Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 213 for token (0.04 sec)

  1. docs/es/docs/tutorial/security/oauth2-jwt.md

    Actualiza `get_current_user` para recibir el mismo token que antes, pero esta vez, usando tokens JWT.
    
    Decodifica el token recibido, verifícalo y devuelve el usuario actual.
    
    Si el token es inválido, devuelve un error HTTP de inmediato.
    
    {* ../../docs_src/security/tutorial004_an_py310.py hl[90:107] *}
    
    ## Actualizar la *path operation* `/token`
    
    Crea un `timedelta` con el tiempo de expiración del token.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  2. docs/de/docs/tutorial/security/oauth2-jwt.md

    Aktualisieren Sie `get_current_user`, um den gleichen Token wie zuvor zu erhalten, dieses Mal jedoch unter Verwendung von JWT-Tokens.
    
    Dekodieren Sie den empfangenen Token, validieren Sie ihn und geben Sie den aktuellen Benutzer zurück.
    
    Wenn der Token ungültig ist, geben Sie sofort einen HTTP-Fehler zurück.
    
    {* ../../docs_src/security/tutorial004_an_py310.py hl[89:106] *}
    
    ## Die *Pfadoperation* `/token` aktualisieren
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 12.1K bytes
    - Viewed (0)
  3. docs/en/docs/tutorial/security/oauth2-jwt.md

    That way, you can create a token with an expiration of, let's say, 1 week. And then when the user comes back the next day with the token, you know that user is still logged in to your system.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.5K bytes
    - Viewed (0)
  4. src/main/java/jcifs/spnego/NegTokenInit.java

        }
    
        /**
         * Constructs a NegTokenInit by parsing the provided token bytes
         * @param token the SPNEGO token bytes to parse
         * @throws IOException if parsing fails
         */
        public NegTokenInit(final byte[] token) throws IOException {
            parse(token);
        }
    
        /**
         * Gets the context flags indicating security capabilities
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 10.3K bytes
    - Viewed (0)
  5. fess-crawler/src/main/java/org/codelibs/fess/crawler/client/http/form/FormScheme.java

     * <li>TOKEN_NAME - The name of the token parameter.</li>
     * <li>TOKEN_METHOD - The HTTP method to use for the token request (GET or POST).</li>
     * <li>TOKEN_PARAMTERS - The parameters to include in the token request.</li>
     * <li>LOGIN_METHOD - The HTTP method to use for the login request (GET or POST).</li>
     * <li>LOGIN_URL - The URL to send the login request to.</li>
    Registered: Sun Sep 21 03:50:09 UTC 2025
    - Last Modified: Sun Jul 06 02:13:03 UTC 2025
    - 14.3K bytes
    - Viewed (1)
  6. src/bufio/scan.go

    		if s.end > s.start || s.err != nil {
    			advance, token, err := s.split(s.buf[s.start:s.end], s.err != nil)
    			if err != nil {
    				if err == ErrFinalToken {
    					s.token = token
    					s.done = true
    					// When token is not nil, it means the scanning stops
    					// with a trailing token, and thus the return value
    					// should be true to indicate the existence of the token.
    					return token != nil
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Wed May 21 18:05:26 UTC 2025
    - 14.2K bytes
    - Viewed (0)
  7. docs/de/docs/tutorial/security/simple-oauth2.md

    ///
    
    ## Den Token zurückgeben
    
    Die Response des `token`-Endpunkts muss ein JSON-Objekt sein.
    
    Es sollte einen `token_type` haben. Da wir in unserem Fall „Bearer“-Token verwenden, sollte der Token-Typ "`bearer`" sein.
    
    Und es sollte einen `access_token` haben, mit einem String, der unseren Zugriffstoken enthält.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 10.7K bytes
    - Viewed (0)
  8. src/test/java/jcifs/spnego/NegTokenInitTest.java

        void testParseRejectsUnknownField() throws Exception {
            ASN1TaggedObject unknown = new DERTaggedObject(true, 7, new DEROctetString(new byte[] { 0x01 }));
            byte[] token = buildInitToken(new ASN1ObjectIdentifier[] { OID_KRB }, 0, null, null, false, null, null, unknown);
    
            IOException ex = assertThrows(IOException.class, () -> new NegTokenInit(token));
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 21K bytes
    - Viewed (0)
  9. src/test/java/jcifs/internal/smb2/session/Smb2SessionSetupRequestTest.java

            // Security Buffer Length
            assertEquals(token.length, SMBUtil.readInt2(buffer, bodyOffset + 14));
    
            // Previous Session ID
            assertEquals(previousSessionId, SMBUtil.readInt8(buffer, bodyOffset + 16));
    
            // Token content
            byte[] actualToken = new byte[token.length];
            System.arraycopy(buffer, securityBufferOffset, actualToken, 0, token.length);
            assertArrayEquals(token, actualToken);
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 21.2K bytes
    - Viewed (0)
  10. docs/es/docs/tutorial/security/simple-oauth2.md

    ///
    
    ## Devolver el token
    
    El response del endpoint `token` debe ser un objeto JSON.
    
    Debe tener un `token_type`. En nuestro caso, como estamos usando tokens "Bearer", el tipo de token debe ser "`bearer`".
    
    Y debe tener un `access_token`, con un string que contenga nuestro token de acceso.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Dec 30 18:26:57 UTC 2024
    - 9.9K bytes
    - Viewed (0)
Back to top