- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 151 for Eskens (0.03 sec)
-
.mailmap
Daz DeBoer <******@****.***> <******@****.***> Daz DeBoer <******@****.***> <******@****.***> Daz DeBoer <******@****.***> <******@****.***> Daz DeBoer <******@****.***> <******@****.***> Derek Eskens <******@****.***> <******@****.***> Etienne Studer <******@****.***> <******@****.***> Etienne Studer <******@****.***> <******@****.***> Etienne Studer <******@****.***> <log>
Registered: Wed Sep 10 11:36:15 UTC 2025 - Last Modified: Tue Oct 03 06:34:28 UTC 2017 - 3.3K bytes - Viewed (0) -
docs/de/docs/tutorial/security/oauth2-jwt.md
# OAuth2 mit Password (und Hashing), Bearer mit JWT-Tokens Da wir nun über den gesamten Sicherheitsablauf verfügen, machen wir die Anwendung tatsächlich sicher, indem wir <abbr title="JSON Web Tokens">JWT</abbr>-Tokens und sicheres Passwort-Hashing verwenden. Diesen Code können Sie tatsächlich in Ihrer Anwendung verwenden, die Passwort-Hashes in Ihrer Datenbank speichern, usw. Wir bauen auf dem vorherigen Kapitel auf. ## Über JWT
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 12.1K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
# OAuth2 with Password (and hashing), Bearer with JWT tokens { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } Now that we have all the security flow, let's make the application actually secure, using <abbr title="JSON Web Tokens">JWT</abbr> tokens and secure password hashing. This code is something you can actually use in your application, save the password hashes in your database, etc.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/suggest/analysis/SuggestAnalyzerTest.java
String lang = "en"; List<AnalyzeToken> tokens = analyzer.analyze(text, field, lang); assertNotNull(tokens); assertEquals(5, tokens.size()); assertEquals("test", tokens.get(0).getTerm()); assertEquals("example", tokens.get(1).getTerm()); assertEquals("com", tokens.get(2).getTerm()); assertEquals("hashtag", tokens.get(3).getTerm());
Registered: Fri Sep 19 09:08:11 UTC 2025 - Last Modified: Mon Sep 01 13:33:03 UTC 2025 - 15.7K bytes - Viewed (0) -
docs/es/docs/tutorial/security/oauth2-jwt.md
# OAuth2 con Password (y hashing), Bearer con tokens JWT Ahora que tenemos todo el flujo de seguridad, hagamos que la aplicación sea realmente segura, usando tokens <abbr title="JSON Web Tokens">JWT</abbr> y hashing de contraseñas seguras. Este código es algo que puedes usar realmente en tu aplicación, guardar los hashes de las contraseñas en tu base de datos, etc. Vamos a empezar desde donde lo dejamos en el capítulo anterior e incrementarlo. ## Acerca de JWT
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.9K bytes - Viewed (0) -
src/cmd/asm/internal/lex/lex.go
args []string // Formal arguments. tokens []Token // Body of macro. } // Tokenize turns a string into a list of Tokens; used to parse the -D flag and in tests. func Tokenize(str string) []Token { t := NewTokenizer("command line", strings.NewReader(str), nil) var tokens []Token for { tok := t.Next() if tok == scanner.EOF { break } tokens = append(tokens, Make(tok, t.Text())) } return tokens
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Tue Aug 29 18:31:05 UTC 2023 - 4.1K bytes - Viewed (0) -
docs/es/docs/tutorial/security/simple-oauth2.md
/// tip | Consejo En el próximo capítulo, verás una implementación segura real, con hashing de passwords y tokens <abbr title="JSON Web Tokens">JWT</abbr>. Pero por ahora, enfoquémonos en los detalles específicos que necesitamos. /// {* ../../docs_src/security/tutorial003_an_py310.py hl[87] *} /// tip | Consejo
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Dec 30 18:26:57 UTC 2024 - 9.9K bytes - Viewed (0) -
docs/site-replication/README.md
Previously, site replication required the root credentials of peer sites to be identical. This is no longer necessary because STS tokens are now signed with the site replicator service account credentials, thus allowing flexibility in the independent management of root accounts across sites and the ability to disable root accounts eventually.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 3.4K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
/// tip In the next chapter, you will see a real secure implementation, with password hashing and <abbr title="JSON Web Tokens">JWT</abbr> tokens. But for now, let's focus on the specific details we need. /// {* ../../docs_src/security/tutorial003_an_py310.py hl[87] *} /// tip By the spec, you should return a JSON with an `access_token` and a `token_type`, the same as in this example.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 9.4K bytes - Viewed (0) -
cmd/ftp-server.go
forceTLS bool ) var err error for _, arg := range args { tokens := strings.SplitN(arg, "=", 2) if len(tokens) != 2 { logger.Fatal(fmt.Errorf("invalid arguments passed to --ftp=%s", arg), "unable to start FTP server") } switch tokens[0] { case "address": host, portStr, err := net.SplitHostPort(tokens[1]) if err != nil {Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 5.2K bytes - Viewed (0)