Apache OFBiz Developer Manual
SSO. It based on 3 technologies: JWT JWT Official site - Wikipedia for JWT CORS CORS (Mozilla doc) - Wikipedia for CORS Ajax Ajax, now well known I guess, in OFBiz we use jQuery for that. The mechanism this stage, if all things are correct, the flow leaves the source side. On the server side: 1. A CORS policy is needed. Without it, the Authorization token containing the JWT will be rejected. It’s a SSO (Single Sign-on) jumpings from an OFBiz instance to another on another domain, by also using CORS ( Cross-origin resource sharing) on the target server How to secure JWT When you use JWT, in order0 码力 | 65 页 | 1.22 MB | 1 年前3Apache OFBiz Developer Manual Version trunk
SSO. It based on 3 technologies: JWT JWT Official site - Wikipedia for JWT CORS CORS (Mozilla doc) - Wikipedia for CORS Ajax Ajax, now well known I guess, in OFBiz we use jQuery for that. The mechanism security.token.key SystemProperty entities locally and on trunk demo server On the server side: 1. A CORS policy is needed. Without it, the Authorization token containing the JWT will be rejected. It’s a SSO (Single Sign-on) jumpings from an OFBiz instance to another on another domain, by also using CORS ( Cross-origin resource sharing) on the target server How to secure JWT When you use JWT, in order0 码力 | 81 页 | 1.77 MB | 1 年前3Apache OFBiz Developer Manual Release 18.12
SSO. It based on 3 technologies: JWT JWT Official site - Wikipedia for JWT CORS CORS (Mozilla doc) - Wikipedia for CORS Ajax Ajax, now well known I guess, in OFBiz we use jQuery for that. The mechanism this stage, if all things are correct, the flow leaves the source side. On the server side: 1. A CORS policy is needed. Without it, the Authorization token containing the JWT will be rejected. It’s a SSO (Single Sign-on) jumpings from an OFBiz instance to another on another domain, by also using CORS ( Cross-origin resource sharing) on the target server How to secure JWT When you use JWT, in order0 码力 | 53 页 | 1.52 MB | 1 年前3Apache OFBiz Developer Manual
SSO. It based on 3 technologies: JWT JWT Official site - Wikipedia for JWT CORS CORS (Mozilla doc) - Wikipedia for CORS Ajax Ajax, now well known I guess, in OFBiz we use jQuery for that. The mechanism this stage, if all things are correct, the flow leaves the source side. On the server side: 1. A CORS policy is needed. Without it, the Authorization token containing the JWT will be rejected. It’s a SSO (Single Sign-on) jumpings from an OFBiz instance to another on another domain, by also using CORS ( Cross-origin resource sharing) on the target server How to secure JWT When you use JWT, in order0 码力 | 108 页 | 2.47 MB | 1 年前3Apache OFBiz Developer Manual
SSO. It based on 3 technologies: JWT JWT Official site - Wikipedia for JWT CORS CORS (Mozilla doc) - Wikipedia for CORS Ajax Ajax, now well known I guess, in OFBiz we use jQuery for that. The mechanism this stage, if all things are correct, the flow leaves the source side. On the server side: 1. A CORS policy is needed. Without it, the Authorization token containing the JWT will be rejected. It’s a SSO (Single Sign-on) jumpings from an OFBiz instance to another on another domain, by also using CORS ( Cross-origin resource sharing) on the target server How to secure JWT When you use JWT, in order0 码力 | 108 页 | 2.47 MB | 1 年前3The Weblate Manual 4.18
The Weblate Manual, Release 4.18 WEBLATE_CORS_ALLOWED_ORIGINS New in version 4.16. Allow CORS requests from given origins. Example: environment: WEBLATE_CORS_ALLOWED_ORIGINS: https://example.com,https://weblate 14. • Upgrade of django-crispy-forms requires changes in INSTALLED_APPS. • Integration of django-cors-headers requires changes in INSTALLED_APPS and MIDDLEWARE. See also: Generic upgrade instructions backup_service": {"queue": "backup"}, "weblate.memory.tasks.*": {"queue": "memory"}, } # CORS allowed origins CORS_ALLOWED_ORIGINS = [] CORS_URLS_REGEX = r"^/api/.*$" # Enable plain database backups DATABASE_BACKUP0 码力 | 533 页 | 7.88 MB | 1 年前3The Weblate Manual 4.16.2
Configures PRIVATE_COMMIT_EMAIL_OPT_IN. WEBLATE_CORS_ALLOWED_ORIGINS New in version 4.16. Allow CORS requests from given origins. Example: environment: WEBLATE_CORS_ALLOWED_ORIGINS: https://example.com [https://docs.djangoproject.com/en/stable/ref/settings/#std-setting-INSTALLED_APPS]. Integration of django-cors-headers requires changes in INSTALLED_APPS [https://docs.djangoproject.com/en/stable/ref/settings/#std-setting- {"queue": "backup"}, "weblate.memory.tasks.*": {"queue": "memory"}, } # CORS allowed origins CORS_ALLOWED_ORIGINS = [] CORS_URLS_REGEX = r"^/api/.*$" # Enable plain database backups DATABASE_BACKUP0 码力 | 807 页 | 11.23 MB | 1 年前3The Weblate Manual 4.16.3
Configures PRIVATE_COMMIT_EMAIL_OPT_IN. WEBLATE_CORS_ALLOWED_ORIGINS New in version 4.16. Allow CORS requests from given origins. Example: environment: WEBLATE_CORS_ALLOWED_ORIGINS: https://example.com,https://weblate 14. • Upgrade of django-crispy-forms requires changes in INSTALLED_APPS. • Integration of django-cors-headers requires changes in INSTALLED_APPS and MIDDLEWARE. See also: Generic upgrade instructions 381 The Weblate Manual, Release 4.16.3 (continued from previous page) # CORS allowed origins CORS_ALLOWED_ORIGINS = [] CORS_URLS_REGEX = r"^/api/.*$" # Enable plain database backups DATABASE_BACKUP0 码力 | 511 页 | 7.46 MB | 1 年前3The Weblate Manual 4.16
Configures PRIVATE_COMMIT_EMAIL_OPT_IN. WEBLATE_CORS_ALLOWED_ORIGINS New in version 4.16. Allow CORS requests from given origins. Example: environment: WEBLATE_CORS_ALLOWED_ORIGINS: https://example.com [https://docs.djangoproject.com/en/stable/ref/settings/#std-setting-INSTALLED_APPS]. Integration of django-cors-headers requires changes in INSTALLED_APPS [https://docs.djangoproject.com/en/stable/ref/settings/#std-setting- {"queue": "backup"}, "weblate.memory.tasks.*": {"queue": "memory"}, } # CORS allowed origins CORS_ALLOWED_ORIGINS = [] CORS_URLS_REGEX = r"^/api/.*$" # Enable plain database backups DATABASE_BACKUP0 码力 | 807 页 | 11.23 MB | 1 年前3The Weblate Manual 4.18.2
Weblate Manual, Release 4.18.2 WEBLATE_CORS_ALLOWED_ORIGINS New in version 4.16. Allow CORS requests from given origins. Example: environment: WEBLATE_CORS_ALLOWED_ORIGINS: https://example.com,https://weblate 14. • Upgrade of django-crispy-forms requires changes in INSTALLED_APPS. • Integration of django-cors-headers requires changes in INSTALLED_APPS and MIDDLEWARE. See also: Generic upgrade instructions backup_service": {"queue": "backup"}, "weblate.memory.tasks.*": {"queue": "memory"}, } # CORS allowed origins CORS_ALLOWED_ORIGINS = [] CORS_URLS_REGEX = r"^/api/.*$" # Enable plain database backups DATABASE_BACKUP0 码力 | 534 页 | 7.88 MB | 1 年前3
共 42 条
- 1
- 2
- 3
- 4
- 5