authorization
Here are 1,611 public repositories matching this topic...
-
Updated
Aug 23, 2020 - Java
-
Updated
Aug 22, 2020 - Go
-
Updated
Aug 10, 2020 - Ruby
-
Updated
Aug 21, 2020 - Go
-
Updated
Jul 29, 2020 - Objective-C
-
Updated
Aug 15, 2020 - JavaScript
-
Updated
Jul 2, 2020 - PHP
-
Updated
Aug 23, 2020 - JavaScript
-
Updated
Jun 6, 2020 - PHP
-
Updated
Aug 3, 2020 - Python
-
Updated
Aug 22, 2020 - Java
-
Updated
Aug 17, 2020 - PHP
Describe the bug
I think this is a similar problem than what was already reported in ory/fosite#434, but elsewhere in the code. I believe all calls to url.QueryUnescape should be removed from the code. Go already escapes all query/form parameters automatically and unescaping again can just break things.
Example:
func GetRedirectURIFromRequestValues(value
-
Updated
Apr 2, 2020 - TypeScript
-
Updated
Apr 5, 2020 - PHP
-
Updated
May 5, 2020 - Java
-
Updated
Nov 18, 2019 - Ruby
-
Updated
Aug 12, 2020 - JavaScript
-
Updated
Aug 18, 2020 - Java
-
Updated
Aug 23, 2020 - Elixir
I've read the docs, and it seems you can pass through knex instances, but I didn't see if it supports SQLite3 - could you clarify please?
-
Updated
Aug 22, 2020 - Java
-
Updated
Aug 12, 2020 - TypeScript
-
Updated
Aug 19, 2020 - Python
The following guides may be improved with unit test examples:
- https://github.com/danschultzer/pow/blob/master/guides/custom_controllers.md
- https://github.com/danschultzer/pow/blob/master/guides/sync_user.md
-
https://github.com/danschultzer/pow/blob/master/guides/lock_users.md -
https://github.com/danschultzer/pow/blob/master/guides/user_roles.md
There's alread
See the-road-to-graphql/fullstack-apollo-express-postgresql-boilerplate#5 for users domain. Maybe someone wants to add tests for the messages domain too.
-
Updated
Apr 22, 2020 - Python
@kiwi179 proposes a lookup set for additional functionality
https://wellsb.com/csharp/aspnet/code-first-ef-core-lookup-table-blazor/
https://coding.abel.nu/2013/11/enums-and-lookup-tables-with-ef-code-first/
Encryption at Rest
Track User Logins
Improve this page
Add a description, image, and links to the authorization topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the authorization topic, visit your repo's landing page and select "manage topics."
At least in the latest spec: https://openid.net/specs/openid-connect-rpinitiated-1_0.html
Currently Hydra uses
id_token_hintto determine if logout is RP-initiated or OP-initiated. I do not think this is possible by relaying onid_token_hint.Looking at the implementation of
issueLogoutVerifierI think the logic is correct (ifid_token_hintis missing, you ask for consent, if it is p