In the best interests of
- Jan 2024
-
www.wordhippo.com www.wordhippo.com
-
-
Acting as a representative of or substitute for (someone or a group)
-
-
-
www.collinsdictionary.com www.collinsdictionary.com
-
in the sense of for the benefit of
-
in the sense of as a representative of
-
-
disqus.com disqus.com
-
Getting the EPP/Auth code of your own domain should be instantaneous. I know of no other registrar, besides Network Solutions, that makes the process so painful. It's a multi-step process to make the request, during which they wave both carrot and stick at you to try and stop you going ahead… and when you do forge ahead, they make you wait 3 days for the code, as if to punish you for daring to ask for the right to transfer your own domain name. What are these guys smoking if they think that's how you keep customers?!
-
Network Solutions basically does not want to provide EPP code. On website it says requesting EPP would take 3 days to get approved (which doesn't make any sense), and in fact they never send out any EPP code. Instead, you will have to call them and ask for EPP code in person. They claimed that their system had some problems sending those emails, however do you really believe that? I don't think it is indeed a "problem" if it's been there for over one year.
-
Network solutions is awful. They behave like mobsters. If you make changes on your account such as changing the e-mail, they very conveniently lock your domain so it cannot be transfered for 60 days. They say that block it's for 'your security'.
-
-
www.postman.com www.postman.com
-
We want to evolve the API without unnecessary versioning. To be able to do that, the consumer should
-
-
steamcommunity.com steamcommunity.com
-
Just one of the reasons why I prefer GOG over Steam. No DRM or other artificial restrictions to worry about, let alone an internet connection required in order to play or to install, since I can simply backup all the (stand-alone) installers onto my NAS. And I can even unpack those with open-source tools if I want to.
-
-
www.kickstarter.com www.kickstarter.com
-
If you have studied the historical campaign, you may wonder if the same operational plan can be duplicated in the game—with the same results. The answer is yes. The unit capabilities and game mechanics allow for a repeat of history, but there is always the other player to consider. As with history, the two sides have nearly the same number of infantry divisions, tanks, mobile units and artillery. The German advantage is most evident in airpower—the Luftwaffe dramatically outclassed the Allied air forces in the campaign (and so it is with the game). Only the German player who knows exactly how to employ their units with careful attention to the movement and combat sequences, event card use, the hidden unit dynamic, and especially the air rules—will be able to duplicate the historic success of the 1940 Wehrmacht. And even then, the historic result was only possible because the Allied response played almost perfectly into Germany’s hand. But there is more than one path to a decisive result, and the game allows for multiple campaign plans for both sides. The rules are set up to mirror the operational, command, and doctrinal differences between the two opposing sides, but the contest is designed simply to re-create the same historic “canvas” upon which both players may then paint—the issue will be decided by a combination of player decisions and the fortunes and fog of war.
-
-
github.com github.com
-
www.internetsociety.org www.internetsociety.org
-
A simple survey should be offered during the unsubscribe process to allow customers to provide feedback about why they are leaving.
-
Do not send a confirmation email as it can be a violation of CAN-SPAM and you risk further alienating consumers.
-
-
www.smtp2go.com www.smtp2go.com
-
What’s worse, their login process is infuriating. It took me 10 minutes just to get into my account.
-
4) Don’t make people log in to unsubscribe.Your subscriber is already overwhelmed by his inbox. He probably spends about 28% of his workday just managing email, according to a McKinsey Global Institute report. So don’t make it any harder by forcing him to log into an account he probably doesn’t remember creating before he can unsubscribe.
-
- Dec 2023
-
developers.googleblog.com developers.googleblog.com
-
Introducing passkeys when it’s relevant to the user
-
-
The first passkey screen users see is light and easy-to-digest. The header is focusing on the user benefit, saying “Simplify your sign in.”
-
-
screentop.gg screentop.gg
Tags
Annotators
URL
-
-
www.kickstarter.com www.kickstarter.com
-
Kickstarter will not let me promise rewards within the same month, but the files will be sent to backers soon after the campaign ends.
-
-
-
www.youtube.com www.youtube.com
-
-
www.youtube.com www.youtube.com
-
-
gitlab.com gitlab.com
-
Enable ActiveRecord unsigned integers to use 8 bytes instead of 4. This fixes the ActiveModel::RangeError problem where AR models with perfectly fine 8 bytes primary keys are taken for ActiveModel::Type::Integer with a default limit of 4 bytes.
-
-
gitlab.com gitlab.com
-
hashie
-
It has its roots in the Rash (specifically the rash_alt flavor), which is a special Mash, made popular by the hashie gem.
first sighting: https://github.com/shishi/rash_alt
-
-
stackoverflow.com stackoverflow.com
-
It's possible to run commands in a pseudo terminal via the PTY module in order to preserve a user facing terminal-like behaviour.
-
-
github.com github.com
-
Authorization scopes are a way to determine to what extent the client can use resources located in the provider. When the client requests the authorization it specifies in which scope they would like to be authorized. This information is then displayed to the user - resource owner - and they can decide whether or not they accept the given application to be able to act in specified scopes.
-
-
stackoverflow.com stackoverflow.com
-
This is similar to gdonato's answer, but scopes in doorkeeper are better used for managing which permissions are being given to the authenticated app (i.e. "Give this app permission to read X and write Y on your behalf").
-
THANK YOU! I gave up on this a long time ago but today I had to complete the project. I came back here intending to post this question again and found your answer. It was exactly what I was looking for. THANK YOU!
-
-
github.com github.com
-
Similar Libraries in Ruby
Tags
Annotators
URL
-
-
github.com github.com
-
next_feed = feed.next_page
-
-
developers.facebook.com developers.facebook.comWebhooks1
-
html.spec.whatwg.org html.spec.whatwg.org
-
To enable servers to push data to web pages over HTTP or using dedicated server-push protocols, this specification introduces the EventSource interface.
So they're kind of like webhooks, but from the server to the client instead of one server to another server?
-
-
developers.facebook.com developers.facebook.com
-
It uses the Server-Sent Events (SSE) web standard
first sighting: server-sent events
https://html.spec.whatwg.org/multipage/server-sent-events.html#server-sent-events
-
-
www.pluralsight.com www.pluralsight.com
-
&& nil
first sighting: I don't think I've seen someone write exactly
&& nilbefore.Apparently to avoid having the return value from
errors.add— which should be done solely for its side effect, not to get a return value -- inadvertently being used as a return value foruser. It wouldn't make sense to return fromuser. That should only return a User or nil. And more statically typed languages would allow that to be expressed/enforced from type annotations alone, which would have caught the mistake of returningerrors.addif someone had accidentally attempted to return that.Having
user(and thereforecall) return nil is key to theunless @current_userworking. -
command = AuthenticateUser.call(params[:email], params[:password]) 8 9 if command.success?
-
nil
I appreciate the attention to detail of returning nil if that's what should be returned (rather than accidentally just returning the return value from the last line of code,
errors.add. -
Instead of using private controller methods, simple_command can be used.
first sighting: simple_command
-
-
Here is a simple diagram of the process:
-
Token-based authentication is stateless - it does not store anything on the server but creates a unique encoded token that gets checked every time a request is made.
-
Token-based authentication (also known as JSON Web Token authentication) is a new way of handling the authentication of users in applications. It is an alternative to session-based authentication.
-
-
stackoverflow.com stackoverflow.com
-
A "piece of code" is worth a thousand words. All the verbosity in the previous answers didn't light the bulb in my head the way this piece of code did. And now that that verbosity makes absolutely perfect sense :)
-
The thing most obvious about the type systems of Java, C, C++, Pascal, and many other widely-used “industry” languages is not that they are statically typed, but that they are explicitly typed.In other words, they require lots of type declarations. (In the world of less explicitly typed languages, where these declarations are optional, they are often called “type annotations”.) This has nothing to do with static types. continued
-
One language that is currently being developed, Rascal, takes a hybrid approach allowing dynamic typing within functions but enforcing static typing for the function signature.
first sighting: Rascal
-
-
-
github.com github.com
-
describe AuthenticateUser do subject(:context) { described_class.call(username, password) } describe '.call' do context 'when the context is successful' do let(:username) { 'correct_user' } let(:password) { 'correct_password' } it 'succeeds' do expect(context).to be_success end end context 'when the context is not successful' do let(:username) { 'wrong_user' } let(:password) { 'wrong_password' } it 'fails' do expect(context).to be_failure end end end end
-
-
`.call` is a shortcut for `.new(args).call`
-
the class'
the class's
-
-
stackoverflow.com stackoverflow.com
-
This question is not duplicate as you marked it. My situation is different
-
-
stackoverflow.com stackoverflow.com
-
I was getting an error indicating I was using an invalid access_token. It turns out that I wasn't waiting for getLoginStatus to complete prior to making an API call
-
-
stackoverflow.com stackoverflow.com
-
stackoverflow.com stackoverflow.com
-
-
I disagree. What is expressed is an attempt to solve X by making something that should maybe be agnostic of time asynchronous. The problem is related to design: time taints code. You have a choice: either you make the surface area of async code grow and grow or you treat it as impure code and you lift pure synchronous logic in an async context. Without more information on the surrounding algorithm, we don't know if the design decision to make SymbolTable async was the best decision and we can't propose an alternative. This question was handled superficially and carelessly by the community.
superficially and carelessly?
-
The problem with this pile of questions is that, instead of helping the OP get out of the X Y problem, people stay focussed on Y, mark the question as a duplicate of Y in a matter of minutes and X is never properly addressed.
sticking too much to policy/habit instead of addressing the specific needs of individuals? too much eagerness to close / mark as duplicate?
-
because the value isn't there yet. A promise is just a marker that it will be available at some point in the future. You cannot convert asynchronous code to synchronous, though. If you order a pizza, you get a receipt that tells you that you will have a pizza at some point in the future. You cannot treat that receipt as the pizza itself, though. When you get your number called you can "resolve" that receipt to a pizza. But what you're describing is trying to eat the receipt.
-
-
stackoverflow.com stackoverflow.com
-
developers.facebook.com developers.facebook.com
-
developers.secure.facebook.com developers.secure.facebook.com
-
Note that because this request uses your app secret, it must never be made in client-side code or in an app binary that could be decompiled. It is important that your app secret is never shared with anyone. Therefore, this API call should only be made using server-side code.
-
for security, app access token should never be hard-coded into client-side code, doing so would give everyone who loaded your webpage or decompiled your app full access to your app secret, and therefore the ability to modify your app. This implies that most of the time, you will be using app access tokens only in server to server calls.
-
once you have an access token you can use it to make calls from a mobile client, a web browser, or from your server to Facebook's servers. If a token is obtained on a client, you can ship that token down to your server and use it in server-to-server calls. If a token is obtained via a server call, you can also ship that token up to a client and then make the calls from the client.
-
Apple does not allow moving tokens to servers.
-
A User access token is used if your app takes actions in real time, based on input from the user. This kind of access token is needed any time the app calls an API to read, modify or write a specific person's Facebook data on their behalf. A User access tokens is generally obtained via a login dialog and requires a person to permit your app to obtain one.
-
-
-
developers.secure.facebook.com developers.secure.facebook.com
-
developers.secure.facebook.com developers.secure.facebook.com
-
It's also a good idea to run qualitative usability tests to understand how people are reacting to what they see.
-
It's incredibly important to test your Facebook Login flow under a variety of conditions, and we've built a robust testing plan for you to follow.
-
-
developer.mozilla.org developer.mozilla.org<button>1
-
Most browsers do give focus to a button being clicked, but Safari does not, by design.
-
-
bugs.webkit.org bugs.webkit.org
-
Are you two serious? Instead of advocating to fix this bug you go out of your way to post another bug report to advocate the devs to dig in their heels?! How about standardizing some devastating needed questions in the technology industry: 1. How does this help productive members of society? 2. Does this serve a useful purpose? 3. Should I be doing this? 4. Have I had a full, non-interrupted, rational conversation with multiple people who disagrees to help determine if I have objectively determined my answers to the first three questions?
-
-
developers.google.com developers.google.com
-
An expired ID token does not mean the user is signed out.
-
and pressed the Confirm button to grant consent and share credentials.
-
In cases where Google is authoritative the user is confirmed to be the legitimate account owner.
What about in other cases? The user may have created an account using someone else's e-mail address? Isn't e-mail verification a required step to create the Google Account though? I think so. I think the only case it is trying to warn us of is the one mentioned below:
email_verfied can also be true as Google initially verified the user when the Google Account was created, however ownership of the third party email account may have since changed.
-
-
www.furnishedfinder.com www.furnishedfinder.com
-
Because your time is valuable, submit one housing request and be connected with property owners eager to host you.
-
-
softwareengineering.stackexchange.com softwareengineering.stackexchange.com
-
Something that you're trying to keep the same, in order to achieve goal X (such as a "log lookup time" above).
-
An invariant is like a rule or an assumption that can be used to dictate the logic of your program.
-
An invariant (in common sense) means some conditions that must be true at some point in time or even always while your program is executing. e.g. PreConditions and PostConditions can be used to assert some conditions that must be true when a function is called and when it returns. Object invariants can be used to assert that a object must have a valid state throughout the time it exists. This is the design by contract principle.
-
Modern cars, however, use a single stick that pivots around among the gears. It's designed in such a way that, on a modern stick-shift car, it is not possible to engage two gears at the same time.
-
In OOP, an invariant is a set of assertions that must always hold true during the life of an object for the program to be valid. It should hold true from the end of the constructor to the start of the destructor whenever the object is not currently executing a method that changes its state.
-
-
stackoverflow.com stackoverflow.com
-
42 View upvote and downvote totals. This answer is not useful Save this answer. Show activity on this post. It is a condition you know to always be true at a particular place in your logic
-
The age of a parent is greater than the age of their biological children.
-
an invariant is something like of a fixed relationship between varying entities. For example, your age will always be less than that compared to your biological parents. Both your age, and your parent's age changes in the passage of time, but the relationship that i mentioned above is an invariant.
-
For instance, a binary search tree might have the invariant that for every node, the key of the node's left child is less than the node's own key. A correctly written insertion function for this tree will maintain that invariant. As you can tell, that's not the sort of thing you can store in a variable: it's more a statement about the program. By figuring out what sort of invariants your program should maintain, then reviewing your code to make sure that it actually maintains those invariants, you can avoid logical errors in your code.
-
-
developers.google.com developers.google.com
-
The secure OAuth 2.0 protocol lets you safely link a user's Google Account with their account on your platform, thereby granting Google applications and devices access to your services.
What I still don't understand is... How do you even initiate the Google app to request such access? How would you trigger that? It's not going to show a list of all 100,000 registered apps and ask which of those you'd like to add...
-
Use cases
-
-
developers.google.com developers.google.com
-
This describes account linking from the opposite direction than I'm used to: starting with the Google App, which requests your app to share data from your service with Google.
As it says on https://developers.google.com/identity/account-linking overview:
The secure OAuth 2.0 protocol lets you safely link a user's Google Account with their account on your platform, thereby granting Google applications and devices access to your services.
-
return and HTTP 200 response
-
-
en.wikipedia.org en.wikipedia.org
-
This can result in an unwanted increase in fraudulent account creations, or worse; attackers successfully stealing social media account credentials from legitimate users.
Tags
Annotators
URL
-
-
developers.google.com developers.google.com
-
The established link grants Google access to the data the user consents to share.
-
Benefits for developers include:
-
Benefits for users include:
-
Users can start and complete the account linking process in your app, an environment they are already familiar with. Users do not require login credentials because they have already been authenticated on the device and in your mobile app.
-
-
developers.google.com developers.google.com
-
-
A traditional account linking flow requires the user to enter their credentials in the browser. The use of App Flip defers user sign-in to your Android app, which allows you to leverage existing authorizations. If the user is signed in to your app, they don't need to re-enter their credentials to link their account.
-
-
support.google.com support.google.com
-
You can create variations of your email address where all messages arrive in your current inbox. Just add a plus sign (+) and any word before the @ sign in your current address.
-
-
developers.google.com developers.google.com
-
To simulate a Google app and trigger the intent which launches your app, download and install the App Flip Test Tool
-
To implement App Flip, you need to modify the user authorization code in your app to accept a deep link from Google.
-
-
developers.google.com developers.google.com
-
aud
-
To perform account linking with OAuth and Google Sign-In, follow these general steps: First, ask the user to give consent to access their Google profile. Use the information in their profile to check if the user account exists. For existing users, link the accounts. If you can't find a match for the Google user in your authentication system, validate the ID token received from Google. You can then create a user based on the profile information contained in the ID token.
-
-
www.centurylink.com www.centurylink.com
-
Don't reply or click any links in a spam message Replying to, clicking on links within, or even attempting to unsubscribe from spam emails typically only informs the sender that they have found an active email address to which they'll send more spam emails.
-
-
developer.chrome.com developer.chrome.com
-
-
This feature is available only in Chrome, not Chromium.
Really? It's working for me in ungoogled-chromium
-
-
stackoverflow.com stackoverflow.com
-
developers.google.com developers.google.com
-
Whether a personalized button or a generic text button displays has no impact on the UX flows after the button is clicked. The account displayed in the personalized button is not automatically selected.
-
A personalized button gives users a quick indication of the session status, both on Google's side and on your website, before they click the button. This is especially helpful to end users who visit your website only occasionally. They may forget whether an account has been created or not, and in which way. A personalized button reminds them that Sign In With Google has been used before. Thus, it helps to prevent unnecessary duplicate account creation on your website.
first sighting: sign-in: problem: forgetting whether an account has been created or not, and in which way
-
-
developers.google.com developers.google.com
-
-
https://accounts.google.com/o/oauth2/v2/auth?
-
-
bankautomationnews.com bankautomationnews.com
-
The United States was lagging in the adoption of real-time payments (RTP) before the launch of FedNow because the market is structured on choice rather than mandate
-
-
en.wikipedia.org en.wikipedia.org
-
Our freedom of choice in a competitive society rests on the fact that, if one person refuses to satisfy our wishes, we can turn to another. But if we face a monopolist we are at his absolute mercy.
-
-
github.com github.com
-
One loss due to this change is the ability to represent an invalid UUID (vs a NIL UUID).
-
-
opentelemetry.io opentelemetry.io
-
-
Compared with simple clients, modern clients are generally much easier to use and more Ruby-like
-
Modern clients are produced by a modern code generator, combined with hand-crafted functionality for some services.
-
Most modern clients connect to high-performance gRPC endpoints, although a few are backed by REST services.
-
The libraries in this repo are simple REST clients. These clients connect to HTTP/JSON REST endpoints and are automatically generated from service discovery documents. They support most API functionality, but their class interfaces are sometimes awkward.
-
-
developers.google.com developers.google.com
-
Web server applications
-
It is generally a best practice to request scopes incrementally, at the time access is required, rather than up front. For example, an app that wants to support saving an event to a calendar should not request Google Calendar access until the user presses the "Add to Calendar" button; see Incremental authorization.
-
After logging in, the user is asked whether they are willing to grant one or more permissions that your application is requesting. This process is called user consent.
-
-
Given the security implications of getting the implementation correct, we strongly encourage you to use OAuth 2.0 libraries when interacting with Google's OAuth 2.0 endpoints. It is a best practice to use well-debugged code provided by others, and it will help you protect yourself and your users. For more information, see Client libraries.
-
-
Tags
Annotators
URL
-
-
developers.google.com developers.google.com
-
Cross-Account Protection does not currently send security events for Google Workspace (formerly G Suite) users.
That's a pretty major caveat
-
For example, if a user's Google Account were compromised, you could temporarily disable Sign In With Google for that user and prevent account recovery emails from being sent to the user's Gmail address.
-
-
developers.google.com developers.google.com
-
After you have verified the token, check if the user is already in your user database. If so, establish an authenticated session for the user. If the user isn't yet in your user database, create a new user record from the information in the ID token payload, and establish a session for the user. You can prompt the user for any additional profile information you require when you detect a newly created user in your app.
-
If so, establish an authenticated session for the user.
-
Warning: Do not accept plain user IDs, such as those you can get with the GoogleUser.getId() method, on your backend server. A modified client application can send arbitrary user IDs to your server to impersonate users, so you must instead use verifiable ID tokens to securely get the user IDs of signed-in users on the server side.
-
- Nov 2023
-
stackoverflow.blog stackoverflow.blog
-
www.intricatecloud.io www.intricatecloud.io
-
If I wanted to integrate this with an existing login system, “signing out” would mean signing out of my own application (and not out of my Google account).
-
I sign in with my Google account everywhere I can to avoid having yet another password on another random website.
-
-
-
-
useInterval( () => { if (typeof window !== "undefined" && window.google) { setGoogle(window.google); setGoogleIsLoading(false); } }, googleIsLoading ? 100 : null );
-
We didn't add this initially because Google is not the only form of authentication we offer and it could get annoying for users that sign up with GitHub or username and password to see the Google popup all the time.
-
-
developers.google.com developers.google.com
-
Sign in with Google is based on OAuth 2.0.
-
At a later time, when accessing data from Google is required, you call the authorization API to ask for the consent and get access tokens for data access. This separation complies with our recommended incremental authorization best practice, in which the permissions are requested in context.
-
OAuth 2.0 is also the industry-standard protocol for authorization. It provides for a set of endpoints with which relying parties integrate using HTTP.
-
relying parties
relying parties
-
-
developers.google.com developers.google.com
-
"Sign up with Google"
-
To mitigate this latency issue, the buttons are rendered in 2 steps, as follows:
-
The Sign in with Google button redirect flow always uses the POST method to submit the credential to your web server, whereas OAuth redirect normally uses the GET method.
How does it both do a POST and a redirect? A redirect is by definition a GET. So I assume it does the POST first with the more sensitive and then a GET without the more sensitive data to the redirect URI?
-
The OAuth 2.0 specification considers HTTP redirection, but lacks guidance on rendering pop-up dialogs.
-
The user's Google account sign-in status and your app are independent of each other, except during the sign-in moment itself when you know that the user has successfully authenticated and is signed into their Google account. Users may remain signed in, they may sign out, or switch to a different Google account while maintaining an active, signed-in session on your website.
-
Automatic Sign-in can only happen with One Tap UX, not with the Sign in with Google button UX.
-
Due to security reasons, it's not allowed to add new Google sessions in an iframe.
-
are triggered only when users have signed in to Google before loading your web pages. This step is optional for the Sign in with Google button flow, since users are prompted to sign in to Google when the button is pressed.
-
-
developers.google.com developers.google.com
-
In contrast to One Tap, the Sign in with Google button flow must be triggered by a user gesture.
"One tap" sounds like a user gesture -- sounds the same as tapping on a button. So I don't yet see the distinction they are trying to make or undertsand the difference between these options...
-
A personalized button reminds end users that they have used Sign in with Google before, and thus helps to prevent unnecessary duplicate account creation on your website. This is especially helpful to end users who visit your website only occasionally. They may forget the login methods they used.
-
Sign in with Google for Web doesn't support silent sign in, in which case a credential is returned without any UI displayed. End users always see some UI, manual or automatic sign in, when a login credential is returned from Google to the relying party. This improves user privacy and control.
-
-
developers.google.com developers.google.com
-
-
Authentication establishes who someone is, and is commonly referred to as user sign-up or sign-in. Authorization is the process of granting or rejecting access to data or resources.
-
The signed-in status of a Google Account, and your app's session state and signed-in status are distinct, separate concepts. User sign-in status to their Google Account and your app are independent of each other
-
-
developers.google.com developers.google.com
-
To improve user privacy, display moment notifications are intentionally delayed a random amount of time when FedCM is enabled.
How does that improve privacy?
-
-
issuetracker.google.com issuetracker.google.com
-
-
If you have any Workspace organization, and the app is only accessible to users within their own org, then we allow non-public domains for projects in "Internal" mode. See this link on how to make the project internal.
didn't work for me
-
I'm going to close this thread which will no longer be monitored. In case you want to report a new issue or you can’t make project to be internal, please do not hesitate to create a new Issue Tracker thread describing your situation.
-
-
www.appsloveworld.com www.appsloveworld.com
-
In development, I was able to reset the exponential cool down by removing the g_state cookie. One method for this might be to add a development-only "Clear Google One Tap Cookie" link that run an server-side action to remove the g_state cookie and then redirect back to the previous page.
-
-
github.com github.com
-
The PSL nor its volunteers prescribe what browsers do with entries or their recognition/handling of entries, default behaviours, or other handling. Browsers do what browsers do, diversely, and the PSL is not the boss of them.
-
mutually-untrusting parties
first sighting: "mutually-untrusting parties"
-
In addition, owners of privately-registered domains who themselves issue subdomains to mutually-untrusting parties may wish to be added to the PRIVATE section of the list.
-
-
github.com github.com
-
This handy table summarizes the differences between the various types of suffix:
-
-
stackoverflow.com stackoverflow.com
-
It does provide an answer. The issue is that the Google form validates that the user has input a valid looking URL. So he needs to input an arbitrary, but valid URL, and then add that to /etc/hosts so his browser will resolve it to the address of his devserver. The question and answer are both fine as is and don't require any critique or clarification.
The critical comment this was apparently in reply to was apparently deleted
-
You can set "Authorized redirect URI" to local IP (like http://127.0.0.1/callback), it's working fine for me. What really agonizing is that google don't allow user to config an external IP (let's say your server IP like 99.99.99.99) as "Authorized redirect URI", google want the "Authorized redirect URI" to end with a public top-level domain (such as .com or .org).
Trying to use a local .test domain results in: Invalid Origin: must end with a public top-level domain (such as .com or .org).
but local IP is allowed. Why this inconsistency?
And then this one: can use external domain, but not external IP?!
-
-
laracasts.com laracasts.com
-
The problem is that when I want to create OAuth client ID in google, it does not accept ".test" domain for "Authorized redirect URIs". It says: Invalid Redirect: must end with a public top-level domain (such as .com or .org). Invalid Redirect: domain must be added to the authorized domains list before submitting. While it accepts .test domain for "Authorized JavaScript origins" part! I saw most of the tutorials when using socialite and google api they set these in google console. http://localhost:8000 and http://localhost:8000/callback/google and google accepts them without problem with domain and generate the key and secret but I am not using mamp and I am going to continue with valet. I would be so thankful if you guide me about what is the alternative domain for .test which works fine in valet and also google accepts it?
-
-
stackoverflow.com stackoverflow.com
-
AIs are not capable of citing the sources of knowledge used up to the standards of the Stack Exchange network. Even when Artificial Intelligence appears to cite sources for responses, such sources may not be relevant to the original request, or may not exist at all. For Stack Overflow, this means the answer may not honestly or fairly represent the sources of knowledge used, even if someone explicitly cites the Artificial Intelligence as an author in their answer.
-
-
webmasters.stackexchange.com webmasters.stackexchange.com
-
It would be http://name./ as FQDN, but the variant without the . typically works in browsers, too.
-
-
-
users
Tags
Annotators
URL
-
-
developer.okta.com developer.okta.com
-
developers.cloudflare.com developers.cloudflare.com
-
Cloudflare Access has a generic OpenID Connect (OIDC) connector to help you integrate IdPs not already set in Access.
-
-
www.okta.com www.okta.com
-
The diagram below walks through the social login process from start to finish.
Equivalent to this diagram: https://hyp.is/YjaJsI5KEe6x-NdCxYmrtA/developer.okta.com/docs/concepts/identity-providers/
Except: - This one shows a GET okta.com/oauth2/v1/authorize/callback and the other shows GET okta.com/oauth2/v1/authorize
Tags
Annotators
URL
-
-
developer.okta.com developer.okta.com
-
Sign-in process
-
Users can use multiple Identity Providers to sign in, and Okta can link all of those profiles to a single Okta user. This is called account linking. For example, a user signs in to your app using a different Identity Provider than they used for registration. Account linking can then establish that the user owns both identities. This allows the user to sign in from either account.
-
-
docs.cypress.io docs.cypress.io
-
logIntoMicrosoft
I think
logInToMicrosoftwould be slightly better, but this is surely much better than the completely incorrectloginToMicrosoft -
loginTo
Incorrect. Should be
logInToorlogInto, same as it is in the other functions,logIntoMicrosoft, ... -
// NOTE: The element exists on the original form but is hidden and gets rerendered, which leads to intermittent detached DOM issues cy.contains('Next').click().wait(4000)
-
-
developers.google.com developers.google.com
-
Use a single project to hold all platform instances of your app (Android, iOS, web, etc.), each with a different Client ID.
-
The Google Sign-In server-side flow differs from the OAuth 2.0 for Web server applications flow.
-
-
datatracker.ietf.org datatracker.ietf.org
-
developer.okta.com developer.okta.com
-
Okta supports the following enterprise and social Identity Provider types:
-
JSON HAL
-
curl -v -X POST \ -H "Accept: application/json" \ -H "Content-Type: application/json" \ -H "User-Agent: Mozilla/5.0 (${systemInformation}) ${platform} (${platformDetails}) ${extensions}" \ -H "Authorization: SSWS ${api_token}"
-
-
stackoverflow.com stackoverflow.com
-
Indicates that the content of the element is an identifier with transient semantics and SHOULD be treated as an opaque and temporary value by the relying party.
-
-
support.apple.com support.apple.com
Tags
Annotators
URL
-
-
docs.cypress.io docs.cypress.io
-
logging in
-
-
docs.cypress.io docs.cypress.io
-
Logging In
-
-
github.com github.com
-
github.com github.com
-
github.com github.com
-
-
// Not recommended: log into the application like a user // by typing into the form and clicking Submit // While this works, it is slow and exercises the login form // and NOT the feature you are trying to test. -
Capybara.string(response.body)
const $html = Cypress.$(body)
-
-
github.com github.com
-
github.com github.com
-
www.grammarly.com www.grammarly.com
-
set [x] up
-
-
github.com github.com
-
// oftentimes once we have a proper e2e test around logging in // there is NO more reason to actually use our UI to log in users // doing so wastes a huge amount of time, as our entire page has to load // all associated resources have to load, we have to wait to fill the // form and for the form submission and redirection process
-
-
github.com github.com
-
// instead of visiting each page and waiting for all // the associated resources to load, we can instead // just issue a simple HTTP request and make an // assertion about the response body cy.request('/admin') .its('body') .should('include', '<h1>Admin</h1>')instead of cy.visit
-
-
humanitec.com humanitec.com
-
can login
inconsistent even on same web page, 1 paragraph away
-