Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 379 for are (0.09 sec)

  1. src/main/java/jcifs/SmbConstants.java

        /**
         * Long file names are supported flag.
         */
        int FLAGS2_LONG_FILENAMES = 0x0001;
        /**
         * Extended attributes are supported flag.
         */
        int FLAGS2_EXTENDED_ATTRIBUTES = 0x0002;
        /**
         * Security signatures are supported flag.
         */
        int FLAGS2_SECURITY_SIGNATURES = 0x0004;
        /**
         * Security signatures are required flag.
         */
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 24 00:49:49 UTC 2025
    - 12.8K bytes
    - Viewed (0)
  2. docs/en/docs/advanced/security/oauth2-scopes.md

    In this example we are using the OAuth2 "password" flow.
    
    This is appropriate when we are logging in to our own application, probably with our own frontend.
    
    Because we can trust it to receive the `username` and `password`, as we control it.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 13.5K bytes
    - Viewed (0)
  3. docs/en/docs/async.md

    Beautiful illustrations by <a href="https://www.instagram.com/ketrinadrawsalot" class="external-link" target="_blank">Ketrina Thompson</a>. 🎨
    
    ///
    
    ---
    
    Imagine you are the computer / program 🤖 in that story.
    
    While you are at the line, you are just idle 😴, waiting for your turn, not doing anything very "productive". But the line is fast because the cashier is only taking the orders (not preparing them), so that's fine.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:56:21 UTC 2025
    - 24K bytes
    - Viewed (0)
  4. docs/en/docs/tutorial/cors.md

    So, all these are different origins:
    
    * `http://localhost`
    * `https://localhost`
    * `http://localhost:8080`
    
    Even if they are all in `localhost`, they use different protocols or ports, so, they are different "origins".
    
    ## Steps { #steps }
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 5.5K bytes
    - Viewed (0)
  5. docs/en/docs/advanced/security/http-basic-auth.md

    ### Return the error { #return-the-error }
    
    After detecting that the credentials are incorrect, return an `HTTPException` with a status code 401 (the same returned when no credentials are provided) and add the header `WWW-Authenticate` to make the browser show the login prompt again:
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 5K bytes
    - Viewed (0)
  6. docs/en/docs/advanced/advanced-dependencies.md

    /// tip
    
    All this might seem contrived. And it might not be very clear how is it useful yet.
    
    These examples are intentionally simple, but show how it all works.
    
    In the chapters about security, there are utility functions that are implemented in this same way.
    
    If you understood all this, you already know how those utility tools for security work underneath.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 2.6K bytes
    - Viewed (0)
  7. src/main/java/jcifs/smb1/smb1/NtStatus.java

                "No mapping between account names and security IDs was done.", "The security ID structure is invalid.",
                "All pipe instances are busy.", "All pipe instances are busy.", "The pipe state is invalid.", "All pipe instances are busy.",
                "No process is on the other end of the pipe.", "The pipe is being closed.",
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 13.2K bytes
    - Viewed (0)
  8. docs/en/docs/tutorial/security/get-current-user.md

    /// tip
    
    You might remember that request bodies are also declared with Pydantic models.
    
    Here **FastAPI** won't get confused because you are using `Depends`.
    
    ///
    
    /// check
    
    The way this dependency system is designed allows us to have different dependencies (different "dependables") that all return a `User` model.
    
    We are not restricted to having only one dependency that can return that type of data.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 4K bytes
    - Viewed (0)
  9. docs/en/docs/tutorial/sql-databases.md

    If we had declared `-> HeroPublic`, your editor and linter would complain (rightfully so) that you are returning a `Hero` instead of a `HeroPublic`.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 15.4K bytes
    - Viewed (0)
  10. docs/en/docs/advanced/security/index.md

    # Advanced Security { #advanced-security }
    
    ## Additional Features { #additional-features }
    
    There are some extra features to handle security apart from the ones covered in the [Tutorial - User Guide: Security](../../tutorial/security/index.md){.internal-link target=_blank}.
    
    /// tip
    
    The next sections are **not necessarily "advanced"**.
    
    And it's possible that for your use case, the solution is in one of them.
    
    ///
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 708 bytes
    - Viewed (0)
Back to top