- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 67 for access_token (0.04 sec)
-
docs_src/security/tutorial003_an_py39.py
hashed_password = fake_hash_password(form_data.password) if not hashed_password == user.hashed_password: raise HTTPException(status_code=400, detail="Incorrect username or password") return {"access_token": user.username, "token_type": "bearer"} @app.get("/users/me") async def read_users_me( current_user: Annotated[User, Depends(get_current_active_user)], ):
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Mon Nov 24 19:03:06 UTC 2025 - 2.5K bytes - Viewed (0) -
docs/sts/client-grants.go
"net/url" "strings" minio "github.com/minio/minio-go/v7" "github.com/minio/minio-go/v7/pkg/credentials" ) // JWTToken - parses the output from IDP id_token. type JWTToken struct { AccessToken string `json:"access_token"` Expiry int `json:"expires_in"` } var ( stsEndpoint string idpEndpoint string clientID string clientSecret string ) func init() {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Thu Aug 19 01:35:22 UTC 2021 - 3.3K bytes - Viewed (0) -
docs_src/security/tutorial003_py39.py
hashed_password = fake_hash_password(form_data.password) if not hashed_password == user.hashed_password: raise HTTPException(status_code=400, detail="Incorrect username or password") return {"access_token": user.username, "token_type": "bearer"} @app.get("/users/me") async def read_users_me(current_user: User = Depends(get_current_active_user)):
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 20:41:43 UTC 2025 - 2.4K bytes - Viewed (0) -
internal/config/identity/openid/provider/keycloak.go
return User{}, err } req.URL.Path = path.Join(req.URL.Path, "realms", k.realm, "users", userid) k.Lock() accessToken := k.accessToken k.Unlock() if accessToken.AccessToken == "" { return User{}, ErrAccessTokenExpired } req.Header.Set("Authorization", "Bearer "+accessToken.AccessToken) resp, err := k.client.Do(req) if err != nil { return User{}, err } defer resp.Body.Close()Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Jul 14 18:12:07 UTC 2024 - 4.6K bytes - Viewed (0) -
internal/config/identity/openid/provider/provider.go
ID string `json:"id"` Enabled bool `json:"enabled"` } // Standard errors. var ( ErrNotImplemented = errors.New("function not implemented") ErrAccessTokenExpired = errors.New("access_token expired or unauthorized") ) // Provider implements identity provider specific admin operations, such as // looking up users, fetching additional attributes etc. type Provider interface {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 2.7K bytes - Viewed (0) -
docs/de/docs/tutorial/security/simple-oauth2.md
Es sollte einen `token_type` haben. Da wir in unserem Fall „Bearer“-Token verwenden, sollte der Token-Typ "`bearer`" sein. Und es sollte einen `access_token` haben, mit einem String, der unseren Zugriffstoken enthält. In diesem einfachen Beispiel gehen wir einfach völlig unsicher vor und geben denselben `username` wie der Token zurück. /// tip | Tipp
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sat Sep 20 15:10:09 UTC 2025 - 11.2K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
The response of the `token` endpoint must be a JSON object. It should have a `token_type`. In our case, as we are using "Bearer" tokens, the token type should be "`bearer`". And it should have an `access_token`, with a string containing our access token. For this simple example, we are going to just be completely insecure and return the same `username` as the token. /// tip
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 9.4K bytes - Viewed (0) -
docs/es/docs/tutorial/security/simple-oauth2.md
El response del endpoint `token` debe ser un objeto JSON. Debe tener un `token_type`. En nuestro caso, como estamos usando tokens "Bearer", el tipo de token debe ser "`bearer`". Y debe tener un `access_token`, con un string que contenga nuestro token de acceso. Para este ejemplo simple, vamos a ser completamente inseguros y devolver el mismo `username` como el token. /// tip | Consejo
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Tue Dec 16 16:33:45 UTC 2025 - 10.3K bytes - Viewed (0) -
tests/test_tutorial/test_security/test_tutorial003.py
def test_login(client: TestClient): response = client.post("/token", data={"username": "johndoe", "password": "secret"}) assert response.status_code == 200, response.text assert response.json() == {"access_token": "johndoe", "token_type": "bearer"} def test_login_incorrect_password(client: TestClient): response = client.post( "/token", data={"username": "johndoe", "password": "incorrect"} )
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sat Dec 27 18:19:10 UTC 2025 - 7.7K bytes - Viewed (0) -
docs/sts/client_grants/__init__.py
) creds = json.loads(response.data) query = {} query['Action'] = 'AssumeRoleWithClientGrants' query['Token'] = creds['access_token'] query['DurationSeconds'] = creds['expires_in'] query['Version'] = '2011-06-15' query_components = [] for key in query: if query[key] is not None:Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Apr 23 18:58:53 UTC 2021 - 4.6K bytes - Viewed (0)