- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 163 for tweens (0.03 sec)
-
docs/iam/identity-manager-plugin.go
} type Resp struct { User string `json:"user"` MaxValiditySeconds int `json:"maxValiditySeconds"` Claims map[string]interface{} `json:"claims"` } var tokens map[string]Resp = map[string]Resp{ "aaa": { User: "Alice", MaxValiditySeconds: 3600, Claims: map[string]interface{}{ "groups": []string{"data-science"}, }, }, "bbb": {Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed May 01 21:31:13 UTC 2024 - 2.1K bytes - Viewed (0) -
docs/site-replication/README.md
Previously, site replication required the root credentials of peer sites to be identical. This is no longer necessary because STS tokens are now signed with the site replicator service account credentials, thus allowing flexibility in the independent management of root accounts across sites and the ability to disable root accounts eventually.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 3.4K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/suggest/analysis/SuggestAnalyzer.java
/** * Interface for analyzing and processing suggestion tokens. */ public interface SuggestAnalyzer { /** * Analyzes the given text and returns a list of tokens. * * @param text the text to analyze * @param field the field associated with the text * @param lang the language of the text * @return a list of analyzed tokens */Registered: Fri Sep 19 09:08:11 UTC 2025 - Last Modified: Sat Mar 15 06:51:20 UTC 2025 - 1.6K bytes - Viewed (0) -
docs/es/docs/tutorial/security/first-steps.md
# Seguridad - Primeros pasos Imaginemos que tienes tu API de **backend** en algún dominio. Y tienes un **frontend** en otro dominio o en un path diferente del mismo dominio (o en una aplicación móvil). Y quieres tener una forma para que el frontend se autentique con el backend, usando un **username** y **password**. Podemos usar **OAuth2** para construir eso con **FastAPI**.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Dec 30 18:26:57 UTC 2024 - 8.8K bytes - Viewed (0) -
docs/de/docs/tutorial/security/simple-oauth2.md
/// tip | Tipp Im nächsten Kapitel sehen Sie eine wirklich sichere Implementierung mit Passwort-Hashing und <abbr title="JSON Web Tokens">JWT</abbr>-Tokens. Aber konzentrieren wir uns zunächst auf die spezifischen Details, die wir benötigen. /// {* ../../docs_src/security/tutorial003_an_py310.py hl[87] *} /// tip | Tipp
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Nov 18 02:25:44 UTC 2024 - 10.7K bytes - Viewed (0) -
docs/es/docs/tutorial/body-nested-models.md
Pero tampoco tienes que preocuparte por ellos, los `dicts` entrantes se convierten automáticamente y tu salida se convierte automáticamente a JSON también. ## Cuerpos de `dict`s arbitrarios También puedes declarar un cuerpo como un `dict` con claves de algún tipo y valores de algún otro tipo.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Dec 30 18:26:57 UTC 2024 - 7.5K bytes - Viewed (0) -
cmd/signature-v2.go
func doesPresignV2SignatureMatch(r *http.Request) APIErrorCode { // r.RequestURI will have raw encoded URI as sent by the client. tokens := strings.SplitN(r.RequestURI, "?", 2) encodedResource := tokens[0] encodedQuery := "" if len(tokens) == 2 { encodedQuery = tokens[1] } var ( filteredQueries []string gotSignature string expires string accessKey string
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 12.2K bytes - Viewed (0) -
cmd/sts-datatypes.go
// which means the policy exceeded the allowed space. PackedPolicySize int `xml:",omitempty"` // The issuing authority of the web identity token presented. For OpenID Connect // ID tokens, this contains the value of the iss field. For OAuth 2.0 id_tokens, // this contains the value of the ProviderId parameter that was passed in the // AssumeRoleWithWebIdentity request. Provider string `xml:",omitempty"`
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri May 27 00:58:09 UTC 2022 - 9.9K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/suggest/settings/AnalyzerSettingsTest.java
final List<AnalyzeToken> tokens = analyzer.analyze(text, "", null); final List<AnalyzeToken> readingTokens = analyzer.analyzeAndReading(text, "", null); int matchCount = 0; for (int i = 0; i < tokens.size(); i++) { final String term = tokens.get(i).getTerm(); final String reading = readingTokens.get(i).getTerm();
Registered: Fri Sep 19 09:08:11 UTC 2025 - Last Modified: Thu Aug 07 02:41:28 UTC 2025 - 5.2K bytes - Viewed (0) -
docs/pt/docs/tutorial/security/oauth2-jwt.md
Agora que temos todo o fluxo de segurança, vamos tornar a aplicação realmente segura, usando tokens <abbr title="JSON Web Tokens">JWT</abbr> e hashing de senhas seguras. Este código é algo que você pode realmente usar na sua aplicação, salvar os hashes das senhas no seu banco de dados, etc. Vamos começar de onde paramos no capítulo anterior e incrementá-lo. ## Sobre o JWT JWT significa "JSON Web Tokens".
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 11K bytes - Viewed (0)