Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 128 for implicit (0.06 sec)

  1. docs/en/docs/advanced/security/oauth2-scopes.md

    The most common is the implicit flow.
    
    The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow.
    
    /// note
    
    It's common that each authentication provider names their flows in a different way, to make it part of their brand.
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 13.5K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/graph/EdgesConnecting.java

    import com.google.common.collect.UnmodifiableIterator;
    import java.util.AbstractSet;
    import java.util.Map;
    import org.jspecify.annotations.Nullable;
    
    /**
     * A class to represent the set of edges connecting an (implicit) origin node to a target node.
     *
     * <p>The {@link #nodeToOutEdge} map means this class only works on networks without parallel edges.
     * See {@link MultiEdgesConnecting} for a class that works with parallel edges.
     *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 19:31:30 UTC 2025
    - 2.1K bytes
    - Viewed (0)
  3. docs/pt/docs/tutorial/security/index.md

    * `oauth2`: todas as formas do OAuth2 para lidar com segurança (chamados "fluxos").
        * Vários desses fluxos são apropriados para construir um provedor de autenticação OAuth2 (como Google, Facebook, X (Twitter), GitHub, etc):
            * `implicit`
            * `clientCredentials`
            * `authorizationCode`
        * Mas existe um “fluxo” específico que pode ser perfeitamente usado para resolver autenticação diretamente na mesma aplicação:
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 4.8K bytes
    - Viewed (0)
  4. docs/de/docs/tutorial/security/index.md

    * `oauth2`: Alle OAuth2-Methoden zum Umgang mit Sicherheit (genannt „Flows“).
        * Mehrere dieser Flows eignen sich zum Aufbau eines OAuth 2.0-Authentifizierungsanbieters (wie Google, Facebook, X (Twitter), GitHub usw.):
            * `implicit`
            * `clientCredentials`
            * `authorizationCode`
        * Es gibt jedoch einen bestimmten „Flow“, der perfekt für die direkte Abwicklung der Authentifizierung in derselben Anwendung verwendet werden kann:
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 5.1K bytes
    - Viewed (0)
  5. docs/en/docs/tutorial/security/index.md

    * `oauth2`: all the OAuth2 ways to handle security (called "flows").
        * Several of these flows are appropriate for building an OAuth 2.0 authentication provider (like Google, Facebook, X (Twitter), GitHub, etc):
            * `implicit`
            * `clientCredentials`
            * `authorizationCode`
        * But there is one specific "flow" that can be perfectly used for handling authentication in the same application directly:
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 4.4K bytes
    - Viewed (0)
  6. docs/es/docs/tutorial/security/index.md

      * Varios de estos flujos son apropiados para construir un proveedor de autenticación OAuth 2.0 (como Google, Facebook, X (Twitter), GitHub, etc.):
        * `implicit`
        * `clientCredentials`
        * `authorizationCode`
      * Pero hay un "flujo" específico que puede usarse perfectamente para manejar la autenticación directamente en la misma aplicación:
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 4.6K bytes
    - Viewed (0)
  7. docs/ru/docs/tutorial/security/index.md

        * Некоторые из этих "потоков" подходят для реализации аутентификации через сторонний сервис использующий OAuth 2.0 (например, Google, Facebook, X (Twitter), GitHub и т.д.):
            * `implicit`
            * `clientCredentials`
            * `authorizationCode`
        * Но есть один конкретный "поток", который может быть идеально использован для обработки аутентификации непосредственно в том же приложении:
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 8.3K bytes
    - Viewed (0)
  8. docs/de/docs/advanced/security/oauth2-scopes.md

    Am häufigsten ist der „Implicit“-Flow.
    
    Am sichersten ist der „Code“-Flow, die Implementierung ist jedoch komplexer, da mehr Schritte erforderlich sind. Da er komplexer ist, schlagen viele Anbieter letztendlich den „Implicit“-Flow vor.
    
    /// note | Hinweis
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 15.1K bytes
    - Viewed (0)
  9. cmd/config-current.go

    				key, subSys)
    		}
    		h = config.HelpKVS{value}
    	}
    
    	help := config.HelpKVS{}
    
    	// Only for multiple targets, make sure
    	// to list the ENV, for regular k/v EnableKey is
    	// implicit, for ENVs we cannot make it implicit.
    	if subSysHelp.MultipleTargets {
    		key := madmin.EnableKey
    		if envOnly {
    			key = config.EnvPrefix + strings.ToTitle(subSys) + config.EnvWordDelimiter + strings.ToTitle(madmin.EnableKey)
    		}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 28.5K bytes
    - Viewed (0)
  10. src/test/java/jcifs/pac/ASN1UtilTest.java

            }, "Should throw StackOverflowError due to recursive call");
        }
    
        // --- readUnparsedTagged ---
    
        @Test
        void testReadUnparsedTagged_Success() throws IOException {
            // Tag [1] IMPLICIT, content is 0x01 0x02 0x03
            byte[] data = new byte[] { (byte) 0xA1, 0x03, 0x01, 0x02, 0x03 };
            ByteArrayInputStream bais = new ByteArrayInputStream(data);
            ASN1InputStream ais = new ASN1InputStream(bais);
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 9.4K bytes
    - Viewed (0)
Back to top