How to Install and Uninstall perl-Authen-Credential.noarch Package on Rocky Linux 8
Last updated: November 29,2024
1. Install "perl-Authen-Credential.noarch" package
Please follow the guidelines below to install perl-Authen-Credential.noarch on Rocky Linux 8
$
sudo dnf update
Copied
$
sudo dnf install
perl-Authen-Credential.noarch
Copied
2. Uninstall "perl-Authen-Credential.noarch" package
Here is a brief guide to show you how to uninstall perl-Authen-Credential.noarch on Rocky Linux 8:
$
sudo dnf remove
perl-Authen-Credential.noarch
Copied
$
sudo dnf autoremove
Copied
3. Information about the perl-Authen-Credential.noarch package on Rocky Linux 8
Last metadata expiration check: 0:20:37 ago on Mon Sep 12 10:27:18 2022.
Available Packages
Name : perl-Authen-Credential
Version : 1.2
Release : 1.el8
Architecture : noarch
Size : 25 k
Source : perl-Authen-Credential-1.2-1.el8.src.rpm
Repository : epel
Summary : Abstraction of a credential
URL : https://metacpan.org/release/Authen-Credential
License : GPL+ or Artistic
Description : This module offers an abstraction of a credential, i.e. something that
: can be used to authenticate. It allows the creation and manipulation of
: credentials. In particular, it defines a standard string representation
: (so that credentials can be given to external programs as command line
: options), a standard structured representation (so that credentials can
: be stored in structured configuration files or using JSON) and
: "preparators" that can transform credentials into ready-to-use data for
: well known targets.
Available Packages
Name : perl-Authen-Credential
Version : 1.2
Release : 1.el8
Architecture : noarch
Size : 25 k
Source : perl-Authen-Credential-1.2-1.el8.src.rpm
Repository : epel
Summary : Abstraction of a credential
URL : https://metacpan.org/release/Authen-Credential
License : GPL+ or Artistic
Description : This module offers an abstraction of a credential, i.e. something that
: can be used to authenticate. It allows the creation and manipulation of
: credentials. In particular, it defines a standard string representation
: (so that credentials can be given to external programs as command line
: options), a standard structured representation (so that credentials can
: be stored in structured configuration files or using JSON) and
: "preparators" that can transform credentials into ready-to-use data for
: well known targets.