- Sort Score
- Num 10 results
- Language All
Results 81 - 90 of 193 for Eskens (0.05 seconds)
-
src/main/java/org/codelibs/fess/app/web/api/FessApiAction.java
* Used to convert validation messages to localized text for API responses. */ @Resource protected MessageManager messageManager; /** * Service for managing API access tokens including validation and authentication. * Used to verify token-based authentication for API requests. */ @Resource protected AccessTokenService accessTokenService; /**Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Thu Aug 07 03:06:29 GMT 2025 - 4.8K bytes - Click Count (0) -
docs/ko/docs/tutorial/security/oauth2-jwt.md
# 패스워드(해싱 포함)를 사용하는 OAuth2, JWT 토큰을 사용하는 Bearer { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } 모든 보안 흐름을 구성했으므로, 이제 <abbr title="JSON 웹 토큰">JWT</abbr> 토큰과 안전한 패스워드 해싱을 사용해 애플리케이션을 실제로 안전하게 만들겠습니다. 이 코드는 실제로 애플리케이션에서 사용할 수 있으며, 패스워드 해시를 데이터베이스에 저장하는 등의 작업에 활용할 수 있습니다. 이전 장에서 멈춘 지점부터 시작해 내용을 확장해 나가겠습니다. ## JWT 알아보기 { #about-jwt } JWT는 "JSON Web Tokens"를 의미합니다. JSON 객체를 공백이 없는 길고 밀집된 문자열로 부호화하는 표준입니다. 다음과 같은 형태입니다: ```Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:06:26 GMT 2026 - 13K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/app/web/admin/accesstoken/AdminAccesstokenAction.java
import org.lastaflute.web.ruts.process.ActionRuntime; import jakarta.annotation.Resource; /** * Admin action for Access Token management. * This class provides CRUD operations for access tokens. * */ public class AdminAccesstokenAction extends FessAdminAction { /** * Default constructor. */ public AdminAccesstokenAction() { super(); }Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Thu Nov 27 07:01:25 GMT 2025 - 15.9K bytes - Click Count (0) -
src/main/java/org/codelibs/core/text/Tokenizer.java
*/ package org.codelibs.core.text; import static org.codelibs.core.misc.AssertionUtil.assertArgumentNotEmpty; import static org.codelibs.core.misc.AssertionUtil.assertArgumentNotNull; /** * A class that recognizes tokens. * * @author higa * */ public class Tokenizer { /** * Represents EOF (End of File). */ public static final int TT_EOF = -1; /** * Represents a Quote.Created: Fri Apr 03 20:58:12 GMT 2026 - Last Modified: Sat Jul 05 00:11:05 GMT 2025 - 8.8K bytes - Click Count (0) -
src/test/java/jcifs/pac/kerberos/KerberosTokenTest.java
baos.write(content); byte[] token = baos.toByteArray(); assertThrows(PACDecodingException.class, () -> new KerberosToken(token)); } // Helper methods to create test tokens private byte[] createGssApiWrapper(ASN1ObjectIdentifier oid, byte[] data) throws IOException { ByteArrayOutputStream baos = new ByteArrayOutputStream(); // Build the inner content
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 6.8K bytes - Click Count (0) -
docs/zh/docs/tutorial/security/simple-oauth2.md
响应返回的内容应该包含 `token_type`。本例中用的是**Bearer**Token,因此, Token 类型应为**`bearer`**。 返回内容还应包含 `access_token` 字段,它是包含权限 Token 的字符串。 本例只是简单的演示,返回的 Token 就是 `username`,但这种方式极不安全。 /// tip | 提示 下一章介绍使用哈希密码和 <abbr title="JSON Web Tokens - JSON Web 令牌">JWT</abbr> Token 的真正安全机制。 但现在,仅关注所需的特定细节。 /// {* ../../docs_src/security/tutorial003_an_py310.py hl[87] *} /// tip | 提示
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 17:06:37 GMT 2026 - 9K bytes - Click Count (0) -
cmd/sts-handlers.go
response.Metadata.RequestID = w.Header().Get(xhttp.AmzRequestID) writeSuccessResponseXML(w, encodeResponse(response)) } // AssumeRoleWithCustomToken implements user authentication with custom tokens. // These tokens are opaque to MinIO and are verified by a configured (external) // Identity Management Plugin. // // API endpoint: https://minio:9000?Action=AssumeRoleWithCustomToken&Token=xxx
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 36.6K bytes - Click Count (0) -
docs/ja/docs/tutorial/security/oauth2-jwt.md
これでセキュリティの流れが全てわかったので、<abbr title="JSON Web Tokens - JSON Web Token">JWT</abbr>トークンと安全なパスワードのハッシュ化を使用して、実際にアプリケーションを安全にしてみましょう。 このコードは、アプリケーションで実際に使用したり、パスワードハッシュをデータベースに保存するといった用途に利用できます。 本章では、前章の続きから始めて、コードをアップデートしていきます。 ## JWT について { #about-jwt } JWTとは「JSON Web Tokens」の略称です。 JSONオブジェクトをスペースのない長く密集した文字列で表現したトークンの仕様です。例えば次のようになります: ```
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:07:17 GMT 2026 - 14.6K bytes - Click Count (1) -
src/main/java/jcifs/spnego/NegTokenTarg.java
/** * Result code indicating authentication completed successfully */ public static final int ACCEPT_COMPLETED = 0; /** * Result code indicating authentication is incomplete and additional tokens required */ public static final int ACCEPT_INCOMPLETE = 1; /** * Result code indicating authentication was rejected */ public static final int REJECTED = 2; /**Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 6.9K bytes - Click Count (0) -
docs/es/docs/tutorial/cors.md
Pero eso solo permitirá ciertos tipos de comunicación, excluyendo todo lo que implique credenciales: Cookies, headers de autorización como los utilizados con Bearer Tokens, etc. Así que, para que todo funcione correctamente, es mejor especificar explícitamente los orígenes permitidos. ## Usa `CORSMiddleware` { #use-corsmiddleware }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 5.6K bytes - Click Count (0)