tag:blogger.com,1999:blog-10943611.post3269826880159949573..comments2024-03-16T02:07:45.896+02:00Comments on Gr33n Data: CherryPy Custom AuthenticationAnonymoushttp://www.blogger.com/profile/04040899001187322598noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-10943611.post-33673830002637153372011-05-03T14:04:53.083+02:002011-05-03T14:04:53.083+02:00Requesting a frob for the identification of the lo...Requesting a frob for the identification of the login session (call) requires a signature. This signature starts with the secret you shared that has to be followed by your API key.USB Encryptionhttp://www.lok-it.net/encrypted-flash-drive/noreply@blogger.comtag:blogger.com,1999:blog-10943611.post-92161010704649479982011-02-18T14:50:34.436+02:002011-02-18T14:50:34.436+02:00I think CherryPy is a useful method for implementi...I think CherryPy is a useful method for implementing the authentication of API Calls. Thanks for such a helpful codes & informationJ (Encrypted Flash Drive Guy)http://www.lok-it.net/encrypted-flash-drive/noreply@blogger.comtag:blogger.com,1999:blog-10943611.post-74983000304159216872010-09-20T19:38:10.879+03:002010-09-20T19:38:10.879+03:00I was able to access Jim Hoskins's tutorial vi...I was able to access Jim Hoskins's tutorial via waybackmachine.org :)<br><br>http://replay.waybackmachine.org/20090222054041/http://jimhoskins.com/2008/07/21/cherrypy-digest-and-basic-authentication/Rafael Pinheirohttp://rbpinheiro.wordpress.comnoreply@blogger.com