Libraries tagged by auth api

phpexperts/gcloud-auth

1 Favers
4 Downloads

A drop-dead simple way to authenticate APIs with Google Cloud without needing the gcloud-api dependency.

Go to Download


ovarun/laravel-hmac-auth

1 Favers
1 Downloads

Secure HMAC authentication module for Laravel APIs

Go to Download


nhanchaukp/linkedin-api-php-client

0 Favers
15 Downloads

LinkedIn API PHP SDK with OAuth 2.0 & CSRF support. Can be used for social sign in or sharing on LinkedIn. Examples. Documentation.

Go to Download


nb_google/auth

0 Favers
48 Downloads

Client library for NetBase Team Developer Customize from API Google

Go to Download


mongdch/mon-auth

2 Favers
164 Downloads

PHP权限控制库

Go to Download


mohist/sodion-auth

0 Favers
22 Downloads

SodionAuth api core.

Go to Download


mohist/flarum-sodion-auth

0 Favers
14 Downloads

SodionAuth api for flarum.

Go to Download


mohammed-samir/linkedin-api-php-client

0 Favers
9 Downloads

LinkedIn API PHP SDK with OAuth 2.0 & CSRF support. Can be used for social sign in or sharing on LinkedIn. Examples. Documentation.

Go to Download


mickaelbaudoin/simple-rest-auth

2 Favers
7 Downloads

Authentification for API REST

Go to Download


michelmelo/linkedin-api-php-client

0 Favers
55 Downloads

LinkedIn API PHP SDK with OAuth 2.0 & CSRF support. Can be used for social sign in or sharing on LinkedIn. Examples. Documentation.

Go to Download


mcg/google-auth-service

0 Favers
5 Downloads

Librerías en PHP para facilitar la autentificación hacia los servicios de Google como Gmail, Google Drive usando las REST APIs de Google.

Go to Download


matthewmee1/linkedin-api-php-client

0 Favers
31 Downloads

LinkedIn API PHP SDK with OAuth 2.0 & CSRF support. Can be used for social sign in or sharing on LinkedIn. Examples. Documentation.

Go to Download


matthewbaggett/docker-api-php-client

0 Favers
7 Downloads

The Engine API is an HTTP API served by Docker Engine. It is the API the Docker client uses to communicate with the Engine, so everything the Docker client can do can be done with the API. Most of the client's commands map directly to API endpoints (e.g. `docker ps` is `GET /containers/json`). The notable exception is running containers, which consists of several API calls. # Errors The API uses standard HTTP status codes to indicate the success or failure of the API call. The body of the response will be JSON in the following format: ``` { "message": "page not found" } ``` # Versioning The API is usually changed in each release, so API calls are versioned to ensure that clients don't break. To lock to a specific version of the API, you prefix the URL with its version, for example, call `/v1.30/info` to use the v1.30 version of the `/info` endpoint. If the API version specified in the URL is not supported by the daemon, a HTTP `400 Bad Request` error message is returned. If you omit the version-prefix, the current version of the API (v1.43) is used. For example, calling `/info` is the same as calling `/v1.43/info`. Using the API without a version-prefix is deprecated and will be removed in a future release. Engine releases in the near future should support this version of the API, so your client will continue to work even if it is talking to a newer Engine. The API uses an open schema model, which means server may add extra properties to responses. Likewise, the server will ignore any extra query parameters and request body properties. When you write clients, you need to ignore additional properties in responses to ensure they do not break when talking to newer daemons. # Authentication Authentication for registries is handled client side. The client has to send authentication details to various endpoints that need to communicate with registries, such as `POST /images/(name)/push`. These are sent as `X-Registry-Auth` header as a [base64url encoded](https://tools.ietf.org/html/rfc4648#section-5) (JSON) string with the following structure: ``` { "username": "string", "password": "string", "email": "string", "serveraddress": "string" } ``` The `serveraddress` is a domain/IP without a protocol. Throughout this structure, double quotes are required. If you have already got an identity token from the [`/auth` endpoint](#operation/SystemAuth), you can just pass this instead of credentials: ``` { "identitytoken": "9cbaf023786cd7..." } ```

Go to Download


matiasnamendola/slimpower-jwt-auth

0 Favers
49 Downloads

JSON Web Token Authentication Middleware for SlimPower Framework

Go to Download


matiasnamendola/slimpower-auth-manager

0 Favers
51 Downloads

Authentication Manager for SlimPower Framework

Go to Download


<< Previous Next >>