-
Updated
Nov 7, 2021 - Ruby
authentication
Here are 8,167 public repositories matching this topic...
-
Updated
Nov 26, 2021 - Go
-
Updated
Nov 15, 2021 - PHP
-
Updated
Nov 26, 2021 - Java
-
Updated
Nov 4, 2021 - Ruby
-
Updated
Apr 5, 2021 - TypeScript
-
Updated
Nov 19, 2021 - Ruby
-
Updated
Nov 24, 2021 - Go
-
Updated
Nov 23, 2021 - Python
-
Updated
Oct 19, 2021 - JavaScript
-
Updated
Nov 9, 2021 - JavaScript
-
Updated
Nov 26, 2021 - Objective-C
-
Updated
Nov 6, 2021 - Elixir
-
Updated
Nov 11, 2021 - Python
-
Updated
Dec 4, 2020 - JavaScript
There was an error where someone was trying to sign up using the thirdparty recipe and postgres rejected the query cause of value too long for type character varying(128)
- and in the thidparty table, only the third_party_user_id
column has 128 chars limit.
Error log reference:
[https://app.zenhub.com/files/231921809/8968d6d6-bcdd-48d8-aa60-fd556e934acd/download](https://app.zenhub.com/files
-
Updated
Nov 25, 2021 - SCSS
-
Updated
Oct 1, 2020 - Java
Is your feature request related to a problem? Please describe.
The public key-based request signing functionality added to sso_proxy in buzzfeed/sso#106 is undocumented. In particular, it's not immediately obvious how to a) generate an appropriate keypair or b) validate a signed request in an upstream service.
Describe the solution you'd like
New documenta
-
Updated
Jul 15, 2020 - JavaScript
-
Updated
Nov 4, 2021 - C#
-
Updated
May 25, 2021 - PHP
-
Updated
Nov 18, 2021 - Python
-
Updated
Oct 30, 2020 - Shell
-
Updated
Nov 16, 2021 - Go
Before opening, please confirm:
- I have installed the latest version of the Amplify CLI (see above), and confirmed that the issue still persists.
- I have searched for duplicate or closed issues.
- I have read the guide for [submitting bug reports](https://github.com/aws-amplify/amplify-cli/blob/master/CONTRIBUTI
Improve this page
Add a description, image, and links to the authentication topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the authentication topic, visit your repo's landing page and select "manage topics."
Description🐜
If you only have a Credentials provider, you now are unable to get a CSRF token: