-
### Is your feature request related to a problem? Please describe.
When I was about to upload a bug report, I saw that logs are mandatory for any reports. Makes sense I thought, so I decided to have …
-
@gkostal 09/12/2023 SIG meeting:
How is "identity" represented for an attested environment? Can it be generalized?
* Especially if the attested environment is a confidential compute attested envi…
-
## Value Statement
**_As a_** software developer
**_I want to_** figure out a process for reporting "bad" SSNs and File Numbers
**_So that_** they can be resolved instead of getting lost after caus…
-
Hey everyone.
Trying to root a Merkury 720 clone from hama. Software version is 2.7.8.
Managed to get http access with the ppsFactoryTool setup.
**deviceInfo** returns:
`{"devname":"Smart Ho…
-
### Summary of the new feature / enhancement
I would really like a way to create a token (for use with an API), without having to create a user (identity). The API is being restricted to a specific…
-
### What would you like to see added in this software?
I have a suggestion that might improve both accuracy and execution speed of the gradient non-linearity distortion correction workflow.
It wou…
-
### Pitch
Currently when moderators receive reports, it's just a big list, and it can be hard to know where to focus first. At the same time, there's often a few accounts who consistently make good…
-
I added and verified a CA enabled for auto-enroll. I issued a client cert from the external CA that I'd verified. I downloaded the verified CA's JWT. I attempted to enroll with latest `ziti-edge-tunne…
-
It may be a "question" or a request to documentation, but it's expressed solely as an Error and so I'm reporting it as a bug.
I've created an application in the [Amazon Q for Business](https://us-e…
-
Identity non-implementation specific requirements.
The requirement ought to outline the goal of the software and minimum capabilities of the software.
ghost updated
8 months ago