a8f3296] [data-rg-theme=purple] .rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before,[data-eb-6a8f3296] [data-rg-theme=purple].rgft_9e423fbb.rgft_1ed8cbde:not(:disabled,.rgft_3ef5a62a):before{background:var(--rg-shadow-gradient-purple, linear-gradient(123deg, #d600ba 0%, #6842ff 50%, #007e94 100%))}[data-eb-6a8f3296] a.rgft_f7822e54,[data-eb-6a8f3296] button.rgft_f7822e54{--button-size: 44px;--button-pad-h: 24px;--button-pad-borderless-h: 26px;border:2px solid var(--rg-color-background-page-inverted, #0F141A);padding:8px var(--button-pad-h, 24px);border-radius:40px!important;align-items:center;justify-content:center;display:inline-flex;height:var(--button-size, 44px);text-decoration:none!important;text-wrap:nowrap;cursor:pointer;position:relative;transition:all .3s ease}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_094d67e1,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_094d67e1{--button-size: 32px;--button-pad-h: 14px;--button-pad-borderless-h: 16px}[data-eb-6a8f3296] a.rgft_f7822e54>span,[data-eb-6a8f3296] button.rgft_f7822e54>span{color:var(--btn-text-color, inherit)!important}[data-eb-6a8f3296] a.rgft_f7822e54:focus-visible,[data-eb-6a8f3296] button.rgft_f7822e54:focus-visible{outline:2px solid var(--rg-color-focus-ring, #006CE0)!important;outline-offset:4px!important;transition:outline 0s}[data-eb-6a8f3296] a.rgft_f7822e54:focus:not(:focus-visible),[data-eb-6a8f3296] button.rgft_f7822e54:focus:not(:focus-visible){outline:none!important}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_303c672b,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_303c672b{--btn-text-color: var(--rg-color-text-utility-inverted, #FFFFFF);background-color:var(--rg-color-btn-primary-bg, #161D26);border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_18409398,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_18409398{--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-btn-secondary-bg, #FFFFFF);border-color:var(--rg-color-background-page-inverted, #0F141A)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_090951dc{--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-background-object, #F3F3F7);border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_15529d9f,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_15529d9f{--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-btn-secondary-bg, #FFFFFF);border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb950a4e{--btn-text-color: var(--rg-color-text-utility, #161D26);border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb950a4e{background-image:linear-gradient(97deg,#ffc0ad,#f8c7ff 37.79%,#d2ccff 75.81%,#c2d1ff)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb950a4e{--rg-gradient-angle:97deg;background-image:var(--rg-gradient-a, linear-gradient(120deg, #f8c7ff 20.08%, #d2ccff 75.81%))}[data-eb-6a8f3296] [data-rg-mode=dark] a.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] [data-rg-mode=dark] button.rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] a[data-rg-mode=dark].rgft_f7822e54.rgft_bb950a4e,[data-eb-6a8f3296] button[data-rg-mode=dark].rgft_f7822e54.rgft_bb950a4e{background-image:var(--rg-gradient-a, linear-gradient(120deg, #78008a 24.25%, #b2008f 69.56%))}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb419678,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb419678{--btn-text-color: var(--rg-color-text-utility-inverted, #FFFFFF);background-color:var(--rg-color-btn-visited-bg, #656871);border-color:var(--rg-color-btn-visited-bg, #656871)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb419678.rgft_18409398,[data-eb-6a8f3296] a.rgft_f7822e54.rgft_bb419678.rgft_15529d9f,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb419678.rgft_18409398,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_bb419678.rgft_15529d9f{--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-btn-secondary-visited-bg, #FFFFFF)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_badebaf5,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_badebaf5{--btn-text-color: var(--rg-color-btn-disabled-text, #B4B4BB);background-color:var(--rg-color-btn-disabled-bg, #F3F3F7);border-color:var(--rg-color-btn-disabled-bg, #F3F3F7);cursor:default}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_badebaf5.rgft_18409398,[data-eb-6a8f3296] a.rgft_f7822e54.rgft_badebaf5.rgft_15529d9f,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_badebaf5.rgft_18409398,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_badebaf5.rgft_15529d9f{border:none;padding:10px var(--button-pad-borderless-h, 24px)}[data-eb-6a8f3296] a.rgft_f7822e54.rgft_badebaf5.rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54.rgft_badebaf5.rgft_090951dc{--btn-text-color: var(--rg-color-btn-tertiary-disabled-text, #B4B4BB);background-color:#0000}[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_18409398:not(.rgft_bb950a4e),[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_15529d9f:not(.rgft_bb950a4e),[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_18409398:not(.rgft_bb950a4e),[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_15529d9f:not(.rgft_bb950a4e){--btn-text-color: var(--rg-color-text-utility, #161D26);background-color:var(--rg-color-btn-secondary-bg, #FFFFFF)}[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc{box-shadow:none}[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc{background-image:linear-gradient(97deg,#ffc0ad80,#f8c7ff80 37.79%,#d2ccff80 75.81%,#c2d1ff80)}[data-eb-6a8f3296] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc{--rg-gradient-angle:97deg;background-image:var(--rg-gradient-a-50, linear-gradient(120deg, #f8c7ff 20.08%, #d2ccff 75.81%))}[data-eb-6a8f3296] [data-rg-mode=dark] a.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] [data-rg-mode=dark] button.rgft_f7822e54:hover:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] a[data-rg-mode=dark].rgft_f7822e54.rgft_090951dc:hover:not(.rgft_badebaf5),[data-eb-6a8f3296] button[data-rg-mode=dark].rgft_f7822e54.rgft_090951dc:hover:not(.rgft_badebaf5){background-image:var(--rg-gradient-a-50, linear-gradient(120deg, #78008a 24.25%, #b2008f 69.56%))}[data-eb-6a8f3296] a.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc{box-shadow:none}[data-eb-6a8f3296] a.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc{background-image:linear-gradient(97deg,#ffc0ad,#f8c7ff 37.79%,#d2ccff 75.81%,#c2d1ff)}[data-eb-6a8f3296] a.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] button.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc{--rg-gradient-angle:97deg;background-image:var(--rg-gradient-a-pressed, linear-gradient(120deg, rgba(248, 199, 255, .5) 20.08%, #d2ccff 75.81%))}[data-eb-6a8f3296] [data-rg-mode=dark] a.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] [data-rg-mode=dark] button.rgft_f7822e54:active:not(.rgft_badebaf5).rgft_090951dc,[data-eb-6a8f3296] a[data-rg-mode=dark].rgft_f7822e54.rgft_090951dc:active:not(.rgft_badebaf5),[data-eb-6a8f3296] button[data-rg-mode=dark].rgft_f7822e54.rgft_090951dc:active:not(.rgft_badebaf5){background-image:var(--rg-gradient-a-pressed, linear-gradient(120deg, rgba(120, 0, 138, .5) 24.25%, #b2008f 69.56%))}[data-eb-6a8f3296] .rgft_8711ccd9{-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale;background:#0000;border:none;margin:0}[data-eb-6a8f3296] .rgft_8711ccd9.rgft_5e58a6df{text-align:center}[data-eb-6a8f3296] .rgft_8711ccd9.rgft_b7ada98b{display:block}[data-eb-6a8f3296] .rgft_8711ccd9.rgft_beb26dc7{font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}[data-eb-6a8f3296] .rgft_8711ccd9 a{display:inline;position:relative;cursor:pointer;text-decoration:none!important;color:var(--rg-color-link-default, #006CE0);background:linear-gradient(to right,currentcolor,currentcolor);background-size:100% .1em;background-position:0 100%;background-repeat:no-repeat}[data-eb-6a8f3296] .rgft_8711ccd9 a:focus-visible{color:var(--rg-color-link-focus, #006CE0)}[data-eb-6a8f3296] .rgft_8711ccd9 a:hover{color:var(--rg-color-link-hover, #003B8F);animation:rgft_d72bdead .3s cubic-bezier(0,0,.2,1)}[data-eb-6a8f3296] .rgft_8711ccd9 a:visited{color:var(--rg-color-link-visited, #6842FF)}@keyframes rgft_d72bdead{0%{background-size:0 .1em}to{background-size:100% .1em}}[data-eb-6a8f3296] .rgft_8711ccd9 b,[data-eb-6a8f3296] b.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 strong,[data-eb-6a8f3296] strong.rgft_8711ccd9{font-weight:700}[data-eb-6a8f3296] i.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 i,[data-eb-6a8f3296] em.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 em{font-style:italic}[data-eb-6a8f3296] u.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 u{text-decoration:underline}[data-eb-6a8f3296] code.rgft_8711ccd9,[data-eb-6a8f3296] .rgft_8711ccd9 code{font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace;border-radius:4px;border:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);color:var(--rg-color-text-secondary, #232B37);padding-top:var(--rg-padding-8);padding-right:var(--rg-padding-8);padding-bottom:var(--rg-padding-8);padding-left:var(--rg-padding-8)}[data-eb-6a8f3296] .rgft_12e1c6fa{display:inline!important;vertical-align:middle}[data-eb-6a8f3296] .rgft_8711ccd9 p img{aspect-ratio:16/9;height:100%;object-fit:cover;width:100%;border-radius:8px;order:1;margin-bottom:var(--rg-margin-4)}[data-eb-6a8f3296] .rgft_8711ccd9 table{table-layout:fixed;border-spacing:0;width:100%}[data-eb-6a8f3296] .rgft_8711ccd9 table td{font-size:14px;border-right:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-bottom:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);padding-top:var(--rg-padding-6);padding-right:var(--rg-padding-6);padding-bottom:var(--rg-padding-6);padding-left:var(--rg-padding-6)}[data-eb-6a8f3296] .rgft_8711ccd9 table td:first-of-type{border-left:1px solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_8711ccd9 table thead tr:first-of-type>*:first-of-type,[data-eb-6a8f3296] .rgft_8711ccd9 table:not(:has(thead)) tr:first-of-type>*:first-of-type{border-top-left-radius:16px}[data-eb-6a8f3296] .rgft_8711ccd9 table thead tr:first-of-type>*:last-of-type,[data-eb-6a8f3296] .rgft_8711ccd9 table:not(:has(thead)) tr:first-of-type>*:last-of-type{border-top-right-radius:16px}[data-eb-6a8f3296] .rgft_8711ccd9 table tr:last-of-type td:first-of-type{border-bottom-left-radius:16px}[data-eb-6a8f3296] .rgft_8711ccd9 table tr:last-of-type td:last-of-type{border-bottom-right-radius:16px}[data-eb-6a8f3296] .rgft_8711ccd9 table:not(:has(thead),:has(th)) tr:first-of-type td{border-top:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-right:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-bottom:1px solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_8711ccd9 table th{color:var(--rg-color-text-primary-inverted, #FFFFFF);min-width:280px;max-width:400px;padding:0;text-align:left;vertical-align:top;background-color:var(--rg-color-background-object-inverted, #232B37);border-left:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-right:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);border-bottom:1px solid var(--rg-color-border-lowcontrast, #CCCCD1);padding-top:var(--rg-padding-6);padding-right:var(--rg-padding-6);padding-bottom:var(--rg-padding-6);padding-left:var(--rg-padding-6);row-gap:var(--rg-margin-5);column-gap:var(--rg-margin-5);max-width:100%;min-width:150px}@media (min-width: 480px) and (max-width: 767px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:100%;min-width:150px}}@media (min-width: 768px) and (max-width: 1023px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:240px;min-width:180px}}@media (min-width: 1024px) and (max-width: 1279px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:350px;min-width:240px}}@media (min-width: 1280px) and (max-width: 1599px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:400px;min-width:280px}}@media (min-width: 1600px){[data-eb-6a8f3296] .rgft_8711ccd9 table th{max-width:400px;min-width:280px}}[data-eb-6a8f3296] .rgft_8711ccd9 table th:first-of-type{border-top-left-radius:16px;border-top:0 solid var(--rg-color-border-lowcontrast, #CCCCD1);border-left:0 solid var(--rg-color-border-lowcontrast, #CCCCD1);border-right:0 solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_8711ccd9 table th:nth-of-type(n+3){border-left:0 solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_8711ccd9 table th:last-of-type{border-top-right-radius:16px;border-top:0 solid var(--rg-color-border-lowcontrast, #CCCCD1);border-right:0 solid var(--rg-color-border-lowcontrast, #CCCCD1)}[data-eb-6a8f3296] .rgft_a1b66739{display:inline-flex;flex-direction:column;align-items:center;justify-content:center;color:var(--rg-color-text-primary, #161D26);--icon-color: currentcolor}[data-eb-6a8f3296] .rgft_a1b66739.rgft_bc1a8743{height:16px;width:16px}[data-eb-6a8f3296] .rgft_a1b66739.rgft_c0cbb35d{height:20px;width:20px}[data-eb-6a8f3296] .rgft_a1b66739.rgft_bd40fe12{height:32px;width:32px}[data-eb-6a8f3296] .rgft_a1b66739.rgft_27320e58{height:48px;width:48px}[data-eb-6a8f3296] .rgft_a1b66739 svg{fill:none;stroke:none}[data-eb-6a8f3296] .rgft_a1b66739 path[data-fill]:not([fill]){fill:var(--icon-color)}[data-eb-6a8f3296] .rgft_a1b66739 path[data-stroke]{stroke-width:2}[data-eb-6a8f3296] .rgft_a1b66739 path[data-stroke]:not([stroke]){stroke:var(--icon-color)}[data-eb-6a8f3296] .rgft_3ed66ff4{display:inline-flex;flex-direction:column;align-items:center;justify-content:center;color:var(--rg-color-text-primary, #161D26)}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_9124b200{height:10px;width:10px}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_bc1a8743{height:16px;width:16px}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_c0cbb35d{height:20px;width:20px}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_bd40fe12{height:32px;width:32px}[data-eb-6a8f3296] .rgft_3ed66ff4.rgft_27320e58{height:48px;width:48px}[data-eb-6a8f3296] .rgft_98b54368{color:var(--rg-color-text-body, #232B37)}[data-eb-6a8f3296] .rgft_98b54368.rgft_275611e5{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_98b54368.rgft_275611e5{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_98b54368.rgft_275611e5{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_98b54368.rgft_275611e5{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_98b54368.rgft_275611e5{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_98b54368.rgft_275611e5{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_98b54368.rgft_275611e5{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_98b54368.rgft_275611e5{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_98b54368.rgft_007aef8b{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_98b54368.rgft_007aef8b{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_98b54368.rgft_007aef8b{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_98b54368.rgft_007aef8b{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_98b54368.rgft_007aef8b{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_98b54368.rgft_007aef8b{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_98b54368.rgft_007aef8b{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_98b54368.rgft_007aef8b{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_98b54368.rgft_ff19c5f9{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_98b54368.rgft_ff19c5f9{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_98b54368.rgft_ff19c5f9{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_98b54368.rgft_ff19c5f9{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_98b54368.rgft_ff19c5f9{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_98b54368.rgft_ff19c5f9{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_98b54368.rgft_ff19c5f9{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_98b54368.rgft_ff19c5f9{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_98b54368 ul{list-style-type:disc;margin-top:2rem}[data-eb-6a8f3296] .rgft_98b54368.rgft_2a7f98ee{display:inline;position:relative;cursor:pointer;text-decoration:none!important;color:var(--rg-color-link-default, #006CE0);background:linear-gradient(to right,currentcolor,currentcolor);background-size:100% .1em;background-position:0 100%;background-repeat:no-repeat}[data-eb-6a8f3296] .rgft_98b54368.rgft_2a7f98ee:focus-visible{color:var(--rg-color-link-focus, #006CE0)}[data-eb-6a8f3296] .rgft_98b54368.rgft_2a7f98ee:hover{color:var(--rg-color-link-hover, #003B8F);animation:rgft_9beb7cc5 .3s cubic-bezier(0,0,.2,1)}[data-eb-6a8f3296] .rgft_98b54368.rgft_2a7f98ee:visited{color:var(--rg-color-link-visited, #6842FF)}@keyframes rgft_9beb7cc5{0%{background-size:0 .1em}to{background-size:100% .1em}}[data-eb-6a8f3296] .rgft_d835af5c{color:var(--rg-color-text-title, #161D26)}[data-eb-6a8f3296] .rgft_d835af5c.rgft_3e9243e1{font-size:calc(4.5rem * var(--font-size-multiplier, 1.6));line-height:1.111;font-weight:500;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_3e9243e1{font-size:calc(3.75rem * var(--font-size-multiplier, 1.6));line-height:1.133;font-weight:500}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_3e9243e1{font-size:calc(3rem * var(--font-size-multiplier, 1.6));line-height:1.167;font-weight:500}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d835af5c.rgft_3e9243e1{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d835af5c.rgft_3e9243e1{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d835af5c.rgft_3e9243e1{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d835af5c.rgft_3e9243e1{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d835af5c.rgft_3e9243e1{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d835af5c.rgft_54816d41{font-size:calc(3.75rem * var(--font-size-multiplier, 1.6));line-height:1.133;font-weight:500;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_54816d41{font-size:calc(3rem * var(--font-size-multiplier, 1.6));line-height:1.167;font-weight:500}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_54816d41{font-size:calc(2.5rem * var(--font-size-multiplier, 1.6));line-height:1.2;font-weight:500}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d835af5c.rgft_54816d41{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d835af5c.rgft_54816d41{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d835af5c.rgft_54816d41{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d835af5c.rgft_54816d41{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d835af5c.rgft_54816d41{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d835af5c.rgft_852a8b78{font-size:calc(3rem * var(--font-size-multiplier, 1.6));line-height:1.167;font-weight:500;font-family:Amazon Ember Display,Amazon Ember,Helvetica Neue,Helvetica,Arial,sans-serif}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_852a8b78{font-size:calc(2.5rem * var(--font-size-multiplier, 1.6));line-height:1.2;font-weight:500}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d835af5c.rgft_852a8b78{font-size:calc(2rem * var(--font-size-multiplier, 1.6));line-height:1.25;font-weight:500}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d835af5c.rgft_852a8b78{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d835af5c.rgft_852a8b78{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d835af5c.rgft_852a8b78{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d835af5c.rgft_852a8b78{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d835af5c.rgft_852a8b78{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_286fbc8d{letter-spacing:1.6px;text-transform:uppercase;color:var(--rg-color-text-eyebrow, #161D26)}[data-eb-6a8f3296] .rgft_286fbc8d.rgft_cf5cdf86{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_286fbc8d.rgft_cf5cdf86{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.714;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_286fbc8d.rgft_cf5cdf86{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:2;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_286fbc8d.rgft_cf5cdf86{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_286fbc8d.rgft_cf5cdf86{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_286fbc8d.rgft_cf5cdf86{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_286fbc8d.rgft_cf5cdf86{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_286fbc8d.rgft_cf5cdf86{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_286fbc8d.rgft_c6f92487{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.714;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_286fbc8d.rgft_c6f92487{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:2;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_286fbc8d.rgft_c6f92487{font-size:calc(.625rem * var(--font-size-multiplier, 1.6));line-height:2.4;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_286fbc8d.rgft_c6f92487{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_286fbc8d.rgft_c6f92487{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_286fbc8d.rgft_c6f92487{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_286fbc8d.rgft_c6f92487{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_286fbc8d.rgft_c6f92487{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d27b4751{color:var(--rg-color-text-utility, #161D26)}[data-eb-6a8f3296] .rgft_d27b4751.rgft_927d7fd1{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_927d7fd1{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_927d7fd1{font-size:calc(1rem * var(--font-size-multiplier, 1.6));line-height:1.5;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d27b4751.rgft_927d7fd1{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d27b4751.rgft_927d7fd1{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d27b4751.rgft_927d7fd1{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d27b4751.rgft_927d7fd1{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d27b4751.rgft_927d7fd1{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d27b4751.rgft_100c8a76{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_100c8a76{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_100c8a76{font-size:calc(.875rem * var(--font-size-multiplier, 1.6));line-height:1.429;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d27b4751.rgft_100c8a76{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d27b4751.rgft_100c8a76{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d27b4751.rgft_100c8a76{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d27b4751.rgft_100c8a76{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d27b4751.rgft_100c8a76{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d27b4751.rgft_453dc601{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (max-width: 768px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_453dc601{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400}}@media (max-width: 480px){[data-eb-6a8f3296] .rgft_d27b4751.rgft_453dc601{font-size:calc(.75rem * var(--font-size-multiplier, 1.6));line-height:1.333;font-weight:400}}[data-eb-6a8f3296] [data-rg-lang=ar] .rgft_d27b4751.rgft_453dc601{font-family:AmazonEmberArabic,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ja] .rgft_d27b4751.rgft_453dc601{font-family:ShinGo,\30d2\30e9\30ae\30ce\89d2\30b4 Pro W3,Hiragino Kaku Gothic Pro,Osaka,\30e1\30a4\30ea\30aa,Meiryo,\ff2d\ff33 \ff30\30b4\30b7\30c3\30af,MS PGothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=ko] .rgft_d27b4751.rgft_453dc601{font-family:NotoSansKR,Malgun Gothic,sans-serif}[data-eb-6a8f3296] [data-rg-lang=th] .rgft_d27b4751.rgft_453dc601{font-family:NotoSansThai,Helvetica,Arial,sans-serif}[data-eb-6a8f3296] [data-rg-lang=zh] .rgft_d27b4751.rgft_453dc601{font-family:NotoSansTC,Helvetica,Arial,Microsoft Yahei,\5fae\8f6f\96c5\9ed1,STXihei,\534e\6587\7ec6\9ed1,sans-serif}[data-eb-6a8f3296] .rgft_d27b4751.rgft_949ed5ce{font-size:calc(.625rem * var(--font-size-multiplier, 1.6));line-height:1.2;font-weight:400;font-family:Amazon Ember Mono,Consolas,Andale Mono WT,Andale Mono,Lucida Console,Lucida Sans Typewriter,DejaVu Sans Mono,Bitstream Vera Sans Mono,Liberation Mono,Nimbus Mono L,Monaco,Courier New,Courier,monospace}@media (min-width: 481px) and (
2026-01-13T09:29:57
https://akismet.com/developers/detailed-docs/errors/akismet-error-10011/
Akismet Error #10011 &#8211; Akismet Skip to content Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Features Enterprise Developers Pricing Resources Learn with Akismet Support Blog Accessibility Log in Get started Getting started Plugins and libraries Detailed docs Building your application Key verification Comment check Submit spam (missed&nbsp;spam) Submit ham (false&nbsp;positives) Key/sites activity Usage limit Response error codes Akismet Error #10001 Akismet Error #10003 Akismet Error #10402 Akismet Error #10011 Akismet Error #10010 Akismet Error #10009 Akismet Error #10006 Akismet Error #10005 Akismet Error #10404 Akismet Error #10403 Akismet Error #30001 Akismet Error #10011 Subscription Upgrade Required Akismet Error #10011 Why am I receiving this error? We have detected that your current subscription is not appropriate for your current usage of Akismet. We attempted to contact you via email regarding the problem as well. Please be sure to contact us within two weeks of receiving this notice. Otherwise, at that time your API Key will be suspended. Which subscription should I choose? Based on the high volume of API usage under your account, you will need to&nbsp; contact our support staff &nbsp;where we&#8217;ll advise you on the proper plan for your needs. What if an agency or studio set everything up? You can contact the folks who helped you get up and running, and let them know that their Akismet API key needs to be upgraded. Or &#8211; simply choose to&nbsp; register your own subscription &nbsp;and activate the Akismet plugin using your new API key. Can I just de-activate Akismet? Yes. If you are currently using our WordPress plugin, go to the Plugins menu in your dashboard and click on the “Deactivate” link found directly under “Akismet.” If you happen to be using a different client, please refer to its documentation regarding deactivation. Note that your site(s) will then be left unprotected from spam, which is not recommended. Can we help with anything else? I need to update my credit card. I forgot my API key. I need to reset my password. I need to cancel my subscription. Priority support Want to get help even faster? Don&#8217;t forget that our Pro subscription includes priority email support. Related Product Features Enterprise Pricing Resources Support Getting Started Blog Accessibility Developers Documentation API Status Legal Terms of Services Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users en An medley Work With Us Press Subscribe Subscribed Akismet Join 173 other subscribers Sign me up Already have a WordPress.com account? Log in now. Akismet Subscribe Subscribed Sign up Log in Copy shortlink Report this content View post in Reader Manage subscriptions Collapse this bar
2026-01-13T09:29:57
https://play.google.com/store/apps/details?id=notion.id&amp;hl=it
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <pat
2026-01-13T09:29:57
https://www.cisco.com/site/hk/en/partners/index.html
Partners - Cisco Skip to main content Skip to search Skip to footer Cisco.com Hong Kong Products and Services Close Solutions Close Support Close Learn Close Why Cisco Close Partners Close Explore Cisco How to buy Partners EN HK Log in Explore Cisco Search MENU CLOSE How to buy Partners Log in EN HK Close Close Close Close Close Thank you. Your profile has been updated. Help us keep your profile up-to-date. Confirm your job details. Job Role -- Please Select -- Customer Service / Support Executive Management Finance / Accounting Information Technology Manufacturing Marketing / PR / Advertising Logistics / Operations / Administration Other (Legal, HR, Training, Vendor Manager, etc) Purchasing / Procurement Research / Development Sales / Account Manager, Business Development System / Sales Engineer Job Level -- Please Select -- Manager Contributor Director / Senior Mgr Executive Partnerships that make everything possible A Cisco partnership provides you exclusive benefits like programs and specializations made to reward you, training and enablement that modernize your practice, and opportunities to transform your capabilities and selling motions. Create a Cisco account Already a partner? Log in Register as a Cisco partner or affiliate your account For new companies Log in with your Cisco account and register your company as a Cisco partner to gain access to exclusive partner content. For individuals Log in with your Cisco account and associate that account with an existing Cisco partner company to gain access to exclusive partner content. Your profitability is our number 1 goal Partner Program A program that is flexibly structured around how you deliver value to customers. Marketing Velocity Training to help modernize your marketing approach, customizable campaigns, and access to a top-tier digital community. Paths to transformation Explore the possibilities of how Cisco can help you build new capabilities and evolving customer needs. See the benefits Cisco partners bring real results The stadium of the future Successful businesses don&#39;t always play by the rules. Cisco Partner AmpThink isn’t just playing the game, they’re redefining it—and they’re winning. Modernize stadiums Paving the way for others One of the first members of the African American Cisco Partner Community, TGS is helping to open doors for other black-owned companies. Promote inclusivity Previous Next Find a partner Partners work to integrate, build, buy, and consult on solutions, software, and services for their customers. Partner Locator Connect with a partner @CiscoPartners Cisco Partner Cisco Partners Cisco Partners Partner Blogs Community Quick Links About Cisco Contact Us Careers Connect with a partner Resources and Legal Feedback Help Terms &amp; Conditions Privacy Statement Cookies Trademarks Supply Chain Transparency Sitemap &copy; Cisco Systems, Inc.
2026-01-13T09:29:57
https://play.google.com/store/apps/details?id=notion.id&amp;hl=ja
Notion: Notes, Tasks, AI - Apps on Google Play Games Apps Books Kids google_logo Play Games Apps Books Kids none search help_outline Sign in with Google play_apps Library &amp; devices payment Payments &amp; subscriptions reviews My Play activity redeem Offers Play Pass Personalization in Play settings Settings Privacy Policy • Terms of Service Games Apps Books Kids Notion: Notes, Tasks, AI Notion Labs, Inc. In-app purchases 4.8 star 327K reviews 10M+ Downloads Rated for 3+ info Install Share Add to wishlist About this app arrow_forward Whether you’re looking to track your personal to-do’s, write and organize class notes, or run project management with a team, Notion is the AI-powered workspace that works your way, for any need. Keep track of your personal and professional goals, take notes about what you care about, and stay organized. &quot;AI&#39;s everything app&quot; — Forbes Notion is a productivity app where you can write, plan, and organize your notes, projects, tasks and more - all in one place. Ask Notion AI about project updates, upcoming tasks, and suggestions for a more streamlined workflow. Simplify writing notes, project and task management, and collaboration. Whether for personal, student or professional use, Notion scales to meet your individual needs with customization tools for everyone. FREE FOR PERSONAL USE • Create as many notes, docs, and content as you want. • Use one of thousands of templates to get started. FREE TO TRY WITH YOUR TEAM • Millions run on Notion every day, from next-generation startups to established enterprises. • Import Google Docs, PDFs, and other content types easily to get started • Write and organize meeting notes, or transcribe with AI. • Collaboration and team work at your fingertips, in one connected workspace. • Connect tools like Figma, Slack, and GitHub to Notion. FREE FOR STUDENTS • Your study planner, class notes, to do lists and more, your way. Loved by millions of students worldwide. • Get organized for your best school year yet with beautiful, customizable templates created by students, for students. NOTES &amp; DOCS Communication is made efficient with Notion&#39;s flexible building blocks. • Create docs with beautiful templates, images, to-dos, and 50+ more content types. • Meeting notes, projects, design systems, pitch decks, and more. • Find exactly what you need using Search with powerful filters to find content across your workspace. TASKS &amp; PROJECTS Catch all details big and small in any workflow. • Workflow manager: Create your own priority labels, status tags, and automations to choose the exact info you want to track. • Capture every detail in a table. Break projects into manageable tasks to get the work done. AI One tool that does it all - search, generate, analyze, and chat - right inside Notion. • Write better. Use Notion AI to help write and brainstorm. • Get answers. Ask Notion AI questions about all your content and get answers in seconds. • Autofill tables. Notion AI turns overwhelming data into clear, actionable information — automatically. SYNCS WITH BROWSER, MAC, AND WINDOWS APPS. • Pick up on mobile where you left off on desktop. MORE PRODUCTIVITY. FEWER TOOLS. • Track to-dos, write notes, create docs, and manage projects in one connected workspace. THINK IT. MAKE IT. Updated on Jan 13, 2026 Productivity Data safety arrow_forward Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time. This app may share these data types with third parties Personal info, App activity and 2 others This app may collect these data types Personal info, Photos and videos and 5 others Data is encrypted in transit You can request that data be deleted See details Ratings and reviews Ratings and reviews are verified info_outline arrow_forward Ratings and reviews are verified info_outline phone_android Phone laptop Chromebook tablet_android Tablet 4.8 319K reviews 5 4 3 2 1 Sommy Nriama more_vert Flag inappropriate Show review history <path d="M12 17.27L18.18
2026-01-13T09:29:57