- Sort Score
- Num 10 results
- Language All
Results 71 - 80 of 127 for beraber (0.04 seconds)
-
docs/de/docs/tutorial/security/oauth2-jwt.md
# OAuth2 mit Passwort (und Hashing), Bearer mit JWT-Tokens { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } Da wir nun über den gesamten Sicherheitsablauf verfügen, machen wir die Anwendung tatsächlich sicher, indem wir <abbr title="JSON Web Tokens">JWT</abbr>-Tokens und sicheres Passwort-Hashing verwenden. Diesen Code können Sie tatsächlich in Ihrer Anwendung verwenden, die Passwort-Hashes in Ihrer Datenbank speichern, usw.
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Oct 01 15:19:54 GMT 2025 - 12.7K bytes - Click Count (0) -
docs/es/docs/tutorial/security/oauth2-jwt.md
# OAuth2 con Password (y hashing), Bearer con tokens JWT { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } Ahora que tenemos todo el flujo de seguridad, hagamos que la aplicación sea realmente segura, usando tokens <abbr title="JSON Web Tokens">JWT</abbr> y hashing de contraseñas seguras. Este código es algo que puedes usar realmente en tu aplicación, guardar los hashes de las contraseñas en tu base de datos, etc.
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Tue Dec 16 16:33:45 GMT 2025 - 11.3K bytes - Click Count (0) -
fastapi/security/open_id_connect_url.py
def make_not_authenticated_error(self) -> HTTPException: return HTTPException( status_code=HTTP_401_UNAUTHORIZED, detail="Not authenticated", headers={"WWW-Authenticate": "Bearer"}, ) async def __call__(self, request: Request) -> Optional[str]: authorization = request.headers.get("Authorization") if not authorization: if self.auto_error:Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 21:25:59 GMT 2025 - 3.1K bytes - Click Count (0) -
internal/event/target/webhook.go
// <Key> <Token> like format, if this is // already present we can blindly use the // authToken as is instead of adding 'Bearer' tokens := strings.Fields(target.args.AuthToken) switch len(tokens) { case 2: req.Header.Set("Authorization", target.args.AuthToken) case 1: req.Header.Set("Authorization", "Bearer "+target.args.AuthToken) } req.Header.Set("Content-Type", "application/json")
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Sep 06 23:06:30 GMT 2024 - 8.8K bytes - Click Count (0) -
cmd/batch-replicate_test.go
value: "image/*" # match objects with 'content-type', with all values starting with 'image/' # notify: # endpoint: "https://notify.endpoint" # notification endpoint to receive job status events # token: "Bearer xxxxx" # optional authentication token for the notification endpoint # # retry: # attempts: 10 # number of retries for the job before giving up # delay: "500ms" # least amount of delay between each retry `
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Thu Aug 01 12:53:30 GMT 2024 - 7.9K bytes - Click Count (0) -
docs/sts/wso2.md
"token_type": "Bearer", "expires_in": 3600 } ``` ### 4. JWT Claims The id_token received is a signed JSON Web Token (JWT). Use a JWT decoder to decode the id_token to access the payload of the token that includes following JWT claims:
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 8.7K bytes - Click Count (0) -
internal/event/target/kafka.go
} return target, nil } func isKafkaConnErr(err error) bool { // Sarama opens the circuit breaker after 3 consecutive connection failures. return err == sarama.ErrLeaderNotAvailable || err.Error() == "circuit breaker is open"
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Sep 06 23:06:30 GMT 2024 - 13.6K bytes - Click Count (0) -
docs/pt/docs/tutorial/security/oauth2-jwt.md
# OAuth2 com Senha (e hashing), Bearer com tokens JWT { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } Agora que temos todo o fluxo de segurança, vamos tornar a aplicação realmente segura, usando tokens <abbr title="JSON Web Tokens">JWT</abbr> e hashing de senhas seguras. Este código é algo que você pode realmente usar na sua aplicação, salvar os hashes das senhas no seu banco de dados, etc. Vamos começar de onde paramos no capítulo anterior e incrementá-lo.
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Nov 12 16:23:57 GMT 2025 - 11.4K bytes - Click Count (0) -
docs/zh/docs/tutorial/security/index.md
OpenAPI 有一种定义多个安全「方案」的方法。 通过使用它们,你可以利用所有这些基于标准的工具,包括这些交互式文档系统。 OpenAPI 定义了以下安全方案: * `apiKey`:一个特定于应用程序的密钥,可以来自: * 查询参数。 * 请求头。 * cookie。 * `http`:标准的 HTTP 身份认证系统,包括: * `bearer`: 一个值为 `Bearer` 加令牌字符串的 `Authorization` 请求头。这是从 OAuth2 继承的。 * HTTP Basic 认证方式。 * HTTP Digest,等等。 * `oauth2`:所有的 OAuth2 处理安全性的方式(称为「流程」)。 *以下几种流程适合构建 OAuth 2.0 身份认证的提供者(例如 Google,Facebook,X (Twitter),GitHub 等):Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sun Aug 31 10:49:48 GMT 2025 - 4.2K bytes - Click Count (0) -
fastapi/openapi/models.py
class HTTPBase(SecurityBase): type_: SecuritySchemeType = Field(default=SecuritySchemeType.http, alias="type") scheme: str class HTTPBearer(HTTPBase): scheme: Literal["bearer"] = "bearer" bearerFormat: Optional[str] = None class OAuthFlow(BaseModelWithConfig): refreshUrl: Optional[str] = None scopes: dict[str, str] = {} class OAuthFlowImplicit(OAuthFlow):
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sat Dec 27 12:54:56 GMT 2025 - 15.1K bytes - Click Count (0)