Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 14 for Marty (0.31 sec)

  1. docs/de/docs/tutorial/security/index.md

    Es handelt sich um eine recht umfangreiche Spezifikation, und sie deckt mehrere komplexe Anwendungsfälle ab.
    
    Sie umfasst Möglichkeiten zur Authentifizierung mithilfe eines „Dritten“ („third party“).
    
    Das ist es, was alle diese „Login mit Facebook, Google, Twitter, GitHub“-Systeme unter der Haube verwenden.
    
    ### OAuth 1
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Sat Mar 30 18:09:35 GMT 2024
    - 5K bytes
    - Viewed (0)
  2. docs/en/docs/async.md

    ## In a hurry?
    
    <abbr title="too long; didn't read"><strong>TL;DR:</strong></abbr>
    
    If you are using third party libraries that tell you to call them with `await`, like:
    
    ```Python
    results = await some_library()
    ```
    
    Then, declare your *path operation functions* with `async def` like:
    
    ```Python hl_lines="2"
    @app.get('/')
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 23K bytes
    - Viewed (0)
  3. docs/en/docs/advanced/security/oauth2-scopes.md

    That's what would happen to a third party application that tried to access one of these *path operations* with a token provided by a user, depending on how many permissions the user gave the application.
    
    ## About third party integrations
    
    In this example we are using the OAuth2 "password" flow.
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Thu Jan 11 21:21:35 GMT 2024
    - 20.5K bytes
    - Viewed (0)
  4. docs/en/docs/tutorial/security/index.md

    OAuth2 is a specification that defines several ways to handle authentication and authorization.
    
    It is quite an extensive specification and covers several complex use cases.
    
    It includes ways to authenticate using a "third party".
    
    That's what all the systems with "login with Facebook, Google, Twitter, GitHub" use underneath.
    
    ### OAuth 1
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Sat Jun 24 14:47:15 GMT 2023
    - 4.3K bytes
    - Viewed (0)
  5. docs/pt/docs/tutorial/security/index.md

    OAuth2 é uma especificação que define várias formas para lidar com autenticação e autorização.
    
    Ela é bastante extensiva na especificação e cobre casos de uso muito complexos.
    
    Ela inclui uma forma para autenticação usando “third party”/aplicações de terceiros.
    
    Isso é o que todos os sistemas com “Login with Facebook, Google, Twitter, GitHub” usam por baixo.
    
    ### OAuth 1
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Sat Jun 24 14:47:15 GMT 2023
    - 4.8K bytes
    - Viewed (0)
  6. docs/pt/docs/tutorial/security/first-steps.md

    Pode ser usado pelo time de frontend (que pode ser você no caso).
    
    Pode ser usado por aplicações e sistemas third party (de terceiros).
    
    E também pode ser usada por você mesmo, para debugar, checar e testar a mesma aplicação.
    
    ## O Fluxo da `senha`
    
    Agora vamos voltar um pouco e entender o que é isso tudo.
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 8.3K bytes
    - Viewed (0)
  7. docs/en/docs/deployment/https.md

    * For HTTPS, **the server** needs to **have "certificates"** generated by a **third party**.
        * Those certificates are actually **acquired** from the third party, not "generated".
    * Certificates have a **lifetime**.
        * They **expire**.
        * And then they need to be **renewed**, **acquired again** from the third party.
    * The encryption of the connection happens at the **TCP level**.
        * That's one layer **below HTTP**.
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Thu Jan 11 16:31:18 GMT 2024
    - 12K bytes
    - Viewed (0)
  8. docs/en/docs/tutorial/security/oauth2-jwt.md

    After a week, the token will be expired and the user will not be authorized and will have to sign in again to get a new token. And if the user (or a third party) tried to modify the token to change the expiration, you would be able to discover it, because the signatures would not match.
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 13K bytes
    - Viewed (0)
  9. docs/en/docs/how-to/nosql-databases-couchbase.md

    ```Python hl_lines="49-53"
    {!../../../docs_src/nosql_databases/tutorial001.py!}
    ```
    
    ## Recap
    
    You can integrate any third party NoSQL database, just using their standard packages.
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Tue Jan 16 13:23:25 GMT 2024
    - 6K bytes
    - Viewed (0)
  10. docs/en/docs/advanced/middleware.md

    In general, ASGI middlewares are classes that expect to receive an ASGI app as the first argument.
    
    So, in the documentation for third-party ASGI middlewares they will probably tell you to do something like:
    
    ```Python
    from unicorn import UnicornMiddleware
    
    app = SomeASGIApp()
    
    new_app = UnicornMiddleware(app, some_config="rainbow")
    ```
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Fri Mar 10 18:27:10 GMT 2023
    - 4K bytes
    - Viewed (0)
Back to top