Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    1,505 openssl jobs found, pricing in USD

    I need to know where I need to install this template for it work - like what hosting company, what package, etc. is needed to run this: These are listed as the requirements for the template: Requirements: PHP version PHP 7.3.0 or higher is required. Mysqli Extension Mysqli Extension is required. OpenSSL Extension OpenSSL PHP Extension is required. Mbstring PHP Extension Mbstring PHP Extension is required. PDO PHP extension PDO PHP extension is required. Tokenizer PHP Extension Tokenizer PHP Extension is required. PHP Zip Archive PHP Zip Archive is required. IMAP Extension PHP IMAP Extension is required. SQLite3 Extension PHP SQLite3 Extension is required. PHP GD Library PHP GD Library is required. PHP Fileinfo extension

    $31 (Avg Bid)
    $31 Avg Bid
    15 bids

    ...for another application.) -Note2: (I have just purchased an SSL Certificate to use it.) I tried to enable SSL before and it didn't work and this was the result of the errors (from wamp/logs): ----------------- [Thu Jul 08 00:22:39 2021] [warn] _default_ VirtualHost overlap on port 8443, the first has precedence [Thu Jul 08 00:22:42 2021] [notice] Apache/2.2.23 (Win32) PHP/5.4.9 mod_ssl/2.2.23 OpenSSL/1.0.2s configured -- resuming normal operations [Thu Jul 08 00:22:42 2021] [notice] Server built: Aug 24 2012 11:30:00 [Thu Jul 08 00:22:42 2021] [notice] Parent: Created child process 5880 [Thu Jul 08 00:22:42 2021] [warn] _default_ VirtualHost overlap on port 8443, the first has precedence [Thu Jul 08 00:22:43 2021] [warn] _default_ VirtualHost overlap on port 8443, the fir...

    $30 (Avg Bid)
    $30 Avg Bid
    9 bids

    Hi I need a developer with experience programming to communicate over a ssl connection. Specifically you need experience using "fsockopen" or similar command. No chancers please. We will be sending and receiving xml and this needs to be done through an openssl client type connection. I have attached two documents. One contains the API structure and what I wish to achieve and the other has a question you need to answer. You need to provide two lines of code which you HAVE TO TEST FIRST. Specifically your code will send and receive xml. Bids which do not have this or give the incorrect result will be ignored. First correct answer will do a call with me. After that we work together. I prefer an individual and not a company.

    $11 / hr (Avg Bid)
    $11 / hr Avg Bid
    9 bids

    i contacted two fr...and successfully wasted my 5 hours. I purchased a new VPS windows server. and tried to install composer. the error is The Composer installer script was not successful [exit code 1]. OpenSSL failed with a 'certificate verify failed' error. This indicates a problem with the Certificate Authority file(s) on your system, which may be out of date. Certificate location [from ini setting]: C: The used by your command-line PHP is: C:xamppphp Script Output: The "" file could not be downloaded: SSL operation failed with code 1. OpenSSL Error messages: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Failed to enable crypto Is there anyone who can really help me?

    $24 (Avg Bid)
    $24 Avg Bid
    7 bids

    ...for another application. ) -Note2: I have just purchased an SSL Certificate to use it. I tried to enable SSL before and it didn't work and this was the result of the errors (from wamp/logs): ----------------- [Thu Jul 08 00:22:39 2021] [warn] _default_ VirtualHost overlap on port 8443, the first has precedence [Thu Jul 08 00:22:42 2021] [notice] Apache/2.2.23 (Win32) PHP/5.4.9 mod_ssl/2.2.23 OpenSSL/1.0.2s configured -- resuming normal operations [Thu Jul 08 00:22:42 2021] [notice] Server built: Aug 24 2012 11:30:00 [Thu Jul 08 00:22:42 2021] [notice] Parent: Created child process 5880 [Thu Jul 08 00:22:42 2021] [warn] _default_ VirtualHost overlap on port 8443, the first has precedence [Thu Jul 08 00:22:43 2021] [warn] _default_ VirtualHost overlap on port 8443, the firs...

    $27 (Avg Bid)
    $27 Avg Bid
    13 bids

    OpenSSL: error:1414D172:SSL routines:tls12_check_peer_sigalg:wrong signature type Unable to establish SSL connection. I have to download a file with wget but I always have the same error, I'm looking for who can fix the problem

    $19 (Avg Bid)
    $19 Avg Bid
    11 bids

    ...want to use port 8443 for ssl instead of 443 because it is used for another application. I tried to enable SSL before and it didn't work and this was the result of the errors (from wamp/logs): ----------------- [Thu Jul 08 00:22:39 2021] [warn] _default_ VirtualHost overlap on port 8443, the first has precedence [Thu Jul 08 00:22:42 2021] [notice] Apache/2.2.23 (Win32) PHP/5.4.9 mod_ssl/2.2.23 OpenSSL/1.0.2s configured -- resuming normal operations [Thu Jul 08 00:22:42 2021] [notice] Server built: Aug 24 2012 11:30:00 [Thu Jul 08 00:22:42 2021] [notice] Parent: Created child process 5880 [Thu Jul 08 00:22:42 2021] [warn] _default_ VirtualHost overlap on port 8443, the first has precedence [Thu Jul 08 00:22:43 2021] [warn] _default_ VirtualHost overlap on port 8443, the fir...

    $30 (Avg Bid)
    $30 Avg Bid
    13 bids

    ...want to use port 8443 for ssl instead of 443 because it is used for another application. I tried to enable SSL before and it didn't work and this was the result of the errors (from wamp/logs): ----------------- [Thu Jul 08 00:22:39 2021] [warn] _default_ VirtualHost overlap on port 8443, the first has precedence [Thu Jul 08 00:22:42 2021] [notice] Apache/2.2.23 (Win32) PHP/5.4.9 mod_ssl/2.2.23 OpenSSL/1.0.2s configured -- resuming normal operations [Thu Jul 08 00:22:42 2021] [notice] Server built: Aug 24 2012 11:30:00 [Thu Jul 08 00:22:42 2021] [notice] Parent: Created child process 5880 [Thu Jul 08 00:22:42 2021] [warn] _default_ VirtualHost overlap on port 8443, the first has precedence [Thu Jul 08 00:22:43 2021] [warn] _default_ VirtualHost overlap on port 8443, the fir...

    $26 (Avg Bid)
    $26 Avg Bid
    11 bids

    I need to encrypt and decrypt files using the openssl library in C++. I use the following for encryption to run in shell: commandToRun = "openssl enc -aes-256-ctr -pbkdf2 -salt -in "; commandToRun += in_fileToEncrypt; commandToRun += " -out "; commandToRun += in_fileToEncrypt; commandToRun += ".enc -pass pass:"; commandToRun += in_password; I use the following for decryption to run in shell: commandToRun = "openssl enc -aes-256-ctr -pbkdf2 -salt -d -in "; commandToRun += in_fileToDecrypt; commandToRun += ".enc -out "; commandToRun += in_fileToDecrypt; commandToRun += " -pass pass:"; commandToRun += in_password; These two methods use the openssl binary but I need code that does it in C++...

    $95 (Avg Bid)
    $95 Avg Bid
    2 bids

    open ssl with Apache in local server help to setup and run the certificate

    $26 (Avg Bid)
    $26 Avg Bid
    19 bids

    Shell Script To sign files using openssl commands

    $32 (Avg Bid)
    $32 Avg Bid
    2 bids

    We are building a distributed filesystem using a data transfer protocol called UDT (), built on top o...transfer protocol called UDT (), built on top of UDP and based off of the Sector () project. Sector hasn't been developed in over a decade, and uses an old version of OpenSSL; in addition, the UDT transport class is currently not using TLS. For this job, we need someone to do two things: 1) Implement TLS for UDT using the OpenSSL BIO class, following the general guidelines laid out in this proposal: (), and 2) Update our code base to ensure that OpenSSL TLS is being used correctly, providing diagrams and justifications for how and when it is used.

    $910 (Avg Bid)
    $910 Avg Bid
    10 bids

    I need help from an expert to install MQTT TLS certificates, I tried but I couldn't. I'm using mosquitto I got this Error: 1623999052: Socket error on client <unknown>, disconnecting. 1623999053: New connection from on port 8883. 1623999053: OpenSSL Error[0]: error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate 1623999053: Socket error on client <unknown>, disconnecting. 1623999054: New connection from on port 8883. 1623999054: OpenSSL Error[0]: error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate 1623999054: Socket error on client <unknown>, disconnecting. 1623999055: New connection from on port 8883.

    $106 (Avg Bid)
    $106 Avg Bid
    4 bids

    I need help from an expert to install MQTT TLS certificates, I tried but I couldn't I got this Error: 1623999052: Socket error on client <unknown>, disconnecting. 1623999053: New connection from on port 8883. 1623999053: OpenSSL Error[0]: error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate 1623999053: Socket error on client <unknown>, disconnecting. 1623999054: New connection from on port 8883. 1623999054: OpenSSL Error[0]: error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate 1623999054: Socket error on client <unknown>, disconnecting. 1623999055: New connection from on port 8883.

    $50 (Avg Bid)
    $50 Avg Bid
    1 bids

    The user, using openssl on a windows pc, creates a .csr file. With this file, on the apple Developer program site it creates a distribution certificate from a windows 10 pc. Download the certificate on the windows pc. Subsequently it is necessary to install the certificate on the keychain of a remote mac (windows 10 pc) using an automatic process, a batch file from windows or any other solution that does not require the use of a man.

    $20 (Avg Bid)
    $20 Avg Bid
    1 bids

    Hi, We have an app ...Push notification. - We are sending Push notification message from our custom web based admin made using angular as front end. - Our android App is working fine for sending and receiving Push Notification. - But for IOS, we are not able to make it works. - FYI, we have done generating the following : for Push Notification Certificate (APNs Certificate). , the openssl generated certificate (if Required) - We need a guideline and hands on assistant on how to make IOS push notification works via our angular web admin. - You may use XCODE to simulate it. **This project will be awarded to whom can give logical reason on why the app is crashing and explain what we missed for push notification VIA CHAT. Git will be shared.** Thank you.

    $198 (Avg Bid)
    $198 Avg Bid
    10 bids

    ...authentication will be done with the domain name / subdomain and the client's license as authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES). 4. The API made must generate a log of the users that use it / call it with the data: Date, IP, Domain / subdomain This log can be consulted in a simple server page displayed as a table with the following columns: Date, IP, Domain, Action and will be automatically cleared every 60 days without using CRON, you can use a timestamp and put a button to clear them manua...

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    I have a C++ server, the server is written using Boost Beast and based on this example code It currently works using WebSockets(WS) however I would like to upgrade it to work with Secure Websockets(WS...currently works using WebSockets(WS) however I would like to upgrade it to work with Secure Websockets(WSS) . I have upgraded the code to use Secure Websockets, however, I'm getting errors that I cannot debug. The errors occur during the handshake and imply that the website name was not correct for the server that was presented. I am looking for a C++ Networking expert who knows Boost ASIO and OpenSSL well enough to help me understand what is going wrong with my code/certificate setup and how to fix it.

    $658 (Avg Bid)
    $658 Avg Bid
    9 bids

    Docker instance with Openssl Make sure it is working and let us know of any issues

    $14 (Avg Bid)
    $14 Avg Bid
    5 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    Basic info: This is a detailed explanation for the project. Language: C++/lua Requirement: boost 1.69, openssl 1.1.1k to build (I can provide if needed) VS2017x64 for editing the source Change directory in for boost and openssl 1.1.1k and build with vs2017 command prompt, nmake build -f Time period: 1w to 1 month. Weekly report or weekly plan is needed for more than 1w. This is a no rush project, time is negotiable. Provide at least 1 week of post-sell service in case there is further problems If paid by time, the coder has to report progress at least every 10h of work time. Payment: Paypal or Zelle if not done on a 3rd party platform. Payment is done upon finishing each target. Acceptance 30%, target 1 15%, target 2 15%, target 3 40%. Target: Build a visualized

    $1270 (Avg Bid)
    $1270 Avg Bid
    11 bids

    Hello, I have 2 guacamole servers installed on centos server. need to generate and install openssl on both. cert info will be provided later. need to get this done quick. thanks

    $27 (Avg Bid)
    $27 Avg Bid
    8 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $250 - $250
    $250 - $250
    0 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $250 - $250
    $250 - $250
    0 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $250 - $250
    $250 - $250
    0 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $500 (Avg Bid)
    $500 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $500 (Avg Bid)
    $500 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $500 (Avg Bid)
    $500 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $500 (Avg Bid)
    $500 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $500 (Avg Bid)
    $500 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $306 (Avg Bid)
    $306 Avg Bid
    9 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    30 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $224 (Avg Bid)
    $224 Avg Bid
    4 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $200 - $200
    $200 - $200
    0 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $200 (Avg Bid)
    $200 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...authentication will be done with the domain / subdomain name and the client's license as the authentication method. For this point, a MYSQL table is used on a server where there is a list with linked domains and licenses that is constantly updated. 3. It is very important that security measures are implemented (the information between client and server must be encrypted using some option such as JWT, OpenSSL, AES) 4. The API carried out must generate a log of the users who use / call it with the data: Date, IP, domain / subdomain This log can be consulted in a simple page of the server that is shown as a table with the following columns: Date, IP, Domain, Action and it will be cleaned automatically every 60 days without using CRON, you can use a timestamp and put a button...

    $250 - $250
    $250 - $250
    0 bids