- Sort Score
- Result 10 results
- Languages All
Results 211 - 220 of 427 for Credential (0.15 sec)
-
cmd/signature-v4-utils.go
u, ok, err := globalIAMSys.CheckKey(r.Context(), accessKey) if err != nil { return auth.Credentials{}, false, ErrIAMNotInitialized } if !ok { // Credentials could be valid but disabled - return a different // error in such a scenario. if u.Credentials.Status == auth.AccountOff { return cred, false, ErrAccessKeyDisabled } return cred, false, ErrInvalidAccessKeyID
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jun 13 22:26:38 UTC 2024 - 9.1K bytes - Viewed (0) -
docs/zh/docs/advanced/security/http-basic-auth.md
`secrets.compare_digest()` 需要仅包含 ASCII 字符(英语字符)的 `bytes` 或 `str`,这意味着它不适用于像`á`一样的字符,如 `Sebastián`。 为了解决这个问题,我们首先将 `username` 和 `password` 转换为使用 UTF-8 编码的 `bytes` 。 然后我们可以使用 `secrets.compare_digest()` 来确保 `credentials.username` 是 `"stanleyjobson"`,且 `credentials.password` 是`"swordfish"`。 //// tab | Python 3.9+ ```Python hl_lines="1 12-24" {!> ../../docs_src/security/tutorial007_an_py39.py!} ``` //// //// tab | Python 3.8+
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 5.2K bytes - Viewed (0) -
cmd/iam-etcd-store.go
if u.Credentials.IsTemp() { // We should delete such that the client can re-request // for the expiring credentials. deleteKeyEtcd(ctx, ies.client, getUserIdentityPath(user, userType)) deleteKeyEtcd(ctx, ies.client, getMappedPolicyPath(user, userType, false)) } return nil } u.Credentials.Claims = jwtClaims.Map() } if u.Credentials.Description == "" {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Aug 15 01:29:20 UTC 2024 - 14K bytes - Viewed (0) -
docs/ftp/README.md
## Scope - All IAM Credentials are allowed access excluding rotating credentials, rotating credentials are not allowed to login via FTP/SFTP ports, you must use S3 API port for if you are using rotating credentials. - Access to bucket(s) and object(s) are governed via IAM policies associated with the incoming login credentials. - Allows authentication and access for all
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue May 07 06:41:25 UTC 2024 - 7.8K bytes - Viewed (0) -
cmd/sftp-server.go
} } else { // Temporary credentials are not allowed. if ui.Credentials.IsTemp() { return nil, errAuthentication } if subtle.ConstantTimeCompare([]byte(ui.Credentials.SecretKey), pass) != 1 { return nil, errAuthentication } } copts := map[string]string{ "AccessKey": ui.Credentials.AccessKey, "SecretKey": ui.Credentials.SecretKey, } if ui.Credentials.IsTemp() {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Aug 20 20:00:29 UTC 2024 - 16K bytes - Viewed (0) -
src/main/java/jcifs/smb/NtlmPasswordAuthentication.java
*/ package jcifs.smb; import java.security.GeneralSecurityException; import java.util.Arrays; import jcifs.CIFSContext; /** * This class stores and encrypts NTLM user credentials. The default * credentials are retrieved from the <tt>jcifs.smb.client.domain</tt>, * <tt>jcifs.smb.client.username</tt>, and <tt>jcifs.smb.client.password</tt> * properties. * <p>
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Tue Jul 07 10:50:16 UTC 2020 - 8.5K bytes - Viewed (0) -
tests/test_tutorial/test_security/test_tutorial005_an_py39.py
response = client.get("/users/me", headers={"Authorization": "Bearer nonexistent"}) assert response.status_code == 401, response.text assert response.json() == {"detail": "Could not validate credentials"} assert response.headers["WWW-Authenticate"] == 'Bearer scope="me"' @needs_py39 def test_incorrect_token_type(client: TestClient): response = client.get(
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Wed Mar 13 19:07:10 UTC 2024 - 16.3K bytes - Viewed (0) -
docs/sts/client-grants.py
# Upload with server side encryption, using temporary credentials s3.meta.client.upload_file('/etc/hosts', 'testbucket', 'hosts', ExtraArgs={'ServerSideEncryption': 'AES256'}) # Download encrypted object using temporary credentials
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Apr 23 18:58:53 UTC 2021 - 1.2K bytes - Viewed (0) -
ci/official/envs/rbe
# ci/official/utilities/setup_docker.sh. else # The volume mapping flag below shares the user's gcloud credentials, if any, # with the container, in case the user has credentials stored there. # This would allow Bazel to authenticate for RBE. # Note: TF's CI does not have any credentials stored there. TFCI_DOCKER_ARGS="$TFCI_DOCKER_ARGS -v $HOME/.config/gcloud:/root/.config/gcloud"
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Fri Aug 09 16:05:18 UTC 2024 - 2.7K bytes - Viewed (0) -
tests/test_tutorial/test_security/test_tutorial005.py
def test_incorrect_token(): response = client.get("/users/me", headers={"Authorization": "Bearer nonexistent"}) assert response.status_code == 401, response.text assert response.json() == {"detail": "Could not validate credentials"} assert response.headers["WWW-Authenticate"] == 'Bearer scope="me"' def test_incorrect_token_type(): response = client.get( "/users/me", headers={"Authorization": "Notexistent testtoken"} )
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Wed Mar 13 19:07:10 UTC 2024 - 15.4K bytes - Viewed (0)