Difference between revisions of "Middleware products verified for the support of SHA-2 proxies and certificates"
Jump to navigation
Jump to search
Line 3: | Line 3: | ||
{{Template:Middleware_menubar}} | {{Template:Middleware_menubar}} | ||
Starting from January 2013, as part of the [[EGI_Quality_Criteria_Dissemination|UMD quality criteria]] products requiring authentication are tested for the support of SHA-2 | Starting from January 2013, as part of the [[EGI_Quality_Criteria_Dissemination|UMD quality criteria]] products requiring authentication are tested for the support of SHA-2. The following table collects the products tested so far during the UMD software provisioning process. | ||
{| cellspacing="0" cellpadding="5" class="wikitable" style="border:1px solid black;" width=90% | |||
|- style="background-color:darkgray;" | |||
! Technology provider | |||
! Product name | |||
! Release version tested | |||
! SHA-2 support | |||
! RFC proxies support | |||
! Comments | |||
|- | |||
| | |||
| | |||
| | |||
| | |||
| | |||
| | |||
|} |
Revision as of 10:31, 11 February 2013
Main | EGI.eu operations services | Support | Documentation | Tools | Activities | Performance | Technology | Catch-all Services | Resource Allocation | Security |
Starting from January 2013, as part of the UMD quality criteria products requiring authentication are tested for the support of SHA-2. The following table collects the products tested so far during the UMD software provisioning process.
Technology provider | Product name | Release version tested | SHA-2 support | RFC proxies support | Comments |
---|---|---|---|---|---|