- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 163 for tweens (0.03 sec)
-
docs/es/docs/tutorial/security/oauth2-jwt.md
# OAuth2 con Password (y hashing), Bearer con tokens JWT Ahora que tenemos todo el flujo de seguridad, hagamos que la aplicación sea realmente segura, usando tokens <abbr title="JSON Web Tokens">JWT</abbr> y hashing de contraseñas seguras. Este código es algo que puedes usar realmente en tu aplicación, guardar los hashes de las contraseñas en tu base de datos, etc. Vamos a empezar desde donde lo dejamos en el capítulo anterior e incrementarlo. ## Acerca de JWT
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.9K bytes - Viewed (0) -
cmd/ftp-server.go
forceTLS bool ) var err error for _, arg := range args { tokens := strings.SplitN(arg, "=", 2) if len(tokens) != 2 { logger.Fatal(fmt.Errorf("invalid arguments passed to --ftp=%s", arg), "unable to start FTP server") } switch tokens[0] { case "address": host, portStr, err := net.SplitHostPort(tokens[1]) if err != nil {Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 5.2K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
# OAuth2 with Password (and hashing), Bearer with JWT tokens { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } Now that we have all the security flow, let's make the application actually secure, using <abbr title="JSON Web Tokens">JWT</abbr> tokens and secure password hashing. This code is something you can actually use in your application, save the password hashes in your database, etc.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
/// tip In the next chapter, you will see a real secure implementation, with password hashing and <abbr title="JSON Web Tokens">JWT</abbr> tokens. But for now, let's focus on the specific details we need. /// {* ../../docs_src/security/tutorial003_an_py310.py hl[87] *} /// tip By the spec, you should return a JSON with an `access_token` and a `token_type`, the same as in this example.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 9.4K bytes - Viewed (0) -
src/cmd/asm/internal/lex/input.go
return } actuals := in.argsFor(macro) var tokens []Token for _, tok := range macro.tokens { if tok.ScanToken != scanner.Ident { tokens = append(tokens, tok) continue } substitution := actuals[tok.text] if substitution == nil { tokens = append(tokens, tok) continue } tokens = append(tokens, substitution...) } in.Push(NewSlice(in.Base(), in.Line(), tokens))
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Fri Sep 06 13:17:27 UTC 2024 - 12.5K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/suggest/index/contents/DefaultContentsParser.java
if (langs == null || langs.length == 0) { final List<AnalyzeToken> tokens = analyzer.analyze(searchWord, "", null); return tokens == null || tokens.size() == 0; } for (final String lang : langs) { final List<AnalyzeToken> tokens = analyzer.analyze(searchWord, field, lang); if (tokens != null && tokens.size() > 0) { return false; } }
Registered: Fri Sep 19 09:08:11 UTC 2025 - Last Modified: Fri Jul 04 14:00:23 UTC 2025 - 15.4K bytes - Viewed (0) -
cmd/sftp-server.go
allowMACs := supportedMACs var err error for _, arg := range args { tokens := strings.SplitN(arg, "=", 2) if len(tokens) != 2 { logger.Fatal(fmt.Errorf("invalid arguments passed to --sftp=%s", arg), "unable to start SFTP server") } switch tokens[0] { case "address": host, portStr, err := net.SplitHostPort(tokens[1]) if err != nil {Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 16.5K bytes - Viewed (0) -
docs/pt/docs/tutorial/security/simple-oauth2.md
Deve ter um `token_type`. No nosso caso, como estamos usando tokens "Bearer", o tipo de token deve ser "`bearer`". E deve ter um `access_token`, com uma string contendo nosso token de acesso. Para este exemplo simples, seremos completamente inseguros e retornaremos o mesmo `username` do token. /// tip | Dica No próximo capítulo, você verá uma implementação realmente segura, com hash de senha e tokens <abbr title="JSON Web Tokens">JWT</abbr>.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Nov 18 02:25:44 UTC 2024 - 10K bytes - Viewed (0) -
src/cmd/asm/internal/lex/slice.go
package lex import ( "text/scanner" "cmd/internal/src" ) // A Slice reads from a slice of Tokens. type Slice struct { tokens []Token base *src.PosBase line int pos int } func NewSlice(base *src.PosBase, line int, tokens []Token) *Slice { return &Slice{ tokens: tokens, base: base, line: line, pos: -1, // Next will advance to zero. } }Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Thu Jun 29 22:49:50 UTC 2023 - 1.6K bytes - Viewed (0) -
docs/sts/web-identity.py
print('body: ' + id_token_response.text) # we can now use the id_token as much as we want to access protected resources. tokens = json.loads(id_token_response.text) id_token = tokens['id_token'] response = sts_client.assume_role_with_web_identity( RoleArn='arn:aws:iam::123456789012:user/svc-internal-api', RoleSessionName='test',Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Jul 28 01:37:51 UTC 2021 - 2.9K bytes - Viewed (0)