书栈网 · BookStack 本次搜索耗时 0.016 秒,为您找到 1849 个相关结果.
  • Kafka

    Kafka binding spec Component format Spec metadata fields Note Binding support Authentication Specifying a partition key Response Related links Kafka binding spec Detaile...
  • Managing Users

    Assigning the Harbor System Administrator Role Pages in this section Harbor manages images through projects. You provide access to these images to users by including the users i...
  • Managing Users

    Assigning the Harbor System Administrator Role Pages in this section Harbor manages images through projects. You provide access to these images to users by including the users i...
  • Configuring Authentication

    Pages in this section Harbor supports different modes for authenticating users and managing user accounts. You should select an authentication mode as soon as you deploy Harbor. ...
  • Kafka

    Kafka binding spec Component format Spec metadata fields Binding support Authentication Specifying a partition key Response Related links Kafka binding spec Detailed docu...
  • Uninstalling a cluster on AWS

    Uninstalling a cluster on AWS Removing a cluster that uses installer-provisioned infrastructure Deleting AWS resources with the Cloud Credential Operator utility Uninstalling ...
  • 帐户管理和权限控制

    帐户管理和权限控制 KubeSphere 中的多租户 外部身份验证 设置外部身份验证 LDAP身份提供者 OIDC 身份提供者 OAuth 2.0身份提供者 帐户管理和权限控制 KubeSphere 的多租户架构是运行在容器平台上的许多关键组件的基础。不同的租户被分配不同的角色,以便他们可以执行相关的任务。本章概述了 KubeSphere ...
  • OpenID Connect with Azure AD

    OpenID Connect with Azure AD Prerequisites Kong Configuration Azure AD IdP Configuration Plugin Configuration Access Restrictions Domain Restrictions Consumer Mapping Pseudo-C...
  • OpenID Connect with Azure AD

    OpenID Connect with Azure AD Prerequisites Kong Configuration Azure AD IdP Configuration Plugin Configuration Access Restrictions Domain Restrictions Consumer Mapping Pseudo-C...
  • OpenID Connect with Azure AD

    OpenID Connect with Azure AD Prerequisites Kong Configuration Azure AD IdP Configuration Plugin Configuration Access Restrictions Domain Restrictions Consumer Mapping Pseudo-C...