- Sort Score
- Num 10 results
- Language All
Results 211 - 220 of 553 for Rrole1 (0.18 seconds)
-
src/main/webapp/WEB-INF/view/admin/role/admin_role_details.jsp
<jsp:include page="/WEB-INF/view/common/admin/sidebar.jsp"> <jsp:param name="menuCategoryType" value="user"/> <jsp:param name="menuType" value="role"/> </jsp:include> <main class="content-wrapper"> <div class="content-header"> <div class="container-fluid"> <div class="row mb-2"> <div class="col-sm-6">
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Mon Feb 23 08:03:44 GMT 2026 - 7K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/app/pager/RolePager.java
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Thu Jul 17 08:28:31 GMT 2025 - 5.8K bytes - Click Count (0) -
docs/es/docs/how-to/conditional-openapi.md
Si quieres asegurar tu API, hay varias cosas mejores que puedes hacer, por ejemplo: * Asegúrate de tener modelos Pydantic bien definidos para tus request bodies y responses. * Configura los permisos y roles necesarios usando dependencias. * Nunca guardes contraseñas en texto plano, solo hashes de contraseñas. * Implementa y utiliza herramientas criptográficas bien conocidas, como pwdlib y JWT tokens, etc.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 2.6K bytes - Click Count (0) -
cmd/iam.go
err = sys.store.PolicyMappingNotificationHandler(ctx, user, true, regUser) } return err } // HasRolePolicy - returns if a role policy is configured for IAM. func (sys *IAMSys) HasRolePolicy() bool { return len(sys.rolesMap) > 0 } // GetRolePolicy - returns policies associated with a role ARN. func (sys *IAMSys) GetRolePolicy(arnStr string) (arn.ARN, string, error) { roleArn, err := arn.Parse(arnStr) if err != nil {
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Wed Oct 15 17:00:45 GMT 2025 - 76.5K bytes - Click Count (0) -
docs/en/docs/how-to/conditional-openapi.md
If you want to secure your API, there are several better things you can do, for example: * Make sure you have well defined Pydantic models for your request bodies and responses. * Configure any required permissions and roles using dependencies. * Never store plaintext passwords, only password hashes. * Implement and use well-known cryptographic tools, like pwdlib and JWT tokens, etc. * Add more granular permission controls with OAuth2 scopes where needed.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 2.4K bytes - Click Count (0) -
.github/workflows/update-perf-test-buckets.yml
steps: - name: Checkout repository uses: actions/checkout@v6 - name: configure aws credentials uses: aws-actions/configure-aws-credentials@v6 with: role-to-assume: arn:aws:iam::992382829881:role/GHASecrets_gradle_all aws-region: "eu-central-1" - name: get secrets uses: aws-actions/aws-secretsmanager-get-secrets@v3 with: secret-ids: |Created: Wed Apr 01 11:36:16 GMT 2026 - Last Modified: Tue Mar 24 22:05:21 GMT 2026 - 1.9K bytes - Click Count (0) -
src/main/webapp/WEB-INF/view/index.jsp
<li class="nav-item"> <div class="dropdown"> <a id="userMenu" class="nav-link dropdown-toggle" data-bs-toggle="dropdown" href="#" role="button" aria-haspopup="true" aria-expanded="false"> <i class="fa fa-fw fa-user" aria-hidden="true"></i>${username} </a> <div class="dropdown-menu" aria-labelledby="userMenu">
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Mon Feb 23 08:03:44 GMT 2026 - 7.3K bytes - Click Count (0) -
tests/test_jsonable_encoder.py
data = ModelV1(name="test") with pytest.raises(PydanticV1NotSupportedError): jsonable_encoder(data) def test_encode_model_with_config(): model = ModelWithConfig(role=RoleEnum.admin) assert jsonable_encoder(model) == {"role": "admin"} def test_encode_model_with_alias_raises(): with pytest.raises(ValidationError): ModelWithAlias(foo="Bar") def test_encode_model_with_alias():
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Tue Feb 17 09:59:14 GMT 2026 - 9.2K bytes - Click Count (0) -
cmd/sts-datatypes.go
// in Using IAM. // // Arn is a required field Arn string // A unique identifier that contains the role ID and the role session name of // the role that is being assumed. The role ID is generated by AWS when the // role is created. // // AssumedRoleId is a required field AssumedRoleID string `xml:"AssumeRoleId"` // contains filtered or unexported fields }
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri May 27 00:58:09 GMT 2022 - 9.9K bytes - Click Count (0) -
docs/sts/web-identity.md
comma-separated list of IAM access policy names already defined in the server. In this situation, the server prints a role ARN at startup that must be specified as a `RoleArn` API request parameter in the STS AssumeRoleWithWebIdentity API call. When using Role Policies, multiple OpenID providers and/or client applications (with unique client IDs) may be configured with independent role policies. Each configuration is assigned a unique RoleARN by the MinIO server and this is used to select the policies...
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 18.9K bytes - Click Count (0)