- Sort Score
- Result 10 results
- Languages All
Results 81 - 90 of 490 for credentials (0.06 sec)
-
cmd/user-provider-utils.go
} } // guessUserProvider - guesses the user provider based on the access key and claims. func guessUserProvider(credentials auth.Credentials) string { if !credentials.IsServiceAccount() && !credentials.IsTemp() { return madmin.BuiltinProvider // regular users are always internal } claims := credentials.Claims if _, ok := claims[ldapUser]; ok { return madmin.LDAPProvider // ldap users }
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.1K bytes - Viewed (0) -
docs_src/security/tutorial006_an_py39.py
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sat Mar 18 12:29:59 UTC 2023 - 361 bytes - Viewed (0) -
tests/test_security_http_basic_optional.py
app = FastAPI() security = HTTPBasic(auto_error=False) @app.get("/users/me") def read_current_user(credentials: Optional[HTTPBasicCredentials] = Security(security)): if credentials is None: return {"msg": "Create an account first"} return {"username": credentials.username, "password": credentials.password} client = TestClient(app) def test_security_http_basic():
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Mon Nov 24 19:03:06 UTC 2025 - 2.6K bytes - Viewed (0) -
docs/sts/client-grants.go
if err = json.NewDecoder(resp.Body).Decode(&idpToken); err != nil { return nil, err } return &credentials.ClientGrantsToken{Token: idpToken.AccessToken, Expiry: idpToken.Expiry}, nil } func main() { flag.Parse() if clientID == "" || clientSecret == "" { flag.PrintDefaults() return } sts, err := credentials.NewSTSClientGrants(stsEndpoint, getTokenExpiry) if err != nil { log.Fatal(err) }
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Thu Aug 19 01:35:22 UTC 2021 - 3.3K bytes - Viewed (0) -
cmd/signature-v2.go
if len(authFields) != 2 { return auth.Credentials{}, false, ErrMissingFields } // Then will be splitting on ":", this will separate `AWSAccessKeyId` and `Signature` string. keySignFields := strings.Split(strings.TrimSpace(authFields[1]), ":") if len(keySignFields) != 2 { return auth.Credentials{}, false, ErrMissingFields } return checkKeyValid(r, keySignFields[0]) }
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 12.2K bytes - Viewed (0) -
tests/test_security_http_basic_realm_description.py
app = FastAPI() security = HTTPBasic(realm="simple", description="HTTPBasic scheme") @app.get("/users/me") def read_current_user(credentials: HTTPBasicCredentials = Security(security)): return {"username": credentials.username, "password": credentials.password} client = TestClient(app) def test_security_http_basic(): response = client.get("/users/me", auth=("john", "secret"))
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Mon Nov 24 19:03:06 UTC 2025 - 2.7K bytes - Viewed (0) -
cmd/signature-v4-utils.go
u, ok, err := globalIAMSys.CheckKey(r.Context(), accessKey) if err != nil { return auth.Credentials{}, false, ErrIAMNotInitialized } if !ok { // Credentials could be valid but disabled - return a different // error in such a scenario. if u.Credentials.Status == auth.AccountOff { return cred, false, ErrAccessKeyDisabled } return cred, false, ErrInvalidAccessKeyID
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Mon Nov 25 17:10:22 UTC 2024 - 9.1K bytes - Viewed (0) -
samples/guide/src/main/java/okhttp3/recipes/kt/Authenticate.kt
println("Authenticating for response: $response") println("Challenges: ${response.challenges()}") val credential = Credentials.basic("jesse", "password1") return response.request .newBuilder() .header("Authorization", credential) .build() } }, ).build() fun run() { val request = RequestRegistered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 2K bytes - Viewed (0) -
cmd/common-main.go
if user == "" || password == "" { return auth.Credentials{} } cred, err := auth.CreateCredentials(user, password) if err != nil { if legacyCredentials { logger.Fatal(config.ErrInvalidCredentials(err), "Unable to validate credentials inherited from the shell environment") } else { logger.Fatal(config.ErrInvalidRootUserCredentials(err), "Unable to validate credentials inherited from the shell environment") }Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 32.5K bytes - Viewed (3) -
docs/kms/IAM.md
to use a memory-hard function (Argon2) that (on purpose) consumes a lot of memory and CPU. The new KMS-based approach can use a key derivation function that is orders of magnitudes cheaper w.r.t. memory and CPU. - Root credentials can now be changed easily. Before, a two-step process was required to change the cluster root credentials since they were used to en/decrypt the IAM data.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 5.3K bytes - Viewed (0)