Skip to content
#

authorization

Here are 2,445 public repositories matching this topic...

Librechain
Librechain commented Oct 15, 2021

Asking about this since the NSA recently published guidance advising the public and private sectors to transition to cryptographic algorithms that are no less than sha384 & ec384 (elliptic curves).

While Edwards' Curves are different, its worth noting that prior to this update sha256 & secp256k1 were both on the list of acceptable cryptographic algorithms. My deduction was that 128-bit securit

Sa-Token

这可能是史上功能最全的Java权限认证框架!目前已集成——登录认证、权限认证、分布式Session会话、微服务网关鉴权、单点登录、OAuth2.0、踢人下线、Redis集成、前后台分离、记住我模式、模拟他人账号、临时身份切换、账号封禁、多账号认证体系、注解式鉴权、路由拦截式鉴权、花式token生成、自动续签、同端互斥登录、会话治理、密码加密、jwt集成、Spring集成、WebFlux集成...

  • Updated Feb 14, 2022
  • Java
anderseknert
anderseknert commented Feb 15, 2022

Running opa check with the --strict flag currently fails when unused assignment is encountered. It would be a good addition if we added a new check to similarly fail on unused imports:

package foo

import data.foo.x

allow {
    input.foo == "bar"
}
$ opa check --strict foo.rego
1 error occurred: policy.rego:3: rego_compile_error: import data.foo.x unused
oso
ximon18
ximon18 commented Mar 18, 2021

With oso 0.11.1 and Rust client code.

When tracking down policy logic failures using the POLAR_LOG=1 environment variable I will see the logging of the execution of all of my inline queries. The problem is that I have lots of these, but usually I'm not interested in the ones in my core policy files which are fairly static and unchanging, but rather I'm interested in those policy sources that

Improve this page

Add a description, image, and links to the authorization topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the authorization topic, visit your repo's landing page and select "manage topics."

Learn more