- Sort Score
- Num 10 results
- Language All
Results 101 - 110 of 640 for PassworD (0.39 seconds)
-
internal/config/dns/operator_dns.go
Endpoint string rootCAs *x509.CertPool username string password string } // OperatorOption - functional options pattern style for OperatorDNS type OperatorOption func(*OperatorDNS) // Authentication - custom username and password for authenticating at the endpoint func Authentication(username, password string) OperatorOption { return func(args *OperatorDNS) { args.username = username
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Mon Nov 11 14:51:43 GMT 2024 - 6.6K bytes - Click Count (0) -
src/test/java/org/codelibs/fess/util/SystemUtilTest.java
assertEquals("********", SystemUtil.maskSensitiveValue("password", "secret")); assertEquals("********", SystemUtil.maskSensitiveValue("PASSWORD", "secret")); assertEquals("********", SystemUtil.maskSensitiveValue("Password", "secret")); assertEquals("********", SystemUtil.maskSensitiveValue("PaSsWoRd", "secret")); } @Test public void test_maskSensitiveValue_emptyValue() {
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sun Jan 11 08:43:05 GMT 2026 - 17.1K bytes - Click Count (0) -
docs/ja/docs/tutorial/security/first-steps.md
サードパーティのアプリケーションやシステムでも使用可能です。 また、同じアプリケーションのデバッグ、チェック、テストのためにも利用できます。 ## `password` フロー { #the-password-flow } では、少し話を戻して、どうなっているか理解しましょう。 `password`の「フロー」は、OAuth2で定義されているセキュリティと認証を扱う方法 (「フロー」) の1つです。 OAuth2は、バックエンドやAPIがユーザーを認証するサーバーから独立したものとして設計されていました。 しかし、この場合、同じ**FastAPI**アプリケーションがAPIと認証を処理します。 そこで、簡略化した箇所から見直してみましょう: * ユーザーはフロントエンドで`username`と`password`を入力し、`Enter`を押します。Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:07:17 GMT 2026 - 10.8K bytes - Click Count (0) -
docs/en/docs/tutorial/request-forms.md
{* ../../docs_src/request_forms/tutorial001_an_py310.py hl[9] *} For example, in one of the ways the OAuth2 specification can be used (called "password flow") it is required to send a `username` and `password` as form fields. The <dfn title="specification">spec</dfn> requires the fields to be exactly named `username` and `password`, and to be sent as form fields, not JSON.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 2.6K bytes - Click Count (0) -
internal/event/target/kafka_scram_client_contrib.go
// factory receiver. This constructor will normalize the username, password // and authzID via the SASLprep algorithm, as recommended by RFC-5802. If // SASLprep fails, the method returns an error. func (x *XDGSCRAMClient) Begin(userName, password, authzID string) (err error) { x.Client, err = x.NewClient(userName, password, authzID) if err != nil { return err } x.ClientConversation = x.NewConversation()
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 3.2K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/opensearch/user/cbean/cq/bs/BsUserCQ.java
TermQueryBuilder builder = regTermQ("password", password); if (opLambda != null) { opLambda.callback(builder); } } public void setPassword_NotEqual(String password) { setPassword_NotTerm(password, null); } public void setPassword_NotTerm(String password) { setPassword_NotTerm(password, null);
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sat Mar 15 06:53:53 GMT 2025 - 326.2K bytes - Click Count (0) -
tests/test_filter_pydantic_sub_model_pv2.py
if not name.endswith("A"): raise ValueError("name must end in A") return name async def get_model_c() -> ModelC: return ModelC(username="test-user", password="test-password") @app.get("/model/{name}", response_model=ModelA) async def get_model_a(name: str, model_c=Depends(get_model_c)): return { "name": name, "description": "model-a-desc",
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Tue Feb 17 09:59:14 GMT 2026 - 6.7K bytes - Click Count (0) -
docs/en/docs/tutorial/response-model.md
Now, whenever a browser is creating a user with a password, the API will return the same password in the response. In this case, it might not be a problem, because it's the same user sending the password. But if we use the same model for another *path operation*, we could be sending our user's passwords to every client. /// danger
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 15.5K bytes - Click Count (0) -
src/main/java/jcifs/dcerpc/msrpc/samr.idl
ACB_SVRTRUST = 0x00000100, /* 1 = Server trust account */ ACB_PWNOEXP = 0x00000200, /* 1 = User password does not expire */ ACB_AUTOLOCK = 0x00000400, /* 1 = Account auto locked */ ACB_ENC_TXT_PWD_ALLOWED = 0x00000800, /* 1 = Encryped text password is allowed */ ACB_SMARTCARD_REQUIRED = 0x00001000, /* 1 = Smart Card required */
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sun Jul 01 13:12:10 GMT 2018 - 3.1K bytes - Click Count (0) -
src/test/java/org/codelibs/fess/ldap/LdapUtilTest.java
assertEquals("\\2a\\29\\28uid=\\2a\\29\\29\\28|\\28uid=\\2a", LdapUtil.escapeValue("*)(uid=*))(|(uid=*")); // Test complex injection: admin)(&(password=*)) assertEquals("admin\\29\\28&\\28password=\\2a\\29\\29", LdapUtil.escapeValue("admin)(&(password=*))")); } @Test public void test_escapeValue_allSpecialCharsInSequence() { assertEquals("\\5c\\2a\\28\\29\\00", LdapUtil.escapeValue("\\*()\0"));
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sun Jan 11 08:43:05 GMT 2026 - 4.4K bytes - Click Count (0)