Search Options

Results per page
Sort
Preferred Languages
Advance

Results 61 - 70 of 410 for Password (0.05 sec)

  1. src/main/resources/fess_label_en.properties

    labels.suggestWord=Suggest Word
    labels.targetLabel=Label
    labels.term=Term
    labels.fields=Fields
    labels.ex_q=Extended Query
    labels.oldPassword=Current Password
    labels.newPassword=New Password
    labels.confirmNewPassword=New Password (Confirm)
    
    labels.menu_system=System
    labels.menu_wizard=Wizard
    labels.menu_crawl_config=General
    labels.menu_scheduler_config=Scheduler
    labels.menu_dashboard_config=Dashboard
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Jul 10 04:56:21 UTC 2025
    - 40.7K bytes
    - Viewed (0)
  2. docs/en/docs/tutorial/response-model.md

    Now, whenever a browser is creating a user with a password, the API will return the same password in the response.
    
    In this case, it might not be a problem, because it's the same user sending the password.
    
    But if we use the same model for another *path operation*, we could be sending our user's passwords to every client.
    
    /// danger
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 16K bytes
    - Viewed (0)
  3. src/main/java/jcifs/smb/JAASAuthenticator.java

         * @param domain the domain for authentication
         * @param username the username for authentication
         * @param password the password for authentication
         */
        public JAASAuthenticator(String serviceName, String domain, String username, String password) {
            super(null, domain, username, password);
            this.serviceName = serviceName;
        }
    
        /**
         * Create an authenticator using the given credentials
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 8.3K bytes
    - Viewed (0)
  4. docs/es/docs/tutorial/request-forms.md

    Por ejemplo, en una de las formas en las que se puede usar la especificación OAuth2 (llamada "password flow") se requiere enviar un `username` y `password` como campos de formulario.
    
    La <abbr title="specification">especificación</abbr> requiere que los campos se llamen exactamente `username` y `password`, y que se envíen como campos de formulario, no JSON.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Dec 30 18:26:57 UTC 2024
    - 2.9K bytes
    - Viewed (0)
  5. docs/en/docs/tutorial/request-forms.md

    {* ../../docs_src/request_forms/tutorial001_an_py39.py hl[9] *}
    
    For example, in one of the ways the OAuth2 specification can be used (called "password flow") it is required to send a `username` and `password` as form fields.
    
    The <abbr title="specification">spec</abbr> requires the fields to be exactly named `username` and `password`, and to be sent as form fields, not JSON.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 2.7K bytes
    - Viewed (0)
  6. src/main/java/jcifs/smb1/smb1/SmbComSessionSetupAndX.java

                        throw new RuntimeException("Plain text passwords are disabled");
                    } else if (useUnicode) {
                        // plain text
                        final String password = auth.getPassword();
                        lmHash = new byte[0];
                        ntHash = new byte[(password.length() + 1) * 2];
                        writeString(password, ntHash, 0);
                    } else {
                        // plain text
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 7.1K bytes
    - Viewed (0)
  7. docs/es/docs/tutorial/security/first-steps.md

    Así que, revisémoslo desde ese punto de vista simplificado:
    
    * El usuario escribe el `username` y `password` en el frontend, y presiona `Enter`.
    * El frontend (ejecutándose en el navegador del usuario) envía ese `username` y `password` a una URL específica en nuestra API (declarada con `tokenUrl="token"`).
    * La API verifica ese `username` y `password`, y responde con un "token" (no hemos implementado nada de esto aún).
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Dec 30 18:26:57 UTC 2024
    - 8.8K bytes
    - Viewed (0)
  8. src/main/java/jcifs/smb/NtStatus.java

                "The specified user does not exist.", "The specified network password is not correct.",
                "Logon failure: unknown user name or bad password.", "Logon failure: user account restriction.",
                "Logon failure: account logon time restriction violation.", "Logon failure: user not allowed to log on to this computer.",
                "Logon failure: the specified account password has expired.", "Logon failure: account currently disabled.",
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 14.9K bytes
    - Viewed (0)
  9. dbflute_fess/dfprop/documentMap.dfprop

        #   o user: The database user name. (Required)
        #   o password: The database password. (NotRequired - Default '')
        #
        #; schemaSyncCheckMap = map:{
        #    ; url = jdbc:...
        #    ; schema = EXAMPLEDB
        #    ; user = exampuser
        #    ; password = exampword
        #}
        # - - - - - - - - - -/
    
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Sat Oct 31 23:35:14 UTC 2015
    - 9.4K bytes
    - Viewed (0)
  10. docs/es/docs/advanced/security/http-basic-auth.md

    Para manejar eso, primero convertimos el `username` y `password` a `bytes` codificándolos con UTF-8.
    
    Luego podemos usar `secrets.compare_digest()` para asegurar que `credentials.username` es `"stanleyjobson"`, y que `credentials.password` es `"swordfish"`.
    
    {* ../../docs_src/security/tutorial007_an_py39.py hl[1,12:24] *}
    
    Esto sería similar a:
    
    ```Python
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Dec 30 18:26:57 UTC 2024
    - 5.1K bytes
    - Viewed (0)
Back to top