Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 2 of 2 for suggestions (0.04 sec)

  1. docs/en/docs/tutorial/query-params-str-validations.md

    Then we **assign those two values** of the tuple to the variables `id` and `name`.
    
    So, if the user didn't provide an item ID, they will still receive a random suggestion.
    
    ...we do all this in a **single simple line**. 🤯 Don't you love Python? 🐍
    
    {* ../../docs_src/query_params_str_validations/tutorial015_an_py310.py ln[22:30] hl[29] *}
    
    ## Recap { #recap }
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 17.2K bytes
    - Viewed (0)
  2. docs/en/docs/advanced/security/oauth2-scopes.md

    The most common is the implicit flow.
    
    The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow.
    
    /// note
    
    It's common that each authentication provider names their flows in a different way, to make it part of their brand.
    
    But in the end, they are implementing the same OAuth2 standard.
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 13.5K bytes
    - Viewed (0)
Back to top