Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 22 for recommended (0.04 sec)

  1. src/main/java/org/codelibs/fess/sso/entraid/EntraIdAuthenticator.java

            final String nonce = UuidUtil.create();
            storeStateInSession(request.getSession(), state, nonce);
            final String authUrl;
    
            if (useV2Endpoint) {
                // v2.0 endpoint with MSAL4J (recommended)
                authUrl = getAuthority() + getTenant()
                        + "/oauth2/v2.0/authorize?response_type=code&scope=https://graph.microsoft.com/.default&response_mode=form_post&redirect_uri="
    Registered: Sat Dec 20 09:19:18 UTC 2025
    - Last Modified: Sat Dec 13 02:21:17 UTC 2025
    - 56.7K bytes
    - Viewed (0)
  2. src/main/java/org/codelibs/fess/opensearch/client/SearchEngineClient.java

                        httpAddress = "http://localhost:" + port; // Fallback
                    }
                    logger.warn("Embedded OpenSearch is running. This configuration is not recommended for production use.");
                    break;
                }
            }
            client = createHttpClient(fessConfig, httpAddress);
    
            if (StringUtil.isNotBlank(httpAddress)) {
    Registered: Sat Dec 20 09:19:18 UTC 2025
    - Last Modified: Fri Nov 28 16:29:12 UTC 2025
    - 122.4K bytes
    - Viewed (1)
  3. src/main/java/jcifs/internal/dtyp/ACE.java

     * To fully understand the information exposed by this class a description
     * of the access check algorithm used by Windows is required. The following
     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.6K bytes
    - Viewed (0)
  4. LICENSE

          replaced with your own identifying information. (Don't include
          the brackets!)  The text should be enclosed in the appropriate
          comment syntax for the file format. We also recommend that a
          file or class name and description of purpose be included on the
          same "printed page" as the copyright notice for easier
          identification within third-party archives.
    
    Registered: Sat Dec 20 11:21:39 UTC 2025
    - Last Modified: Mon Jan 11 04:26:17 UTC 2021
    - 11.1K bytes
    - Viewed (0)
  5. LICENSE

          replaced with your own identifying information. (Don't include
          the brackets!)  The text should be enclosed in the appropriate
          comment syntax for the file format. We also recommend that a
          file or class name and description of purpose be included on the
          same "printed page" as the copyright notice for easier
          identification within third-party archives.
    
    Registered: Sat Dec 20 08:54:13 UTC 2025
    - Last Modified: Thu Feb 20 19:53:57 UTC 2020
    - 11.1K bytes
    - Viewed (0)
  6. src/main/java/jcifs/ACE.java

     * To fully understand the information exposed by this class a description
     * of the access check algorithm used by Windows is required. The following
     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 7.1K bytes
    - Viewed (0)
  7. src/main/java/jcifs/smb1/smb1/ACE.java

     * To fully understand the information exposed by this class a description
     * of the access check algorithm used by Windows is required. The following
     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 8.8K bytes
    - Viewed (0)
  8. LICENSE

          replaced with your own identifying information. (Don't include
          the brackets!)  The text should be enclosed in the appropriate
          comment syntax for the file format. We also recommend that a
          file or class name and description of purpose be included on the
          same "printed page" as the copyright notice for easier
          identification within third-party archives.
    
    Registered: Sat Dec 20 09:19:18 UTC 2025
    - Last Modified: Tue May 08 21:35:34 UTC 2018
    - 11.1K bytes
    - Viewed (0)
  9. LICENSE

          replaced with your own identifying information. (Don't include
          the brackets!)  The text should be enclosed in the appropriate
          comment syntax for the file format. We also recommend that a
          file or class name and description of purpose be included on the
          same "printed page" as the copyright notice for easier
          identification within third-party archives.
    
    Registered: Sat Dec 20 13:04:59 UTC 2025
    - Last Modified: Mon Jan 11 04:30:09 UTC 2021
    - 11.1K bytes
    - Viewed (0)
  10. LICENSE

          replaced with your own identifying information. (Don't include
          the brackets!)  The text should be enclosed in the appropriate
          comment syntax for the file format. We also recommend that a
          file or class name and description of purpose be included on the
          same "printed page" as the copyright notice for easier
          identification within third-party archives.
    
    Registered: Sat Dec 20 08:55:33 UTC 2025
    - Last Modified: Fri Apr 18 13:54:00 UTC 2025
    - 11.1K bytes
    - Viewed (0)
Back to top