- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 593 for cscopes (0.03 sec)
-
docs/sts/dex.md
``` ### Run the `web-identity.go` ``` ~ go run web-identity.go -cid example-app -csec ZXhhbXBsZS1hcHAtc2VjcmV0 \ -config-ep http://127.0.0.1:5556/dex/.well-known/openid-configuration \ -cscopes groups,openid,email,profile ``` ``` ~ mc admin policy create admin allaccess.json ``` Contents of `allaccess.json` ```json { "Version": "2012-10-17", "Statement": [ {Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 3.8K bytes - Viewed (0) -
docs/sts/web-identity.go
"response_mode": {"form_post"}, "client_id": {c.ClientID}, } if c.RedirectURL != "" { v.Set("redirect_uri", c.RedirectURL) } if len(c.Scopes) > 0 { v.Set("scope", strings.Join(c.Scopes, " ")) } v.Set("state", state) v.Set("nonce", state) if strings.Contains(c.Endpoint.AuthURL, "?") { buf.WriteByte('&') } else { buf.WriteByte('?') } buf.WriteString(v.Encode())
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri May 19 09:13:33 UTC 2023 - 7.8K bytes - Viewed (0) -
docs/sts/README.md
"SignerType": 1 } } ``` > NOTE: You can use the `-cscopes` parameter to restrict the requested scopes, for example to `"openid,policy_role_attribute"`, being `policy_role_attribute` a client_scope / client_mapper that maps a role attribute called policy to a `policy` claim returned by Keycloak.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 7.8K bytes - Viewed (0) -
docs/sts/keycloak.md
claim_name (string) JWT canned policy claim name, defaults to "policy" claim_prefix (string) JWT claim namespace prefix e.g. "customer1/" scopes (csv) Comma separated list of OpenID scopes for server, defaults to advertised scopes from discovery document e.g. "email,admin" comment (sentence) optionally add a comment to this setting ``` and ENV based options ```
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.1K bytes - Viewed (0) -
tests/test_security_scopes_dont_propagate.py
from fastapi.testclient import TestClient async def security1(scopes: SecurityScopes): return scopes.scopes async def security2(scopes: SecurityScopes): return scopes.scopes async def dep3( dep1: Annotated[list[str], Security(security1, scopes=["scope1"])], dep2: Annotated[list[str], Security(security2, scopes=["scope2"])], ): return {"dep1": dep1, "dep2": dep2} app = FastAPI()
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 21:25:59 UTC 2025 - 973 bytes - Viewed (0) -
docs/pt/docs/advanced/security/oauth2-scopes.md
## Verifique os `scopes` { #verify-the-scopes } Nós verificamos agora que todos os escopos necessários, por essa dependência e todos os dependentes (incluindo as *operações de rota*) estão incluídas nos escopos fornecidos pelo token recebido, caso contrário, levantamos uma `HTTPException`. Para isso, nós utilizamos `security_scopes.scopes`, que contém uma `list` com todos esses escopos como uma `str`.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Nov 12 16:23:57 UTC 2025 - 14.9K bytes - Viewed (0) -
docs/de/docs/advanced/security/oauth2-scopes.md
## Abhängigkeitsbaum und Scopes { #dependency-tree-and-scopes } Sehen wir uns diesen Abhängigkeitsbaum und die Scopes noch einmal an. Da die Abhängigkeit `get_current_active_user` von `get_current_user` abhängt, wird der bei `get_current_active_user` deklarierte Scope `"me"` in die Liste der erforderlichen Scopes in `security_scopes.scopes` aufgenommen, das an `get_current_user` übergeben wird.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sat Sep 20 15:10:09 UTC 2025 - 15.7K bytes - Viewed (0) -
docs/es/docs/advanced/security/oauth2-scopes.md
## Token JWT con scopes { #jwt-token-with-scopes } Ahora, modifica la *path operation* del token para devolver los scopes solicitados. Todavía estamos usando el mismo `OAuth2PasswordRequestForm`. Incluye una propiedad `scopes` con una `list` de `str`, con cada scope que recibió en el request. Y devolvemos los scopes como parte del token JWT. /// danger | PeligroRegistered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 10:15:01 UTC 2025 - 14.2K bytes - Viewed (0) -
docs/ru/docs/advanced/security/oauth2-scopes.md
Для этого используем `security_scopes.scopes`, содержащий `list` со всеми этими scopes как `str`. {* ../../docs_src/security/tutorial005_an_py310.py hl[130:136] *} ## Дерево зависимостей и scopes { #dependency-tree-and-scopes } Ещё раз рассмотрим дерево зависимостей и scopes.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Tue Sep 30 11:37:11 UTC 2025 - 20.7K bytes - Viewed (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
Nevertheless, you still enforce those scopes, or any other security/authorization requirement, however you need, in your code. In many cases, OAuth2 with scopes can be an overkill. But if you know you need it, or you are curious, keep reading. /// ## OAuth2 scopes and OpenAPI { #oauth2-scopes-and-openapi }Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 13.5K bytes - Viewed (0)