- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for grant_type (0.06 sec)
-
docs/sts/wso2.md
Request ``` curl -u <CLIENT_ID>:<CLIENT_SECRET> -k -d "grant_type=client_credentials" -H "Content-Type:application/x-www-form-urlencoded" https://<IS_HOST>:<IS_HTTPS_PORT>/oauth2/token ``` Example: ``` curl -u PoEgXP6uVO45IsENRngDXj5Au5Ya:eKsw6z8CtOJVBtrOWvhRWL4TUCga -k -d "grant_type=client_credentials" -H "Content-Type:application/x-www-form-urlencoded" https://localhost:9443/oauth2/token ```
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.7K bytes - Viewed (0) -
docs/em/docs/tutorial/security/simple-oauth2.md
{* ../../docs_src/security/tutorial003.py hl[4,76] *} `OAuth2PasswordRequestForm` đ đ đ đŖ đ¨ đĒ âŽī¸: * `username`. * `password`. * đĻ `scope` đ đĻ đģ, â đģ đ đ. * đĻ `grant_type`. /// tip Oauth2ī¸âŖ đ đ¤ *đ* đ `grant_type` âŽī¸ đ§ đ˛ `password`, âī¸ `OAuth2PasswordRequestForm` đĢ đ ī¸ âĢī¸. đĨ đ đĒ đ ī¸ âĢī¸, âī¸ `OAuth2PasswordRequestFormStrict` âŠī¸ `OAuth2PasswordRequestForm`. ///
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Nov 18 02:25:44 UTC 2024 - 7.7K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
* The `username`. * The `password`. * An optional `scope` field as a big string, composed of strings separated by spaces. * An optional `grant_type`. /// tip The OAuth2 spec actually *requires* a field `grant_type` with a fixed value of `password`, but `OAuth2PasswordRequestForm` doesn't enforce it. If you need to enforce it, use `OAuth2PasswordRequestFormStrict` instead of `OAuth2PasswordRequestForm`.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 9.4K bytes - Viewed (0) -
docs/sts/client_grants/__init__.py
basic_auth='%s:%s' % (self.cid, self.csec))['authorization'] response = self._http.urlopen('POST', self.idp_ep, body="grant_type=client_credentials", headers=headers, preload_content=True, ) if response.status != 200:
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Apr 23 18:58:53 UTC 2021 - 4.6K bytes - Viewed (0) -
docs/sts/web-identity.py
@app.route('/oauth2/callback') def callback(): error = request.args.get('error', '') if error: return "Error: " + error authorization_code = request.args.get('code') data = {'grant_type': 'authorization_code', 'code': authorization_code, 'redirect_uri': callback_uri} id_token_response = requests.post( token_url, data=data, verify=False,
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Jul 28 01:37:51 UTC 2021 - 2.9K bytes - Viewed (0) -
docs/sts/client-grants.go
flag.StringVar(&clientID, "cid", "", "Client ID") flag.StringVar(&clientSecret, "csec", "", "Client secret") } func getTokenExpiry() (*credentials.ClientGrantsToken, error) { data := url.Values{} data.Set("grant_type", "client_credentials") req, err := http.NewRequest(http.MethodPost, idpEndpoint, strings.NewReader(data.Encode())) if err != nil { return nil, err } req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Thu Aug 19 01:35:22 UTC 2021 - 3.3K bytes - Viewed (0) -
docs/sts/keycloak.md
After that, you will be able to obtain an id_token for the Admin REST API using client_id and client_secret: ``` curl \ -d "client_id=<YOUR_CLIENT_ID>" \ -d "client_secret=<YOUR_CLIENT_SECRET>" \ -d "grant_type=client_credentials" \ "http://localhost:8080/auth/realms/{realm}/protocol/openid-connect/token" ```
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.1K bytes - Viewed (0)