- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 97 for passwords (0.1 sec)
-
fess-crawler/src/main/java/org/codelibs/fess/crawler/extractor/impl/PasswordBasedExtractor.java
* It provides functionality to manage passwords for different file patterns using regular expressions. * * <p>The extractor supports two types of password management: * <ul> * <li>Static passwords configured via {@link #addPassword(String, String)}</li> * <li>Dynamic passwords provided through extraction parameters</li> * </ul> *
Registered: Sun Sep 21 03:50:09 UTC 2025 - Last Modified: Thu Aug 07 02:55:08 UTC 2025 - 5.1K bytes - Viewed (0) -
docs/sts/dex.yaml
# Let dex keep a list of passwords which can be used to login to dex. enablePasswordDB: true # A static list of passwords to login the end user. By identifying here, dex # won't look in its underlying storage for passwords. # # If this option isn't chosen users may be added through the gRPC API. staticPasswords: - email: "******@****.***" # bcrypt hash of the string "password"
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Jul 15 11:55:55 UTC 2020 - 2.7K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
If the passwords don't match, we return the same error. #### Password hashing { #password-hashing } "Hashing" means: converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish. Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 9.4K bytes - Viewed (0) -
fess-crawler/src/main/java/org/codelibs/fess/crawler/entity/ExtractData.java
public static final String RESOURCE_NAME_KEY = "resourceName"; /** URL key for metadata */ public static final String URL = "url"; /** File passwords key for metadata */ public static final String FILE_PASSWORDS = "file.passwords"; /** Map containing metadata key-value pairs */ protected Map<String, String[]> metadata = new HashMap<>(); /** The extracted content text */
Registered: Sun Sep 21 03:50:09 UTC 2025 - Last Modified: Sat Sep 06 04:15:37 UTC 2025 - 3.8K bytes - Viewed (0) -
docs/en/docs/how-to/conditional-openapi.md
* Make sure you have well defined Pydantic models for your request bodies and responses. * Configure any required permissions and roles using dependencies. * Never store plaintext passwords, only password hashes. * Implement and use well-known cryptographic tools, like Passlib and JWT tokens, etc. * Add more granular permission controls with OAuth2 scopes where needed. * ...etc.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 2.4K bytes - Viewed (0) -
docs/sts/dex.md
"arn:aws:s3:::*" ] } ] } ``` ### Visit <http://localhost:8080> You will be redirected to dex login screen - click "Login with email", enter username password > username: ******@****.*** > password: password and then click "Grant access" On the browser now you shall see the list of buckets output, along with your temporary credentials obtained from MinIO. ``` { "buckets": [Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 3.8K bytes - Viewed (0) -
docs/en/docs/tutorial/extra-models.md
* The **input model** needs to be able to have a password. * The **output model** should not have a password. * The **database model** would probably need to have a hashed password. /// danger Never store user's plaintext passwords. Always store a "secure hash" that you can then verify. If you don't know, you will learn what a "password hash" is in the [security chapters](security/simple-oauth2.md#password-hashing){.internal-link target=_blank}. ///
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 7.2K bytes - Viewed (0) -
docs/de/docs/advanced/security/http-basic-auth.md
Um dies zu lösen, konvertieren wir zunächst den `username` und das `password` in UTF-8-codierte `bytes`. Dann können wir `secrets.compare_digest()` verwenden, um sicherzustellen, dass `credentials.username` `"stanleyjobson"` und `credentials.password` `"swordfish"` ist. {* ../../docs_src/security/tutorial007_an_py39.py hl[1,12:24] *} Dies wäre das gleiche wie: ```Python
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Oct 27 15:25:54 UTC 2024 - 5.8K bytes - Viewed (0) -
docs/de/docs/tutorial/extra-models.md
* Das **hereinkommende Modell** sollte ein Passwort haben können. * Das **herausgehende Modell** sollte kein Passwort haben. * Das **Datenbankmodell** sollte wahrscheinlich ein <abbr title='Ein aus scheinbar zufälligen Zeichen bestehender „Fingerabdruck“ eines Textes. Der Inhalt des Textes kann nicht eingesehen werden.'>gehashtes</abbr> Passwort haben. /// danger | Gefahr
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Nov 18 02:25:44 UTC 2024 - 7.8K bytes - Viewed (0) -
docs/de/docs/tutorial/security/first-steps.md
Betrachten wir es also aus dieser vereinfachten Sicht: * Der Benutzer gibt den `username` und das `password` im Frontend ein und drückt `Enter`. * Das Frontend (das im Browser des Benutzers läuft) sendet diesen `username` und das `password` an eine bestimmte URL in unserer API (deklariert mit `tokenUrl="token"`). * Die API überprüft den `username` und das `password` und antwortet mit einem „Token“ (wir haben davon noch nichts implementiert).
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Nov 18 02:25:44 UTC 2024 - 9.2K bytes - Viewed (0)