Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 51 - 60 of 135 for authorized (0.07 seconds)

  1. CHANGELOG/CHANGELOG-1.5.md

    * Use authorization to limit users' ability to use specific PodSecurityPolicy objects
    
    **What is the impact?**
    
    A user that is authorized to create pods can make use of any existing PodSecurityPolicy, even ones they are not authorized to use.
    
    **How can I mitigate this prior to installing 1.5.5?**
    
    1. Export existing PodSecurityPolicy objects:
      * `kubectl get podsecuritypolicies -o yaml > psp.yaml`
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Thu Dec 24 02:28:26 GMT 2020
    - 136.4K bytes
    - Click Count (0)
  2. docs/recipes.md

            }
          }
        ```
    
    ### Handling authentication ([.kt][AuthenticateKotlin], [.java][AuthenticateJava])
    
    OkHttp can automatically retry unauthenticated requests. When a response is `401 Not Authorized`, an `Authenticator` is asked to supply credentials. Implementations should build a new request that includes the missing credentials. If no credentials are available, return null to skip the retry.
    
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Sat Aug 30 17:01:12 GMT 2025
    - 47.8K bytes
    - Click Count (0)
  3. cmd/api-errors.go

    		Description:    "The service is unavailable. Please retry.",
    		HTTPStatusCode: http.StatusServiceUnavailable,
    	},
    	ErrUnauthorizedAccess: {
    		Code:           "UnauthorizedAccess",
    		Description:    "You are not authorized to perform this operation",
    		HTTPStatusCode: http.StatusUnauthorized,
    	},
    	ErrExpressionTooLong: {
    		Code:           "ExpressionTooLong",
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Wed Apr 16 07:34:24 GMT 2025
    - 93K bytes
    - Click Count (3)
  4. CHANGELOG/CHANGELOG-1.6.md

    ### RBAC
    * The `attributeRestrictions` field has been removed from the PolicyRule type in the rbac.authorization.k8s.io/v1alpha1 API. The field was not used by the RBAC authorizer. ([#39625](https://github.com/kubernetes/kubernetes/pull/39625), [@deads2k](https://github.com/deads2k))
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Thu Dec 24 02:28:26 GMT 2020
    - 304K bytes
    - Click Count (0)
  5. cmd/object-handlers.go

    					}
    				}
    				if reader != nil && proxy.Proxy && perr == nil {
    					gr = reader
    				}
    			}
    		}
    		if reader == nil || !proxy.Proxy {
    			// validate if the request indeed was authorized, if it wasn't we need to return "ErrAccessDenied"
    			// instead of any namespace related error.
    			if s3Error := authorizeRequest(ctx, r, policy.GetObjectAction); s3Error != ErrNone {
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 120.6K bytes
    - Click Count (0)
  6. okhttp/src/jvmTest/kotlin/okhttp3/URLConnectionTest.kt

        server.enqueue(MockResponse(body = "this response comes via HTTPS"))
        server.enqueue(MockResponse(body = "another response via HTTPS"))
    
        // install a custom SSL socket factory so the server can be authorized
        client =
          client
            .newBuilder()
            .sslSocketFactory(
              handshakeCertificates.sslSocketFactory(),
              handshakeCertificates.trustManager,
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Sat Jun 21 20:36:35 GMT 2025
    - 133.2K bytes
    - Click Count (0)
  7. docs/en/docs/tutorial/security/first-steps.md

    You will see something like this:
    
    <img src="/img/tutorial/security/image01.png">
    
    /// check | Authorize button!
    
    You already have a shiny new "Authorize" button.
    
    And your *path operation* has a little lock in the top-right corner that you can click.
    
    ///
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Sun Aug 31 09:15:41 GMT 2025
    - 8.4K bytes
    - Click Count (0)
  8. CHANGELOG/CHANGELOG-1.33.md

    object by patching themselves with an OwnerReference to a cluster-scoped resource. If the OwnerReference resource does not exist or is subsequently deleted, the given node object will be deleted via garbage collection. By default, node users are authorized for create and patch requests but not delete requests against their node object. Since the NodeRestriction admission controller does not prevent patching OwnerReferences, a compromised node could leverage this vulnerability to delete and then recreate...
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Wed Dec 10 01:15:24 GMT 2025
    - 334.8K bytes
    - Click Count (0)
  9. docs/zh/docs/tutorial/security/first-steps.md

    界面如下图所示:
    
    <img src="/img/tutorial/security/image01.png">
    
    /// check | Authorize 按钮!
    
    页面右上角出现了一个「**Authorize**」按钮。
    
    *路径操作*的右上角也出现了一个可以点击的小锁图标。
    
    ///
    
    点击 **Authorize** 按钮,弹出授权表单,输入 `username` 与 `password` 及其它可选字段:
    
    <img src="/img/tutorial/security/image02.png">
    
    /// note | 笔记
    
    目前,在表单中输入内容不会有任何反应,后文会介绍相关内容。
    
    ///
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Nov 18 02:25:44 GMT 2024
    - 7K bytes
    - Click Count (0)
  10. docs/de/docs/tutorial/security/first-steps.md

    Sie werden etwa Folgendes sehen:
    
    <img src="/img/tutorial/security/image01.png">
    
    /// check | Authorize-Button!
    
    Sie haben bereits einen glänzenden, neuen „Authorize“-Button.
    
    Und Ihre *Pfadoperation* hat in der oberen rechten Ecke ein kleines Schloss, auf das Sie klicken können.
    
    ///
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Sat Sep 20 15:10:09 GMT 2025
    - 9.9K bytes
    - Click Count (0)
Back to Top