Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 13 for Varty (0.04 sec)

  1. docs/de/docs/tutorial/security/index.md

    Es handelt sich um eine recht umfangreiche Spezifikation, und sie deckt mehrere komplexe Anwendungsfälle ab.
    
    Sie umfasst Möglichkeiten zur Authentifizierung mithilfe eines „Dritten“ („third party“).
    
    Das ist es, was alle diese „Login mit Facebook, Google, Twitter, GitHub“-Systeme unter der Haube verwenden.
    
    ### OAuth 1
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 5K bytes
    - Viewed (0)
  2. docs/en/docs/tutorial/security/index.md

    OAuth2 is a specification that defines several ways to handle authentication and authorization.
    
    It is quite an extensive specification and covers several complex use cases.
    
    It includes ways to authenticate using a "third party".
    
    That's what all the systems with "login with Facebook, Google, Twitter, GitHub" use underneath.
    
    ### OAuth 1
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 4.3K bytes
    - Viewed (0)
  3. docs/en/docs/release-notes.md

    The focus of this release is **compatibility** with Pydantic v1 and v2, to make sure your current apps keep working. Later there will be more focus on refactors, correctness, code improvements, and then **performance** improvements. Some third-party early beta testers that ran benchmarks on the beta releases of FastAPI reported improvements of **2x - 3x**. Which is not bad for just doing `pip install --upgrade fastapi pydantic`. This was not an official benchmark and I didn't check it myself,...
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Fri Nov 01 11:25:57 UTC 2024
    - 460.3K bytes
    - Viewed (0)
  4. docs/en/docs/tutorial/security/oauth2-jwt.md

    After a week, the token will be expired and the user will not be authorized and will have to sign in again to get a new token. And if the user (or a third party) tried to modify the token to change the expiration, you would be able to discover it, because the signatures would not match.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Oct 26 11:45:10 UTC 2024
    - 12.8K bytes
    - Viewed (0)
  5. docs/pt/docs/tutorial/security/first-steps.md

    Pode ser usado pelo time de frontend (que pode ser você no caso).
    
    Pode ser usado por aplicações e sistemas third party (de terceiros).
    
    E também pode ser usada por você mesmo, para debugar, checar e testar a mesma aplicação.
    
    ## O Fluxo da `senha`
    
    Agora vamos voltar um pouco e entender o que é isso tudo.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 8.4K bytes
    - Viewed (0)
  6. docs/en/docs/deployment/https.md

    * For HTTPS, **the server** needs to **have "certificates"** generated by a **third party**.
        * Those certificates are actually **acquired** from the third party, not "generated".
    * Certificates have a **lifetime**.
        * They **expire**.
        * And then they need to be **renewed**, **acquired again** from the third party.
    * The encryption of the connection happens at the **TCP level**.
        * That's one layer **below HTTP**.
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 12K bytes
    - Viewed (0)
  7. docs/pt/docs/tutorial/security/index.md

    OAuth2 é uma especificação que define várias formas para lidar com autenticação e autorização.
    
    Ela é bastante extensiva na especificação e cobre casos de uso muito complexos.
    
    Ela inclui uma forma para autenticação usando “third party”/aplicações de terceiros.
    
    Isso é o que todos os sistemas com “Login with Facebook, Google, Twitter, GitHub” usam por baixo.
    
    ### OAuth 1
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 4.8K bytes
    - Viewed (0)
  8. docs/en/docs/tutorial/security/first-steps.md

    This is of course not the frontend for the final users, but it's a great automatic tool to document interactively all your API.
    
    It can be used by the frontend team (that can also be yourself).
    
    It can be used by third party applications and systems.
    
    And it can also be used by yourself, to debug, check and test the same application.
    
    ## The `password` flow
    
    Now let's go back a bit and understand what is all that.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 9.2K bytes
    - Viewed (0)
  9. docs/en/docs/advanced/middleware.md

    In general, ASGI middlewares are classes that expect to receive an ASGI app as the first argument.
    
    So, in the documentation for third-party ASGI middlewares they will probably tell you to do something like:
    
    ```Python
    from unicorn import UnicornMiddleware
    
    app = SomeASGIApp()
    
    new_app = UnicornMiddleware(app, some_config="rainbow")
    ```
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 27 16:45:50 UTC 2024
    - 4K bytes
    - Viewed (0)
  10. docs/en/docs/advanced/security/oauth2-scopes.md

    That's what would happen to a third party application that tried to access one of these *path operations* with a token provided by a user, depending on how many permissions the user gave the application.
    
    ## About third party integrations
    
    In this example we are using the OAuth2 "password" flow.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Oct 29 11:02:16 UTC 2024
    - 13.1K bytes
    - Viewed (0)
Back to top