r6rs-springkussen
cli
r6rs-springkussen | cli | |
---|---|---|
1 | 8 | |
5 | 3,487 | |
- | 0.8% | |
10.0 | 9.2 | |
over 1 year ago | 2 days ago | |
Scheme | Go | |
BSD 2-clause "Simplified" License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
r6rs-springkussen
cli
-
Google will disable all but OAuth for IMAP, SMTP and POP starting Sept. 30
https://github.com/smallstep/cli implements some OAuth flows from the CLI, it may be helpful for you.
- Running one’s own root Certificate Authority in 2023
- Uacme: ACMEv2 client written in plain C with minimal dependencies
-
OpenSSL as a GUI
Is the according command line tool (https://github.com/smallstep/cli) from smallstep free and behind this GUI?
-
If you’re not using SSH certificates you’re doing SSH wrong
And they have an open issue for producing a chocolatey package: https://github.com/smallstep/cli/issues/365
-
Should you use Let's Encrypt for internal hostnames?
I'm biased because I'm the founder of the company, but you should check out the certificate management toolchain (CA[1] and CLI[2]) we've built at smallstep. A big focus of the project is human-friendliness. It's not perfect (yet) but I think we've made some good progress.
We also have a hosted option[3] with a free tier that should work for individuals, homelabs, pre-production, and even small production environments. We've started building out a management UI there, and it does map to the CLI as you've described :).
[1] https://github.com/smallstep/certificates
[2] https://github.com/smallstep/cli
[3] https://smallstep.com/certificate-manager/
-
SSH Keys How Are You Managing Them All?
https://github.com/smallstep/cli is pretty amazing, tbh. Documentation is just as stellar!
-
Recommend: Linux-Equivalent Tool of mkcert
https://github.com/smallstep/cli may be a bit overkill for your needs, but it's an epic toolkit and well worth checking out!
What are some alternatives?
certigo - A utility to examine and validate certificates in a variety of formats
jose-jwt - Ultimate Javascript Object Signing and Encryption (JOSE), JSON Web Token (JWT) and Json Web Keys (JWK) Implementation for .NET and .NET Core
gfc - stable branch of gfc, a small go file encryption utility using AES 256 and PBKDF2
slips - SatoshiLabs Improvement Proposals
PHPSecLib - PHP Secure Communications Library
authy - Go library and program to access your Authy TOTP secrets.
forge - A native implementation of TLS in Javascript and tools to write crypto-based and network-heavy webapps
ssh-baseline - DevSec SSH Baseline - InSpec Profile
CryptoNet - CryptoNet is simple, fast and a lightweight asymmetric and symmetric encryption library.
mkcert - A simple zero-config tool to make locally trusted development certificates with any names you'd like.
cl-tls - An implementation of TLS and related specifications in Common Lisp
sio-go - Authenticated encryption for streams in Go