摘要:
n this example, we'll be setting up a custom authorization scheme based on a key which will be validated using a very simple algorithm. This isn't secure for any number of reasons, but with some minor modifications (e.g. expiring a key once it is used) it would be sufficient for things like 阅读全文
posted @ 2013-02-07 16:28
chunchill
阅读(251)
评论(0)
推荐(0)


浙公网安备 33010602011771号