- Sort Score
- Num 10 results
- Language All
Results 141 - 150 of 665 for tokens (0.29 seconds)
-
docs/ru/docs/tutorial/security/simple-oauth2.md
/// info | Дополнительная информация Более полное объяснение `**user_dict` можно найти в [документации к **Дополнительным моделям**](../extra-models.md#about-user-in-dict). /// ## Возврат токена { #return-the-token } Ответ операции пути `/token` должен быть объектом JSON. В нём должен быть `token_type`. В нашем случае, поскольку мы используем токены типа "Bearer", тип токена должен быть `bearer`.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:56:20 GMT 2026 - 16.2K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.11.md
* kubeadm: The Token-related fields in the `MasterConfiguration` object have now been refactored. Instead of the top-level `.Token`, `.TokenTTL`, `.TokenUsages`, `.TokenGroups` fields, there is now a `BootstrapTokens` slice of `BootstrapToken` objects that support the same features under the `.Token`, `.TTL`, `.Usages`, `.Groups` fields. ([#64408](https://github.com/kubernetes/kubernetes/pull/64408), [@lu...
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu Feb 06 06:04:15 GMT 2020 - 328.4K bytes - Click Count (0) -
docs/ko/docs/tutorial/security/oauth2-jwt.md
# 패스워드(해싱 포함)를 사용하는 OAuth2, JWT 토큰을 사용하는 Bearer { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } 모든 보안 흐름을 구성했으므로, 이제 <abbr title="JSON 웹 토큰">JWT</abbr> 토큰과 안전한 패스워드 해싱을 사용해 애플리케이션을 실제로 안전하게 만들겠습니다. 이 코드는 실제로 애플리케이션에서 사용할 수 있으며, 패스워드 해시를 데이터베이스에 저장하는 등의 작업에 활용할 수 있습니다. 이전 장에서 멈춘 지점부터 시작해 내용을 확장해 나가겠습니다. ## JWT 알아보기 { #about-jwt } JWT는 "JSON Web Tokens"를 의미합니다. JSON 객체를 공백이 없는 길고 밀집된 문자열로 부호화하는 표준입니다. 다음과 같은 형태입니다: ```Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:06:26 GMT 2026 - 13K bytes - Click Count (0) -
docs/fr/docs/tutorial/security/simple-oauth2.md
Pour une explication plus complète de `**user_dict`, consultez [la documentation pour **Modèles supplémentaires**](../extra-models.md#about-user-in-dict). /// ## Renvoyer le jeton { #return-the-token } La réponse de l'endpoint `token` doit être un objet JSON. Il doit contenir un `token_type`. Dans notre cas, comme nous utilisons des jetons « Bearer », le type de jeton doit être « bearer ».
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:37:13 GMT 2026 - 11.2K bytes - Click Count (0) -
docs/de/docs/tutorial/cors.md
Aber das erlaubt nur bestimmte Arten der Kommunikation und schließt alles aus, was Anmeldeinformationen beinhaltet: Cookies, Autorisierungsheader wie die, die mit Bearer Tokens verwendet werden, usw. Um sicherzustellen, dass alles korrekt funktioniert, ist es besser, die erlaubten Origins explizit anzugeben. ## `CORSMiddleware` verwenden { #use-corsmiddleware }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:58:09 GMT 2026 - 6K bytes - Click Count (0) -
docs/ko/docs/tutorial/security/simple-oauth2.md
/// ## 토큰 반환하기 { #return-the-token } `token` 엔드포인트의 응답은 JSON 객체여야 합니다. `token_type`이 있어야 합니다. 여기서는 "Bearer" 토큰을 사용하므로 토큰 유형은 "`bearer`"여야 합니다. 그리고 액세스 토큰을 포함하는 문자열과 함께 `access_token`이 있어야 합니다. 이 간단한 예제에서는 완전히 안전하지 않고, 동일한 `username`을 토큰으로 반환합니다. /// tip | 팁 다음 장에서는 패스워드 해싱 및 <abbr title="JSON Web Tokens - JSON 웹 토큰">JWT</abbr> 토큰을 사용하여 실제 보안 구현을 볼 수 있습니다.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:06:26 GMT 2026 - 11.1K bytes - Click Count (0) -
docs/es/docs/tutorial/cors.md
Pero eso solo permitirá ciertos tipos de comunicación, excluyendo todo lo que implique credenciales: Cookies, headers de autorización como los utilizados con Bearer Tokens, etc. Así que, para que todo funcione correctamente, es mejor especificar explícitamente los orígenes permitidos. ## Usa `CORSMiddleware` { #use-corsmiddleware }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 5.6K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.30.md
- Node information is now embedded into Pod-bound service account tokens as additional metadata. The 'JTI' field is set in issued service account tokens, and this information is embedded as `authentication.kubernetes.io/credential-id` in the user's ExtraInfo. ([#123135](https://github.com/kubernetes/kubernetes/pull/123135), [@munnerz](https://github.com/munnerz))...
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Wed Jun 18 18:59:10 GMT 2025 - 398.1K bytes - Click Count (0) -
docs/fr/docs/tutorial/cors.md
Mais cela n’autorisera que certains types de communication, en excluant tout ce qui implique des informations d’identification : cookies, en-têtes Authorization comme ceux utilisés avec les Bearer Tokens, etc. Ainsi, pour que tout fonctionne correctement, il est préférable d’indiquer explicitement les origines autorisées. ## Utiliser `CORSMiddleware` { #use-corsmiddleware }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:37:13 GMT 2026 - 6.1K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.8.md
- The default Bootstrap Token created with `kubeadm init` v1.8 expires and is deleted after 24 hours by default to limit the exposure of the valuable credential. You can create a new Bootstrap Token with `kubeadm token create` or make the default token permanently valid by specifying `--token-ttl 0` to `kubeadm init`. The default token can later be deleted with `kubeadm token delete`.
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Tue Feb 20 15:45:02 GMT 2024 - 312.2K bytes - Click Count (0)