Tagged articles
653 articles
Page 2 of 7
MaGe Linux Operations
MaGe Linux Operations
May 15, 2025 · Cloud Native

Kubernetes Security Deep Dive: Auth, AuthZ, and Admission Control

This article explains Kubernetes' comprehensive security architecture, detailing the three critical gates—authentication, authorization, and admission control—along with token, basic, and certificate methods, RBAC policies, service accounts, kubeconfig setup, and practical examples for managing user permissions within clusters.

AdmissionControlAuthenticationAuthorization
0 likes · 20 min read
Kubernetes Security Deep Dive: Auth, AuthZ, and Admission Control
IT Services Circle
IT Services Circle
May 15, 2025 · Information Security

Critical RDP Vulnerability Allows Persistent Access with Revoked Microsoft/Azure Passwords

A newly disclosed critical vulnerability in Windows Remote Desktop Protocol (RDP) lets attackers bypass cloud authentication and maintain permanent access using revoked Microsoft or Azure account passwords, even after password changes, while Microsoft treats the issue as a design decision rather than a bug.

AuthenticationAzureMicrosoft
0 likes · 5 min read
Critical RDP Vulnerability Allows Persistent Access with Revoked Microsoft/Azure Passwords
Bilibili Tech
Bilibili Tech
May 9, 2025 · Artificial Intelligence

How an AI Gateway Scales LLM Services: Architecture, Auth, Quotas, and Load Balancing

This article explains the design of an AI gateway that centralizes LLM access, detailing its background, overall architecture, authentication, quota management, multi‑model routing, load‑balancing strategies, multi‑tenant isolation, observability features, and the supported API protocols for enterprise integration.

AI gatewayAuthenticationLLM
0 likes · 17 min read
How an AI Gateway Scales LLM Services: Architecture, Auth, Quotas, and Load Balancing
Top Architect
Top Architect
May 7, 2025 · Information Security

Understanding JWT Token Security and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common security threats such as theft, replay and forgery, and provides practical mitigation measures including HTTPS, token encryption, secure storage, expiration policies, two‑factor authentication and safe token refresh mechanisms.

AuthenticationJWTWeb Development
0 likes · 14 min read
Understanding JWT Token Security and Mitigation Strategies
Java Architect Essentials
Java Architect Essentials
May 6, 2025 · Backend Development

How @Authenticated Simplifies SpringBoot API Security

The article explains how the @Authenticated annotation in SpringBoot can replace repetitive manual authentication code, offering automatic request validation, role‑based checks, and streamlined error handling, with practical examples and a clear list of benefits for developers.

API SecurityAuthenticationBackend
0 likes · 7 min read
How @Authenticated Simplifies SpringBoot API Security
Code Mala Tang
Code Mala Tang
Apr 29, 2025 · Backend Development

Master FastAPI Middleware: From Built‑in to Custom Auth and Logging

This guide explains how FastAPI middleware works, outlines its request‑response lifecycle, shows built‑in examples like CORS and HTTPS redirect, and demonstrates how to create custom middleware for logging, authentication, and other cross‑cutting concerns.

AuthenticationBackendlogging
0 likes · 6 min read
Master FastAPI Middleware: From Built‑in to Custom Auth and Logging
Raymond Ops
Raymond Ops
Apr 24, 2025 · Cloud Native

Mastering Istio Security: Complete Guide to Mutual TLS, Authentication, and Authorization

This article explains how Istio secures micro‑service architectures by providing strong identity, fine‑grained access policies, transparent TLS encryption, and comprehensive AAA (authentication, authorization, audit) mechanisms, covering high‑level architecture, certificate management, peer and request authentication, and authorization policy design.

AuthenticationAuthorizationIstio
0 likes · 23 min read
Mastering Istio Security: Complete Guide to Mutual TLS, Authentication, and Authorization
Top Architect
Top Architect
Apr 21, 2025 · Information Security

Understanding JWT Token Security and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common token security threats such as theft, replay, and forgery, and presents practical mitigation measures including HTTPS, encryption, secure storage, short expiration, MFA, and safe token refresh mechanisms.

AuthenticationHTTPSJWT
0 likes · 14 min read
Understanding JWT Token Security and Mitigation Strategies
Top Architect
Top Architect
Apr 17, 2025 · Information Security

Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Replay‑Attack Prevention

This article presents a comprehensive design for securing third‑party APIs by using Access Key/Secret Key pairs, timestamp and nonce validation, signature generation, token handling, HTTPS, rate limiting, logging, idempotency, versioning, standardized response formats and practical Java code examples to prevent tampering and replay attacks.

API SecurityAccess KeyAuthentication
0 likes · 32 min read
Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Replay‑Attack Prevention
Alibaba Cloud Developer
Alibaba Cloud Developer
Apr 16, 2025 · Artificial Intelligence

Deploy AI Model Context Protocol (MCP) on Alibaba Cloud Serverless

An in‑depth guide explains the Model Context Protocol (MCP) as the AI era’s operating‑system interface, outlines ecosystem pain points, and shows how Alibaba Cloud Function Compute’s serverless platform provides optimal hosting, authentication, variable management, CI/CD, and fast‑mode options for deploying MCP services.

AIAuthenticationCloud Functions
0 likes · 10 min read
Deploy AI Model Context Protocol (MCP) on Alibaba Cloud Serverless
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Apr 10, 2025 · Backend Development

From Frontend Lightning Strike to Full‑Stack Node.js Backend: A Story and Implementation Guide

This article narrates a dramatic front‑end takeover during a high‑traffic promotion, then provides a step‑by‑step guide to building a Node.js backend service with Express, MongoDB, JWT authentication, and deployment considerations, illustrating performance trade‑offs between Java and Node.js.

AuthenticationBackend DevelopmentExpress
0 likes · 16 min read
From Frontend Lightning Strike to Full‑Stack Node.js Backend: A Story and Implementation Guide
Selected Java Interview Questions
Selected Java Interview Questions
Apr 8, 2025 · Backend Development

Authentication Implementation: Choosing Between JWT and Session in Backend Development

This article explains the technical selection between JWT and session for authentication, compares their differences, advantages, and disadvantages, and provides a complete Java implementation—including token generation, Redis storage, login/logout, password update, and request interception—demonstrating why JWT was chosen for a distributed backend system.

AuthenticationBackendJWT
0 likes · 13 min read
Authentication Implementation: Choosing Between JWT and Session in Backend Development
Architect
Architect
Apr 6, 2025 · Information Security

Technical Selection and Implementation of Authentication: JWT vs Session

This article compares JWT and session-based authentication, detailing their differences, certification processes, advantages, disadvantages, security considerations, performance impacts, token renewal, and revocation strategies, and provides a complete Java implementation using Spring, Redis, and custom utility classes.

AuthenticationJWTJava
0 likes · 12 min read
Technical Selection and Implementation of Authentication: JWT vs Session
Architect's Guide
Architect's Guide
Mar 31, 2025 · Information Security

Design and Security Practices for Third‑Party API Authentication and Signing

This article presents a comprehensive design scheme for third‑party APIs, covering permission segmentation, AK/SK generation, signature workflow and rules, secure API endpoint design, anti‑replay mechanisms, token handling, TLS encryption, database schema, and implementation examples in Java.

API SecurityAccess KeyAuthentication
0 likes · 30 min read
Design and Security Practices for Third‑Party API Authentication and Signing
Top Architecture Tech Stack
Top Architecture Tech Stack
Mar 25, 2025 · Information Security

Designing Secure Third‑Party API Interfaces: Authentication, Signature, and Best Practices

This guide details a secure third‑party API design, covering API key generation, request signing with timestamps and nonces, permission division, CRUD endpoint definitions, unified response structures, and best‑practice security measures such as HTTPS, IP whitelisting, rate limiting, logging, and idempotency handling.

API SecurityAuthenticationBackend
0 likes · 29 min read
Designing Secure Third‑Party API Interfaces: Authentication, Signature, and Best Practices
Liangxu Linux
Liangxu Linux
Mar 19, 2025 · Operations

Master FTP: Configure, Secure, and Manage Linux File Transfers

This guide explains the FTP protocol, active and passive modes, authentication options, and step‑by‑step Linux vsftpd configuration—including local, anonymous, and virtual user setups, permission tweaks, chroot jail rules, and file download/upload commands.

AuthenticationFTPLinux
0 likes · 10 min read
Master FTP: Configure, Secure, and Manage Linux File Transfers
Top Architect
Top Architect
Mar 17, 2025 · Information Security

OAuth 2.0 Overview and Spring Boot Implementation Guide

This article introduces OAuth 2.0 fundamentals, explains its roles and four grant types, and provides a step‑by‑step Spring Boot implementation with configuration classes, code snippets, and testing procedures, while also containing promotional material for AI‑related products and services.

APIAuthenticationOAuth2
0 likes · 12 min read
OAuth 2.0 Overview and Spring Boot Implementation Guide
php Courses
php Courses
Feb 21, 2025 · Backend Development

Best Practices for Laravel API Development in 2025

This guide presents comprehensive Laravel API development best practices for 2025, covering authentication with Sanctum and Passport, resource formatting, versioning, rate limiting, error handling, caching, and logging, offering code examples and practical advice to build secure, scalable, high‑performance APIs.

APIAuthenticationLaravel
0 likes · 6 min read
Best Practices for Laravel API Development in 2025
Java Architecture Diary
Java Architecture Diary
Feb 19, 2025 · Information Security

How Spring Security 6.4’s One-Time Token Login Enhances Security and UX

Spring Security 6.4 introduces One-Time Token Login, allowing users to authenticate via a magic link sent by email instead of passwords; the article explains its core concepts, token lifecycle, essential components, and provides step‑by‑step code examples for configuring and implementing this secure, user‑friendly authentication method.

AuthenticationJavaMagic Link
0 likes · 5 min read
How Spring Security 6.4’s One-Time Token Login Enhances Security and UX
Java Tech Enthusiast
Java Tech Enthusiast
Feb 12, 2025 · Backend Development

How to Implement Single Device Login in Web Applications

The article explains how to enforce single‑device login in web apps by contrasting token‑version control—incrementing a version field in the database and embedding it in JWTs to invalidate older tokens—with a WebSocket‑based method that pushes real‑time logout messages, comparing their trade‑offs and suggesting a hybrid solution.

AuthenticationBackend DevelopmentWebSocket
0 likes · 5 min read
How to Implement Single Device Login in Web Applications
Code Ape Tech Column
Code Ape Tech Column
Feb 4, 2025 · Backend Development

Sa-Token Java Permission Authentication Framework: Overview, Login, and Permission Implementation

This article introduces the lightweight Sa-Token Java authentication framework, explains why it is chosen over Spring Security and Shiro, details its login and permission APIs with code examples, shows how to configure it in Spring Boot and WebFlux projects, and lists its extensive feature set for secure backend development.

AuthenticationBackendJava
0 likes · 23 min read
Sa-Token Java Permission Authentication Framework: Overview, Login, and Permission Implementation
Top Architect
Top Architect
Jan 30, 2025 · Backend Development

OAuth 2.0 Tutorial with Spring Boot Implementation and Testing

This article introduces OAuth 2.0 concepts, explains its roles and grant types, and provides a complete Spring Boot implementation—including configuration classes, dependency setup, and test endpoints—followed by step‑by‑step testing results with screenshots.

AuthenticationBackendOAuth2
0 likes · 13 min read
OAuth 2.0 Tutorial with Spring Boot Implementation and Testing
Top Architect
Top Architect
Jan 22, 2025 · Information Security

Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Token Management

This article presents a comprehensive design for securing third‑party API calls by generating unique Access Key/Secret Key pairs, defining permission granularity, implementing signature generation with timestamps and nonces, handling token lifecycle, and providing concrete Java and SQL code examples for practical deployment.

AK/SKAPI SecurityAuthentication
0 likes · 31 min read
Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Token Management
Code Ape Tech Column
Code Ape Tech Column
Jan 20, 2025 · Backend Development

Integrating Spring Cloud Gateway with OAuth2.0 for Unified Authentication and Authorization

This article demonstrates how to integrate Spring Cloud Gateway with OAuth2.0 to build a unified authentication and authorization solution for microservices, covering architecture design, service setup, JWT token handling, custom authentication and authorization managers, exception handling, and end‑to‑end testing.

AuthenticationOAuth2.0
0 likes · 10 min read
Integrating Spring Cloud Gateway with OAuth2.0 for Unified Authentication and Authorization
dbaplus Community
dbaplus Community
Dec 29, 2024 · Information Security

Why Many Developers Warn Against Using JWTs for Authentication

This article explains what JSON Web Tokens are, outlines their typical usage flow, and critically examines their drawbacks such as size overhead, redundant signatures, revocation challenges, stale data, lack of encryption, and broader security concerns.

AuthenticationJWTSecurity
0 likes · 6 min read
Why Many Developers Warn Against Using JWTs for Authentication
21CTO
21CTO
Dec 16, 2024 · Information Security

Pick the Best Identity Verification Framework: Clerk, Supabase Auth, or Better Auth

This article introduces three top‑tier authentication solutions—Clerk, Supabase Auth, and Better Auth—detailing their key features, supported strategies, customization options, and integration benefits, helping developers decide which framework best fits their user management and security needs.

AuthenticationBackendIdentity verification
0 likes · 4 min read
Pick the Best Identity Verification Framework: Clerk, Supabase Auth, or Better Auth
Eric Tech Circle
Eric Tech Circle
Dec 16, 2024 · Backend Development

Implementing Secure Double‑Token Authentication in WeChat Mini‑Programs

This article explains the design and implementation of a dual‑token authentication system—short‑lived AccessToken and long‑lived RefreshToken—for WeChat Mini‑Programs, covering token generation, login flow, client‑side handling of 401/403 errors, and best‑practice testing strategies.

API SecurityAccessTokenAuthentication
0 likes · 6 min read
Implementing Secure Double‑Token Authentication in WeChat Mini‑Programs
Code Mala Tang
Code Mala Tang
Dec 16, 2024 · Information Security

Avoid These 9 Common Node.js Security Pitfalls and Harden Your Apps

This guide reveals nine frequent security mistakes in Node.js applications—from misconfigured CORS and vulnerable dependencies to weak authentication and missing HTTPS—offering concrete code‑level solutions and best‑practice recommendations to protect your backend.

AuthenticationCORSNode.js
0 likes · 8 min read
Avoid These 9 Common Node.js Security Pitfalls and Harden Your Apps
Architect's Guide
Architect's Guide
Dec 16, 2024 · Information Security

Understanding the Mechanics of QR Code Login and Token‑Based Authentication

This article explains how QR code login works by describing QR code fundamentals, token‑based authentication, and the step‑by‑step process—including QR generation, scanning, state transitions, and final confirmation—that enables a mobile device to securely authenticate a PC session.

AuthenticationMobileQR code
0 likes · 11 min read
Understanding the Mechanics of QR Code Login and Token‑Based Authentication
Architecture and Beyond
Architecture and Beyond
Dec 7, 2024 · Information Security

Understanding Multi-Factor Authentication (MFA) and Google Authenticator: Principles, Implementation, and Limitations

This article explains the concepts, importance, various forms, and practical implementation details of MFA and 2FA—including the Google Authenticator TOTP mechanism—while also discussing their limitations, costs, and future directions in modern identity security.

2FAAuthenticationGoogle Authenticator
0 likes · 15 min read
Understanding Multi-Factor Authentication (MFA) and Google Authenticator: Principles, Implementation, and Limitations
Top Architect
Top Architect
Dec 6, 2024 · Information Security

Design and Implementation of Secure Third‑Party API Authentication Using AK/SK, Signatures, and Tokens

This article presents a comprehensive design for securing third‑party APIs, covering permission segmentation, AK/SK generation, signature workflow and rules, anti‑replay mechanisms, token handling, detailed API endpoint specifications, and best‑practice security measures with illustrative Java code examples.

AK/SKAPI SecurityAuthentication
0 likes · 32 min read
Design and Implementation of Secure Third‑Party API Authentication Using AK/SK, Signatures, and Tokens
Code Ape Tech Column
Code Ape Tech Column
Nov 30, 2024 · Cloud Native

Implementing Distributed Authentication in Spring Cloud Alibaba Using Custom Annotations

This article demonstrates how to move authentication from the gateway to downstream microservices in a Spring Cloud Alibaba setup by disabling the gateway’s ReactiveAuthorizationManager, defining three custom security annotations, creating an AOP aspect to enforce them, and showing practical usage examples with role‑based access control and Feign calls.

AuthenticationJavaSpring Cloud
0 likes · 9 min read
Implementing Distributed Authentication in Spring Cloud Alibaba Using Custom Annotations
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Nov 21, 2024 · Information Security

Mastering Single Sign-On (SSO): Principles, Tokens, and Real-World Applications

This article provides a comprehensive overview of Single Sign-On (SSO), explaining its core concepts, authentication flow, token generation and validation, and practical use cases across enterprises, education, finance, and e‑commerce, while also offering insights into security benefits and implementation details.

AuthenticationSSOSecurity
0 likes · 5 min read
Mastering Single Sign-On (SSO): Principles, Tokens, and Real-World Applications
php Courses
php Courses
Nov 14, 2024 · Information Security

Best Practices for Securing Laravel Web Applications

This article outlines essential Laravel security practices, including built‑in authentication, CSRF protection, input validation, HTTPS enforcement, secure session handling, regular dependency updates, and rate limiting, providing developers with concrete steps to protect web applications from common attacks.

AuthenticationCSRFHTTPS
0 likes · 6 min read
Best Practices for Securing Laravel Web Applications
37 Interactive Technology Team
37 Interactive Technology Team
Nov 11, 2024 · Information Security

Background, Definition, Structure, and Authentication Process of JWT (JSON Web Token)

JSON Web Token (JWT) is a compact, self‑contained, stateless token that encodes header, payload, and signature in Base64URL, enabling secure, signature‑verified authentication without server‑side session storage, simplifying scaling, supporting cross‑domain use, while offering advantages like lightweight extensibility and drawbacks such as revocation difficulty and secret‑key reliance.

AuthenticationAuthorizationJSON
0 likes · 16 min read
Background, Definition, Structure, and Authentication Process of JWT (JSON Web Token)
Java Architecture Stack
Java Architecture Stack
Nov 6, 2024 · Information Security

Mastering Apache Shiro: Core Concepts, Real‑World Usage, and JWT Microservice Integration

This article explains Apache Shiro’s fundamental components—Subject, SecurityManager, Realm, Session, authentication, authorization, and cryptography—then walks through a complete configuration example, a custom Realm, JWT integration, and a Spring Boot microservice scenario to illustrate secure, stateless authentication and fine‑grained permission control.

Apache ShiroAuthenticationAuthorization
0 likes · 13 min read
Mastering Apache Shiro: Core Concepts, Real‑World Usage, and JWT Microservice Integration
IT Services Circle
IT Services Circle
Oct 27, 2024 · Information Security

Understanding Password Salting: Why It Matters, How to Generate and Use It, and Additional Security Measures

This article explains what password salting is, why it is essential for protecting stored passwords against rainbow‑table and brute‑force attacks, outlines step‑by‑step how to generate, apply, and verify salted hashes, and lists additional best practices for enhancing overall credential security.

AuthenticationHashingpassword
0 likes · 5 min read
Understanding Password Salting: Why It Matters, How to Generate and Use It, and Additional Security Measures
MaGe Linux Operations
MaGe Linux Operations
Oct 16, 2024 · Information Security

How to Build a Unified Enterprise SSO System with Go and Vue

This guide explains the challenges of multiple logins in enterprises, introduces Single Sign‑On concepts and protocols, and provides a step‑by‑step deployment of an open‑source Go‑Vue SSO solution, covering authentication methods, supported protocols, security features, and Docker‑based installation.

AuthenticationDockerGo
0 likes · 8 min read
How to Build a Unified Enterprise SSO System with Go and Vue
Selected Java Interview Questions
Selected Java Interview Questions
Sep 26, 2024 · Information Security

Understanding JWT Token Security: Threats and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common security threats such as theft, replay, and forgery, and presents practical measures—including HTTPS, encryption, secure storage, short lifetimes, two‑factor authentication, and safe token refresh—to protect token integrity in modern web applications.

AuthenticationJWTWeb Security
0 likes · 14 min read
Understanding JWT Token Security: Threats and Mitigation Strategies
Architect
Architect
Sep 16, 2024 · Backend Development

Seamless Token Refresh in Spring Boot & Axios: Full Implementation Guide

This article explains how to implement invisible token refresh for authentication servers using Spring Boot gateway filters, JWT handling, Axios interceptors, and a client‑side timer, compares client‑ and server‑side approaches, and provides complete code examples and practical recommendations.

AuthenticationJWTSpring Boot
0 likes · 21 min read
Seamless Token Refresh in Spring Boot & Axios: Full Implementation Guide
Architecture Digest
Architecture Digest
Sep 8, 2024 · Information Security

Combining JWT and Session for Secure Authentication and State Management

This article explains how JWT provides stateless user authentication while Session adds an extra security layer and state management, detailing their respective roles, the reasons for using Session alongside JWT, and offering Java code examples that illustrate their combined implementation.

AuthenticationBackendJWT
0 likes · 7 min read
Combining JWT and Session for Secure Authentication and State Management
Top Architect
Top Architect
Sep 1, 2024 · Information Security

Understanding JWT Token Security: Threats and Protection Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token-based authentication with traditional session methods, outlines common security threats such as theft, replay and forgery, and provides practical measures—including HTTPS, encryption, proper storage, expiration policies, and two-factor authentication—to safeguard token integrity.

AuthenticationJWTWeb Development
0 likes · 13 min read
Understanding JWT Token Security: Threats and Protection Strategies
Architect
Architect
Aug 26, 2024 · Information Security

Understanding JWT Token Security: Threats and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token-based authentication with traditional session methods, outlines common security threats such as theft, replay and forgery, and provides practical mitigation measures including HTTPS, encryption, secure storage, short lifetimes, two‑factor authentication, and safe token refresh strategies.

AuthenticationJWTWeb Security
0 likes · 12 min read
Understanding JWT Token Security: Threats and Mitigation Strategies
Su San Talks Tech
Su San Talks Tech
Aug 19, 2024 · Information Security

Mastering RBAC with Spring Security and JWT: A Complete Guide

This tutorial walks through RBAC fundamentals, model classifications (RBAC0‑3), permission and user‑group concepts, then demonstrates practical Spring Security setups including in‑memory authentication, JWT integration, JSON‑based login, password encryption with BCrypt, and database‑backed authentication, providing complete code examples.

AuthenticationAuthorizationJWT
0 likes · 19 min read
Mastering RBAC with Spring Security and JWT: A Complete Guide
php Courses
php Courses
Aug 16, 2024 · Backend Development

Using PHP LDAP Functions to Connect, Bind, and Authenticate Users

This tutorial explains how to use PHP's LDAP functions—ldap_connect, ldap_bind, ldap_search, and ldap_get_entries—to establish a connection to an LDAP server, bind an administrator account, and perform user authentication with example code for each step.

AuthenticationDirectory ServicesLDAP
0 likes · 4 min read
Using PHP LDAP Functions to Connect, Bind, and Authenticate Users
Top Architect
Top Architect
Aug 11, 2024 · Information Security

Deep Dive into Spring Security Architecture and Implementation Principles

This article provides an in‑depth analysis of Spring Security 6.x architecture, explaining its filter‑chain design, authentication and authorization mechanisms, key components such as DelegatingFilterProxy, FilterChainProxy, SecurityFilterChain, and offers code examples and practical guidance for developers.

AuthenticationAuthorizationJava
0 likes · 31 min read
Deep Dive into Spring Security Architecture and Implementation Principles
Code Ape Tech Column
Code Ape Tech Column
Jul 31, 2024 · Information Security

Designing User Authentication in Microservice Architecture with JWT and Spring Cloud Gateway

This article explains traditional session‑based authentication, introduces JWT and JJWT usage with Java code examples, and compares two microservice authentication designs—service‑side verification and API‑gateway unified verification—while discussing their trade‑offs, challenges, and practical implementation tips.

AuthenticationJWTJava
0 likes · 15 min read
Designing User Authentication in Microservice Architecture with JWT and Spring Cloud Gateway
Java Architect Essentials
Java Architect Essentials
Jul 30, 2024 · Backend Development

Transparent Token Refresh: Client‑Side and Server‑Side Implementations

This article explains how to implement seamless, invisible token refresh for authentication systems, covering client‑side strategies using Axios interceptors and timers, server‑side gateway filters with Spring Boot, code examples for detecting token expiration, obtaining new tokens, and choosing between client and server approaches based on security and performance considerations.

AuthenticationJWTToken
0 likes · 23 min read
Transparent Token Refresh: Client‑Side and Server‑Side Implementations
Top Architect
Top Architect
Jul 30, 2024 · Information Security

Understanding RBAC and Implementing Spring Security with JWT in Java

This article explains the concepts and models of Role‑Based Access Control (RBAC), demonstrates how to configure Spring Security for in‑memory and JWT‑based authentication, and provides complete Java code examples for permissions, user groups, password encryption, and custom login filters.

AuthenticationJWTJava
0 likes · 18 min read
Understanding RBAC and Implementing Spring Security with JWT in Java
Architect's Guide
Architect's Guide
Jul 27, 2024 · Information Security

Understanding OAuth 2.0: Principles, Architecture, and Implementation

This article explains the OAuth 2.0 authorization framework, its core concepts, architecture, key roles, and implementation patterns for web, user‑agent, and native applications, helping readers grasp how delegated access works without sharing user credentials.

AuthenticationAuthorizationOAuth2
0 likes · 9 min read
Understanding OAuth 2.0: Principles, Architecture, and Implementation
IT Architects Alliance
IT Architects Alliance
Jul 26, 2024 · Information Security

Unveiling Spring Security 6: Architecture, Filters, and Authentication Deep Dive

This article provides a comprehensive analysis of Spring Security 6's architecture, explaining how the framework uses a chain of servlet Filters, the DelegatingFilterProxy, and the SecurityFilterChain to implement authentication, authorization, and protection against common attacks, while also offering practical debugging tips and configuration guidance.

AuthenticationAuthorizationFilter Chain
0 likes · 32 min read
Unveiling Spring Security 6: Architecture, Filters, and Authentication Deep Dive
Eric Tech Circle
Eric Tech Circle
Jul 24, 2024 · Backend Development

Designing Secure Microservice Authentication with Spring Boot 3 and OAuth2

This article explains the key changes in Spring Boot 3, outlines the new OAuth2 components, and provides a detailed design for secure microservice authentication and authorization using Spring Authorization Server, JWT, API Gateway, and client applications, complete with architecture diagrams and implementation steps.

AuthenticationAuthorizationBackend
0 likes · 9 min read
Designing Secure Microservice Authentication with Spring Boot 3 and OAuth2
Top Architect
Top Architect
Jul 24, 2024 · Information Security

Understanding Session and Token-Based Authentication with JWT in Web Applications

The article explains how HTTP’s stateless nature requires session or token mechanisms for preserving user state, compares session‑based and JWT token authentication, details JWT structure, and provides Java code examples for generating, verifying, and extracting token information, while also promoting related services.

AuthenticationJWTJava
0 likes · 10 min read
Understanding Session and Token-Based Authentication with JWT in Web Applications
Java Architect Essentials
Java Architect Essentials
Jul 17, 2024 · Information Security

Why Many Experts Advise Against Using JWT for Authentication

This article explains what JSON Web Tokens are, outlines their typical workflow, and critically examines their drawbacks—including size overhead, redundant signatures, revocation challenges, lack of encryption, and broader security concerns—before concluding with practical recommendations for their use.

AuthenticationJWTSecurity
0 likes · 8 min read
Why Many Experts Advise Against Using JWT for Authentication
Top Architect
Top Architect
Jul 13, 2024 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article explains the OAuth2.0 authorization protocol, distinguishes it from single sign‑on, describes its core entities and step‑by‑step flow, and outlines how web servers, user agents, and native applications interact to securely obtain access tokens for protected resources.

AuthenticationAuthorizationBackend Development
0 likes · 12 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
Java Tech Enthusiast
Java Tech Enthusiast
Jul 12, 2024 · Databases

New Features, Deprecations, and Removals in MySQL 9.0

MySQL 9.0, released July 2 2024, introduces EXPLAIN JSON output stored in variables, native EVENT DDL statements, and two new performance‑schema tables for variable metadata, while deprecating the old variables_info columns and removing the mysql_native_password plugin in favor of caching_sha2_password, enhancing observability and security.

AuthenticationEventPerformance Schema
0 likes · 11 min read
New Features, Deprecations, and Removals in MySQL 9.0
macrozheng
macrozheng
Jul 12, 2024 · Information Security

Understanding JWT: Secure Token-Based Authentication for Modern Apps

This article explains the evolution from traditional cookie‑session authentication to token‑based JWT, detailing its structure, security mechanisms, implementation steps, advantages, limitations, and practical Java code examples, while also comparing it with modern authentication challenges in web and mobile environments.

AuthenticationJWTJava
0 likes · 15 min read
Understanding JWT: Secure Token-Based Authentication for Modern Apps
Top Architect
Top Architect
Jul 5, 2024 · Information Security

Deep Dive into Spring Security Architecture: Authentication, Authorization, and Filter Chains

This article explains the core architecture of Spring Security 6.x, detailing how a chain of servlet Filters implements authentication and authorization, the role of DelegatingFilterProxy, SecurityFilterChain, and the extensible components such as AuthenticationManager, UserDetailsService, and PasswordEncoder.

AuthenticationAuthorizationJava
0 likes · 31 min read
Deep Dive into Spring Security Architecture: Authentication, Authorization, and Filter Chains
Architect
Architect
Jul 1, 2024 · Information Security

Spring Security 6.1 Deep Dive: Architecture, Filters, and Authentication Explained

This article provides a comprehensive analysis of Spring Security 6.1, covering its core architecture, the role of FilterChainProxy, detailed authentication and authorization flows, key interfaces such as SecurityFilterChain, AuthenticationManager, and practical code examples to help developers understand and debug the framework.

AuthenticationAuthorizationFilterChain
0 likes · 34 min read
Spring Security 6.1 Deep Dive: Architecture, Filters, and Authentication Explained
Top Architect
Top Architect
Jul 1, 2024 · Information Security

Understanding Single Sign-On (SSO) and CAS Authentication Flow

This article explains the concept, definitions, and three deployment types of Single Sign-On (SSO), introduces the Central Authentication Service (CAS) mechanism, and details step‑by‑step login and logout processes across multiple web applications, illustrating each flow with diagrams and examples.

AuthenticationCASSSO
0 likes · 12 min read
Understanding Single Sign-On (SSO) and CAS Authentication Flow
Eric Tech Circle
Eric Tech Circle
Jun 30, 2024 · Information Security

Build Enterprise SSO Fast: Keycloak, SpringBoot, OAuth2 & JWT Guide

This article provides a comprehensive walkthrough of Single Sign‑On (SSO) concepts, common protocols, login flow diagrams, and multiple implementation options, then dives into step‑by‑step deployment of an enterprise‑grade SSO system using Keycloak with Docker or Kubernetes, including configuration, client setup, custom extensions, and practical code snippets.

AuthenticationDockerJWT
0 likes · 17 min read
Build Enterprise SSO Fast: Keycloak, SpringBoot, OAuth2 & JWT Guide
21CTO
21CTO
Jun 22, 2024 · Backend Development

How to Build a Secure Laravel 11 API with Sanctum – Step‑by‑Step Guide

This tutorial walks you through installing Laravel 11, adding Sanctum for API authentication, creating migrations, models, resources, controllers, and routes, and finally testing the API with Postman, providing complete code snippets and configuration details for a functional backend.

APIAuthenticationBackend Development
0 likes · 11 min read
How to Build a Secure Laravel 11 API with Sanctum – Step‑by‑Step Guide
IT Services Circle
IT Services Circle
Jun 17, 2024 · Information Security

Disgruntled Former Employee Hacks Singapore IT Firm, Deletes 180 Virtual Servers, Highlighting Human Factors in Enterprise Security

A former NCS QA engineer in Singapore, feeling wronged after his dismissal, illegally accessed the company's internal systems, wrote malicious scripts, and deleted 180 virtual servers, causing $678,000 in losses and prompting security experts to stress the importance of account deactivation, continuous monitoring, and the impact of employee emotions on corporate security.

AuthenticationSecurity Breachcybercrime
0 likes · 7 min read
Disgruntled Former Employee Hacks Singapore IT Firm, Deletes 180 Virtual Servers, Highlighting Human Factors in Enterprise Security
Top Architect
Top Architect
Jun 12, 2024 · Information Security

Understanding RBAC and Implementing Spring Security with JWT

This article explains the fundamentals of Role‑Based Access Control (RBAC), its model classifications, permission concepts, and user‑group usage, then demonstrates how to implement RBAC in a Spring Security application, including in‑memory authentication, JWT integration, JSON login, and password encryption techniques.

AuthenticationJWTJava
0 likes · 17 min read
Understanding RBAC and Implementing Spring Security with JWT
Java High-Performance Architecture
Java High-Performance Architecture
Jun 4, 2024 · Backend Development

Master Spring Security & JWT for Seamless Single Sign-On (SSO)

This comprehensive guide walks you through the concepts of Single Sign-On, the mechanics of JWT, RSA asymmetric encryption, and step‑by‑step integration of Spring Security with JWT, providing full Maven project setup, configuration files, utility classes, custom filters, and testing instructions for a robust distributed authentication system.

AuthenticationBackend DevelopmentJWT
0 likes · 25 min read
Master Spring Security & JWT for Seamless Single Sign-On (SSO)
Architect's Guide
Architect's Guide
May 19, 2024 · Information Security

RBAC Permission Analysis and Spring Security Integration with JWT

This article explains the fundamentals of role‑based access control (RBAC), its model variants, and user‑group usage, then demonstrates how to configure Spring Security with in‑memory authentication, integrate JWT for stateless token‑based authentication, customize JSON login, and securely encrypt passwords using BCrypt.

AuthenticationBackendJWT
0 likes · 15 min read
RBAC Permission Analysis and Spring Security Integration with JWT