Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 30 of 58 for isImplicit (0.14 sec)

  1. docs/en/docs/advanced/security/oauth2-scopes.md

    The most common is the implicit flow.
    
    The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow.
    
    /// note
    
    It's common that each authentication provider names their flows in a different way, to make it part of their brand.
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 13.5K bytes
    - Viewed (0)
  2. build-logic/kotlin-dsl-shared-runtime/src/main/kotlin/org/gradle/kotlin/dsl/internal/sharedruntime/codegen/ApiExtensionGeneratorFacade.kt

            writer.write("\n")
            extensions.forEach {
                writer.write("\n${it.toKotlinString()}")
            }
        }
    
    
    /**
     * An implicit file class like `AbcKt` that Kotlin generates is also part of the public API,
     * and it should be appropriately marked with `@file:Incubating`.
     *
    Registered: Wed Dec 31 11:36:14 UTC 2025
    - Last Modified: Wed Mar 12 15:56:18 UTC 2025
    - 17.8K bytes
    - Viewed (0)
  3. impl/maven-core/src/site/apt/inheritance.apt

     * the order in which elements in the POM are overridden
    
     * minimum element-set for a valid project pom
    
    
    Maven super model
    
     Inheritance is recursive in Maven but there is a special model which is the implicit super parent in the lineage
     of models you may specify:
    
     all of the models that you specify are collected to produce a lineage and then the super model is place at
     the top of that lineage to provide default values.
    
    Registered: Sun Dec 28 03:35:09 UTC 2025
    - Last Modified: Fri Oct 25 12:31:46 UTC 2024
    - 3.5K bytes
    - Viewed (0)
  4. docs/ru/docs/tutorial/security/index.md

        * Некоторые из этих "потоков" подходят для реализации аутентификации через сторонний сервис использующий OAuth 2.0 (например, Google, Facebook, X (Twitter), GitHub и т.д.):
            * `implicit`
            * `clientCredentials`
            * `authorizationCode`
        * Но есть один конкретный "поток", который может быть идеально использован для обработки аутентификации непосредственно в том же приложении:
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Thu Dec 11 21:25:03 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  5. docs/es/docs/tutorial/security/index.md

      * Varios de estos flujos son apropiados para construir un proveedor de autenticación OAuth 2.0 (como Google, Facebook, X (Twitter), GitHub, etc.):
        * `implicit`
        * `clientCredentials`
        * `authorizationCode`
      * Pero hay un "flujo" específico que puede usarse perfectamente para manejar la autenticación directamente en la misma aplicación:
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Dec 17 10:15:01 UTC 2025
    - 4.8K bytes
    - Viewed (0)
  6. dbflute_fess/dfprop/documentMap.dfprop

        #   o isEnvOnlyFloatLeft: is it environment only? (and show as float-left?) (NotRequired)
        #   o extendsPropRequest: other request name of exnteds-properties (NotRequired)
        #   o isCheckImplicitOverride: does it check implicit override? (NotRequired)
        #
        #; propertiesHtmlMap = map:{
        #    ; MaihamaEnv = map:{
        #        ; baseDir = ../src
        #        ; rootFile = $$baseDir$$/main/resources/maihama_env.properties
    Registered: Sat Dec 20 09:19:18 UTC 2025
    - Last Modified: Sat Oct 31 23:35:14 UTC 2015
    - 9.4K bytes
    - Viewed (0)
  7. docs/de/docs/advanced/security/oauth2-scopes.md

    Am häufigsten ist der „Implicit“-Flow.
    
    Am sichersten ist der „Code“-Flow, die Implementierung ist jedoch komplexer, da mehr Schritte erforderlich sind. Da er komplexer ist, schlagen viele Anbieter letztendlich den „Implicit“-Flow vor.
    
    /// note | Hinweis
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sat Sep 20 15:10:09 UTC 2025
    - 15.7K bytes
    - Viewed (0)
  8. src/test/java/jcifs/pac/ASN1UtilTest.java

            }, "Should throw StackOverflowError due to recursive call");
        }
    
        // --- readUnparsedTagged ---
    
        @Test
        void testReadUnparsedTagged_Success() throws IOException {
            // Tag [1] IMPLICIT, content is 0x01 0x02 0x03
            byte[] data = new byte[] { (byte) 0xA1, 0x03, 0x01, 0x02, 0x03 };
            ByteArrayInputStream bais = new ByteArrayInputStream(data);
            ASN1InputStream ais = new ASN1InputStream(bais);
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 9.4K bytes
    - Viewed (0)
  9. cmd/config-current.go

    				key, subSys)
    		}
    		h = config.HelpKVS{value}
    	}
    
    	help := config.HelpKVS{}
    
    	// Only for multiple targets, make sure
    	// to list the ENV, for regular k/v EnableKey is
    	// implicit, for ENVs we cannot make it implicit.
    	if subSysHelp.MultipleTargets {
    		key := madmin.EnableKey
    		if envOnly {
    			key = config.EnvPrefix + strings.ToTitle(subSys) + config.EnvWordDelimiter + strings.ToTitle(madmin.EnableKey)
    		}
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 28.5K bytes
    - Viewed (0)
  10. impl/maven-core/src/main/java/org/apache/maven/internal/aether/ReverseTreeRepositoryListener.java

                InputLocation location = plugin.getLocation("");
                if (location != null && location.getSource() != null) {
                    trackingData.add(indent + location.getSource().getModelId() + " (implicit)");
                    indent.append("  ");
                }
            } else if (collectStepTrace != null) {
                if (collectStepTrace.getPath().get(0).getArtifact() == null) {
                    return;
                }
    Registered: Sun Dec 28 03:35:09 UTC 2025
    - Last Modified: Wed Jan 29 08:17:07 UTC 2025
    - 10.1K bytes
    - Viewed (0)
Back to top