- Sort Score
- Num 10 results
- Language All
Results 51 - 60 of 803 for token2 (0.05 seconds)
-
internal/bucket/lifecycle/tag.go
) // UnmarshalXML - decodes XML data. func (tag *Tag) UnmarshalXML(d *xml.Decoder, start xml.StartElement) (err error) { var keyAlreadyParsed, valueAlreadyParsed bool for { // Read tokens from the XML document in a stream. t, err := d.Token() if err != nil { if err == io.EOF { break } return err } if se, ok := t.(xml.StartElement); ok { var s string
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Mon Mar 06 16:56:10 GMT 2023 - 2.4K bytes - Click Count (0) -
docs/pt/docs/advanced/security/oauth2-scopes.md
<img src="/img/tutorial/security/image11.png"> ## Token JWT com escopos { #jwt-token-with-scopes } Agora, modifique a *operação de rota* do token para retornar os escopos solicitados. Nós ainda estamos utilizando o mesmo `OAuth2PasswordRequestForm`. Ele inclui a propriedade `scopes` com uma `list` de `str`, com cada escopo que ele recebeu na requisição. E nós retornamos os escopos como parte do token JWT. /// danger | Cuidado
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Nov 12 16:23:57 GMT 2025 - 14.9K bytes - Click Count (0) -
docs/es/docs/advanced/security/oauth2-scopes.md
<img src="/img/tutorial/security/image11.png"> ## Token JWT con scopes { #jwt-token-with-scopes } Ahora, modifica la *path operation* del token para devolver los scopes solicitados. Todavía estamos usando el mismo `OAuth2PasswordRequestForm`. Incluye una propiedad `scopes` con una `list` de `str`, con cada scope que recibió en el request. Y devolvemos los scopes como parte del token JWT. /// danger | Peligro
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 10:15:01 GMT 2025 - 14.2K bytes - Click Count (0) -
src/test/java/jcifs/pac/kerberos/KerberosEncDataTest.java
import org.junit.jupiter.api.Test; import jcifs.pac.PACDecodingException; /** * Tests for KerberosEncData. */ class KerberosEncDataTest { /** * Test constructor with a valid token. * * @throws IOException if an I/O error occurs * @throws PACDecodingException if a PAC decoding error occurs * @throws UnknownHostException if the IP address is not found */ @TestCreated: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 7.7K bytes - Click Count (0) -
internal/event/target/nats_contrib_test.go
defer s.Shutdown() clientConfig := &NATSArgs{ Enable: true, Address: xnet.Host{ Name: "localhost", Port: (xnet.Port(opts.Port)), IsPortSet: true, }, Subject: "test", Token: opts.Authorization, } con, err := clientConfig.connectNats() if err != nil { t.Errorf("Could not connect to nats: %v", err) } defer con.Close() } func TestNatsConnNKeySeed(t *testing.T) {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Apr 27 04:30:57 GMT 2025 - 3K bytes - Click Count (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
<img src="/img/tutorial/security/image11.png"> ## JWT token with scopes { #jwt-token-with-scopes } Now, modify the token *path operation* to return the scopes requested. We are still using the same `OAuth2PasswordRequestForm`. It includes a property `scopes` with a `list` of `str`, with each scope it received in the request. And we return the scopes as part of the JWT token. /// danger
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sun Aug 31 10:49:48 GMT 2025 - 13.5K bytes - Click Count (0) -
docs/zh/docs/tutorial/security/oauth2-jwt.md
# OAuth2 实现密码哈希与 Bearer JWT 令牌验证 至此,我们已经编写了所有安全流,本章学习如何使用 <abbr title="JSON Web Tokens">JWT</abbr> 令牌(Token)和安全密码哈希(Hash)实现真正的安全机制。 本章的示例代码真正实现了在应用的数据库中保存哈希密码等功能。 接下来,我们紧接上一章,继续完善安全机制。 ## JWT 简介 JWT 即**JSON 网络令牌**(JSON Web Tokens)。 JWT 是一种将 JSON 对象编码为没有空格,且难以理解的长字符串的标准。JWT 的内容如下所示: ```
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Nov 18 02:25:44 GMT 2024 - 8.9K bytes - Click Count (0) -
src/cmd/asm/internal/asm/parse.go
} } // have reports whether the remaining tokens (including the current one) contain the specified token. func (p *Parser) have(token lex.ScanToken) bool { for i := p.inputPos; i < len(p.input); i++ { if p.input[i].ScanToken == token { return true } } return false } // at reports whether the next tokens are as requested. func (p *Parser) at(next ...lex.ScanToken) bool {
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Wed Nov 12 03:59:40 GMT 2025 - 37.3K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/sso/entraid/EntraIdAuthenticator.java
throw new SsoLoginException("could not validate nonce", e); } } /** * Obtains an access token using a refresh token. * @param refreshToken The refresh token to use for token acquisition. * @return The authentication result containing the access token. */ public IAuthenticationResult getAccessToken(final String refreshToken) {
Created: Sat Dec 20 09:19:18 GMT 2025 - Last Modified: Sat Dec 13 02:21:17 GMT 2025 - 56.7K bytes - Click Count (0) -
docs/ko/docs/tutorial/security/simple-oauth2.md
/// ## 토큰 반환하기 `token` 엔드포인트의 응답은 JSON 객체여야 합니다. `token_type`이 있어야 합니다. 여기서는 "Bearer" 토큰을 사용하므로 토큰 유형은 "`bearer`"여야 합니다. 그리고 액세스 토큰을 포함하는 문자열과 함께 `access_token`이 있어야 합니다. 이 간단한 예제에서는 완전히 안전하지 않고, 동일한 `username`을 토큰으로 반환합니다. /// tip | 팁 다음 장에서는 패스워드 해싱 및 <abbr title="JSON Web Tokens">JWT</abbr> 토큰을 사용하여 실제 보안 구현을 볼 수 있습니다. 하지만 지금은 필요한 세부 정보에 집중하겠습니다.
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sat Feb 15 11:19:12 GMT 2025 - 10.8K bytes - Click Count (0)