Search Options

Results per page
Sort
Preferred Languages
Advance

Results 91 - 100 of 425 for Credentials (0.12 sec)

  1. cmd/iam-etcd-store.go

    			if u.Credentials.IsTemp() {
    				// We should delete such that the client can re-request
    				// for the expiring credentials.
    				deleteKeyEtcd(ctx, ies.client, getUserIdentityPath(user, userType))
    				deleteKeyEtcd(ctx, ies.client, getMappedPolicyPath(user, userType, false))
    			}
    			return nil
    		}
    		u.Credentials.Claims = jwtClaims.Map()
    	}
    	if u.Credentials.Description == "" {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Aug 15 01:29:20 UTC 2024
    - 14K bytes
    - Viewed (0)
  2. cmd/sftp-server.go

    		}
    	} else {
    		// Temporary credentials are not allowed.
    		if ui.Credentials.IsTemp() {
    			return nil, errAuthentication
    		}
    		if subtle.ConstantTimeCompare([]byte(ui.Credentials.SecretKey), pass) != 1 {
    			return nil, errAuthentication
    		}
    
    	}
    
    	copts := map[string]string{
    		"AccessKey": ui.Credentials.AccessKey,
    		"SecretKey": ui.Credentials.SecretKey,
    	}
    	if ui.Credentials.IsTemp() {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Aug 20 20:00:29 UTC 2024
    - 16K bytes
    - Viewed (0)
  3. tests/test_tutorial/test_security/test_tutorial005_an_py39.py

        response = client.get("/users/me", headers={"Authorization": "Bearer nonexistent"})
        assert response.status_code == 401, response.text
        assert response.json() == {"detail": "Could not validate credentials"}
        assert response.headers["WWW-Authenticate"] == 'Bearer scope="me"'
    
    
    @needs_py39
    def test_incorrect_token_type(client: TestClient):
        response = client.get(
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Wed Mar 13 19:07:10 UTC 2024
    - 16.3K bytes
    - Viewed (0)
  4. src/main/java/jcifs/smb/NtlmPasswordAuthentication.java

     */
    
    package jcifs.smb;
    
    
    import java.security.GeneralSecurityException;
    import java.util.Arrays;
    
    import jcifs.CIFSContext;
    
    
    /**
     * This class stores and encrypts NTLM user credentials. The default
     * credentials are retrieved from the <tt>jcifs.smb.client.domain</tt>,
     * <tt>jcifs.smb.client.username</tt>, and <tt>jcifs.smb.client.password</tt>
     * properties.
     * <p>
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Tue Jul 07 10:50:16 UTC 2020
    - 8.5K bytes
    - Viewed (0)
  5. docs/sts/client-grants.py

    # Upload with server side encryption, using temporary credentials
    s3.meta.client.upload_file('/etc/hosts',
                               'testbucket',
                               'hosts',
                               ExtraArgs={'ServerSideEncryption': 'AES256'})
    
    # Download encrypted object using temporary credentials
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Apr 23 18:58:53 UTC 2021
    - 1.2K bytes
    - Viewed (0)
  6. ci/official/envs/rbe

      # ci/official/utilities/setup_docker.sh.
    else
      # The volume mapping flag below shares the user's gcloud credentials, if any,
      # with the container, in case the user has credentials stored there.
      # This would allow Bazel to authenticate for RBE.
      # Note: TF's CI does not have any credentials stored there.
      TFCI_DOCKER_ARGS="$TFCI_DOCKER_ARGS -v $HOME/.config/gcloud:/root/.config/gcloud"
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Fri Aug 09 16:05:18 UTC 2024
    - 2.7K bytes
    - Viewed (0)
  7. tests/test_tutorial/test_security/test_tutorial005.py

    def test_incorrect_token():
        response = client.get("/users/me", headers={"Authorization": "Bearer nonexistent"})
        assert response.status_code == 401, response.text
        assert response.json() == {"detail": "Could not validate credentials"}
        assert response.headers["WWW-Authenticate"] == 'Bearer scope="me"'
    
    
    def test_incorrect_token_type():
        response = client.get(
            "/users/me", headers={"Authorization": "Notexistent testtoken"}
        )
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Wed Mar 13 19:07:10 UTC 2024
    - 15.4K bytes
    - Viewed (0)
  8. docs/sts/web-identity.py

                                     endpoint_url='http://localhost:9000',
                                     aws_access_key_id=response['Credentials']['AccessKeyId'],
                                     aws_secret_access_key=response['Credentials']['SecretAccessKey'],
                                     aws_session_token=response['Credentials']['SessionToken'],
                                     config=Config(signature_version='s3v4'),
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Jul 28 01:37:51 UTC 2021
    - 2.9K bytes
    - Viewed (0)
  9. docs/em/docs/advanced/security/http-basic-auth.md

    โคด๏ธ ๐Ÿ‘ฅ ๐Ÿ’ช โš™๏ธ `secrets.compare_digest()` ๐Ÿšš ๐Ÿ‘ˆ `credentials.username` `"stanleyjobson"`, &amp; ๐Ÿ‘ˆ `credentials.password` `"swordfish"`.
    
    ```Python hl_lines="1  11-21"
    {!../../docs_src/security/tutorial007.py!}
    ```
    
    ๐Ÿ‘‰ ๐Ÿ”œ ๐ŸŽ:
    
    ```Python
    if not (credentials.username == "stanleyjobson") or not (credentials.password == "swordfish"):
        # Return some error
        ...
    ```
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 4.1K bytes
    - Viewed (0)
  10. docs/iam/identity-management-plugin.md

    | user               | string                                  | Identifier for owner of requested credentials          |
    | maxValiditySeconds | integer (>= 900 seconds and < 365 days) | Maximum allowed expiry duration for the credentials    |
    | claims             | key-value pairs                         | Claims to be associated with the requested credentials |
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 27 00:58:09 UTC 2022
    - 4.2K bytes
    - Viewed (0)
Back to top