mirror of
https://github.com/encode/django-rest-framework.git
synced 2025-12-15 14:14:01 +03:00
Fix broken link and formatting in documentation (#9848)
This commit is contained in:
parent
e221d9a1d6
commit
d0a5d5e7ca
|
|
@ -451,7 +451,7 @@ More information can be found in the [Documentation](https://django-rest-durin.r
|
||||||
|
|
||||||
## django-pyoidc
|
## django-pyoidc
|
||||||
|
|
||||||
[dango-pyoidc][django_pyoidc] adds support for OpenID Connect (OIDC) authentication. This allows you to delegate user management to an Identity Provider, which can be used to implement Single-Sign-On (SSO). It provides support for most uses-cases, such as customizing how token info are mapped to user models, using OIDC audiences for access control, etc.
|
[django_pyoidc][django-pyoidc] adds support for OpenID Connect (OIDC) authentication. This allows you to delegate user management to an Identity Provider, which can be used to implement Single-Sign-On (SSO). It provides support for most uses-cases, such as customizing how token info are mapped to user models, using OIDC audiences for access control, etc.
|
||||||
|
|
||||||
More information can be found in the [Documentation](https://django-pyoidc.readthedocs.io/latest/index.html).
|
More information can be found in the [Documentation](https://django-pyoidc.readthedocs.io/latest/index.html).
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -19,9 +19,9 @@ Multiple throttles can also be used if you want to impose both burst throttling
|
||||||
|
|
||||||
Throttles do not necessarily only refer to rate-limiting requests. For example a storage service might also need to throttle against bandwidth, and a paid data service might want to throttle against a certain number of a records being accessed.
|
Throttles do not necessarily only refer to rate-limiting requests. For example a storage service might also need to throttle against bandwidth, and a paid data service might want to throttle against a certain number of a records being accessed.
|
||||||
|
|
||||||
**The application-level throttling that REST framework provides should not be considered a security measure or protection against brute forcing or denial-of-service attacks. Deliberately malicious actors will always be able to spoof IP origins. In addition to this, the built-in throttling implementations are implemented using Django's cache framework, and use non-atomic operations to determine the request rate, which may sometimes result in some fuzziness.
|
**The application-level throttling that REST framework provides should not be considered a security measure or protection against brute forcing or denial-of-service attacks. Deliberately malicious actors will always be able to spoof IP origins. In addition to this, the built-in throttling implementations are implemented using Django's cache framework, and use non-atomic operations to determine the request rate, which may sometimes result in some fuzziness.**
|
||||||
|
|
||||||
The application-level throttling provided by REST framework is intended for implementing policies such as different business tiers and basic protections against service over-use.**
|
**The application-level throttling provided by REST framework is intended for implementing policies such as different business tiers and basic protections against service over-use.**
|
||||||
|
|
||||||
## How throttling is determined
|
## How throttling is determined
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue
Block a user