Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 31 - 40 of 631 for token (0.02 seconds)

  1. cmd/jwt_test.go

    		t.Fatal(err)
    	}
    
    	creds := globalActiveCred
    	token, err := getTokenString(creds.AccessKey, creds.SecretKey)
    	if err != nil {
    		t.Fatalf("unable get token %s", err)
    	}
    	testCases := []struct {
    		req         *http.Request
    		expectedErr error
    	}{
    		// Set valid authorization header.
    		{
    			req: &http.Request{
    				Header: http.Header{
    					"Authorization": []string{token},
    				},
    			},
    			expectedErr: nil,
    		},
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 4.4K bytes
    - Click Count (0)
  2. docs_src/security/tutorial003_an_py39.py

            return UserInDB(**user_dict)
    
    
    def fake_decode_token(token):
        # This doesn't provide any security at all
        # Check the next version
        user = get_user(fake_users_db, token)
        return user
    
    
    async def get_current_user(token: Annotated[str, Depends(oauth2_scheme)]):
        user = fake_decode_token(token)
        if not user:
            raise HTTPException(
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Nov 24 19:03:06 GMT 2025
    - 2.5K bytes
    - Click Count (0)
  3. docs/iam/identity-management-plugin.md

    `AssumeRoleWithCustomToken` STS API extension. A user or application can now present a token to the `AssumeRoleWithCustomToken` API, and MinIO verifies this token by sending it to the Identity Management Plugin webhook. This plugin responds with some information and MinIO is able to generate temporary STS credentials to interact with object storage.
    
    The authentication flow is similar to that of OpenID, however the token is "opaque" to MinIO - it is simply sent to the plugin for verification. CAVEAT:...
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri May 27 00:58:09 GMT 2022
    - 4.2K bytes
    - Click Count (0)
  4. docs_src/security/tutorial001_py39.py

    from fastapi import Depends, FastAPI
    from fastapi.security import OAuth2PasswordBearer
    
    app = FastAPI()
    
    oauth2_scheme = OAuth2PasswordBearer(tokenUrl="token")
    
    
    @app.get("/items/")
    async def read_items(token: str = Depends(oauth2_scheme)):
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Wed Dec 17 20:41:43 GMT 2025
    - 269 bytes
    - Click Count (0)
  5. tests/test_security_oauth2_authorization_code_bearer_description.py

    app = FastAPI()
    
    oauth2_scheme = OAuth2AuthorizationCodeBearer(
        authorizationUrl="authorize",
        tokenUrl="token",
        description="OAuth2 Code Bearer",
        auto_error=True,
    )
    
    
    @app.get("/items/")
    async def read_items(token: Optional[str] = Security(oauth2_scheme)):
        return {"token": token}
    
    
    client = TestClient(app)
    
    
    def test_no_token():
        response = client.get("/items")
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Fri Jun 30 18:25:16 GMT 2023
    - 2.4K bytes
    - Click Count (0)
  6. docs_src/security/tutorial004_an_py39.py

        return encoded_jwt
    
    
    async def get_current_user(token: Annotated[str, Depends(oauth2_scheme)]):
        credentials_exception = HTTPException(
            status_code=status.HTTP_401_UNAUTHORIZED,
            detail="Could not validate credentials",
            headers={"WWW-Authenticate": "Bearer"},
        )
        try:
            payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM])
            username = payload.get("sub")
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Sep 29 02:57:38 GMT 2025
    - 4.2K bytes
    - Click Count (0)
  7. docs_src/security/tutorial002_py39.py

    from pydantic import BaseModel
    
    app = FastAPI()
    
    oauth2_scheme = OAuth2PasswordBearer(tokenUrl="token")
    
    
    class User(BaseModel):
        username: str
        email: Union[str, None] = None
        full_name: Union[str, None] = None
        disabled: Union[bool, None] = None
    
    
    def fake_decode_token(token):
        return User(
            username=token + "fakedecoded", email="******@****.***", full_name="John Doe"
        )
    
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Wed Dec 17 20:41:43 GMT 2025
    - 755 bytes
    - Click Count (0)
  8. docs/en/docs/tutorial/security/simple-oauth2.md

    ///
    
    ## Return the token { #return-the-token }
    
    The response of the `token` endpoint must be a JSON object.
    
    It should have a `token_type`. In our case, as we are using "Bearer" tokens, the token type should be "`bearer`".
    
    And it should have an `access_token`, with a string containing our access token.
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Sun Aug 31 09:15:41 GMT 2025
    - 9.4K bytes
    - Click Count (0)
  9. docs/es/docs/tutorial/security/simple-oauth2.md

    ///
    
    ## Devolver el token { #return-the-token }
    
    El response del endpoint `token` debe ser un objeto JSON.
    
    Debe tener un `token_type`. En nuestro caso, como estamos usando tokens "Bearer", el tipo de token debe ser "`bearer`".
    
    Y debe tener un `access_token`, con un string que contenga nuestro token de acceso.
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Tue Dec 16 16:33:45 GMT 2025
    - 10.3K bytes
    - Click Count (0)
  10. docs_src/security/tutorial005_an_py310.py

    ):
        if current_user.disabled:
            raise HTTPException(status_code=400, detail="Inactive user")
        return current_user
    
    
    @app.post("/token")
    async def login_for_access_token(
        form_data: Annotated[OAuth2PasswordRequestForm, Depends()],
    ) -> Token:
        user = authenticate_user(fake_users_db, form_data.username, form_data.password)
        if not user:
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Sep 29 02:57:38 GMT 2025
    - 5.3K bytes
    - Click Count (0)
Back to Top