Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 14 for Varty (0.15 sec)

  1. docs/en/docs/tutorial/security/index.md

    OAuth2 is a specification that defines several ways to handle authentication and authorization.
    
    It is quite an extensive specification and covers several complex use cases.
    
    It includes ways to authenticate using a "third party".
    
    That's what all the systems with "login with Facebook, Google, Twitter, GitHub" use underneath.
    
    ### OAuth 1
    
    Plain Text
    - Registered: Sun Apr 21 07:19:11 GMT 2024
    - Last Modified: Sat Jun 24 14:47:15 GMT 2023
    - 4.3K bytes
    - Viewed (0)
  2. docs/pt/docs/tutorial/security/index.md

    OAuth2 é uma especificação que define várias formas para lidar com autenticação e autorização.
    
    Ela é bastante extensiva na especificação e cobre casos de uso muito complexos.
    
    Ela inclui uma forma para autenticação usando “third party”/aplicações de terceiros.
    
    Isso é o que todos os sistemas com “Login with Facebook, Google, Twitter, GitHub” usam por baixo.
    
    ### OAuth 1
    
    Plain Text
    - Registered: Sun Apr 21 07:19:11 GMT 2024
    - Last Modified: Sat Jun 24 14:47:15 GMT 2023
    - 4.8K bytes
    - Viewed (0)
  3. docs/pt/docs/tutorial/security/first-steps.md

    Pode ser usado pelo time de frontend (que pode ser você no caso).
    
    Pode ser usado por aplicações e sistemas third party (de terceiros).
    
    E também pode ser usada por você mesmo, para debugar, checar e testar a mesma aplicação.
    
    ## O Fluxo da `senha`
    
    Agora vamos voltar um pouco e entender o que é isso tudo.
    
    Plain Text
    - Registered: Sun Apr 21 07:19:11 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 8.3K bytes
    - Viewed (0)
  4. docs/en/docs/advanced/security/oauth2-scopes.md

    That's what would happen to a third party application that tried to access one of these *path operations* with a token provided by a user, depending on how many permissions the user gave the application.
    
    ## About third party integrations
    
    In this example we are using the OAuth2 "password" flow.
    
    Plain Text
    - Registered: Sun Apr 21 07:19:11 GMT 2024
    - Last Modified: Thu Jan 11 21:21:35 GMT 2024
    - 20.5K bytes
    - Viewed (0)
  5. docs/en/docs/async.md

    ## In a hurry?
    
    <abbr title="too long; didn't read"><strong>TL;DR:</strong></abbr>
    
    If you are using third party libraries that tell you to call them with `await`, like:
    
    ```Python
    results = await some_library()
    ```
    
    Then, declare your *path operation functions* with `async def` like:
    
    ```Python hl_lines="2"
    @app.get('/')
    Plain Text
    - Registered: Sun Apr 21 07:19:11 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 23K bytes
    - Viewed (0)
  6. docs/en/docs/advanced/middleware.md

    In general, ASGI middlewares are classes that expect to receive an ASGI app as the first argument.
    
    So, in the documentation for third-party ASGI middlewares they will probably tell you to do something like:
    
    ```Python
    from unicorn import UnicornMiddleware
    
    app = SomeASGIApp()
    
    new_app = UnicornMiddleware(app, some_config="rainbow")
    ```
    
    Plain Text
    - Registered: Sun Apr 21 07:19:11 GMT 2024
    - Last Modified: Fri Mar 10 18:27:10 GMT 2023
    - 4K bytes
    - Viewed (0)
  7. docs/en/docs/alternatives.md

    !!! check "Inspired **FastAPI** to"
        Find a way to have a crazy performance.
    
        That's why **FastAPI** is based on Starlette, as it is the fastest framework available (tested by third-party benchmarks).
    
    ### <a href="https://falconframework.org/" class="external-link" target="_blank">Falcon</a>
    
    Plain Text
    - Registered: Sun Apr 21 07:19:11 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 23.2K bytes
    - Viewed (0)
  8. docs/en/docs/deployment/https.md

    * For HTTPS, **the server** needs to **have "certificates"** generated by a **third party**.
        * Those certificates are actually **acquired** from the third party, not "generated".
    * Certificates have a **lifetime**.
        * They **expire**.
        * And then they need to be **renewed**, **acquired again** from the third party.
    * The encryption of the connection happens at the **TCP level**.
        * That's one layer **below HTTP**.
    Plain Text
    - Registered: Sun Apr 21 07:19:11 GMT 2024
    - Last Modified: Thu Jan 11 16:31:18 GMT 2024
    - 12K bytes
    - Viewed (0)
  9. docs/en/docs/tutorial/security/oauth2-jwt.md

    After a week, the token will be expired and the user will not be authorized and will have to sign in again to get a new token. And if the user (or a third party) tried to modify the token to change the expiration, you would be able to discover it, because the signatures would not match.
    
    Plain Text
    - Registered: Sun Apr 21 07:19:11 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 13K bytes
    - Viewed (0)
  10. docs/en/docs/how-to/nosql-databases-couchbase.md

    ```Python hl_lines="49-53"
    {!../../../docs_src/nosql_databases/tutorial001.py!}
    ```
    
    ## Recap
    
    You can integrate any third party NoSQL database, just using their standard packages.
    
    Plain Text
    - Registered: Sun Apr 21 07:19:11 GMT 2024
    - Last Modified: Tue Jan 16 13:23:25 GMT 2024
    - 6K bytes
    - Viewed (0)
Back to top