- Sort Score
- Result 10 results
- Languages All
Results 171 - 180 of 418 for authenticator (0.09 sec)
-
architecture/tests/integration.md
### Security Integration Tests - **Location**: `tests/integration/security` - **Purpose**: Tests related to the security features and components of Istio, such as authentication and authorization mechanisms. - **Focus**: 1. Authentication and authorization mechanisms. 1. Interaction between security components and Istio control plane. 1. Validation of mutual TLS (mTLS) configurations.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Oct 09 00:57:44 UTC 2024 - 5.9K bytes - Viewed (0) -
src/main/java/jcifs/smb1/ntlmssp/Type2Message.java
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Mar 22 20:39:42 UTC 2019 - 12.6K bytes - Viewed (0) -
docs/logging/README.md
sasl_username (string) username for SASL/PLAIN or SASL/SCRAM authentication sasl_password (string) password for SASL/PLAIN or SASL/SCRAM authentication sasl_mechanism (string) sasl authentication mechanism, default 'plain' tls_client_auth (string) clientAuth determines the Kafka server's policy for TLS client auth sasl (on|off) set to 'on' to enable SASL authentication tls (on|off) set to 'on' to enable TLS
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu May 09 17:15:03 UTC 2024 - 10.4K bytes - Viewed (0) -
docs/sts/dex.md
Dex is an identity service that uses OpenID Connect to drive authentication for apps. Dex acts as a portal to other identity providers through "connectors." This lets dex defer authentication to LDAP servers, SAML providers, or established identity providers like GitHub, Google, and Active Directory. Clients write their authentication logic once to talk to dex, then dex handles the protocols for a given backend. ## Prerequisites
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Mar 21 06:38:06 UTC 2023 - 3.8K bytes - Viewed (0) -
docs/iam/identity-management-plugin.md
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 27 00:58:09 UTC 2022 - 4.2K bytes - Viewed (0) -
src/main/java/jcifs/ntlmssp/Type3Message.java
* @param user * The username for the authenticating user. * @param workstation * The workstation from which authentication is * taking place. * @param flags * @param nonAnonymous * actually perform authentication with empty password * @throws GeneralSecurityException * @throws CIFSException */
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Tue Jul 07 12:07:20 UTC 2020 - 30.6K bytes - Viewed (0) -
compat/maven-compat/src/main/java/org/apache/maven/repository/legacy/LegacyRepositorySystem.java
} } Authentication authentication = new Authentication(server.getUsername(), server.getPassword()); authentication.setPrivateKey(server.getPrivateKey()); authentication.setPassphrase(server.getPassphrase()); repository.setAuthentication(authentication); } else {
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 31.6K bytes - Viewed (0) -
tests/test_security_oauth2_authorization_code_bearer_description.py
assert response.status_code == 401, response.text assert response.json() == {"detail": "Not authenticated"} def test_incorrect_token(): response = client.get("/items", headers={"Authorization": "Non-existent testtoken"}) assert response.status_code == 401, response.text assert response.json() == {"detail": "Not authenticated"} def test_token():
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Fri Jun 30 18:25:16 UTC 2023 - 2.4K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/Hashing.java
private static class Sha512Holder { static final HashFunction SHA_512 = new MessageDigestHashFunction("SHA-512", "Hashing.sha512()"); } /** * Returns a hash function implementing the Message Authentication Code (MAC) algorithm, using the * MD5 (128 hash bits) hash function and the given secret key. * * <p>If you are designing a new system that needs HMAC, prefer {@link #hmacSha256} or other
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Jul 19 16:02:36 UTC 2024 - 29.3K bytes - Viewed (0) -
docs_src/security/tutorial004_an_py39.py
credentials_exception = HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Could not validate credentials", headers={"WWW-Authenticate": "Bearer"}, ) try: payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM]) username: str = payload.get("sub") if username is None: raise credentials_exception
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon May 20 17:37:28 UTC 2024 - 4.2K bytes - Viewed (0)