Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 130 for sasl (0.03 sec)

  1. internal/logger/target/kafka/kafka_scram_client_contrib.go

    )
    
    func initScramClient(cfg Config, config *sarama.Config) {
    	switch strings.ToLower(cfg.SASL.Mechanism) {
    	case "sha512":
    		config.Net.SASL.SCRAMClientGeneratorFunc = func() sarama.SCRAMClient { return &XDGSCRAMClient{HashGeneratorFcn: KafkaSHA512} }
    		config.Net.SASL.Mechanism = sarama.SASLMechanism(sarama.SASLTypeSCRAMSHA512)
    	case "sha256":
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 3.3K bytes
    - Viewed (0)
  2. docs/logging/README.md

    sasl_username    (string)    username for SASL/PLAIN or SASL/SCRAM authentication
    sasl_password    (string)    password for SASL/PLAIN or SASL/SCRAM authentication
    sasl_mechanism   (string)    sasl authentication mechanism, default 'plain'
    tls_client_auth  (string)    clientAuth determines the Kafka server's policy for TLS client auth
    sasl             (on|off)    set to 'on' to enable SASL authentication
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 10.5K bytes
    - Viewed (0)
  3. internal/event/target/kafka_scram_client_contrib.go

    func initScramClient(args KafkaArgs, config *sarama.Config) {
    	switch strings.ToLower(args.SASL.Mechanism) {
    	case "sha512":
    		config.Net.SASL.SCRAMClientGeneratorFunc = func() sarama.SCRAMClient { return &XDGSCRAMClient{HashGeneratorFcn: KafkaSHA512} }
    		config.Net.SASL.Mechanism = sarama.SASLMechanism(sarama.SASLTypeSCRAMSHA512)
    	case "sha256":
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 3.2K bytes
    - Viewed (0)
  4. internal/logger/target/kafka/kafka.go

    			return err
    		}
    		sconfig.Version = kafkaVersion
    	}
    
    	sconfig.Net.KeepAlive = 60 * time.Second
    	sconfig.Net.SASL.User = h.kconfig.SASL.User
    	sconfig.Net.SASL.Password = h.kconfig.SASL.Password
    	initScramClient(h.kconfig, sconfig) // initializes configured scram client.
    	sconfig.Net.SASL.Enable = h.kconfig.SASL.Enable
    
    	tlsConfig, err := saramatls.NewConfig(h.kconfig.TLS.ClientTLSCert, h.kconfig.TLS.ClientTLSKey)
    	if err != nil {
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 10.2K bytes
    - Viewed (0)
  5. internal/logger/config.go

    		kafkaArgs.SASL.Enable = getCfgVal(EnvKafkaSASLEnable, k, kv.Get(KafkaSASL)) == config.EnableOn
    		kafkaArgs.SASL.User = getCfgVal(EnvKafkaSASLUsername, k, kv.Get(KafkaSASLUsername))
    		kafkaArgs.SASL.Password = getCfgVal(EnvKafkaSASLPassword, k, kv.Get(KafkaSASLPassword))
    		kafkaArgs.SASL.Mechanism = getCfgVal(EnvKafkaSASLMechanism, k, kv.Get(KafkaSASLMechanism))
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 18.7K bytes
    - Viewed (0)
  6. internal/config/notify/legacy.go

    			Value: strconv.Itoa(int(cfg.TLS.ClientAuth)),
    		},
    		config.KV{
    			Key:   target.KafkaSASL,
    			Value: config.FormatBool(cfg.SASL.Enable),
    		},
    		config.KV{
    			Key:   target.KafkaSASLUsername,
    			Value: cfg.SASL.User,
    		},
    		config.KV{
    			Key:   target.KafkaSASLPassword,
    			Value: cfg.SASL.Password,
    		},
    		config.KV{
    			Key:   target.KafkaCompressionCodec,
    			Value: cfg.Producer.Compression,
    		},
    		config.KV{
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Apr 27 04:30:57 UTC 2025
    - 13.3K bytes
    - Viewed (0)
  7. docs/bucket/notifications/README.md

    sasl_username    (string)    username for SASL/PLAIN or SASL/SCRAM authentication
    sasl_password    (string)    password for SASL/PLAIN or SASL/SCRAM authentication
    sasl_mechanism   (string)    sasl authentication mechanism, default 'PLAIN'
    tls_client_auth  (string)    clientAuth determines the Kafka server's policy for TLS client auth
    sasl             (on|off)    set to 'on' to enable SASL authentication
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 84.2K bytes
    - Viewed (0)
  8. internal/config/notify/parse.go

    			saslMechanismEnv = saslMechanismEnv + config.Default + k
    		}
    		kafkaArgs.SASL.Enable = env.Get(saslEnableEnv, kv.Get(target.KafkaSASL)) == config.EnableOn
    		kafkaArgs.SASL.User = env.Get(saslUsernameEnv, kv.Get(target.KafkaSASLUsername))
    		kafkaArgs.SASL.Password = env.Get(saslPasswordEnv, kv.Get(target.KafkaSASLPassword))
    		kafkaArgs.SASL.Mechanism = env.Get(saslMechanismEnv, kv.Get(target.KafkaSASLMechanism))
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 47.5K bytes
    - Viewed (0)
  9. src/main/resources/fess_sso++.xml

    	</component>
    	<component name="oicAuthenticator" class="org.codelibs.fess.sso.oic.OpenIdConnectAuthenticator">
    	</component>
    	<component name="samlAuthenticator" class="org.codelibs.fess.sso.saml.SamlAuthenticator">
    	</component>
    	<component name="spnegoAuthenticator" class="org.codelibs.fess.sso.spnego.SpnegoAuthenticator">
    	</component>
    Registered: Sat Dec 20 09:19:18 UTC 2025
    - Last Modified: Thu Nov 27 07:33:53 UTC 2025
    - 612 bytes
    - Viewed (0)
  10. src/main/java/jcifs/internal/dtyp/SecurityInfo.java

        /**
         * Flag indicating that discretionary access control list (DACL) information is requested or being set.
         */
        int DACL_SECURITY_INFO = 0x4;
    
        /**
         * Flag indicating that system access control list (SACL) information is requested or being set.
         */
        int SACL_SECURITY_INFO = 0x8;
    
        /**
         * Flag indicating that mandatory label information is requested or being set.
         */
        int LABEL_SECURITY_INFO = 0x10;
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 2.2K bytes
    - Viewed (0)
Back to top