- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 137 for xjwt (0.01 sec)
-
docs/pt/docs/tutorial/security/oauth2-jwt.md
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Nov 12 16:23:57 UTC 2025 - 11.4K bytes - Viewed (0) -
docs/ko/docs/tutorial/security/oauth2-jwt.md
# 패스워드 해싱을 이용한 OAuth2, JWT 토큰을 사용하는 Bearer 인증 모든 보안 흐름을 구성했으므로, 이제 <abbr title="JSON Web Tokens">JWT</abbr> 토큰과 패스워드 해싱을 사용해 애플리케이션을 안전하게 만들 것입니다. 이 코드는 실제로 애플리케이션에서 패스워드를 해싱하여 DB에 저장하는 등의 작업에 활용할 수 있습니다. 이전 장에 이어서 시작해 봅시다. ## JWT JWT 는 "JSON Web Tokens" 을 의미합니다. JSON 객체를 공백이 없는 긴 문자열로 인코딩하는 표준이며, 다음과 같은 형태입니다: ```
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 12.2K bytes - Viewed (0) -
docs/ja/docs/tutorial/security/oauth2-jwt.md
そして、「ドライブ」(車の場合)や「編集」(ブログの場合)など、そのエンティティに関する権限も追加できます。 また、JWTトークンをユーザー(またはボット)に渡すことができます。ユーザーは、JWTトークンを使用するだけで、アカウントを持っていなくても、APIが生成したJWTトークンを使ってそれらの行動(車の運転、ブログ投稿の編集)を実行できるのです。 これらのアイデアを使用すると、JWTをより高度なシナリオに使用できます。 しかしながら、それらのエンティティのいくつかが同じIDを持つ可能性があります。例えば、`foo`(ユーザー`foo`、車 `foo`、ブログ投稿`foo`)などです。 IDの衝突を回避するために、ユーザーのJWTトークンを作成するとき、subキーの値にプレフィックスを付けることができます(例えば、`username:`)。したがって、この例では、`sub`の値は次のようになっている可能性があります:`username:johndoe`
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 14K bytes - Viewed (1) -
internal/config/identity/openid/ecdsa-sha3_contrib.go
jwt.RegisterSigningMethod(SigningMethodES3256.Alg(), func() jwt.SigningMethod { return SigningMethodES3256 }) // ES384 SigningMethodES3384 = &jwt.SigningMethodECDSA{Name: "ES3384", Hash: crypto.SHA3_384, KeySize: 48, CurveBits: 384} jwt.RegisterSigningMethod(SigningMethodES3384.Alg(), func() jwt.SigningMethod { return SigningMethodES3384 })
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri May 16 14:27:42 UTC 2025 - 1.7K bytes - Viewed (0) -
internal/config/identity/openid/rsa-sha3_contrib.go
jwt.RegisterSigningMethod(SigningMethodRS3256.Alg(), func() jwt.SigningMethod { return SigningMethodRS3256 }) // RS3384 SigningMethodRS3384 = &jwt.SigningMethodRSA{Name: "RS3384", Hash: crypto.SHA3_384} jwt.RegisterSigningMethod(SigningMethodRS3384.Alg(), func() jwt.SigningMethod { return SigningMethodRS3384 }) // RS3512
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri May 16 14:27:42 UTC 2025 - 1.6K bytes - Viewed (0) -
docs/sts/wso2.md
"token_type": "Bearer", "expires_in": 3600 } ``` ### 4. JWT Claims The id_token received is a signed JSON Web Token (JWT). Use a JWT decoder to decode the id_token to access the payload of the token that includes following JWT claims:
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.7K bytes - Viewed (0) -
internal/jwt/parser_test.go
// along with this program. If not, see <http://www.gnu.org/licenses/>. package jwt // This file is a re-implementation of the original code here with some // additional allocation tweaks reproduced using GODEBUG=allocfreetrace=1 // original file https://github.com/golang-jwt/jwt/blob/main/parser.go // borrowed under MIT License https://github.com/golang-jwt/jwt/blob/main/LICENSE import ( "fmt" "testing" "time"
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 6K bytes - Viewed (0) -
docs/sts/casdoor.md
client_id (string) unique public identifier for apps e.g. "292085223830.apps.googleusercontent.com" claim_name (string) JWT canned policy claim name, defaults to "policy" claim_prefix (string) JWT claim namespace prefix e.g. "customer1/" scopes (csv) Comma separated list of OpenID scopes for server, defaults to advertised scopes from discovery document e.g. "email,admin"
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 6.6K bytes - Viewed (0) -
docs/sts/README.md
> - [**AD/LDAP**](https://github.com/minio/minio/blob/master/docs/sts/ldap.md)
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 7.8K bytes - Viewed (0) -
internal/auth/credentials.go
m["accessKey"] = accessKey jwt := jwtgo.NewWithClaims(jwtgo.SigningMethodHS512, jwtgo.MapClaims(m)) return jwt.SignedString([]byte(tokenSecret)) } // ExtractClaims extracts JWT claims from a security token using a secret key func ExtractClaims(token, secretKey string) (*jwt.MapClaims, error) { if token == "" || secretKey == "" { return nil, errors.New("invalid argument")
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 11.8K bytes - Viewed (0)