- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 12 for authorize (0.06 sec)
-
tests/test_security_oauth2_authorization_code_bearer_scopes_openapi.py
from fastapi.security import OAuth2AuthorizationCodeBearer from fastapi.testclient import TestClient from inline_snapshot import snapshot oauth2_scheme = OAuth2AuthorizationCodeBearer( authorizationUrl="authorize", tokenUrl="token", auto_error=True, scopes={"read": "Read access", "write": "Write access"}, ) async def get_token(token: Annotated[str, Depends(oauth2_scheme)]) -> str: return token
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 21:25:59 UTC 2025 - 6.6K bytes - Viewed (0) -
tests/test_security_oauth2_authorization_code_bearer_scopes_openapi_simple.py
from fastapi.security import OAuth2AuthorizationCodeBearer from fastapi.testclient import TestClient from inline_snapshot import snapshot oauth2_scheme = OAuth2AuthorizationCodeBearer( authorizationUrl="api/oauth/authorize", tokenUrl="/api/oauth/token", scopes={"read": "Read access", "write": "Write access"}, ) async def get_token(token: Annotated[str, Depends(oauth2_scheme)]) -> str: return token
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 21:25:59 UTC 2025 - 2.6K bytes - Viewed (0) -
docs/es/docs/tutorial/security/simple-oauth2.md
Abre la documentación interactiva: <a href="http://127.0.0.1:8000/docs" class="external-link" target="_blank">http://127.0.0.1:8000/docs</a>. ### Autenticar { #authenticate } Haz clic en el botón "Authorize". Usa las credenciales: Usuario: `johndoe` Contraseña: `secret` <img src="/img/tutorial/security/image04.png"> Después de autenticarte en el sistema, lo verás así:
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Tue Dec 16 16:33:45 UTC 2025 - 10.3K bytes - Viewed (0) -
docs/es/docs/tutorial/security/first-steps.md
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Tue Dec 16 16:33:45 UTC 2025 - 8.9K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/sso/entraid/EntraIdAuthenticator.java
} return value; } /** * Gets the Entra ID authority URL from configuration. * Uses new entraid.authority key with fallback to legacy aad.authority. * @return The authority URL. */ protected String getAuthority() { String value = ComponentUtil.getFessConfig().getSystemProperty(ENTRAID_AUTHORITY);Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Sat Dec 13 02:21:17 UTC 2025 - 56.7K bytes - Viewed (0) -
fastapi/applications.py
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 21:25:59 UTC 2025 - 176.3K bytes - Viewed (0) -
docs/es/docs/tutorial/security/oauth2-jwt.md
Verás la interfaz de usuario como: <img src="/img/tutorial/security/image07.png"> Autoriza la aplicación de la misma manera que antes. Usando las credenciales: Usuario: `johndoe` Contraseña: `secret` /// check | Revisa
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Tue Dec 16 16:33:45 UTC 2025 - 11.3K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/sso/spnego/SpnegoAuthenticator.java
} if (status) { return new ActionResponseCredential(() -> { throw new RequestLoggingFilter.RequestClientErrorException("Your request is not authorized.", "401 Unauthorized", HttpServletResponse.SC_UNAUTHORIZED); }); } // assert if (null == principal) {Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Fri Nov 28 16:29:12 UTC 2025 - 17.8K bytes - Viewed (3) -
CHANGELOG/CHANGELOG-1.32.md
object by patching themselves with an OwnerReference to a cluster-scoped resource. If the OwnerReference resource does not exist or is subsequently deleted, the given node object will be deleted via garbage collection. By default, node users are authorized for create and patch requests but not delete requests against their node object. Since the NodeRestriction admission controller does not prevent patching OwnerReferences, a compromised node could leverage this vulnerability to delete and then recreate...
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Tue Dec 16 18:27:41 UTC 2025 - 448.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.33.md
object by patching themselves with an OwnerReference to a cluster-scoped resource. If the OwnerReference resource does not exist or is subsequently deleted, the given node object will be deleted via garbage collection. By default, node users are authorized for create and patch requests but not delete requests against their node object. Since the NodeRestriction admission controller does not prevent patching OwnerReferences, a compromised node could leverage this vulnerability to delete and then recreate...
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Dec 10 01:15:24 UTC 2025 - 334.8K bytes - Viewed (0)