-
Hi,
The current documents treat captivity as a transient phase with a well-defined exit process. Often, the users stay in a "captive" mode longer, and they can still access certain resources/websit…
-
- Generate yaml config as files; the config contains policy name cluster and namespace mapping
- store in a similar hierarchy as policies
- Output on file system and or github (if the config provid…
-
> Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. These attacks…
-
-
This section of the "Creating policies from verdicts" doc describes how to look at cilium monitor output and understand how the identities, direction, etc. aspects of a policy log relate to the endpoi…
-
Given that match key providers have great power in the IPA proposal to do cross-device attribution and to match web events with [arbitrary off-web events](https://github.com/patcg-individual-drafts/ip…
-
Right now in cirq and all modules in the main cirq repo, the `cirq_type` field used in json serialization is the unqualified object name. This has not caused any naming collisions yet.
I had alway…
-
```
Some administrators will want to (for their systems' or their users'
safety) enforce a policy for password strength.
It would be good to have some presets, and also allow a custom function in
the…
-
```
Some administrators will want to (for their systems' or their users'
safety) enforce a policy for password strength.
It would be good to have some presets, and also allow a custom function in
the…
-
### What version of the package are you using?
latest
### Does this issue reproduce with the latest release?
Yes
### What OS and CPU architecture are you using (`go env`)?
irrelevant
### W…