Search Options

Results per page
Sort
Preferred Languages
Advance

Results 81 - 90 of 490 for credentials (0.06 sec)

  1. cmd/user-provider-utils.go

    	}
    }
    
    // guessUserProvider - guesses the user provider based on the access key and claims.
    func guessUserProvider(credentials auth.Credentials) string {
    	if !credentials.IsServiceAccount() && !credentials.IsTemp() {
    		return madmin.BuiltinProvider // regular users are always internal
    	}
    
    	claims := credentials.Claims
    	if _, ok := claims[ldapUser]; ok {
    		return madmin.LDAPProvider // ldap users
    	}
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 4.1K bytes
    - Viewed (0)
  2. docs_src/security/tutorial006_an_py39.py

    from fastapi.security import HTTPBasic, HTTPBasicCredentials
    
    app = FastAPI()
    
    security = HTTPBasic()
    
    
    @app.get("/users/me")
    def read_current_user(credentials: Annotated[HTTPBasicCredentials, Depends(security)]):
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sat Mar 18 12:29:59 UTC 2023
    - 361 bytes
    - Viewed (0)
  3. tests/test_security_http_basic_optional.py

    app = FastAPI()
    
    security = HTTPBasic(auto_error=False)
    
    
    @app.get("/users/me")
    def read_current_user(credentials: Optional[HTTPBasicCredentials] = Security(security)):
        if credentials is None:
            return {"msg": "Create an account first"}
        return {"username": credentials.username, "password": credentials.password}
    
    
    client = TestClient(app)
    
    
    def test_security_http_basic():
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Mon Nov 24 19:03:06 UTC 2025
    - 2.6K bytes
    - Viewed (0)
  4. docs/sts/client-grants.go

    	if err = json.NewDecoder(resp.Body).Decode(&idpToken); err != nil {
    		return nil, err
    	}
    
    	return &credentials.ClientGrantsToken{Token: idpToken.AccessToken, Expiry: idpToken.Expiry}, nil
    }
    
    func main() {
    	flag.Parse()
    	if clientID == "" || clientSecret == "" {
    		flag.PrintDefaults()
    		return
    	}
    
    	sts, err := credentials.NewSTSClientGrants(stsEndpoint, getTokenExpiry)
    	if err != nil {
    		log.Fatal(err)
    	}
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Thu Aug 19 01:35:22 UTC 2021
    - 3.3K bytes
    - Viewed (0)
  5. cmd/signature-v2.go

    	if len(authFields) != 2 {
    		return auth.Credentials{}, false, ErrMissingFields
    	}
    
    	// Then will be splitting on ":", this will separate `AWSAccessKeyId` and `Signature` string.
    	keySignFields := strings.Split(strings.TrimSpace(authFields[1]), ":")
    	if len(keySignFields) != 2 {
    		return auth.Credentials{}, false, ErrMissingFields
    	}
    
    	return checkKeyValid(r, keySignFields[0])
    }
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 12.2K bytes
    - Viewed (0)
  6. tests/test_security_http_basic_realm_description.py

    app = FastAPI()
    
    security = HTTPBasic(realm="simple", description="HTTPBasic scheme")
    
    
    @app.get("/users/me")
    def read_current_user(credentials: HTTPBasicCredentials = Security(security)):
        return {"username": credentials.username, "password": credentials.password}
    
    
    client = TestClient(app)
    
    
    def test_security_http_basic():
        response = client.get("/users/me", auth=("john", "secret"))
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Mon Nov 24 19:03:06 UTC 2025
    - 2.7K bytes
    - Viewed (0)
  7. cmd/signature-v4-utils.go

    		u, ok, err := globalIAMSys.CheckKey(r.Context(), accessKey)
    		if err != nil {
    			return auth.Credentials{}, false, ErrIAMNotInitialized
    		}
    		if !ok {
    			// Credentials could be valid but disabled - return a different
    			// error in such a scenario.
    			if u.Credentials.Status == auth.AccountOff {
    				return cred, false, ErrAccessKeyDisabled
    			}
    			return cred, false, ErrInvalidAccessKeyID
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Mon Nov 25 17:10:22 UTC 2024
    - 9.1K bytes
    - Viewed (0)
  8. samples/guide/src/main/java/okhttp3/recipes/kt/Authenticate.kt

                println("Authenticating for response: $response")
                println("Challenges: ${response.challenges()}")
                val credential = Credentials.basic("jesse", "password1")
                return response.request
                  .newBuilder()
                  .header("Authorization", credential)
                  .build()
              }
            },
          ).build()
    
      fun run() {
        val request =
          Request
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Wed Mar 19 19:25:20 UTC 2025
    - 2K bytes
    - Viewed (0)
  9. cmd/common-main.go

    	if user == "" || password == "" {
    		return auth.Credentials{}
    	}
    	cred, err := auth.CreateCredentials(user, password)
    	if err != nil {
    		if legacyCredentials {
    			logger.Fatal(config.ErrInvalidCredentials(err),
    				"Unable to validate credentials inherited from the shell environment")
    		} else {
    			logger.Fatal(config.ErrInvalidRootUserCredentials(err),
    				"Unable to validate credentials inherited from the shell environment")
    		}
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 32.5K bytes
    - Viewed (3)
  10. docs/kms/IAM.md

       to use a memory-hard function (Argon2) that (on purpose) consumes a lot of memory and CPU.
       The new KMS-based approach can use a key derivation function that is orders of magnitudes
       cheaper w.r.t. memory and CPU.
    - Root credentials can now be changed easily. Before, a two-step process was required to
       change the cluster root credentials since they were used to en/decrypt the IAM data.
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Thu Jan 18 07:03:17 UTC 2024
    - 5.3K bytes
    - Viewed (0)
Back to top