-
Updated
Mar 26, 2022 - JavaScript
oauth2
Here are 5,147 public repositories matching this topic...
-
Updated
Jan 3, 2022 - Java
Description 📓
Middleware is calling getToken
directly without providing any decode
methods. By getToken()
uses jwtDecrypt
from jose
package, and it will probably throws error when the JWT is not signed in the same way. It will throw error when we p
-
Updated
Mar 27, 2022 - Java
-
Updated
Mar 8, 2022 - Java
-
Updated
Mar 21, 2022 - C#
-
Updated
Dec 9, 2021 - Java
-
Updated
Mar 10, 2022 - C++
-
Updated
Mar 16, 2022 - PHP
-
Updated
Mar 1, 2022 - Java
-
Updated
Mar 18, 2022 - Ruby
-
Updated
Mar 9, 2022 - JavaScript
-
Updated
Jul 2, 2021 - Java
-
Updated
Mar 8, 2022 - Java
-
Updated
Mar 4, 2022 - JavaScript
-
Updated
Mar 4, 2022 - PHP
-
Updated
Mar 27, 2022 - Java
-
Updated
Jan 26, 2021 - Go
-
Updated
Mar 18, 2022 - Python
-
Updated
Jan 31, 2022 - Swift
-
Updated
Mar 26, 2022 - Python
If not for some particular exceptions, the status code returned from our WebAPI on error is always 500, regardless of the kind of error.
If an object already exists, for example, it should be returned as 409
. If the object does not pass the schema validation, it should be a 415
.
Go through the whole WebAPI and verify that the status codes are being returned correctly.
Hint: Error
cl
Is your feature request related to a problem? Please describe.
The hydrator have only Basic auth - see config: https://www.ory.sh/oathkeeper/docs/pipeline/mutator/#configuration-4, however for more flexibility, similiar pre-authorization
mechanism could ba added as in the instropsection authenticator handler: https://www.ory.sh/oathkeeper/docs/pipeline/mutator/#configuration-4
**Descri
-
Updated
Mar 27, 2022 - C#
Improve this page
Add a description, image, and links to the oauth2 topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the oauth2 topic, visit your repo's landing page and select "manage topics."
Asking about this since the NSA recently published guidance advising the public and private sectors to transition to cryptographic algorithms that are no less than sha384 & ec384 (elliptic curves).
While Edwards' Curves are different, its worth noting that prior to this update sha256 & secp256k1 were both on the list of acceptable cryptographic algorithms. My deduction was that 128-bit securit