authorization
Here are 2,273 public repositories matching this topic...
-
Updated
Nov 2, 2021 - Go
-
Updated
Nov 12, 2021 - Java
-
Updated
Nov 9, 2021 - Java
These two examples point to hardcoded playground URLs, https://play.openpolicyagent.org/p/ikesWCFIH8 and https://play.openpolicyagent.org/p/oL4Ofd1nQi.
They contain input documents that don't match the latest kubernetes schema, i.e. "apiVersion": "admission.k8s.io/v1beta1"
.
The
-
Updated
Oct 6, 2021 - Ruby
-
Updated
Nov 11, 2021 - Objective-C
-
Updated
Nov 9, 2021 - JavaScript
-
Updated
Oct 19, 2021 - JavaScript
-
Updated
Oct 26, 2021 - Objective-C
-
Updated
Jul 29, 2021 - PHP
-
Updated
Nov 9, 2021 - Python
-
Updated
Sep 16, 2021 - PHP
-
Updated
Nov 11, 2021 - Java
I've read the docs, and it seems you can pass through knex
instances, but I didn't see if it supports SQLite3 - could you clarify please?
-
Updated
Sep 20, 2021 - PHP
-
Updated
Nov 10, 2021 - Go
-
Updated
Oct 29, 2021 - TypeScript
-
Updated
Sep 28, 2021 - TypeScript
-
Updated
Nov 11, 2021 - C#
-
Updated
Jun 4, 2021 - Java
-
Updated
Nov 11, 2021 - Go
-
Updated
Oct 28, 2021 - Java
-
Updated
Oct 13, 2021 - Java
-
Updated
Nov 9, 2021 - C#
-
Updated
Nov 3, 2021 - Python
-
Updated
May 3, 2021 - PHP
The following guides may be improved with unit test examples:
- https://github.com/danschultzer/pow/blob/master/guides/custom_controllers.md
- https://github.com/danschultzer/pow/blob/master/guides/sync_user.md
-
https://github.com/danschultzer/pow/blob/master/guides/lock_users.md -
https://github.com/danschultzer/pow/blob/master/guides/user_roles.md
There's alread
Improve this page
Add a description, image, and links to the authorization topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the authorization topic, visit your repo's landing page and select "manage topics."
Asking about this since the NSA recently published guidance advising the public and private sectors to transition to cryptographic algorithms that are no less than sha384 & ec384 (elliptic curves).
While Edwards' Curves are different, its worth noting that prior to this update sha256 & secp256k1 were both on the list of acceptable cryptographic algorithms. My deduction was that 128-bit securit