- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 142 for xjwt (0.04 sec)
-
internal/jwt/parser_test.go
// along with this program. If not, see <http://www.gnu.org/licenses/>. package jwt // This file is a re-implementation of the original code here with some // additional allocation tweaks reproduced using GODEBUG=allocfreetrace=1 // original file https://github.com/golang-jwt/jwt/blob/main/parser.go // borrowed under MIT License https://github.com/golang-jwt/jwt/blob/main/LICENSE import ( "fmt" "testing" "time"
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Nov 05 19:20:08 UTC 2021 - 6K bytes - Viewed (0) -
internal/config/identity/openid/ecdsa-sha3_contrib.go
// ES256 SigningMethodES3256 = &jwt.SigningMethodECDSA{Name: "ES3256", Hash: crypto.SHA3_256, KeySize: 32, CurveBits: 256} jwt.RegisterSigningMethod(SigningMethodES3256.Alg(), func() jwt.SigningMethod { return SigningMethodES3256 }) // ES384 SigningMethodES3384 = &jwt.SigningMethodECDSA{Name: "ES3384", Hash: crypto.SHA3_384, KeySize: 48, CurveBits: 384} jwt.RegisterSigningMethod(SigningMethodES3384.Alg(), func() jwt.SigningMethod {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Nov 05 19:20:08 UTC 2021 - 1.8K bytes - Viewed (0) -
internal/config/identity/openid/rsa-sha3_contrib.go
SigningMethodRS3256 = &jwt.SigningMethodRSA{Name: "RS3256", Hash: crypto.SHA3_256} jwt.RegisterSigningMethod(SigningMethodRS3256.Alg(), func() jwt.SigningMethod { return SigningMethodRS3256 }) // RS3384 SigningMethodRS3384 = &jwt.SigningMethodRSA{Name: "RS3384", Hash: crypto.SHA3_384} jwt.RegisterSigningMethod(SigningMethodRS3384.Alg(), func() jwt.SigningMethod { return SigningMethodRS3384 }) // RS3512
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Nov 05 19:20:08 UTC 2021 - 1.7K bytes - Viewed (0) -
internal/config/identity/openid/jwt_test.go
"encoding/json" "fmt" "io" "net/http" "net/http/httptest" "net/url" "sync" "testing" "time" jwtgo "github.com/golang-jwt/jwt/v4" "github.com/minio/minio/internal/arn" "github.com/minio/minio/internal/config" jwtm "github.com/minio/minio/internal/jwt" xnet "github.com/minio/pkg/v3/net" ) func TestUpdateClaimsExpiry(t *testing.T) { testCases := []struct { exp interface{}
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 8.3K bytes - Viewed (0) -
docs_src/security/tutorial005_an_py310.py
from datetime import datetime, timedelta, timezone from typing import Annotated import jwt from fastapi import Depends, FastAPI, HTTPException, Security, status from fastapi.security import ( OAuth2PasswordBearer, OAuth2PasswordRequestForm, SecurityScopes, ) from jwt.exceptions import InvalidTokenError from passlib.context import CryptContext from pydantic import BaseModel, ValidationError # to get a string like this run:
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon May 20 17:37:28 UTC 2024 - 5.2K bytes - Viewed (0) -
docs_src/security/tutorial005_an_py39.py
from datetime import datetime, timedelta, timezone from typing import Annotated, List, Union import jwt from fastapi import Depends, FastAPI, HTTPException, Security, status from fastapi.security import ( OAuth2PasswordBearer, OAuth2PasswordRequestForm, SecurityScopes, ) from jwt.exceptions import InvalidTokenError from passlib.context import CryptContext from pydantic import BaseModel, ValidationError
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon May 20 17:37:28 UTC 2024 - 5.3K bytes - Viewed (0) -
internal/jwt/parser.go
// along with this program. If not, see <http://www.gnu.org/licenses/>. package jwt // This file is a re-implementation of the original code here with some // additional allocation tweaks reproduced using GODEBUG=allocfreetrace=1 // original file https://github.com/golang-jwt/jwt/blob/main/parser.go // borrowed under MIT License https://github.com/golang-jwt/jwt/blob/main/LICENSE import ( "bytes" "crypto" "crypto/hmac"
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Sep 17 16:45:46 UTC 2024 - 14.1K bytes - Viewed (0) -
docs/sts/wso2.md
"token_type": "Bearer", "expires_in": 3600 } ``` ### 4. JWT Claims The id_token received is a signed JSON Web Token (JWT). Use a JWT decoder to decode the id_token to access the payload of the token that includes following JWT claims:
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Sep 29 04:28:45 UTC 2022 - 8.7K bytes - Viewed (0) -
architecture/security/istio-agent.md
1. `SecretManager` can also read certificates from files. When this is configured, no CA client is used. 1. The `caClient` will be configured to use either JWT or mTLS authentication. For JWT authentication, gRPC's `PerRPCCredentials` is configured with a `TokenProvider` which handles the logic of adding the proper JWT to each request. mTLS is configured by a tls.Config that points to files on disk.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Jul 18 23:11:18 UTC 2024 - 7.2K bytes - Viewed (0) -
docs/sts/casdoor.md
client_id (string) unique public identifier for apps e.g. "292085223830.apps.googleusercontent.com" claim_name (string) JWT canned policy claim name, defaults to "policy" claim_prefix (string) JWT claim namespace prefix e.g. "customer1/" scopes (csv) Comma separated list of OpenID scopes for server, defaults to advertised scopes from discovery document e.g. "email,admin"
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Sep 29 04:28:45 UTC 2022 - 6.6K bytes - Viewed (0)