-
Updated
Feb 11, 2022 - JavaScript
oauth2
Here are 5,042 public repositories matching this topic...
-
Updated
Jan 3, 2022 - Java
-
Updated
Feb 13, 2022 - Java
-
Updated
Jan 17, 2022 - Java
The way basic-tests is written currently, each adapter method test run depend on previous tests to succeed. This way easier to write initially, but as a result, it is much harder to debug the original cause of an issue while debugging/working on an adapter.
We should refactor basic-tests so tests don't rely on each other to succeed.
-
Updated
Feb 2, 2022 - C#
-
Updated
Dec 9, 2021 - Java
-
Updated
Feb 8, 2022 - C++
-
Updated
Jan 29, 2022 - PHP
-
Updated
Feb 12, 2022 - Java
-
Updated
Feb 5, 2022 - Ruby
-
Updated
Feb 7, 2022 - JavaScript
-
Updated
Jul 2, 2021 - Java
-
Updated
Feb 13, 2022 - Java
-
Updated
Nov 18, 2021 - JavaScript
-
Updated
Jan 5, 2022 - PHP
-
Updated
Jan 31, 2022 - Swift
-
Updated
Jan 26, 2021 - Go
-
Updated
Feb 12, 2022 - Python
-
Updated
Jan 30, 2022 - Java
-
Updated
Feb 12, 2022 - Python
If not for some particular exceptions, the status code returned from our WebAPI on error is always 500, regardless of the kind of error.
If an object already exists, for example, it should be returned as 409. If the object does not pass the schema validation, it should be a 415.
Go through the whole WebAPI and verify that the status codes are being returned correctly.
Hint: Error cl
Is your feature request related to a problem? Please describe.
The hydrator have only Basic auth - see config: https://www.ory.sh/oathkeeper/docs/pipeline/mutator/#configuration-4, however for more flexibility, similiar pre-authorization mechanism could ba added as in the instropsection authenticator handler: https://www.ory.sh/oathkeeper/docs/pipeline/mutator/#configuration-4
**Descri
Improve this page
Add a description, image, and links to the oauth2 topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the oauth2 topic, visit your repo's landing page and select "manage topics."
Asking about this since the NSA recently published guidance advising the public and private sectors to transition to cryptographic algorithms that are no less than sha384 & ec384 (elliptic curves).
While Edwards' Curves are different, its worth noting that prior to this update sha256 & secp256k1 were both on the list of acceptable cryptographic algorithms. My deduction was that 128-bit securit